Report - mm.exe

Malicious Library Malicious Packer Obsidium protector UPX PE File PE32 OS Processor Check PE64
ScreenShot
Created 2024.10.30 09:50 Machine s1_win7_x6403
Filename mm.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
2.8
ZERO API file : clean
VT API (file) 50 detected (FamVT, EqtoneGQ, BitMiner, malicious, high confidence, Artemis, DeepScan, Dacic, BitCoinMiner, unsafe, Save, Attribute, HighConfidence, CoinMiner, Miner, ajmz, hmsukf, HackTool, XMRMiner, CLASSIC, R002C0WI423, Infected, Generic Reputation PUA, ai score=83, Malware@#1zy989m8u7xhz, Detected, R002H0CI423, RiskTool, 7ORE5vM8QpY, susgen, confidence)
md5 d782071609e332aa2c8caa1778d76431
sha256 b003817debf3e7e8bf5c773628cc0072bcf84a5c726e8a1743e2a5a99424074a
ssdeep 24576:O1kdoDrvYM8Rti01lzEQi7NrTYKC7Jn/uso7sxPkRlcnBvzV2mIGfpd+nUleGhVu:KkdoXYM8RSxNrT91so7sxPkRqNT7fvV
imphash 142f9643f11fc54d62544563f109f10f
impfuzzy 192:KMz23NOuUKzLu57oCbA9KsecOcncJOkP1PO3O:KHNOIb92Ja61PO3O
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice Foreign language identified in PE resource
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (14cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch Obsidium_Zero Obsidium protector file binaries (download)
watch Obsidium_Zero Obsidium protector file binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x42109c FileTimeToSystemTime
 0x4210a0 FileTimeToLocalFileTime
 0x4210a4 GetTickCount
 0x4210a8 GetFileAttributesA
 0x4210ac GetFileSize
 0x4210b0 GetFileTime
 0x4210b4 RtlUnwind
 0x4210b8 HeapAlloc
 0x4210bc GetStartupInfoA
 0x4210c0 GetCommandLineA
 0x4210c4 ExitProcess
 0x4210c8 HeapFree
 0x4210cc RaiseException
 0x4210d0 HeapReAlloc
 0x4210d4 HeapSize
 0x4210d8 GetACP
 0x4210dc GetTimeZoneInformation
 0x4210e0 GetEnvironmentVariableA
 0x4210e4 GetVersionExA
 0x4210e8 HeapDestroy
 0x4210ec HeapCreate
 0x4210f0 VirtualAlloc
 0x4210f4 IsBadWritePtr
 0x4210f8 UnhandledExceptionFilter
 0x4210fc FreeEnvironmentStringsA
 0x421100 FreeEnvironmentStringsW
 0x421104 GetEnvironmentStrings
 0x421108 GetEnvironmentStringsW
 0x42110c SetHandleCount
 0x421110 GetStdHandle
 0x421114 GetFileType
 0x421118 LCMapStringA
 0x42111c LCMapStringW
 0x421120 GetStringTypeA
 0x421124 GetStringTypeW
 0x421128 SetUnhandledExceptionFilter
 0x42112c IsBadReadPtr
 0x421130 IsBadCodePtr
 0x421134 SetStdHandle
 0x421138 CompareStringA
 0x42113c CompareStringW
 0x421140 SetEnvironmentVariableA
 0x421144 GetFullPathNameA
 0x421148 GetVolumeInformationA
 0x42114c FindFirstFileA
 0x421150 FindClose
 0x421154 SetEndOfFile
 0x421158 UnlockFile
 0x42115c LockFile
 0x421160 FlushFileBuffers
 0x421164 SetFilePointer
 0x421168 ReadFile
 0x42116c GetCurrentProcess
 0x421170 DuplicateHandle
 0x421174 SetErrorMode
 0x421178 GetOEMCP
 0x42117c GetCPInfo
 0x421180 GetThreadLocale
 0x421184 GetProcessVersion
 0x421188 WritePrivateProfileStringA
 0x42118c GlobalFlags
 0x421190 lstrcpynA
 0x421194 TlsGetValue
 0x421198 LocalReAlloc
 0x42119c TlsSetValue
 0x4211a0 EnterCriticalSection
 0x4211a4 GlobalReAlloc
 0x4211a8 LeaveCriticalSection
 0x4211ac TlsFree
 0x4211b0 GlobalHandle
 0x4211b4 DeleteCriticalSection
 0x4211b8 TlsAlloc
 0x4211bc InitializeCriticalSection
 0x4211c0 LocalAlloc
 0x4211c4 MulDiv
 0x4211c8 SetLastError
 0x4211cc LoadLibraryA
 0x4211d0 FreeLibrary
 0x4211d4 GetVersion
 0x4211d8 lstrcatA
 0x4211dc GlobalGetAtomNameA
 0x4211e0 GlobalAddAtomA
 0x4211e4 GlobalFindAtomA
 0x4211e8 lstrcpyA
 0x4211ec GetProcAddress
 0x4211f0 GlobalUnlock
 0x4211f4 GlobalFree
 0x4211f8 FormatMessageA
 0x4211fc LocalFree
 0x421200 WideCharToMultiByte
 0x421204 lstrlenA
 0x421208 InterlockedDecrement
 0x42120c InterlockedIncrement
 0x421210 GetModuleFileNameA
 0x421214 GlobalLock
 0x421218 GlobalAlloc
 0x42121c GlobalDeleteAtom
 0x421220 lstrcmpA
 0x421224 lstrcmpiA
 0x421228 GetCurrentThread
 0x42122c GetCurrentThreadId
 0x421230 GetSystemInfo
 0x421234 GetSystemTimeAsFileTime
 0x421238 GetProcessTimes
 0x42123c SetFileAttributesA
 0x421240 CreateProcessA
 0x421244 GetLastError
 0x421248 CreateFileW
 0x42124c MultiByteToWideChar
 0x421250 GetExitCodeProcess
 0x421254 Sleep
 0x421258 CreateToolhelp32Snapshot
 0x42125c Process32First
 0x421260 Process32Next
 0x421264 OpenProcess
 0x421268 TerminateProcess
 0x42126c GetModuleHandleA
 0x421270 FindResourceA
 0x421274 LoadResource
 0x421278 LockResource
 0x42127c SizeofResource
 0x421280 CreateFileA
 0x421284 WriteFile
 0x421288 VirtualFree
 0x42128c CloseHandle
USER32.dll
 0x4212c4 GetSysColorBrush
 0x4212c8 CharNextA
 0x4212cc CopyAcceleratorTableA
 0x4212d0 SetRect
 0x4212d4 GetNextDlgGroupItem
 0x4212d8 MessageBeep
 0x4212dc CharUpperA
 0x4212e0 RegisterClipboardFormatA
 0x4212e4 PostThreadMessageA
 0x4212e8 GetDesktopWindow
 0x4212ec LoadCursorA
 0x4212f0 DestroyMenu
 0x4212f4 GrayStringA
 0x4212f8 DrawTextA
 0x4212fc TabbedTextOutA
 0x421300 EndPaint
 0x421304 BeginPaint
 0x421308 GetWindowDC
 0x42130c ReleaseDC
 0x421310 GetDC
 0x421314 ClientToScreen
 0x421318 LoadStringA
 0x42131c ShowWindow
 0x421320 MoveWindow
 0x421324 SetWindowTextA
 0x421328 IsDialogMessageA
 0x42132c UpdateWindow
 0x421330 SendDlgItemMessageA
 0x421334 MapWindowPoints
 0x421338 GetSysColor
 0x42133c SetFocus
 0x421340 AdjustWindowRectEx
 0x421344 CopyRect
 0x421348 GetTopWindow
 0x42134c IsChild
 0x421350 GetCapture
 0x421354 WinHelpA
 0x421358 GetClassInfoA
 0x42135c RegisterClassA
 0x421360 GetMenu
 0x421364 GetMenuItemCount
 0x421368 GetSubMenu
 0x42136c GetMenuItemID
 0x421370 GetWindowTextA
 0x421374 GetDlgCtrlID
 0x421378 CreateWindowExA
 0x42137c GetClassLongA
 0x421380 SetPropA
 0x421384 UnhookWindowsHookEx
 0x421388 GetPropA
 0x42138c CallWindowProcA
 0x421390 RemovePropA
 0x421394 DefWindowProcA
 0x421398 GetMessageTime
 0x42139c GetMessagePos
 0x4213a0 GetForegroundWindow
 0x4213a4 SetForegroundWindow
 0x4213a8 SetWindowLongA
 0x4213ac RegisterWindowMessageA
 0x4213b0 OffsetRect
 0x4213b4 SystemParametersInfoA
 0x4213b8 GetWindowPlacement
 0x4213bc GetWindowRect
 0x4213c0 EndDialog
 0x4213c4 SetActiveWindow
 0x4213c8 IsWindow
 0x4213cc CreateDialogIndirectParamA
 0x4213d0 DestroyWindow
 0x4213d4 GetDlgItem
 0x4213d8 MapDialogRect
 0x4213dc SetWindowPos
 0x4213e0 GetWindow
 0x4213e4 SetWindowContextHelpId
 0x4213e8 GetMenuCheckMarkDimensions
 0x4213ec LoadBitmapA
 0x4213f0 GetMenuState
 0x4213f4 ModifyMenuA
 0x4213f8 SetMenuItemBitmaps
 0x4213fc CheckMenuItem
 0x421400 EnableMenuItem
 0x421404 GetFocus
 0x421408 PtInRect
 0x42140c GetClassNameA
 0x421410 GetNextDlgTabItem
 0x421414 GetMessageA
 0x421418 TranslateMessage
 0x42141c DispatchMessageA
 0x421420 GetActiveWindow
 0x421424 GetKeyState
 0x421428 CallNextHookEx
 0x42142c ValidateRect
 0x421430 IsWindowVisible
 0x421434 PeekMessageA
 0x421438 GetCursorPos
 0x42143c SetWindowsHookExA
 0x421440 GetParent
 0x421444 GetLastActivePopup
 0x421448 IsWindowEnabled
 0x42144c GetWindowLongA
 0x421450 MessageBoxA
 0x421454 SetCursor
 0x421458 PostQuitMessage
 0x42145c PostMessageA
 0x421460 LoadIconA
 0x421464 EnableWindow
 0x421468 GetClientRect
 0x42146c IsIconic
 0x421470 GetSystemMenu
 0x421474 SendMessageA
 0x421478 AppendMenuA
 0x42147c DrawIcon
 0x421480 GetSystemMetrics
 0x421484 wsprintfA
 0x421488 UnregisterClassA
GDI32.dll
 0x42101c GetWindowExtEx
 0x421020 PtVisible
 0x421024 RectVisible
 0x421028 TextOutA
 0x42102c ExtTextOutA
 0x421030 Escape
 0x421034 GetTextColor
 0x421038 GetBkColor
 0x42103c DPtoLP
 0x421040 LPtoDP
 0x421044 GetViewportExtEx
 0x421048 GetMapMode
 0x42104c GetDeviceCaps
 0x421050 DeleteObject
 0x421054 CreateBitmap
 0x421058 ScaleWindowExtEx
 0x42105c SetWindowExtEx
 0x421060 ScaleViewportExtEx
 0x421064 SetViewportExtEx
 0x421068 OffsetViewportOrgEx
 0x42106c SetViewportOrgEx
 0x421070 SetMapMode
 0x421074 GetStockObject
 0x421078 SelectObject
 0x42107c RestoreDC
 0x421080 SaveDC
 0x421084 DeleteDC
 0x421088 GetObjectA
 0x42108c SetBkColor
 0x421090 SetTextColor
 0x421094 GetClipBox
comdlg32.dll
 0x4214a0 GetFileTitleA
WINSPOOL.DRV
 0x421490 ClosePrinter
 0x421494 DocumentPropertiesA
 0x421498 OpenPrinterA
ADVAPI32.dll
 0x421000 RegCloseKey
 0x421004 RegSetValueExA
 0x421008 RegOpenKeyExA
 0x42100c RegCreateKeyExA
COMCTL32.dll
 0x421014 None
oledlg.dll
 0x4214e8 None
ole32.dll
 0x4214a8 CoFreeUnusedLibraries
 0x4214ac OleInitialize
 0x4214b0 CoTaskMemAlloc
 0x4214b4 CoTaskMemFree
 0x4214b8 CreateILockBytesOnHGlobal
 0x4214bc StgCreateDocfileOnILockBytes
 0x4214c0 StgOpenStorageOnILockBytes
 0x4214c4 CoGetClassObject
 0x4214c8 CLSIDFromString
 0x4214cc CLSIDFromProgID
 0x4214d0 CoRegisterMessageFilter
 0x4214d4 CoRevokeClassObject
 0x4214d8 OleIsCurrentClipboard
 0x4214dc OleFlushClipboard
 0x4214e0 OleUninitialize
OLEPRO32.DLL
 0x4212bc None
OLEAUT32.dll
 0x421294 SysStringLen
 0x421298 SysAllocStringByteLen
 0x42129c SysAllocString
 0x4212a0 VariantChangeType
 0x4212a4 VariantCopy
 0x4212a8 VariantTimeToSystemTime
 0x4212ac VariantClear
 0x4212b0 SysAllocStringLen
 0x4212b4 SysFreeString

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure