Report - svc.exe

Browser Login Data Stealer Gen1 Generic Malware Malicious Library UPX Malicious Packer Antivirus ASPack Anti_VM PE File PE64 OS Processor Check DLL ZIP Format JPEG Format
ScreenShot
Created 2025.01.18 16:38 Machine s1_win7_x6401
Filename svc.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
10
Behavior Score
12.0
ZERO API file : malware
VT API (file) 30 detected (Unsafe, Vue2, malicious, confidence, GenericKD, Attribute, HighConfidence, moderate confidence, a variant of Generik, HFFPMFS, fkny, OskiStealer, CLASSIC, Siggen30, AMADEY, YXFAQZ, Static AI, Malicious PE, Detected, Casdet, ABTrojan, VEIA, Artemis, Chgt, PossibleThreat)
md5 e2b9936f5b41295ba4ca23afae692813
sha256 2c74e012e213dc721370aeed8f4932e677f28a95b3da7e3f94e74013f078f066
ssdeep 24576:ACCer7uT8MPvT0hLiKQ+Ijxqykg+Tzwl2KzK:/fr7uXr0hqjxqo
imphash 15c85327ab84144ef8b4188b3142f8f6
impfuzzy 96:lEju4nMr8csfut3gBlQHHJHhN7fd8v+gszuiss2VUT7W:Eu4nM9KBlgoRfssUT7W
  Network IP location

Signature (26cnts)

Level Description
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Attempts to access Bitcoin/ALTCoin wallets
watch Communicates with host for which no DNS query was performed
watch Creates a thread using CreateRemoteThread in a non-child process indicative of process injection
watch Drops a binary and executes it
watch Executes one or more WMI queries
watch Installs itself for autorun at Windows startup
watch Manipulates memory of a non-child process indicative of process injection
watch One or more of the buffers contains an embedded PE file
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the process svc.exe
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice Executes one or more WMI queries which can be used to identify virtual machines
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername

Rules (21cnts)

Level Name Description Collection
danger infoStealer_browser_b_Zero browser info stealer binaries (upload)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch ASPack_Zero ASPack packed file binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
info IsDLL (no description) binaries (download)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info JPEG_Format_Zero JPEG Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info zip_file_format ZIP file format binaries (download)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.81.68.147/svcstealer/get.php FI KLN-Optimum Group Ltd 185.81.68.147 clean
http://185.81.68.147/zx.exe FI KLN-Optimum Group Ltd 185.81.68.147 43576 malware
http://185.81.68.147/update.exe FI KLN-Optimum Group Ltd 185.81.68.147 43577 malware
185.81.68.147 FI KLN-Optimum Group Ltd 185.81.68.147 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1400eb058 LoadLibraryA
 0x1400eb060 SetCurrentDirectoryW
 0x1400eb068 Process32First
 0x1400eb070 GetComputerNameW
 0x1400eb078 K32GetModuleFileNameExW
 0x1400eb080 OpenProcess
 0x1400eb088 GetVersionExW
 0x1400eb090 GetModuleFileNameW
 0x1400eb098 GetLocalTime
 0x1400eb0a0 Process32Next
 0x1400eb0a8 GlobalMemoryStatusEx
 0x1400eb0b0 K32EnumProcesses
 0x1400eb0b8 GetSystemInfo
 0x1400eb0c0 CreateToolhelp32Snapshot
 0x1400eb0c8 ExitProcess
 0x1400eb0d0 TerminateThread
 0x1400eb0d8 DeleteFileW
 0x1400eb0e0 CreateThread
 0x1400eb0e8 HeapAlloc
 0x1400eb0f0 HeapFree
 0x1400eb0f8 GetProcessHeap
 0x1400eb100 FormatMessageA
 0x1400eb108 SetLastError
 0x1400eb110 OutputDebugStringA
 0x1400eb118 LocalFree
 0x1400eb120 HeapReAlloc
 0x1400eb128 GetCurrentProcess
 0x1400eb130 GetModuleHandleW
 0x1400eb138 HeapDestroy
 0x1400eb140 HeapCreate
 0x1400eb148 GetCurrentThreadId
 0x1400eb150 GetCurrentProcessId
 0x1400eb158 GetFullPathNameW
 0x1400eb160 GetFullPathNameA
 0x1400eb168 CreateMutexW
 0x1400eb170 HeapCompact
 0x1400eb178 SetFilePointer
 0x1400eb180 TryEnterCriticalSection
 0x1400eb188 MapViewOfFile
 0x1400eb190 UnmapViewOfFile
 0x1400eb198 SetEndOfFile
 0x1400eb1a0 SystemTimeToFileTime
 0x1400eb1a8 QueryPerformanceCounter
 0x1400eb1b0 WaitForSingleObject
 0x1400eb1b8 UnlockFile
 0x1400eb1c0 FlushViewOfFile
 0x1400eb1c8 LockFile
 0x1400eb1d0 WaitForSingleObjectEx
 0x1400eb1d8 OutputDebugStringW
 0x1400eb1e0 GetTickCount
 0x1400eb1e8 UnlockFileEx
 0x1400eb1f0 GetSystemTimeAsFileTime
 0x1400eb1f8 InitializeCriticalSection
 0x1400eb200 WideCharToMultiByte
 0x1400eb208 GetProcAddress
 0x1400eb210 FormatMessageW
 0x1400eb218 GetFileAttributesA
 0x1400eb220 LeaveCriticalSection
 0x1400eb228 HeapValidate
 0x1400eb230 Sleep
 0x1400eb238 MultiByteToWideChar
 0x1400eb240 FlushFileBuffers
 0x1400eb248 GetTempPathW
 0x1400eb250 HeapSize
 0x1400eb258 LockFileEx
 0x1400eb260 EnterCriticalSection
 0x1400eb268 GetDiskFreeSpaceW
 0x1400eb270 CreateFileMappingA
 0x1400eb278 CreateFileMappingW
 0x1400eb280 GetDiskFreeSpaceA
 0x1400eb288 GetFileAttributesExW
 0x1400eb290 DeleteCriticalSection
 0x1400eb298 GetVersionExA
 0x1400eb2a0 GetTempPathA
 0x1400eb2a8 GetSystemTime
 0x1400eb2b0 AreFileApisANSI
 0x1400eb2b8 DeleteFileA
 0x1400eb2c0 FindFirstFileW
 0x1400eb2c8 CreateDirectoryW
 0x1400eb2d0 CopyFileW
 0x1400eb2d8 FindClose
 0x1400eb2e0 FindNextFileW
 0x1400eb2e8 GetWindowsDirectoryA
 0x1400eb2f0 GetVolumeInformationA
 0x1400eb2f8 TerminateProcess
 0x1400eb300 CopyFileA
 0x1400eb308 Process32FirstW
 0x1400eb310 RemoveDirectoryW
 0x1400eb318 Process32NextW
 0x1400eb320 GetWindowsDirectoryW
 0x1400eb328 GetVolumeInformationW
 0x1400eb330 FindFirstFileA
 0x1400eb338 FindNextFileA
 0x1400eb340 SetEnvironmentVariableA
 0x1400eb348 WriteConsoleW
 0x1400eb350 SetStdHandle
 0x1400eb358 EnumSystemLocalesEx
 0x1400eb360 IsValidLocaleName
 0x1400eb368 LCMapStringEx
 0x1400eb370 GetUserDefaultLocaleName
 0x1400eb378 CompareStringEx
 0x1400eb380 lstrlenA
 0x1400eb388 lstrcmpA
 0x1400eb390 CloseHandle
 0x1400eb398 GetLastError
 0x1400eb3a0 CreateFileW
 0x1400eb3a8 ReadFile
 0x1400eb3b0 WriteFile
 0x1400eb3b8 FreeEnvironmentStringsW
 0x1400eb3c0 GetEnvironmentStringsW
 0x1400eb3c8 GetTickCount64
 0x1400eb3d0 ReadConsoleW
 0x1400eb3d8 FlsFree
 0x1400eb3e0 FlsSetValue
 0x1400eb3e8 FlsGetValue
 0x1400eb3f0 FlsAlloc
 0x1400eb3f8 SetUnhandledExceptionFilter
 0x1400eb400 lstrcatA
 0x1400eb408 FreeLibrary
 0x1400eb410 lstrcpyA
 0x1400eb418 LoadLibraryW
 0x1400eb420 GetCurrentDirectoryW
 0x1400eb428 UnhandledExceptionFilter
 0x1400eb430 RtlVirtualUnwind
 0x1400eb438 RtlCaptureContext
 0x1400eb440 GetTimeZoneInformation
 0x1400eb448 GetOEMCP
 0x1400eb450 GetACP
 0x1400eb458 IsValidCodePage
 0x1400eb460 GetConsoleMode
 0x1400eb468 GetConsoleCP
 0x1400eb470 SetFilePointerEx
 0x1400eb478 GetStartupInfoW
 0x1400eb480 InitOnceExecuteOnce
 0x1400eb488 GetFileType
 0x1400eb490 GetStdHandle
 0x1400eb498 GetModuleHandleExW
 0x1400eb4a0 GetFileSize
 0x1400eb4a8 GetFileAttributesW
 0x1400eb4b0 CreateFileA
 0x1400eb4b8 IsDebuggerPresent
 0x1400eb4c0 IsProcessorFeaturePresent
 0x1400eb4c8 InitializeCriticalSectionAndSpinCount
 0x1400eb4d0 RtlUnwindEx
 0x1400eb4d8 RtlLookupFunctionEntry
 0x1400eb4e0 RaiseException
 0x1400eb4e8 RtlPcToFileHeader
 0x1400eb4f0 GetCommandLineW
 0x1400eb4f8 LoadLibraryExW
 0x1400eb500 ExitThread
 0x1400eb508 GetCPInfo
 0x1400eb510 GetLocaleInfoEx
 0x1400eb518 GetStringTypeW
 0x1400eb520 EncodePointer
 0x1400eb528 DecodePointer
 0x1400eb530 InitializeCriticalSectionEx
USER32.dll
 0x1400eb5a8 wsprintfW
 0x1400eb5b0 GetDC
 0x1400eb5b8 GetTopWindow
 0x1400eb5c0 GetWindowTextW
 0x1400eb5c8 GetSystemMetrics
 0x1400eb5d0 GetWindowThreadProcessId
 0x1400eb5d8 wsprintfA
 0x1400eb5e0 GetWindow
ADVAPI32.dll
 0x1400eb000 GetUserNameW
SHLWAPI.dll
 0x1400eb588 PathStripPathA
 0x1400eb590 StrCmpIW
 0x1400eb598 PathFindExtensionW
SHELL32.dll
 0x1400eb560 SHGetKnownFolderPath
 0x1400eb568 ShellExecuteW
 0x1400eb570 SHGetFolderPathW
 0x1400eb578 SHGetFolderPathA
GDI32.dll
 0x1400eb028 DeleteObject
 0x1400eb030 SelectObject
 0x1400eb038 CreateCompatibleDC
 0x1400eb040 CreateCompatibleBitmap
 0x1400eb048 BitBlt
ole32.dll
 0x1400eb690 CoSetProxyBlanket
 0x1400eb698 CoInitializeSecurity
 0x1400eb6a0 CoInitializeEx
 0x1400eb6a8 CoUninitialize
 0x1400eb6b0 CoCreateInstance
OLEAUT32.dll
 0x1400eb540 SysAllocString
 0x1400eb548 VariantClear
 0x1400eb550 SysFreeString
crypt.dll
 0x1400eb5f0 BCryptGenerateSymmetricKey
 0x1400eb5f8 BCryptSetProperty
 0x1400eb600 BCryptDecrypt
 0x1400eb608 BCryptCloseAlgorithmProvider
 0x1400eb610 BCryptOpenAlgorithmProvider
CRYPT32.dll
 0x1400eb010 CryptStringToBinaryA
 0x1400eb018 CryptUnprotectData
gdiplus.dll
 0x1400eb620 GdipSaveImageToFile
 0x1400eb628 GdipCloneImage
 0x1400eb630 GdipCreateBitmapFromHBITMAP
 0x1400eb638 GdiplusStartup
 0x1400eb640 GdipDisposeImage
 0x1400eb648 GdipAlloc
 0x1400eb650 GdipGetImageEncodersSize
 0x1400eb658 GdipGetImageEncoders
 0x1400eb660 GdiplusShutdown
 0x1400eb668 GdipFree
msi.dll
 0x1400eb678 None
 0x1400eb680 None

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure