Report - wlanext.exe

UPX PE File PE32
ScreenShot
Created 2024.10.24 10:10 Machine s1_win7_x6401
Filename wlanext.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
AI Score
6
Behavior Score
6.0
ZERO API file : clean
VT API (file) 44 detected (AIDetectMalware, Autoit, Malicious, score, TrojanPWS, Zbot, TrojanAitInject, Unsafe, V5qb, confidence, GenericKD, Attribute, HighConfidence, moderate confidence, FileRepMalware, Misc, Strab, GenSteal, xzkgj, moderate, Detected, Wacatac, YUAL8Y, Artemis, Chgt, Oqil, susgen, Sonbokli, A9uj)
md5 0369d0934ddf416abc3f1434d0a8742d
sha256 76e42fbca8f0727bbaf291471eda2e95d9ab28071a8d238dc55a30feff03112a
ssdeep 12288:7ozGdX0M4ornOmZIzfMwHHQmRROXKLQqlp6SBeI21GRRUXFI9OaGU0mAdby:74GHnhIzOacQEoep1GDUW9lAlA
imphash fc6683d30d9f25244a50fd5357825e79
impfuzzy 12:VA/DzqYOZkKDHLB78r4B3ExjLAkcOaiTQQnd3mxCHH:V0DBaPHLB7PxExjLAkcOV2kn
  Network IP location

Signature (14cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
watch Harvests credentials from local email clients
watch Harvests credentials from local FTP client softwares
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x57bbe0 LoadLibraryA
 0x57bbe4 GetProcAddress
 0x57bbe8 VirtualProtect
 0x57bbec VirtualAlloc
 0x57bbf0 VirtualFree
 0x57bbf4 ExitProcess
ADVAPI32.dll
 0x57bbfc GetAce
COMCTL32.dll
 0x57bc04 ImageList_Remove
COMDLG32.dll
 0x57bc0c GetOpenFileNameW
GDI32.dll
 0x57bc14 LineTo
IPHLPAPI.DLL
 0x57bc1c IcmpSendEcho
MPR.dll
 0x57bc24 WNetUseConnectionW
ole32.dll
 0x57bc2c CoGetObject
OLEAUT32.dll
 0x57bc34 VariantInit
PSAPI.DLL
 0x57bc3c GetProcessMemoryInfo
SHELL32.dll
 0x57bc44 DragFinish
USER32.dll
 0x57bc4c GetDC
USERENV.dll
 0x57bc54 LoadUserProfileW
UxTheme.dll
 0x57bc5c IsThemeActive
VERSION.dll
 0x57bc64 VerQueryValueW
WININET.dll
 0x57bc6c FtpOpenFileW
WINMM.dll
 0x57bc74 timeGetTime
WSOCK32.dll
 0x57bc7c connect

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure