Report - blecher.exe

Generic Malware Malicious Library Malicious Packer UPX PE64 PE File OS Processor Check
ScreenShot
Created 2024.11.20 09:19 Machine s1_win7_x6403
Filename blecher.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
2.4
ZERO API file : clean
VT API (file)
md5 339ae0260481a7cf89f3f5e3d506ff37
sha256 71201202878157570c3be3e6a6e3022a194e9e879872c916e3c62e72cb661ba8
ssdeep 24576:rmCkR8pID8IfP0RLao4ur1ASah0lhSMXluuQfkaTVMLGbwo3rPzULXKUxTgtdSq:rzkRrf8RLao4weuQM/LDkrPaX3C
imphash 096dde8aae1c709cab8eec54c5073534
impfuzzy 96:4D8bdLoq9+utOV8CAIWjSrBGHDWeDChBwZ:BZP2JWOhaZ
  Network IP location

Signature (4cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
45.130.145.152 RU LLC Baxet 45.130.145.152 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ntdll.dll
 0x1400863c8 RtlImageDirectoryEntryToData
 0x1400863d0 RtlAdjustPrivilege
 0x1400863d8 NtRaiseHardError
 0x1400863e0 RtlLeaveCriticalSection
 0x1400863e8 RtlEnterCriticalSection
 0x1400863f0 RtlCompareMemory
 0x1400863f8 NtProtectVirtualMemory
 0x140086400 RtlImageNtHeader
 0x140086408 NtQueryVirtualMemory
 0x140086410 RtlGetNtVersionNumbers
KERNEL32.dll
 0x140086018 FreeEnvironmentStringsW
 0x140086020 GetEnvironmentStringsW
 0x140086028 FindNextFileW
 0x140086030 FindFirstFileExW
 0x140086038 VirtualFree
 0x140086040 VirtualAlloc
 0x140086048 GetModuleHandleW
 0x140086050 LoadLibraryA
 0x140086058 ReadFile
 0x140086060 WriteFile
 0x140086068 CreateFileW
 0x140086070 UnmapViewOfFile
 0x140086078 CloseHandle
 0x140086080 CreateFileMappingW
 0x140086088 MapViewOfFile
 0x140086090 GetProcAddress
 0x140086098 GetCurrentProcess
 0x1400860a0 FlushInstructionCache
 0x1400860a8 VirtualQuery
 0x1400860b0 WriteProcessMemory
 0x1400860b8 EnterCriticalSection
 0x1400860c0 GetModuleFileNameW
 0x1400860c8 LeaveCriticalSection
 0x1400860d0 GetModuleHandleA
 0x1400860d8 MultiByteToWideChar
 0x1400860e0 ExitProcess
 0x1400860e8 WideCharToMultiByte
 0x1400860f0 GetTickCount
 0x1400860f8 GetLastError
 0x140086100 VirtualProtect
 0x140086108 VirtualQueryEx
 0x140086110 ReadProcessMemory
 0x140086118 GetSystemInfo
 0x140086120 InitializeCriticalSection
 0x140086128 DeleteCriticalSection
 0x140086130 SetLastError
 0x140086138 RtlCaptureContext
 0x140086140 RtlLookupFunctionEntry
 0x140086148 RtlVirtualUnwind
 0x140086150 IsDebuggerPresent
 0x140086158 UnhandledExceptionFilter
 0x140086160 SetUnhandledExceptionFilter
 0x140086168 TerminateProcess
 0x140086170 IsProcessorFeaturePresent
 0x140086178 GetSystemTimeAsFileTime
 0x140086180 GetCommandLineA
 0x140086188 GetCommandLineW
 0x140086190 HeapAlloc
 0x140086198 HeapFree
 0x1400861a0 GetCurrentThreadId
 0x1400861a8 GetStdHandle
 0x1400861b0 GetFileType
 0x1400861b8 GetStartupInfoW
 0x1400861c0 RaiseException
 0x1400861c8 FlsAlloc
 0x1400861d0 FlsSetValue
 0x1400861d8 FlsFree
 0x1400861e0 InitializeCriticalSectionAndSpinCount
 0x1400861e8 FreeLibrary
 0x1400861f0 LoadLibraryExW
 0x1400861f8 LCMapStringW
 0x140086200 GetLocaleInfoW
 0x140086208 IsValidLocale
 0x140086210 GetUserDefaultLCID
 0x140086218 EnumSystemLocalesW
 0x140086220 HeapReAlloc
 0x140086228 HeapSize
 0x140086230 GetCPInfo
 0x140086238 GetStringTypeW
 0x140086240 IsValidCodePage
 0x140086248 GetACP
 0x140086250 GetModuleHandleExW
 0x140086258 GetConsoleOutputCP
 0x140086260 GetConsoleMode
 0x140086268 GetFileSizeEx
 0x140086270 SetFilePointerEx
 0x140086278 GetProcessHeap
 0x140086280 SetStdHandle
 0x140086288 ReadConsoleW
 0x140086290 FlushFileBuffers
 0x140086298 WriteConsoleW
 0x1400862a0 ReleaseSRWLockExclusive
 0x1400862a8 AcquireSRWLockExclusive
 0x1400862b0 QueryPerformanceCounter
 0x1400862b8 GetCurrentProcessId
 0x1400862c0 InitializeSListHead
 0x1400862c8 RtlUnwindEx
 0x1400862d0 RtlPcToFileHeader
 0x1400862d8 RtlUnwind
 0x1400862e0 EncodePointer
 0x1400862e8 TlsAlloc
 0x1400862f0 TlsGetValue
 0x1400862f8 TlsSetValue
 0x140086300 TlsFree
 0x140086308 FindClose
 0x140086310 LCMapStringEx
 0x140086318 LocalFree
 0x140086320 DecodePointer
 0x140086328 InitializeCriticalSectionEx
 0x140086330 FlsGetValue
 0x140086338 GetOEMCP
 0x140086340 QueryPerformanceFrequency
 0x140086348 TryAcquireSRWLockExclusive
USER32.dll
 0x1400863a0 LoadAcceleratorsW
 0x1400863a8 LoadAcceleratorsA
ADVAPI32.dll
 0x140086000 GetTokenInformation
 0x140086008 OpenProcessToken
OLEAUT32.dll
 0x140086358 SysAllocString
 0x140086360 SafeArrayPutElement
 0x140086368 SafeArrayUnaccessData
 0x140086370 SafeArrayCreate
 0x140086378 SafeArrayCreateVector
 0x140086380 SafeArrayAccessData
 0x140086388 SysFreeString
 0x140086390 SafeArrayDestroy
mscoree.dll
 0x1400863b8 CLRCreateInstance

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure