Report - pomoykaXL.exe

Generic Malware Malicious Library Malicious Packer VMProtect UPX Anti_VM AntiDebug AntiVM PE File PE64 OS Processor Check PE32
ScreenShot
Created 2025.01.23 06:35 Machine s1_win7_x6403
Filename pomoykaXL.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
2
Behavior Score
6.6
ZERO API file : malware
VT API (file)
md5 756219b350b87a85f693dccbbf4cbc1e
sha256 7dff620d738f6ca95281cdd0c9574a384f99ae0f02aeab4d9b0b5379b79ca1cb
ssdeep 98304:ry9bpMVdN2VDCNHkZM6wiuxPXdfFUJ3lQiXclIe99BaTYXX:rFBiK
imphash 9d9e04c678f34e9bd7a7f4510bb2d134
impfuzzy 48:oBQQCZ0mgxy4jVut8v5LwrI9GcpVsK9r3WTL64/lhOvn6GSvFE6U0IZ7KQbiDH/J:zuxyMVut8v5LKIgcpVsKaQcnEZqgkPx
  Network IP location

Signature (15cnts)

Level Description
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Code injection by writing an executable or DLL to the memory of another process
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice The executable is likely packed with VMProtect
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (20cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1402ed040 SetStdHandle
 0x1402ed048 OutputDebugStringW
 0x1402ed050 GetProcessHeap
 0x1402ed058 SetEnvironmentVariableW
 0x1402ed060 FreeEnvironmentStringsW
 0x1402ed068 GetEnvironmentStringsW
 0x1402ed070 GetCommandLineW
 0x1402ed078 GetCommandLineA
 0x1402ed080 GetOEMCP
 0x1402ed088 GetACP
 0x1402ed090 IsValidCodePage
 0x1402ed098 FindNextFileW
 0x1402ed0a0 FindFirstFileExW
 0x1402ed0a8 FindClose
 0x1402ed0b0 GetTimeZoneInformation
 0x1402ed0b8 SetConsoleCtrlHandler
 0x1402ed0c0 GetFileType
 0x1402ed0c8 HeapReAlloc
 0x1402ed0d0 EnumSystemLocalesW
 0x1402ed0d8 GetUserDefaultLCID
 0x1402ed0e0 IsValidLocale
 0x1402ed0e8 GetLocaleInfoW
 0x1402ed0f0 LCMapStringW
 0x1402ed0f8 CompareStringW
 0x1402ed100 GetTimeFormatW
 0x1402ed108 GetDateFormatW
 0x1402ed110 VirtualProtect
 0x1402ed118 IsThreadAFiber
 0x1402ed120 FlsFree
 0x1402ed128 FlsSetValue
 0x1402ed130 FlsGetValue
 0x1402ed138 FlsAlloc
 0x1402ed140 GetTempPathW
 0x1402ed148 SetFilePointerEx
 0x1402ed150 GetFileSizeEx
 0x1402ed158 GetConsoleMode
 0x1402ed160 GetConsoleOutputCP
 0x1402ed168 GetCurrentThread
 0x1402ed170 CreateFileW
 0x1402ed178 HeapFree
 0x1402ed180 HeapAlloc
 0x1402ed188 WriteFile
 0x1402ed190 GetStdHandle
 0x1402ed198 GetModuleFileNameW
 0x1402ed1a0 GetModuleHandleExW
 0x1402ed1a8 ExitProcess
 0x1402ed1b0 LoadLibraryExW
 0x1402ed1b8 FreeLibrary
 0x1402ed1c0 TlsFree
 0x1402ed1c8 TlsSetValue
 0x1402ed1d0 TlsGetValue
 0x1402ed1d8 TlsAlloc
 0x1402ed1e0 InitializeCriticalSectionAndSpinCount
 0x1402ed1e8 SetLastError
 0x1402ed1f0 GetLastError
 0x1402ed1f8 InterlockedFlushSList
 0x1402ed200 InterlockedPushEntrySList
 0x1402ed208 RtlUnwindEx
 0x1402ed210 RaiseException
 0x1402ed218 RtlPcToFileHeader
 0x1402ed220 TerminateProcess
 0x1402ed228 GetCurrentProcess
 0x1402ed230 InitializeSListHead
 0x1402ed238 GetSystemTimeAsFileTime
 0x1402ed240 GetCurrentThreadId
 0x1402ed248 GetCurrentProcessId
 0x1402ed250 QueryPerformanceCounter
 0x1402ed258 GetModuleHandleW
 0x1402ed260 IsProcessorFeaturePresent
 0x1402ed268 GetStartupInfoW
 0x1402ed270 SetUnhandledExceptionFilter
 0x1402ed278 UnhandledExceptionFilter
 0x1402ed280 IsDebuggerPresent
 0x1402ed288 RtlVirtualUnwind
 0x1402ed290 RtlLookupFunctionEntry
 0x1402ed298 RtlCaptureContext
 0x1402ed2a0 GetCPInfo
 0x1402ed2a8 CompareStringEx
 0x1402ed2b0 FlushFileBuffers
 0x1402ed2b8 ReadFile
 0x1402ed2c0 ReadConsoleW
 0x1402ed2c8 HeapSize
 0x1402ed2d0 SetEndOfFile
 0x1402ed2d8 WriteConsoleW
 0x1402ed2e0 CloseHandle
 0x1402ed2e8 GetProcAddress
 0x1402ed2f0 FormatMessageA
 0x1402ed2f8 EnterCriticalSection
 0x1402ed300 LeaveCriticalSection
 0x1402ed308 InitializeCriticalSectionEx
 0x1402ed310 DeleteCriticalSection
 0x1402ed318 EncodePointer
 0x1402ed320 DecodePointer
 0x1402ed328 LocalFree
 0x1402ed330 GetLocaleInfoEx
 0x1402ed338 MultiByteToWideChar
 0x1402ed340 WideCharToMultiByte
 0x1402ed348 LCMapStringEx
 0x1402ed350 GetStringTypeW
 0x1402ed358 RtlUnwind
USER32.dll
 0x1402ed368 GetSystemMenu
 0x1402ed370 GetMessageA
 0x1402ed378 CheckMenuRadioItem
 0x1402ed380 DispatchMessageA
 0x1402ed388 GetWindowRect
 0x1402ed390 GetMenu
 0x1402ed398 LoadCursorA
 0x1402ed3a0 DestroyWindow
 0x1402ed3a8 SetWindowPos
 0x1402ed3b0 CheckRadioButton
 0x1402ed3b8 SetActiveWindow
 0x1402ed3c0 PostMessageA
 0x1402ed3c8 EndDialog
 0x1402ed3d0 GetSystemMetrics
 0x1402ed3d8 CreatePopupMenu
 0x1402ed3e0 DialogBoxParamA
 0x1402ed3e8 GetWindowPlacement
 0x1402ed3f0 DestroyCursor
 0x1402ed3f8 TrackPopupMenu
 0x1402ed400 wsprintfA
 0x1402ed408 GetSubMenu
 0x1402ed410 GetActiveWindow
 0x1402ed418 IsWindow
 0x1402ed420 OpenClipboard
 0x1402ed428 TranslateAcceleratorA
 0x1402ed430 GetDlgItemTextA
 0x1402ed438 SetTimer
 0x1402ed440 RedrawWindow
 0x1402ed448 DestroyIcon
 0x1402ed450 IsDialogMessageA
 0x1402ed458 SetMenuItemInfoA
 0x1402ed460 IsMenu
 0x1402ed468 SetWindowLongA
 0x1402ed470 ClientToScreen
 0x1402ed478 CloseClipboard
 0x1402ed480 CallWindowProcA
 0x1402ed488 DestroyAcceleratorTable
 0x1402ed490 EmptyClipboard
 0x1402ed498 GetWindowTextA
 0x1402ed4a0 LoadAcceleratorsA
 0x1402ed4a8 CharLowerBuffA
 0x1402ed4b0 SetWindowPlacement
 0x1402ed4b8 wvsprintfA
 0x1402ed4c0 SetWindowTextA
 0x1402ed4c8 MessageBoxA
 0x1402ed4d0 GetSysColor
 0x1402ed4d8 MoveWindow
 0x1402ed4e0 EnumClipboardFormats
 0x1402ed4e8 IsDlgButtonChecked
 0x1402ed4f0 RegisterClassA
 0x1402ed4f8 DestroyMenu
 0x1402ed500 SetFocus
 0x1402ed508 TranslateMessage
 0x1402ed510 GetClipboardData
 0x1402ed518 SendDlgItemMessageA
 0x1402ed520 GetClassInfoA
 0x1402ed528 SetDlgItemTextA
 0x1402ed530 SendMessageA
 0x1402ed538 SetClipboardData
 0x1402ed540 SetCursor
 0x1402ed548 CreateDialogParamA
 0x1402ed550 LoadIconA
 0x1402ed558 CharUpperA
 0x1402ed560 AppendMenuA
 0x1402ed568 RemoveMenu
 0x1402ed570 CheckMenuItem
 0x1402ed578 GetClientRect
 0x1402ed580 GetDlgItem
 0x1402ed588 UnregisterClassA
 0x1402ed590 KillTimer
 0x1402ed598 CheckDlgButton
 0x1402ed5a0 PostQuitMessage
 0x1402ed5a8 GetSysColorBrush
 0x1402ed5b0 EnableMenuItem
 0x1402ed5b8 SetDlgItemInt
 0x1402ed5c0 FindWindowA
 0x1402ed5c8 InsertMenuItemA
 0x1402ed5d0 InvalidateRect
 0x1402ed5d8 DefDlgProcA
 0x1402ed5e0 ChildWindowFromPoint
 0x1402ed5e8 GetCursorPos
 0x1402ed5f0 EnableWindow
 0x1402ed5f8 GetWindowLongA
COMCTL32.dll
 0x1402ed000 CreateToolbarEx
 0x1402ed008 ImageList_Destroy
 0x1402ed010 ImageList_Create
 0x1402ed018 ImageList_SetBkColor
 0x1402ed020 ImageList_ReplaceIcon
 0x1402ed028 InitCommonControlsEx
 0x1402ed030 ImageList_Remove

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure