Report - clr.exe

Generic Malware UPX Malicious Library PE File PE32
ScreenShot
Created 2024.11.13 14:11 Machine s1_win7_x6403
Filename clr.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, RAR self-extracting archive
AI Score
5
Behavior Score
6.8
ZERO API file : clean
VT API (file) 55 detected (lCIq, Malicious, score, Clearlogs, Clearlog, Unsafe, grayware, confidence, many, HackTool, AYQF, moderate confidence, multiple detections, Genome, Scar, cqqapi, CLASSIC, VirusConstructor, TSPY, FAREIT, YYSRV, Detected, Malware@#2f8qa3jru3l1h, Multiverze, Razy, RFBI, R348454, Artemis, BScope, Ditertag, Probably Heur, ExeHeaderL, Qimw, susgen)
md5 a736e23ae291f6d3a848fdb1aaa7348f
sha256 d00d806f1df7195c4d6b5757d90c3e81fdbf8d4f2efcbc895ee752af0b09b28c
ssdeep 1536:o8V6g/5b+Dae3E/j9pGtbFIViUDq51plh6HcUa3WloAuyQjn:o8V6E5e3YxGF6zDUj/Rj3Pjn
imphash af7b8813a2e213ad2ed4a1d42c1b2975
impfuzzy 6:dBJAEHGDzyRlbRmVOZ/EwRgsyIBMeGaTKOdLMKJAm3EQbS4QG:VA/DzqYOZ9RghIBXGq+m3EP4QG
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
warning Stops Windows services
watch Installs itself for autorun at Windows startup
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a service
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Executes one or more WMI queries
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info Queries for the computername

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x426ef0 LoadLibraryA
 0x426ef4 GetProcAddress
 0x426ef8 VirtualProtect
 0x426efc VirtualAlloc
 0x426f00 VirtualFree
 0x426f04 ExitProcess
ADVAPI32.dll
 0x426f0c RegCloseKey
COMCTL32.dll
 0x426f14 None
COMDLG32.dll
 0x426f1c GetSaveFileNameA
GDI32.dll
 0x426f24 DeleteDC
ole32.dll
 0x426f2c OleInitialize
OLEAUT32.dll
 0x426f34 VariantInit
SHELL32.dll
 0x426f3c SHGetMalloc
USER32.dll
 0x426f44 GetDC

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure