Report - purchaseorder.exe

Malicious Library UPX ftp PE32 PE File MZP Format URL Format
ScreenShot
Created 2024.12.02 10:02 Machine s1_win7_x6403
Filename purchaseorder.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
11.4
ZERO API file : clean
VT API (file) 52 detected (AIDetectMalware, ModiLoader, Malicious, score, Zusy, Unsafe, Vh6m, confidence, DelphGen, Attribute, HighConfidence, high confidence, MalwareX, Generickdz, Noon, YzY0Ogv, qeSm3GfU, Nekark, avidg, Starter, Detected, Eldorado, Artemis, TScope, Delf, GdSda, Gencirc, susgen)
md5 ff74865e59dc57289613c8acf736e684
sha256 8ee464a74743e4ddc61f0afb0a555e5cd5d8c286eae283e80f3cbf77f6ca88d2
ssdeep 24576:kUFlmYzMQEOu53W2/AVTNFM9TfXx0IOnl6Q2G9RghhPHu:kKFzjboqFMRXx0IUl6Q2vh/u
imphash 2ecd98434b0d8fca7b990c4042ffd038
impfuzzy 192:oN3MSbuuaDSUvK9D/o1Xy007/GQs8G1Q5POQHnDv:O3BaI98N1qPOQHT
  Network IP location

Signature (23cnts)

Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Attempts to create or modify system certificates
watch Deletes executed files from disk
watch Disables proxy possibly for traffic interception
watch Installs itself for autorun at Windows startup
watch Manipulates memory of a non-child process indicative of process injection
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Downloads a file or document from Google Drive
notice Drops a binary and executes it
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
info Checks if process is being debugged by a debugger
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer

Rules (11cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info ftp_command ftp command binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (download)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info url_file_format Microsoft Windows Internet Shortcut File Format binaries (download)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://drive.google.com/uc?export=download&id=1XzhOpdRULZx1cctu9j9NRQy6z6bLZdx1 US GOOGLE 142.250.197.110 clean
https://drive.usercontent.google.com/download?id=1XzhOpdRULZx1cctu9j9NRQy6z6bLZdx1&export=download US GOOGLE 142.250.197.33 clean
drive.usercontent.google.com US GOOGLE 216.58.220.97 mailcious
drive.google.com US GOOGLE 142.250.207.46 mailcious
142.250.197.110 US GOOGLE 142.250.197.110 clean
142.250.197.33 US GOOGLE 142.250.197.33 clean

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x4a6858 SysFreeString
 0x4a685c SysReAllocStringLen
 0x4a6860 SysAllocStringLen
advapi32.dll
 0x4a6868 RegQueryValueExA
 0x4a686c RegOpenKeyExA
 0x4a6870 RegCloseKey
user32.dll
 0x4a6878 GetKeyboardType
 0x4a687c DestroyWindow
 0x4a6880 LoadStringA
 0x4a6884 MessageBoxA
 0x4a6888 CharNextA
kernel32.dll
 0x4a6890 GetACP
 0x4a6894 Sleep
 0x4a6898 VirtualFree
 0x4a689c VirtualAlloc
 0x4a68a0 GetCurrentThreadId
 0x4a68a4 InterlockedDecrement
 0x4a68a8 InterlockedIncrement
 0x4a68ac VirtualQuery
 0x4a68b0 WideCharToMultiByte
 0x4a68b4 MultiByteToWideChar
 0x4a68b8 lstrlenA
 0x4a68bc lstrcpynA
 0x4a68c0 LoadLibraryExA
 0x4a68c4 GetThreadLocale
 0x4a68c8 GetStartupInfoA
 0x4a68cc GetProcAddress
 0x4a68d0 GetModuleHandleA
 0x4a68d4 GetModuleFileNameA
 0x4a68d8 GetLocaleInfoA
 0x4a68dc GetLastError
 0x4a68e0 GetCommandLineA
 0x4a68e4 FreeLibrary
 0x4a68e8 FindFirstFileA
 0x4a68ec FindClose
 0x4a68f0 ExitProcess
 0x4a68f4 CompareStringA
 0x4a68f8 WriteFile
 0x4a68fc UnhandledExceptionFilter
 0x4a6900 SetFilePointer
 0x4a6904 SetEndOfFile
 0x4a6908 RtlUnwind
 0x4a690c ReadFile
 0x4a6910 RaiseException
 0x4a6914 GetStdHandle
 0x4a6918 GetFileSize
 0x4a691c GetFileType
 0x4a6920 CreateFileA
 0x4a6924 CloseHandle
kernel32.dll
 0x4a692c TlsSetValue
 0x4a6930 TlsGetValue
 0x4a6934 LocalAlloc
 0x4a6938 GetModuleHandleA
user32.dll
 0x4a6940 CreateWindowExA
 0x4a6944 WindowFromPoint
 0x4a6948 WaitMessage
 0x4a694c UpdateWindow
 0x4a6950 UnregisterClassA
 0x4a6954 UnhookWindowsHookEx
 0x4a6958 TranslateMessage
 0x4a695c TranslateMDISysAccel
 0x4a6960 TrackPopupMenu
 0x4a6964 SystemParametersInfoA
 0x4a6968 ShowWindow
 0x4a696c ShowScrollBar
 0x4a6970 ShowOwnedPopups
 0x4a6974 SetWindowsHookExA
 0x4a6978 SetWindowTextA
 0x4a697c SetWindowPos
 0x4a6980 SetWindowPlacement
 0x4a6984 SetWindowLongW
 0x4a6988 SetWindowLongA
 0x4a698c SetTimer
 0x4a6990 SetScrollRange
 0x4a6994 SetScrollPos
 0x4a6998 SetScrollInfo
 0x4a699c SetRect
 0x4a69a0 SetPropA
 0x4a69a4 SetParent
 0x4a69a8 SetMenuItemInfoA
 0x4a69ac SetMenu
 0x4a69b0 SetForegroundWindow
 0x4a69b4 SetFocus
 0x4a69b8 SetCursor
 0x4a69bc SetClipboardData
 0x4a69c0 SetClassLongA
 0x4a69c4 SetCapture
 0x4a69c8 SetActiveWindow
 0x4a69cc SendMessageW
 0x4a69d0 SendMessageA
 0x4a69d4 ScrollWindow
 0x4a69d8 ScreenToClient
 0x4a69dc RemovePropA
 0x4a69e0 RemoveMenu
 0x4a69e4 ReleaseDC
 0x4a69e8 ReleaseCapture
 0x4a69ec RegisterWindowMessageA
 0x4a69f0 RegisterClipboardFormatA
 0x4a69f4 RegisterClassA
 0x4a69f8 RedrawWindow
 0x4a69fc PtInRect
 0x4a6a00 PostQuitMessage
 0x4a6a04 PostMessageA
 0x4a6a08 PeekMessageW
 0x4a6a0c PeekMessageA
 0x4a6a10 OpenClipboard
 0x4a6a14 OffsetRect
 0x4a6a18 OemToCharA
 0x4a6a1c MessageBoxA
 0x4a6a20 MessageBeep
 0x4a6a24 MapWindowPoints
 0x4a6a28 MapVirtualKeyA
 0x4a6a2c LoadStringA
 0x4a6a30 LoadKeyboardLayoutA
 0x4a6a34 LoadIconA
 0x4a6a38 LoadCursorA
 0x4a6a3c LoadBitmapA
 0x4a6a40 KillTimer
 0x4a6a44 IsZoomed
 0x4a6a48 IsWindowVisible
 0x4a6a4c IsWindowUnicode
 0x4a6a50 IsWindowEnabled
 0x4a6a54 IsWindow
 0x4a6a58 IsRectEmpty
 0x4a6a5c IsIconic
 0x4a6a60 IsDialogMessageW
 0x4a6a64 IsDialogMessageA
 0x4a6a68 IsChild
 0x4a6a6c InvalidateRect
 0x4a6a70 IntersectRect
 0x4a6a74 InsertMenuItemA
 0x4a6a78 InsertMenuA
 0x4a6a7c InflateRect
 0x4a6a80 GetWindowThreadProcessId
 0x4a6a84 GetWindowTextA
 0x4a6a88 GetWindowRect
 0x4a6a8c GetWindowPlacement
 0x4a6a90 GetWindowLongW
 0x4a6a94 GetWindowLongA
 0x4a6a98 GetWindowDC
 0x4a6a9c GetUpdateRect
 0x4a6aa0 GetTopWindow
 0x4a6aa4 GetSystemMetrics
 0x4a6aa8 GetSystemMenu
 0x4a6aac GetSysColorBrush
 0x4a6ab0 GetSysColor
 0x4a6ab4 GetSubMenu
 0x4a6ab8 GetScrollRange
 0x4a6abc GetScrollPos
 0x4a6ac0 GetScrollInfo
 0x4a6ac4 GetPropA
 0x4a6ac8 GetParent
 0x4a6acc GetWindow
 0x4a6ad0 GetMessagePos
 0x4a6ad4 GetMenuStringA
 0x4a6ad8 GetMenuState
 0x4a6adc GetMenuItemInfoA
 0x4a6ae0 GetMenuItemID
 0x4a6ae4 GetMenuItemCount
 0x4a6ae8 GetMenu
 0x4a6aec GetLastActivePopup
 0x4a6af0 GetKeyboardState
 0x4a6af4 GetKeyboardLayoutNameA
 0x4a6af8 GetKeyboardLayoutList
 0x4a6afc GetKeyboardLayout
 0x4a6b00 GetKeyState
 0x4a6b04 GetKeyNameTextA
 0x4a6b08 GetIconInfo
 0x4a6b0c GetForegroundWindow
 0x4a6b10 GetFocus
 0x4a6b14 GetDlgItem
 0x4a6b18 GetDesktopWindow
 0x4a6b1c GetDCEx
 0x4a6b20 GetDC
 0x4a6b24 GetCursorPos
 0x4a6b28 GetCursor
 0x4a6b2c GetClipboardData
 0x4a6b30 GetClientRect
 0x4a6b34 GetClassNameA
 0x4a6b38 GetClassLongA
 0x4a6b3c GetClassInfoA
 0x4a6b40 GetCapture
 0x4a6b44 GetActiveWindow
 0x4a6b48 FrameRect
 0x4a6b4c FindWindowA
 0x4a6b50 FillRect
 0x4a6b54 EqualRect
 0x4a6b58 EnumWindows
 0x4a6b5c EnumThreadWindows
 0x4a6b60 EnumChildWindows
 0x4a6b64 EndPaint
 0x4a6b68 EnableWindow
 0x4a6b6c EnableScrollBar
 0x4a6b70 EnableMenuItem
 0x4a6b74 EmptyClipboard
 0x4a6b78 DrawTextA
 0x4a6b7c DrawMenuBar
 0x4a6b80 DrawIconEx
 0x4a6b84 DrawIcon
 0x4a6b88 DrawFrameControl
 0x4a6b8c DrawFocusRect
 0x4a6b90 DrawEdge
 0x4a6b94 DispatchMessageW
 0x4a6b98 DispatchMessageA
 0x4a6b9c DestroyWindow
 0x4a6ba0 DestroyMenu
 0x4a6ba4 DestroyIcon
 0x4a6ba8 DestroyCursor
 0x4a6bac DeleteMenu
 0x4a6bb0 DefWindowProcA
 0x4a6bb4 DefMDIChildProcA
 0x4a6bb8 DefFrameProcA
 0x4a6bbc CreatePopupMenu
 0x4a6bc0 CreateMenu
 0x4a6bc4 CreateIcon
 0x4a6bc8 CloseClipboard
 0x4a6bcc ClientToScreen
 0x4a6bd0 ChildWindowFromPoint
 0x4a6bd4 CheckMenuItem
 0x4a6bd8 CallWindowProcA
 0x4a6bdc CallNextHookEx
 0x4a6be0 BeginPaint
 0x4a6be4 CharNextA
 0x4a6be8 CharLowerBuffA
 0x4a6bec CharLowerA
 0x4a6bf0 CharUpperBuffA
 0x4a6bf4 CharToOemA
 0x4a6bf8 AdjustWindowRectEx
 0x4a6bfc ActivateKeyboardLayout
msimg32.dll
 0x4a6c04 GradientFill
gdi32.dll
 0x4a6c0c UnrealizeObject
 0x4a6c10 StretchBlt
 0x4a6c14 StartPage
 0x4a6c18 StartDocA
 0x4a6c1c SetWindowOrgEx
 0x4a6c20 SetWinMetaFileBits
 0x4a6c24 SetViewportOrgEx
 0x4a6c28 SetTextColor
 0x4a6c2c SetStretchBltMode
 0x4a6c30 SetROP2
 0x4a6c34 SetPixel
 0x4a6c38 SetMapMode
 0x4a6c3c SetEnhMetaFileBits
 0x4a6c40 SetDIBColorTable
 0x4a6c44 SetBrushOrgEx
 0x4a6c48 SetBkMode
 0x4a6c4c SetBkColor
 0x4a6c50 SetAbortProc
 0x4a6c54 SelectPalette
 0x4a6c58 SelectObject
 0x4a6c5c SaveDC
 0x4a6c60 RestoreDC
 0x4a6c64 Rectangle
 0x4a6c68 RectVisible
 0x4a6c6c RealizePalette
 0x4a6c70 Polyline
 0x4a6c74 Polygon
 0x4a6c78 PlayEnhMetaFile
 0x4a6c7c PatBlt
 0x4a6c80 MoveToEx
 0x4a6c84 MaskBlt
 0x4a6c88 LineTo
 0x4a6c8c IntersectClipRect
 0x4a6c90 GetWindowOrgEx
 0x4a6c94 GetWinMetaFileBits
 0x4a6c98 GetTextMetricsA
 0x4a6c9c GetTextExtentPointA
 0x4a6ca0 GetTextExtentPoint32A
 0x4a6ca4 GetSystemPaletteEntries
 0x4a6ca8 GetStockObject
 0x4a6cac GetRgnBox
 0x4a6cb0 GetPixel
 0x4a6cb4 GetPaletteEntries
 0x4a6cb8 GetObjectA
 0x4a6cbc GetEnhMetaFilePaletteEntries
 0x4a6cc0 GetEnhMetaFileHeader
 0x4a6cc4 GetEnhMetaFileBits
 0x4a6cc8 GetDeviceCaps
 0x4a6ccc GetDIBits
 0x4a6cd0 GetDIBColorTable
 0x4a6cd4 GetDCOrgEx
 0x4a6cd8 GetCurrentPositionEx
 0x4a6cdc GetClipBox
 0x4a6ce0 GetBrushOrgEx
 0x4a6ce4 GetBitmapBits
 0x4a6ce8 GdiFlush
 0x4a6cec ExtTextOutA
 0x4a6cf0 ExcludeClipRect
 0x4a6cf4 EndPage
 0x4a6cf8 EndDoc
 0x4a6cfc DeleteObject
 0x4a6d00 DeleteEnhMetaFile
 0x4a6d04 DeleteDC
 0x4a6d08 CreateSolidBrush
 0x4a6d0c CreateRectRgn
 0x4a6d10 CreatePenIndirect
 0x4a6d14 CreatePalette
 0x4a6d18 CreateICA
 0x4a6d1c CreateHalftonePalette
 0x4a6d20 CreateFontIndirectA
 0x4a6d24 CreateDIBitmap
 0x4a6d28 CreateDIBSection
 0x4a6d2c CreateDCA
 0x4a6d30 CreateCompatibleDC
 0x4a6d34 CreateCompatibleBitmap
 0x4a6d38 CreateBrushIndirect
 0x4a6d3c CreateBitmap
 0x4a6d40 CopyEnhMetaFileA
 0x4a6d44 CombineRgn
 0x4a6d48 BitBlt
version.dll
 0x4a6d50 VerQueryValueA
 0x4a6d54 GetFileVersionInfoSizeA
 0x4a6d58 GetFileVersionInfoA
kernel32.dll
 0x4a6d60 lstrcpyA
 0x4a6d64 lstrcmpA
 0x4a6d68 WriteFile
 0x4a6d6c WaitForSingleObject
 0x4a6d70 VirtualQuery
 0x4a6d74 VirtualAlloc
 0x4a6d78 SizeofResource
 0x4a6d7c SetThreadLocale
 0x4a6d80 SetFilePointer
 0x4a6d84 SetEvent
 0x4a6d88 SetErrorMode
 0x4a6d8c SetEndOfFile
 0x4a6d90 ResetEvent
 0x4a6d94 ReadFile
 0x4a6d98 MultiByteToWideChar
 0x4a6d9c MulDiv
 0x4a6da0 LockResource
 0x4a6da4 LoadResource
 0x4a6da8 LoadLibraryExA
 0x4a6dac LoadLibraryA
 0x4a6db0 LeaveCriticalSection
 0x4a6db4 InitializeCriticalSection
 0x4a6db8 GlobalUnlock
 0x4a6dbc GlobalLock
 0x4a6dc0 GlobalFree
 0x4a6dc4 GlobalFindAtomA
 0x4a6dc8 GlobalDeleteAtom
 0x4a6dcc GlobalAlloc
 0x4a6dd0 GlobalAddAtomA
 0x4a6dd4 GetVersionExA
 0x4a6dd8 GetVersion
 0x4a6ddc GetTickCount
 0x4a6de0 GetThreadLocale
 0x4a6de4 GetStdHandle
 0x4a6de8 GetProfileStringA
 0x4a6dec GetProcAddress
 0x4a6df0 GetModuleHandleA
 0x4a6df4 GetModuleFileNameA
 0x4a6df8 GetLocaleInfoA
 0x4a6dfc GetLocalTime
 0x4a6e00 GetLastError
 0x4a6e04 GetFullPathNameA
 0x4a6e08 GetDiskFreeSpaceA
 0x4a6e0c GetDateFormatA
 0x4a6e10 GetCurrentThreadId
 0x4a6e14 GetCurrentProcessId
 0x4a6e18 GetCPInfo
 0x4a6e1c FreeResource
 0x4a6e20 InterlockedExchange
 0x4a6e24 FreeLibrary
 0x4a6e28 FormatMessageA
 0x4a6e2c FindResourceA
 0x4a6e30 EnumCalendarInfoA
 0x4a6e34 EnterCriticalSection
 0x4a6e38 DeleteCriticalSection
 0x4a6e3c CreateThread
 0x4a6e40 CreateFileA
 0x4a6e44 CreateEventA
 0x4a6e48 CompareStringA
 0x4a6e4c CloseHandle
advapi32.dll
 0x4a6e54 RegQueryValueExA
 0x4a6e58 RegOpenKeyExA
 0x4a6e5c RegFlushKey
 0x4a6e60 RegCloseKey
oleaut32.dll
 0x4a6e68 GetErrorInfo
 0x4a6e6c SysFreeString
ole32.dll
 0x4a6e74 CoTaskMemAlloc
 0x4a6e78 CoCreateInstance
 0x4a6e7c CoUninitialize
 0x4a6e80 CoInitialize
kernel32.dll
 0x4a6e88 Sleep
oleaut32.dll
 0x4a6e90 SafeArrayPtrOfIndex
 0x4a6e94 SafeArrayGetUBound
 0x4a6e98 SafeArrayGetLBound
 0x4a6e9c SafeArrayCreate
 0x4a6ea0 VariantChangeType
 0x4a6ea4 VariantCopy
 0x4a6ea8 VariantClear
 0x4a6eac VariantInit
comctl32.dll
 0x4a6eb4 _TrackMouseEvent
 0x4a6eb8 ImageList_SetIconSize
 0x4a6ebc ImageList_GetIconSize
 0x4a6ec0 ImageList_Write
 0x4a6ec4 ImageList_Read
 0x4a6ec8 ImageList_GetDragImage
 0x4a6ecc ImageList_DragShowNolock
 0x4a6ed0 ImageList_DragMove
 0x4a6ed4 ImageList_DragLeave
 0x4a6ed8 ImageList_DragEnter
 0x4a6edc ImageList_EndDrag
 0x4a6ee0 ImageList_BeginDrag
 0x4a6ee4 ImageList_Remove
 0x4a6ee8 ImageList_DrawEx
 0x4a6eec ImageList_Replace
 0x4a6ef0 ImageList_Draw
 0x4a6ef4 ImageList_GetBkColor
 0x4a6ef8 ImageList_SetBkColor
 0x4a6efc ImageList_Add
 0x4a6f00 ImageList_GetImageCount
 0x4a6f04 ImageList_Destroy
 0x4a6f08 ImageList_Create
 0x4a6f0c InitCommonControls
winspool.drv
 0x4a6f14 OpenPrinterA
 0x4a6f18 EnumPrintersA
 0x4a6f1c DocumentPropertiesA
 0x4a6f20 ClosePrinter
comdlg32.dll
 0x4a6f28 GetSaveFileNameA
 0x4a6f2c GetOpenFileNameA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure