Report - MJPVgHw.exe

Generic Malware Malicious Library Malicious Packer UPX Http API Escalate priviledges HTTP Code injection Internet API persistence AntiDebug AntiVM PE File PE64 OS Processor Check Lnk Format GIF Format
ScreenShot
Created 2024.11.13 13:58 Machine s1_win7_x6403
Filename MJPVgHw.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
11.4
ZERO API file : clean
VT API (file) 55 detected (Common, Androm, Malicious, score, Infected, Artemis, Unsafe, Mikey, confidence, 100%, Genus, Attribute, HighConfidence, high confidence, MalwareX, vtbt, kthnza, uGYVIXwGFbQ, Nekark, ersvn, Siggen29, moderate, Static AI, Malicious PE, Detected, Wacatac, Malware@#ct2zyii2g0b7, ABTrojan, WYCP, Tnaket, Chgt, Gencirc, 7kcNxiEd0tU, Tinukebot, susgen)
md5 5523f28f2224dde8d74286b09146bb47
sha256 b2f9c3002820fa654f514db1779c55a606ec8c164b744aacb9e886a7e1e7c4d9
ssdeep 6144:+nNuJp9FtYk5k3uZElT63edWRK9Izm/sHgo2TW:+nMp9AYqtoKapHgo2a
imphash 32fbf5b10b16ec517b227ff71a382b38
impfuzzy 48:oAMHhNYuL5lX6ZbKoyh6OgqcpV69g8YyFZ7:oAMHhNYuLvX6Zmo26RqcpV+g8Yyz
  Network IP location

Signature (23cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Attempts to disable SPDY support in Firefox to improve web infostealing capability
watch Attempts to modify Explorer settings to prevent hidden files from being displayed
watch Installs itself for autorun at Windows startup
watch Modifies the Firefox configuration file
watch One or more of the buffers contains an embedded PE file
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice One or more potentially interesting buffers were extracted
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername

Rules (23cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice Code_injection Code injection with CreateRemoteThread in a remote process memory
notice Escalate_priviledges Escalate priviledges memory
notice Network_HTTP Communications over HTTP memory
notice Persistence Install itself for autorun at Windows startup memory
notice Str_Win32_Http_API Match Windows Http API call memory
notice Str_Win32_Internet_API Match Windows Inet API call memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE64 (no description) binaries (upload)
info lnk_file_format Microsoft Windows Shortcut File Format binaries (download)
info Lnk_Format_Zero LNK Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

OLEAUT32.dll
 0x1400213b0 VariantClear
KERNEL32.dll
 0x140021000 EnumSystemLocalesEx
 0x140021008 IsValidLocaleName
 0x140021010 LCMapStringEx
 0x140021018 GetUserDefaultLocaleName
 0x140021020 FreeEnvironmentStringsW
 0x140021028 GetEnvironmentStringsW
 0x140021030 QueryPerformanceCounter
 0x140021038 FlsFree
 0x140021040 FlsSetValue
 0x140021048 FlsGetValue
 0x140021050 FlsAlloc
 0x140021058 SetUnhandledExceptionFilter
 0x140021060 UnhandledExceptionFilter
 0x140021068 RtlVirtualUnwind
 0x140021070 RtlCaptureContext
 0x140021078 LoadLibraryExW
 0x140021080 ReadConsoleW
 0x140021088 SetStdHandle
 0x140021090 WriteConsoleW
 0x140021098 OutputDebugStringW
 0x1400210a0 LocalFree
 0x1400210a8 GetTickCount64
 0x1400210b0 SetEndOfFile
 0x1400210b8 GetConsoleMode
 0x1400210c0 GetConsoleCP
 0x1400210c8 FlushFileBuffers
 0x1400210d0 SetFilePointerEx
 0x1400210d8 GetThreadContext
 0x1400210e0 GetTempFileNameW
 0x1400210e8 GetFileSize
 0x1400210f0 SetThreadContext
 0x1400210f8 SetFilePointer
 0x140021100 FreeLibrary
 0x140021108 GetCurrentProcess
 0x140021110 WaitForSingleObject
 0x140021118 WriteFile
 0x140021120 OpenProcess
 0x140021128 GetSystemDirectoryW
 0x140021130 LoadLibraryW
 0x140021138 GetModuleFileNameW
 0x140021140 CreateFileW
 0x140021148 GetTempPathW
 0x140021150 GetLastError
 0x140021158 GetProcAddress
 0x140021160 VirtualAllocEx
 0x140021168 LoadLibraryA
 0x140021170 GetModuleHandleA
 0x140021178 lstrcatW
 0x140021180 Wow64SetThreadContext
 0x140021188 CloseHandle
 0x140021190 WriteProcessMemory
 0x140021198 ResumeThread
 0x1400211a0 Wow64GetThreadContext
 0x1400211a8 CreateThread
 0x1400211b0 HeapAlloc
 0x1400211b8 GetProcessHeap
 0x1400211c0 Sleep
 0x1400211c8 CreateRemoteThread
 0x1400211d0 CreateToolhelp32Snapshot
 0x1400211d8 VirtualProtectEx
 0x1400211e0 VirtualProtect
 0x1400211e8 ExitProcess
 0x1400211f0 CreateMutexA
 0x1400211f8 HeapReAlloc
 0x140021200 CreateFileA
 0x140021208 FindFirstFileW
 0x140021210 MapViewOfFile
 0x140021218 UnmapViewOfFile
 0x140021220 CompareFileTime
 0x140021228 HeapFree
 0x140021230 GetModuleHandleW
 0x140021238 GetProcessTimes
 0x140021240 GetFileAttributesA
 0x140021248 TerminateProcess
 0x140021250 ReadFile
 0x140021258 lstrcatA
 0x140021260 MultiByteToWideChar
 0x140021268 CreateDirectoryA
 0x140021270 CopyFileA
 0x140021278 SetFileAttributesA
 0x140021280 Process32FirstW
 0x140021288 CreateFileMappingA
 0x140021290 GetModuleFileNameA
 0x140021298 Process32NextW
 0x1400212a0 IsDebuggerPresent
 0x1400212a8 FindNextFileW
 0x1400212b0 DeleteFileW
 0x1400212b8 ExpandEnvironmentStringsW
 0x1400212c0 WideCharToMultiByte
 0x1400212c8 GetStringTypeW
 0x1400212d0 EncodePointer
 0x1400212d8 DecodePointer
 0x1400212e0 EnterCriticalSection
 0x1400212e8 LeaveCriticalSection
 0x1400212f0 InitializeCriticalSectionEx
 0x1400212f8 DeleteCriticalSection
 0x140021300 GetLocaleInfoEx
 0x140021308 GetCPInfo
 0x140021310 IsProcessorFeaturePresent
 0x140021318 GetSystemTimeAsFileTime
 0x140021320 GetCommandLineW
 0x140021328 RtlPcToFileHeader
 0x140021330 RaiseException
 0x140021338 RtlLookupFunctionEntry
 0x140021340 RtlUnwindEx
 0x140021348 InitializeCriticalSectionAndSpinCount
 0x140021350 GetModuleHandleExW
 0x140021358 HeapSize
 0x140021360 IsValidCodePage
 0x140021368 GetACP
 0x140021370 GetOEMCP
 0x140021378 SetLastError
 0x140021380 GetCurrentThreadId
 0x140021388 GetStdHandle
 0x140021390 GetFileType
 0x140021398 InitOnceExecuteOnce
 0x1400213a0 GetStartupInfoW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure