Report - jmkykhjksefkyt.exe

Generic Malware Malicious Library Antivirus UPX PE File PE32 OS Processor Check
ScreenShot
Created 2025.01.23 06:51 Machine s1_win7_x6403
Filename jmkykhjksefkyt.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
3.0
ZERO API file : mailcious
VT API (file)
md5 65cc23e7237f3cff2d206a269793772e
sha256 a57a8a3c3c073632337bb870db56538ef3d3cebd1ada4c3ed2397ea73a6923fb
ssdeep 3072:8Ho0VvS7fw67XojiwHjwlntccGGLz9VkYFP+WR9pLhbtnhSe2e2e2nw:41VvSM6ziiw0cMLzDj9VBne
imphash 84ba17106ada936d580064070fd488b4
impfuzzy 48:pCJ+8JliQqgy4/OTtoLI6X0Wh2Pa4jt4y4rzCLus5KQDw6/lgz9loehrw3R7oC6a:pq+IlRqgB/etoL50WnnM4lncaC9
  Network IP location

Signature (7cnts)

Level Description
watch Attempts to create or modify system certificates
watch Communicates with host for which no DNS query was performed
watch Network activity contains more than one unique useragent
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://steamcommunity.com/profiles/76561199819539662 KR LG DACOM Corporation 202.43.50.213 clean
t.me GB Telegram Messenger Inc 149.154.167.99 mailcious
steamcommunity.com US AKAMAI-AS 23.49.154.73 mailcious
149.154.167.99 GB Telegram Messenger Inc 149.154.167.99 mailcious
95.217.240.67 FI Hetzner Online GmbH 95.217.240.67
202.43.50.213 KR LG DACOM Corporation 202.43.50.213 clean

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x41b470 ??2@YAPAXI@Z
 0x41b474 ??3@YAXPAX@Z
 0x41b478 ??_U@YAPAXI@Z
 0x41b47c ??_V@YAXPAX@Z
 0x41b480 _itoa_s
 0x41b484 _splitpath
 0x41b488 atexit
 0x41b48c free
 0x41b490 isupper
 0x41b494 malloc
 0x41b498 memchr
 0x41b49c memcmp
 0x41b4a0 memcpy
 0x41b4a4 memmove
 0x41b4a8 memset
 0x41b4ac rand
 0x41b4b0 srand
 0x41b4b4 strchr
 0x41b4b8 strcpy
 0x41b4bc strcpy_s
 0x41b4c0 strlen
 0x41b4c4 strncpy
 0x41b4c8 strstr
 0x41b4cc strtok_s
KERNEL32.dll
 0x41b4d4 CloseHandle
 0x41b4d8 CopyFileA
 0x41b4dc CreateDirectoryA
 0x41b4e0 CreateEventA
 0x41b4e4 CreateFileA
 0x41b4e8 CreateProcessA
 0x41b4ec CreateThread
 0x41b4f0 CreateToolhelp32Snapshot
 0x41b4f4 DeleteFileA
 0x41b4f8 ExitProcess
 0x41b4fc ExpandEnvironmentStringsA
 0x41b500 FileTimeToSystemTime
 0x41b504 FindClose
 0x41b508 FindFirstFileA
 0x41b50c FindNextFileA
 0x41b510 GetComputerNameA
 0x41b514 GetComputerNameW
 0x41b518 GetCurrentProcess
 0x41b51c GetCurrentProcessId
 0x41b520 GetDriveTypeA
 0x41b524 GetEnvironmentVariableA
 0x41b528 GetFileAttributesA
 0x41b52c GetFileInformationByHandle
 0x41b530 GetFileSize
 0x41b534 GetFileSizeEx
 0x41b538 GetLastError
 0x41b53c GetLocalTime
 0x41b540 GetLocaleInfoA
 0x41b544 GetLogicalDriveStringsA
 0x41b548 GetLogicalProcessorInformationEx
 0x41b54c GetModuleFileNameA
 0x41b550 GetProcAddress
 0x41b554 GetProcessHeap
 0x41b558 GetSystemInfo
 0x41b55c GetSystemTime
 0x41b560 GetTickCount
 0x41b564 GetTimeZoneInformation
 0x41b568 GetVolumeInformationA
 0x41b56c GetWindowsDirectoryA
 0x41b570 GlobalAlloc
 0x41b574 GlobalFree
 0x41b578 GlobalLock
 0x41b57c GlobalMemoryStatusEx
 0x41b580 GlobalSize
 0x41b584 HeapAlloc
 0x41b588 HeapFree
 0x41b58c K32GetModuleFileNameExA
 0x41b590 LoadLibraryW
 0x41b594 LocalAlloc
 0x41b598 LocalFree
 0x41b59c OpenEventA
 0x41b5a0 OpenProcess
 0x41b5a4 Process32First
 0x41b5a8 Process32Next
 0x41b5ac RaiseException
 0x41b5b0 ReadFile
 0x41b5b4 ReadProcessMemory
 0x41b5b8 SetFilePointer
 0x41b5bc Sleep
 0x41b5c0 SystemTimeToFileTime
 0x41b5c4 TerminateProcess
 0x41b5c8 VirtualQueryEx
 0x41b5cc WaitForSingleObject
 0x41b5d0 WriteFile
 0x41b5d4 lstrcatA
 0x41b5d8 lstrcpyA
 0x41b5dc lstrlenA
ADVAPI32.dll
 0x41b5e4 GetCurrentHwProfileA
 0x41b5e8 GetUserNameA
 0x41b5ec GetUserNameW
 0x41b5f0 RegCloseKey
 0x41b5f4 RegEnumKeyExA
 0x41b5f8 RegGetValueA
 0x41b5fc RegOpenKeyExA
 0x41b600 RegQueryValueExA
api-ms-win-crt-runtime-l1-1-0.dll
 0x41b608 _invalid_parameter_noinfo_noreturn
USER32.dll
 0x41b610 CharToOemA
 0x41b614 CloseDesktop
 0x41b618 CloseWindow
 0x41b61c CreateDesktopA
 0x41b620 EnumDisplayDevicesA
 0x41b624 GetDC
 0x41b628 GetDesktopWindow
 0x41b62c GetKeyboardLayoutList
 0x41b630 GetWindowRect
 0x41b634 MessageBoxA
 0x41b638 OpenDesktopA
 0x41b63c ReleaseDC
 0x41b640 wsprintfA
 0x41b644 wsprintfW
api-ms-win-crt-stdio-l1-1-0.dll
 0x41b64c __stdio_common_vsnprintf_s
 0x41b650 __stdio_common_vsprintf
GDI32.dll
 0x41b658 BitBlt
 0x41b65c CreateCompatibleBitmap
 0x41b660 CreateCompatibleDC
 0x41b664 CreateDCA
 0x41b668 DeleteObject
 0x41b66c GetDeviceCaps
 0x41b670 SelectObject
SHELL32.dll
 0x41b678 SHFileOperationA
 0x41b67c SHGetFolderPathA
 0x41b680 ShellExecuteExA
ole32.dll
 0x41b688 CreateStreamOnHGlobal
 0x41b68c GetHGlobalFromStream
WS2_32.dll
 0x41b694 WSACleanup
 0x41b698 WSAStartup
 0x41b69c closesocket
 0x41b6a0 connect
 0x41b6a4 freeaddrinfo
 0x41b6a8 getaddrinfo
 0x41b6ac htons
 0x41b6b0 recv
 0x41b6b4 send
 0x41b6b8 socket
SHLWAPI.dll
 0x41b6c0 PathFileExistsA
 0x41b6c4 PathMatchSpecA
 0x41b6c8 None
 0x41b6cc None
 0x41b6d0 StrStrA
CRYPT32.dll
 0x41b6d8 CryptBinaryToStringA
 0x41b6dc CryptUnprotectData
WININET.dll
 0x41b6e4 HttpOpenRequestA
 0x41b6e8 HttpQueryInfoA
 0x41b6ec HttpSendRequestA
 0x41b6f0 InternetCloseHandle
 0x41b6f4 InternetConnectA
 0x41b6f8 InternetCrackUrlA
 0x41b6fc InternetOpenA
 0x41b700 InternetOpenUrlA
 0x41b704 InternetReadFile
 0x41b708 InternetSetOptionA
crypt.dll
 0x41b710 BCryptCloseAlgorithmProvider
 0x41b714 BCryptDecrypt
 0x41b718 BCryptDestroyKey
 0x41b71c BCryptGenerateSymmetricKey
 0x41b720 BCryptOpenAlgorithmProvider
 0x41b724 BCryptSetProperty
dbghelp.dll
 0x41b72c SymCleanup
 0x41b730 SymFromAddr
 0x41b734 SymGetLineFromAddr64
 0x41b738 SymInitialize
 0x41b73c SymMatchString
 0x41b740 SymSetOptions

EAT(Export Address Table) Library

0x40f48a _UnhandledExceptionFilter@4


Similarity measure (PE file only) - Checking for service failure