Report - UN8QxIq.exe

Generic Malware Malicious Library UPX Antivirus PE File PE64 OS Processor Check PowerShell
ScreenShot
Created 2025.02.11 11:03 Machine s1_win7_x6401
Filename UN8QxIq.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
2
Behavior Score
4.8
ZERO API file : malware
VT API (file) 9 detected (Save, malicious, confidence, Attribute, HighConfidence, high confidence, Kryptik@AI, RDML, 08mR8iq7OsjpVBW+gMya3Q, Static AI, Suspicious PE, Artemis)
md5 04c35b787b10661350e076a7d9ffa1bc
sha256 d6fa01630b0e150b05f0240f0404e8d4150c400e3b1aadb4249efc45283d618e
ssdeep 6144:qIXSbPRUwqjvAxtNDtTrheNiq+X/+sS/o9:/XgRUweIxtNlHq+V
imphash 2668c56ed187d07e3269e27d61659ac7
impfuzzy 24:WqkXu9QHkxsBKAW4jDYc+Wch02thTBg3JBl39ro6LOovbOxv4GM+9RFZ8jiCc99Z:Txs/W4Qc+5JthTBgPpZO3RdFZ193Jh
  Network IP location

Signature (14cnts)

Level Description
watch Creates a suspicious Powershell process
watch The process powershell.exe wrote an executable file to disk
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice File has been identified by 9 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (9cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
github.com US MICROSOFT-CORP-MSN-AS-BLOCK 20.200.245.247
20.200.245.247 US MICROSOFT-CORP-MSN-AS-BLOCK 20.200.245.247 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140031020 CreateDirectoryA
 0x140031028 HeapSize
 0x140031030 CreateFileW
 0x140031038 GetConsoleWindow
 0x140031040 GetLastError
 0x140031048 WriteConsoleW
 0x140031050 SetEndOfFile
 0x140031058 GetModuleFileNameA
 0x140031060 GetProcessHeap
 0x140031068 SetStdHandle
 0x140031070 SetEnvironmentVariableW
 0x140031078 FreeEnvironmentStringsW
 0x140031080 GetEnvironmentStringsW
 0x140031088 GetOEMCP
 0x140031090 GetACP
 0x140031098 IsValidCodePage
 0x1400310a0 QueryPerformanceCounter
 0x1400310a8 QueryPerformanceFrequency
 0x1400310b0 WideCharToMultiByte
 0x1400310b8 GetCurrentThreadId
 0x1400310c0 ReleaseSRWLockExclusive
 0x1400310c8 AcquireSRWLockExclusive
 0x1400310d0 TryAcquireSRWLockExclusive
 0x1400310d8 Sleep
 0x1400310e0 CloseHandle
 0x1400310e8 InitializeCriticalSectionEx
 0x1400310f0 GetSystemTimeAsFileTime
 0x1400310f8 GetModuleHandleW
 0x140031100 GetProcAddress
 0x140031108 EnterCriticalSection
 0x140031110 LeaveCriticalSection
 0x140031118 DeleteCriticalSection
 0x140031120 EncodePointer
 0x140031128 DecodePointer
 0x140031130 MultiByteToWideChar
 0x140031138 LCMapStringEx
 0x140031140 WakeAllConditionVariable
 0x140031148 GetStringTypeW
 0x140031150 GetCPInfo
 0x140031158 RtlCaptureContext
 0x140031160 RtlLookupFunctionEntry
 0x140031168 RtlVirtualUnwind
 0x140031170 UnhandledExceptionFilter
 0x140031178 SetUnhandledExceptionFilter
 0x140031180 GetCurrentProcess
 0x140031188 TerminateProcess
 0x140031190 IsProcessorFeaturePresent
 0x140031198 GetCurrentProcessId
 0x1400311a0 InitializeSListHead
 0x1400311a8 IsDebuggerPresent
 0x1400311b0 GetStartupInfoW
 0x1400311b8 RtlUnwindEx
 0x1400311c0 RtlPcToFileHeader
 0x1400311c8 RaiseException
 0x1400311d0 SetLastError
 0x1400311d8 InitializeCriticalSectionAndSpinCount
 0x1400311e0 TlsAlloc
 0x1400311e8 TlsGetValue
 0x1400311f0 TlsSetValue
 0x1400311f8 TlsFree
 0x140031200 FreeLibrary
 0x140031208 LoadLibraryExW
 0x140031210 ExitProcess
 0x140031218 GetModuleHandleExW
 0x140031220 CreateThread
 0x140031228 ExitThread
 0x140031230 FreeLibraryAndExitThread
 0x140031238 GetStdHandle
 0x140031240 WriteFile
 0x140031248 GetModuleFileNameW
 0x140031250 GetCommandLineA
 0x140031258 GetCommandLineW
 0x140031260 GetFileSizeEx
 0x140031268 SetFilePointerEx
 0x140031270 GetFileType
 0x140031278 HeapAlloc
 0x140031280 FlushFileBuffers
 0x140031288 GetConsoleOutputCP
 0x140031290 GetConsoleMode
 0x140031298 HeapFree
 0x1400312a0 FlsAlloc
 0x1400312a8 FlsGetValue
 0x1400312b0 FlsSetValue
 0x1400312b8 FlsFree
 0x1400312c0 CompareStringW
 0x1400312c8 LCMapStringW
 0x1400312d0 GetLocaleInfoW
 0x1400312d8 IsValidLocale
 0x1400312e0 GetUserDefaultLCID
 0x1400312e8 EnumSystemLocalesW
 0x1400312f0 WaitForSingleObject
 0x1400312f8 GetExitCodeProcess
 0x140031300 CreateProcessW
 0x140031308 GetFileAttributesExW
 0x140031310 ReadFile
 0x140031318 ReadConsoleW
 0x140031320 HeapReAlloc
 0x140031328 FindClose
 0x140031330 FindFirstFileExW
 0x140031338 FindNextFileW
 0x140031340 RtlUnwind
USER32.dll
 0x140031368 GetAsyncKeyState
 0x140031370 ShowWindow
ADVAPI32.dll
 0x140031000 FreeSid
 0x140031008 CheckTokenMembership
 0x140031010 AllocateAndInitializeSid
SHELL32.dll
 0x140031350 ShellExecuteExA
 0x140031358 ShellExecuteA
WININET.dll
 0x140031380 InternetOpenUrlA
 0x140031388 InternetCloseHandle
 0x140031390 InternetOpenA
 0x140031398 InternetReadFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure