Report - helps.hta

UPX PE File PE32
ScreenShot
Created 2025.01.24 13:59 Machine s1_win7_x6403
Filename helps.hta
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
AI Score
9
Behavior Score
5.6
ZERO API
VT API (file) 60 detected (AIDetectMalware, Farfli, Malicious, score, Mauvaise, Unsafe, Mint, Zard, Save, confidence, 100%, GenericKD, Attribute, HighConfidence, moderate confidence, dxihqn, CQejOpL0yUV, DownLoader16, ZEGOST, SM44, moderate, Static AI, Malicious PE, bqnp, Detected, AntiAV, ~D@fny3h, ABTrojan, FYFU, R97143, Artemis, BScope, gh0RAT, MachineLearning, Anomalous, Bjlog, Genetic, Gencirc, GenAsa, iwTZsTxBTgQ, ToBea, susgen)
md5 407c9a93188dc7088e19d688a589c8c5
sha256 924c4682daa9e4f5dbb41a71458e6d37a927f86c01465ad209f9c78fe17973da
ssdeep 1536:0DAVfkzHIrV6EG0bd881SvsKjh0uRN4fcezQ0zfIikL:34HIx6g1S3jhhRNHz0zQL
imphash 0fd81f440ebc75b9643f0a9a76fd8d29
impfuzzy 6:dBJAEHGDvZ/ED2vI73T7dCgwyvcSbVIS11n:VA/DvZ2H7j7HwyvDpn
  Network IP location

Signature (11cnts)

Level Description
danger File has been identified by 60 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Installs itself for autorun at Windows startup
notice Creates a service
notice Expresses interest in specific running processes
notice Foreign language identified in PE resource
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
idc6.yjzj.org CN CHINA UNICOM China169 Backbone 122.114.69.29
122.114.69.29 CN CHINA UNICOM China169 Backbone 122.114.69.29

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x4327e0 LoadLibraryA
 0x4327e4 GetProcAddress
 0x4327e8 ExitProcess
ADVAPI32.dll
 0x4327f0 LsaClose
GDI32.dll
 0x4327f8 BitBlt
MSVCP60.dll
 0x432800 ?_Xran@std@@YAXXZ
MSVCRT.dll
 0x432808 free
MSVFW32.dll
 0x432810 ICOpen
PSAPI.DLL
 0x432818 EnumProcessModules
SHELL32.dll
 0x432820 ShellExecuteA
WINMM.dll
 0x432828 waveInStop
WS2_32.dll
 0x432830 send

EAT(Export Address Table) Library

0x4014d3 dfdg


Similarity measure (PE file only) - Checking for service failure