Report - ASUFER.exe

Gen1 Generic Malware UPX Malicious Packer Antivirus Malicious Library PE File PE32
ScreenShot
Created 2024.11.13 14:09 Machine s1_win7_x6403
Filename ASUFER.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, RAR self-extracting archive
AI Score
5
Behavior Score
6.4
ZERO API file : clean
VT API (file) 56 detected (AIDetectMalware, lCIq, Malicious, score, GenericRXCJ, Unsafe, confidence, AYQF, Gampass, moderate confidence, multiple detections, Genome, wGet, DelayedStart, Systroj, dddlxb, Upatre, CLOUD, Tool, Starter, TSPY, FAREIT, YYSRV, Detected, HackTool, MUPX, Gen@24tbus, Multiverze, RFBI, Tiggre, R299355, Probably Heur, ExeHeaderL, Ncnw, GenAsa, w6RILdF4Q)
md5 3e47dd3f7b0be7bc26abea791d386145
sha256 ce760056cd6800c9d0e05e6c84b6360ab626d86381b0d9ab0764d1b27736ed86
ssdeep 24576:bA6foqZxz4UMRM0dZj5YKGYRu8YnwVbE/x8Ub7pq2sBkbRBxh4yXom1rWZE3zj:UitZxzrsM+ZNYNRXuU420kPxhRXdaZEv
imphash af7b8813a2e213ad2ed4a1d42c1b2975
impfuzzy 6:dBJAEHGDzyRlbRmVOZ/EwRgsyIBMeGaTKOdLMKJAm3EQbS4QG:VA/DzqYOZ9RghIBXGq+m3EP4QG
  Network IP location

Signature (13cnts)

Level Description
danger File has been identified by 56 AntiVirus engines on VirusTotal as malicious
warning Stops Windows services
watch Attempts to disable System Restore
watch Installs itself for autorun at Windows startup
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Executes one or more WMI queries
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
notice Uses Windows utilities for basic Windows functionality
info Command line console output was observed
info Queries for the computername

Rules (11cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
openslowmo.com DE Keyweb AG 87.118.86.57 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x427f04 LoadLibraryA
 0x427f08 GetProcAddress
 0x427f0c VirtualProtect
 0x427f10 VirtualAlloc
 0x427f14 VirtualFree
 0x427f18 ExitProcess
ADVAPI32.dll
 0x427f20 RegCloseKey
COMCTL32.dll
 0x427f28 None
COMDLG32.dll
 0x427f30 GetSaveFileNameA
GDI32.dll
 0x427f38 DeleteDC
ole32.dll
 0x427f40 OleInitialize
OLEAUT32.dll
 0x427f48 VariantInit
SHELL32.dll
 0x427f50 SHGetMalloc
USER32.dll
 0x427f58 GetDC

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure