Report - svc.exe

Browser Login Data Stealer Gen1 Generic Malware Malicious Library UPX Downloader ASPack Anti_VM PE File PE64 OS Processor Check DLL ZIP Format PE32 JPEG Format
ScreenShot
Created 2025.02.07 11:36 Machine s1_win7_x6403
Filename svc.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
9
Behavior Score
14.8
ZERO API file : clean
VT API (file) 50 detected (Malicious, score, Zusy, Unsafe, confidence, 100%, GenusT, EIAH, Attribute, HighConfidence, high confidence, Nekark, OskiStealer, CLASSIC, ydehd, Static AI, Malicious PE, Detected, GrayWare, Wacapew, Wacatac, ABTrojan, XDPU, R690410, Artemis, R002H09B625, Gencirc, B9nj)
md5 4868a5a4c8e0ab56fa3be8469dd4bc75
sha256 b1e889002d9174c58dd9d8b20758516a3ff6e636ff14e00793da3ff9a09a7e9e
ssdeep 24576:N8sLDE4McT5z35ba06PpeguG7XlYtidA+56Epa29C:VLDE4D5TVa0IV71YtF1
imphash 4b08efbed763524964334e9746c7ffd2
impfuzzy 96:lEju4nMr8csfStbgBlQHHZHhN7S9njLas6ussjQ7BLpU:Eu4nMJCBlgYtljEBLpU
  Network IP location

Signature (31cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Attempts to access Bitcoin/ALTCoin wallets
watch Attempts to modify Explorer settings to prevent hidden files from being displayed
watch Communicates with host for which no DNS query was performed
watch Creates a thread using CreateRemoteThread in a non-child process indicative of process injection
watch Drops a binary and executes it
watch Executes one or more WMI queries
watch Expresses interest in specific running processes
watch Installs itself for autorun at Windows startup
watch Manipulates memory of a non-child process indicative of process injection
watch Network activity contains more than one unique useragent
watch One or more of the buffers contains an embedded PE file
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the processes svc.exe
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries which can be used to identify virtual machines
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername

Rules (21cnts)

Level Name Description Collection
danger infoStealer_browser_b_Zero browser info stealer binaries (upload)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch ASPack_Zero ASPack packed file binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Network_Downloader File Downloader binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info JPEG_Format_Zero JPEG Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info zip_file_format ZIP file format binaries (download)

Network (9cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.81.68.156/svcstealer/get.php FI KLN-Optimum Group Ltd 185.81.68.156 43701 mailcious
http://185.81.68.156/nvc.exe FI KLN-Optimum Group Ltd 185.81.68.156 malware
http://185.81.68.156/tnk.exe FI KLN-Optimum Group Ltd 185.81.68.156 clean
http://185.81.68.156/bin/bot.dll FI KLN-Optimum Group Ltd 185.81.68.156 clean
http://185.81.68.156/update.exe FI KLN-Optimum Group Ltd 185.81.68.156 malware
http://185.81.68.156/zx.exe FI KLN-Optimum Group Ltd 185.81.68.156 43702 malware
http://176.113.115.149/bin/bot.dll RU OOO Network of data-centers Selectel 176.113.115.149
176.113.115.149 RU OOO Network of data-centers Selectel 176.113.115.149
185.81.68.156 FI KLN-Optimum Group Ltd 185.81.68.156 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1400eb058 LoadLibraryA
 0x1400eb060 SetCurrentDirectoryW
 0x1400eb068 Process32First
 0x1400eb070 GetComputerNameW
 0x1400eb078 K32GetModuleFileNameExW
 0x1400eb080 OpenProcess
 0x1400eb088 GetVersionExW
 0x1400eb090 GetModuleFileNameW
 0x1400eb098 GetLocalTime
 0x1400eb0a0 Process32Next
 0x1400eb0a8 GlobalMemoryStatusEx
 0x1400eb0b0 K32EnumProcesses
 0x1400eb0b8 GetSystemInfo
 0x1400eb0c0 CreateToolhelp32Snapshot
 0x1400eb0c8 ExitProcess
 0x1400eb0d0 TerminateThread
 0x1400eb0d8 DeleteFileW
 0x1400eb0e0 CreateThread
 0x1400eb0e8 HeapAlloc
 0x1400eb0f0 HeapFree
 0x1400eb0f8 GetProcessHeap
 0x1400eb100 FormatMessageA
 0x1400eb108 SetLastError
 0x1400eb110 OutputDebugStringA
 0x1400eb118 LocalFree
 0x1400eb120 HeapReAlloc
 0x1400eb128 GetCurrentProcess
 0x1400eb130 GetModuleHandleW
 0x1400eb138 HeapDestroy
 0x1400eb140 HeapCreate
 0x1400eb148 GetCurrentThreadId
 0x1400eb150 GetCurrentProcessId
 0x1400eb158 GetFullPathNameW
 0x1400eb160 GetFullPathNameA
 0x1400eb168 CreateMutexW
 0x1400eb170 HeapCompact
 0x1400eb178 SetFilePointer
 0x1400eb180 TryEnterCriticalSection
 0x1400eb188 MapViewOfFile
 0x1400eb190 UnmapViewOfFile
 0x1400eb198 SetEndOfFile
 0x1400eb1a0 SystemTimeToFileTime
 0x1400eb1a8 QueryPerformanceCounter
 0x1400eb1b0 WaitForSingleObject
 0x1400eb1b8 UnlockFile
 0x1400eb1c0 FlushViewOfFile
 0x1400eb1c8 LockFile
 0x1400eb1d0 WaitForSingleObjectEx
 0x1400eb1d8 OutputDebugStringW
 0x1400eb1e0 GetTickCount
 0x1400eb1e8 UnlockFileEx
 0x1400eb1f0 GetSystemTimeAsFileTime
 0x1400eb1f8 InitializeCriticalSection
 0x1400eb200 WideCharToMultiByte
 0x1400eb208 LoadLibraryW
 0x1400eb210 FormatMessageW
 0x1400eb218 GetFileAttributesA
 0x1400eb220 LeaveCriticalSection
 0x1400eb228 HeapValidate
 0x1400eb230 GetFileAttributesW
 0x1400eb238 MultiByteToWideChar
 0x1400eb240 GetProcAddress
 0x1400eb248 GetTempPathW
 0x1400eb250 HeapSize
 0x1400eb258 LockFileEx
 0x1400eb260 EnterCriticalSection
 0x1400eb268 GetDiskFreeSpaceW
 0x1400eb270 CreateFileMappingA
 0x1400eb278 CreateFileMappingW
 0x1400eb280 GetDiskFreeSpaceA
 0x1400eb288 GetFileAttributesExW
 0x1400eb290 DeleteCriticalSection
 0x1400eb298 GetVersionExA
 0x1400eb2a0 GetTempPathA
 0x1400eb2a8 GetSystemTime
 0x1400eb2b0 AreFileApisANSI
 0x1400eb2b8 DeleteFileA
 0x1400eb2c0 FindFirstFileW
 0x1400eb2c8 CreateDirectoryW
 0x1400eb2d0 CopyFileW
 0x1400eb2d8 FindClose
 0x1400eb2e0 FindNextFileW
 0x1400eb2e8 GetWindowsDirectoryA
 0x1400eb2f0 GetVolumeInformationA
 0x1400eb2f8 TerminateProcess
 0x1400eb300 CopyFileA
 0x1400eb308 Process32FirstW
 0x1400eb310 RemoveDirectoryW
 0x1400eb318 Process32NextW
 0x1400eb320 GetWindowsDirectoryW
 0x1400eb328 GetVolumeInformationW
 0x1400eb330 FindFirstFileA
 0x1400eb338 FindNextFileA
 0x1400eb340 WriteConsoleW
 0x1400eb348 SetStdHandle
 0x1400eb350 EnumSystemLocalesEx
 0x1400eb358 IsValidLocaleName
 0x1400eb360 LCMapStringEx
 0x1400eb368 GetUserDefaultLocaleName
 0x1400eb370 CompareStringEx
 0x1400eb378 lstrcatA
 0x1400eb380 FreeLibrary
 0x1400eb388 lstrcpyA
 0x1400eb390 GetCurrentDirectoryW
 0x1400eb398 Sleep
 0x1400eb3a0 lstrlenA
 0x1400eb3a8 FreeEnvironmentStringsW
 0x1400eb3b0 GetEnvironmentStringsW
 0x1400eb3b8 GetTickCount64
 0x1400eb3c0 ReadConsoleW
 0x1400eb3c8 FlsFree
 0x1400eb3d0 FlsSetValue
 0x1400eb3d8 FlsGetValue
 0x1400eb3e0 FlsAlloc
 0x1400eb3e8 SetUnhandledExceptionFilter
 0x1400eb3f0 UnhandledExceptionFilter
 0x1400eb3f8 RtlVirtualUnwind
 0x1400eb400 RtlCaptureContext
 0x1400eb408 GetTimeZoneInformation
 0x1400eb410 GetOEMCP
 0x1400eb418 GetACP
 0x1400eb420 IsValidCodePage
 0x1400eb428 GetConsoleMode
 0x1400eb430 GetConsoleCP
 0x1400eb438 SetFilePointerEx
 0x1400eb440 GetStartupInfoW
 0x1400eb448 InitOnceExecuteOnce
 0x1400eb450 GetFileType
 0x1400eb458 GetStdHandle
 0x1400eb460 GetModuleHandleExW
 0x1400eb468 IsDebuggerPresent
 0x1400eb470 IsProcessorFeaturePresent
 0x1400eb478 InitializeCriticalSectionAndSpinCount
 0x1400eb480 RtlUnwindEx
 0x1400eb488 RtlLookupFunctionEntry
 0x1400eb490 lstrcmpA
 0x1400eb498 CloseHandle
 0x1400eb4a0 GetLastError
 0x1400eb4a8 CreateFileW
 0x1400eb4b0 ReadFile
 0x1400eb4b8 WriteFile
 0x1400eb4c0 GetFileSize
 0x1400eb4c8 FlushFileBuffers
 0x1400eb4d0 CreateFileA
 0x1400eb4d8 RaiseException
 0x1400eb4e0 RtlPcToFileHeader
 0x1400eb4e8 GetCommandLineW
 0x1400eb4f0 LoadLibraryExW
 0x1400eb4f8 ExitThread
 0x1400eb500 GetCPInfo
 0x1400eb508 GetLocaleInfoEx
 0x1400eb510 InitializeCriticalSectionEx
 0x1400eb518 DecodePointer
 0x1400eb520 EncodePointer
 0x1400eb528 GetStringTypeW
 0x1400eb530 SetEnvironmentVariableA
USER32.dll
 0x1400eb5a8 wsprintfW
 0x1400eb5b0 GetDC
 0x1400eb5b8 GetWindow
 0x1400eb5c0 GetWindowTextW
 0x1400eb5c8 GetSystemMetrics
 0x1400eb5d0 GetWindowThreadProcessId
 0x1400eb5d8 GetTopWindow
 0x1400eb5e0 wsprintfA
ADVAPI32.dll
 0x1400eb000 GetUserNameW
SHLWAPI.dll
 0x1400eb588 PathStripPathA
 0x1400eb590 PathFindExtensionW
 0x1400eb598 StrCmpIW
SHELL32.dll
 0x1400eb560 SHGetKnownFolderPath
 0x1400eb568 ShellExecuteW
 0x1400eb570 SHGetFolderPathW
 0x1400eb578 SHGetFolderPathA
ole32.dll
 0x1400eb690 CoUninitialize
 0x1400eb698 CoInitializeSecurity
 0x1400eb6a0 CoInitializeEx
 0x1400eb6a8 CoSetProxyBlanket
 0x1400eb6b0 CoCreateInstance
OLEAUT32.dll
 0x1400eb540 SysAllocString
 0x1400eb548 VariantClear
 0x1400eb550 SysFreeString
crypt.dll
 0x1400eb5f0 BCryptOpenAlgorithmProvider
 0x1400eb5f8 BCryptSetProperty
 0x1400eb600 BCryptDecrypt
 0x1400eb608 BCryptCloseAlgorithmProvider
 0x1400eb610 BCryptGenerateSymmetricKey
CRYPT32.dll
 0x1400eb010 CryptUnprotectData
 0x1400eb018 CryptStringToBinaryA
GDI32.dll
 0x1400eb028 CreateCompatibleDC
 0x1400eb030 SelectObject
 0x1400eb038 DeleteObject
 0x1400eb040 CreateCompatibleBitmap
 0x1400eb048 BitBlt
gdiplus.dll
 0x1400eb620 GdipSaveImageToFile
 0x1400eb628 GdipGetImageEncoders
 0x1400eb630 GdipCloneImage
 0x1400eb638 GdipDisposeImage
 0x1400eb640 GdipGetImageEncodersSize
 0x1400eb648 GdiplusStartup
 0x1400eb650 GdipFree
 0x1400eb658 GdipAlloc
 0x1400eb660 GdipCreateBitmapFromHBITMAP
 0x1400eb668 GdiplusShutdown
msi.dll
 0x1400eb678 None
 0x1400eb680 None

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure