Report - svhost.exe

Malicious Library UPX PE File PE32
ScreenShot
Created 2024.11.13 14:21 Machine s1_win7_x6401
Filename svhost.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
5.2
ZERO API file : clean
VT API (file) 58 detected (AIDetectMalware, Glomaru, lXMS, Malicious, score, GenericRXTR, Unsafe, Dump, KillMBR, confidence, 100%, Genus, high confidence, FatalRAT, Zegost, Farfli, itwbcp, Kryptik, CLASSIC, Fatal, high, Static AI, Suspicious PE, ckgk, Detected, PDSB@4q3i1w, Eldorado, LVbg, R553633, BScope, Nq5f4FOwmYc, susgen, GenKryptik, BJAB)
md5 200488185d59ab372448732e08da1b50
sha256 1722be3ca7c30055c94f37b865d6f3554c934b23a59f3c1adb7c093473ee0521
ssdeep 1536:Vua+BTv3tIO8MtM+/6jRVGIk1MgHjsPGYYwOda2CqqZOIgQJb0lfjtO+vbWL8xJb:Vn+htWMtf+7GZYGVA2QJgi8xJLDoU
imphash 6c306e45fa9f977a2f45c8a08df084d5
impfuzzy 12:mDoABZGJCAOovO3wXJYv8ERRvNu1GlEIjLFQLRJ:mDoCqOovLiv8ERRvNuklEuG
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 58 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a service
notice Searches running processes potentially to identify processes for sandbox evasion
info The executable uses a known packer

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
108.181.157.69 CA ASN852 108.181.157.69 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x406000 GetProcAddress
 0x406004 LoadLibraryA
 0x406008 ExitProcess
 0x40600c GetModuleHandleA
 0x406010 GetStartupInfoA
 0x406014 GetCommandLineA
 0x406018 GetVersion
 0x40601c TerminateProcess
 0x406020 GetCurrentProcess
 0x406024 UnhandledExceptionFilter
 0x406028 GetModuleFileNameA
 0x40602c FreeEnvironmentStringsA
 0x406030 FreeEnvironmentStringsW
 0x406034 WideCharToMultiByte
 0x406038 GetEnvironmentStrings
 0x40603c GetEnvironmentStringsW
 0x406040 SetHandleCount
 0x406044 GetStdHandle
 0x406048 GetFileType
 0x40604c GetEnvironmentVariableA
 0x406050 GetVersionExA
 0x406054 HeapDestroy
 0x406058 HeapCreate
 0x40605c VirtualFree
 0x406060 HeapFree
 0x406064 RtlUnwind
 0x406068 WriteFile
 0x40606c GetCPInfo
 0x406070 GetACP
 0x406074 GetOEMCP
 0x406078 HeapAlloc
 0x40607c VirtualAlloc
 0x406080 HeapReAlloc
 0x406084 MultiByteToWideChar
 0x406088 LCMapStringA
 0x40608c LCMapStringW
 0x406090 GetStringTypeA
 0x406094 GetStringTypeW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure