Report - nixsudo.exe

Gen1 Generic Malware Malicious Library Admin Tool (Sysinternals etc ...) Malicious Packer UPX PE File MZP Format PE32 OS Processor Check PNG Format
ScreenShot
Created 2025.03.31 12:25 Machine s1_win7_x6401
Filename nixsudo.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score Not founds Behavior Score
7.6
ZERO API file : mailcious
VT API (file) 47 detected (AIDetectMalware, Penguish, Ghanarava, Artemis, GenericKD, Unsafe, Vpjo, Attribute, HighConfidence, a variant of Generik, GXLYXZH, CLOUD, mvtdq, Inject5, GHOSTSOCKS, YXFC1Z, Detected, Wacatac, Leonem, ABTrojan, WXPX, MALICIOUS, TScope, Delf, Gencirc, susgen, Behavior)
md5 09f7e5af8af839111c760e5fead1363f
sha256 81e8ba37f175c8798101d49019f24188d0877185e68cbe8b2ad3ca1f0cb89eef
ssdeep 196608:mzThHKR3CVPLc4F8d+qSicW9mHTPUULixyoWh2FMmq6nQJEx:mlKJADF8dCnToWhROQJEx
imphash d73e412edccba7ffc3c299db8491f3eb
impfuzzy 96:nkHBEKDL1N+IBNJeOcImTX1pDnji+XXogAoaENiLfHbaDOK4AzPvrn:2KGzUTFln+E4toaENY/baD54Ajvj
  Network IP location

Signature (18cnts)

Level Description
danger File has been identified by 47 AntiVirus engines on VirusTotal as malicious
watch A process attempted to delay the analysis task.
watch Attempts to remove evidence of file being downloaded from the Internet
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
watch Looks for the Windows Idle Time to determine the uptime
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Expresses interest in specific running processes
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info Uses Windows APIs to generate a cryptographic key

Rules (11cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
103.28.89.34 HK Amarutu Technology Ltd 103.28.89.34 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x8bb568 GetFileTime
 0x8bb56c GetFileType
 0x8bb570 SetFileTime
 0x8bb574 QueryDosDeviceW
 0x8bb578 GetACP
 0x8bb57c GetExitCodeProcess
 0x8bb580 GetStringTypeExW
 0x8bb584 CloseHandle
 0x8bb588 LocalFree
 0x8bb58c GetCurrentProcessId
 0x8bb590 SizeofResource
 0x8bb594 VirtualProtect
 0x8bb598 UnlockFile
 0x8bb59c SetEnvironmentVariableW
 0x8bb5a0 TerminateThread
 0x8bb5a4 QueryPerformanceFrequency
 0x8bb5a8 IsDebuggerPresent
 0x8bb5ac FindNextFileW
 0x8bb5b0 FlushInstructionCache
 0x8bb5b4 GetFullPathNameW
 0x8bb5b8 VirtualFree
 0x8bb5bc GetProcessHeap
 0x8bb5c0 ExitProcess
 0x8bb5c4 HeapAlloc
 0x8bb5c8 GetCPInfoExW
 0x8bb5cc GetSystemTime
 0x8bb5d0 GetLongPathNameW
 0x8bb5d4 RtlUnwind
 0x8bb5d8 GetCPInfo
 0x8bb5dc EnumSystemLocalesW
 0x8bb5e0 GetStdHandle
 0x8bb5e4 GetTimeZoneInformation
 0x8bb5e8 FileTimeToLocalFileTime
 0x8bb5ec GetModuleHandleW
 0x8bb5f0 FreeLibrary
 0x8bb5f4 TryEnterCriticalSection
 0x8bb5f8 HeapDestroy
 0x8bb5fc FileTimeToDosDateTime
 0x8bb600 ReadFile
 0x8bb604 DosDateTimeToFileTime
 0x8bb608 CreateProcessW
 0x8bb60c GetLastError
 0x8bb610 GetModuleFileNameW
 0x8bb614 SetLastError
 0x8bb618 FindResourceW
 0x8bb61c lstrlenA
 0x8bb620 OpenMutexW
 0x8bb624 CreateThread
 0x8bb628 CompareStringW
 0x8bb62c CopyFileW
 0x8bb630 MapViewOfFile
 0x8bb634 CreateMutexW
 0x8bb638 LoadLibraryA
 0x8bb63c GetVolumeInformationW
 0x8bb640 ResetEvent
 0x8bb644 FreeResource
 0x8bb648 GetComputerNameExW
 0x8bb64c GetDriveTypeW
 0x8bb650 GetVersion
 0x8bb654 MoveFileW
 0x8bb658 RaiseException
 0x8bb65c FormatMessageW
 0x8bb660 OpenProcess
 0x8bb664 SwitchToThread
 0x8bb668 GetExitCodeThread
 0x8bb66c ReadDirectoryChangesW
 0x8bb670 GetCurrentThread
 0x8bb674 LocalFileTimeToFileTime
 0x8bb678 GetFileAttributesExW
 0x8bb67c IsBadReadPtr
 0x8bb680 ExpandEnvironmentStringsW
 0x8bb684 LockResource
 0x8bb688 LoadLibraryExW
 0x8bb68c FileTimeToSystemTime
 0x8bb690 GetCurrentThreadId
 0x8bb694 UnhandledExceptionFilter
 0x8bb698 VirtualQuery
 0x8bb69c GlobalFree
 0x8bb6a0 VirtualQueryEx
 0x8bb6a4 Sleep
 0x8bb6a8 EnterCriticalSection
 0x8bb6ac SetFilePointer
 0x8bb6b0 ReleaseMutex
 0x8bb6b4 FlushFileBuffers
 0x8bb6b8 GetStringTypeExA
 0x8bb6bc LoadResource
 0x8bb6c0 SuspendThread
 0x8bb6c4 GetTickCount
 0x8bb6c8 WritePrivateProfileStringW
 0x8bb6cc WaitForMultipleObjects
 0x8bb6d0 GetTempFileNameW
 0x8bb6d4 GetFileSize
 0x8bb6d8 GetStartupInfoW
 0x8bb6dc GetFileAttributesW
 0x8bb6e0 SetCurrentDirectoryW
 0x8bb6e4 GetCurrentDirectoryW
 0x8bb6e8 InitializeCriticalSection
 0x8bb6ec VerLanguageNameW
 0x8bb6f0 GetThreadPriority
 0x8bb6f4 GetCurrentProcess
 0x8bb6f8 SetThreadPriority
 0x8bb6fc VirtualAlloc
 0x8bb700 GetTempPathW
 0x8bb704 GetCommandLineW
 0x8bb708 GetSystemInfo
 0x8bb70c LeaveCriticalSection
 0x8bb710 GetProcAddress
 0x8bb714 ResumeThread
 0x8bb718 SearchPathW
 0x8bb71c GetLogicalDriveStringsW
 0x8bb720 GetVersionExW
 0x8bb724 GetModuleHandleA
 0x8bb728 VerifyVersionInfoW
 0x8bb72c HeapCreate
 0x8bb730 LCMapStringW
 0x8bb734 GetDiskFreeSpaceW
 0x8bb738 VerSetConditionMask
 0x8bb73c FindFirstFileW
 0x8bb740 GetUserDefaultUILanguage
 0x8bb744 LockFile
 0x8bb748 GetConsoleOutputCP
 0x8bb74c UnmapViewOfFile
 0x8bb750 GetConsoleCP
 0x8bb754 lstrlenW
 0x8bb758 CompareStringA
 0x8bb75c QueryPerformanceCounter
 0x8bb760 SetEndOfFile
 0x8bb764 HeapFree
 0x8bb768 WideCharToMultiByte
 0x8bb76c FindClose
 0x8bb770 MultiByteToWideChar
 0x8bb774 CreateMutexA
 0x8bb778 LoadLibraryW
 0x8bb77c SetEvent
 0x8bb780 GetLocaleInfoW
 0x8bb784 CreateFileW
 0x8bb788 SystemTimeToFileTime
 0x8bb78c DeleteFileW
 0x8bb790 IsDBCSLeadByteEx
 0x8bb794 GetEnvironmentVariableW
 0x8bb798 GetLocalTime
 0x8bb79c WaitForSingleObject
 0x8bb7a0 WriteFile
 0x8bb7a4 CreateFileMappingW
 0x8bb7a8 ExitThread
 0x8bb7ac DeleteCriticalSection
 0x8bb7b0 GetDateFormatW
 0x8bb7b4 TlsGetValue
 0x8bb7b8 SetErrorMode
 0x8bb7bc GetComputerNameW
 0x8bb7c0 IsValidLocale
 0x8bb7c4 TlsSetValue
 0x8bb7c8 CreateDirectoryW
 0x8bb7cc GetSystemDefaultUILanguage
 0x8bb7d0 EnumCalendarInfoW
 0x8bb7d4 LocalAlloc
 0x8bb7d8 RemoveDirectoryW
 0x8bb7dc CreateEventW
 0x8bb7e0 GetPrivateProfileStringW
 0x8bb7e4 WaitForMultipleObjectsEx
 0x8bb7e8 GetThreadLocale
 0x8bb7ec SetThreadLocale
shlwapi.dll
 0x8bb7f4 PathRelativePathToW
shell32.dll
 0x8bb7fc SHGetFolderPathW
ole32.dll
 0x8bb804 CoInitializeEx
 0x8bb808 CoInitialize
 0x8bb80c CoCreateInstance
 0x8bb810 CoUninitialize
 0x8bb814 CoTaskMemFree
 0x8bb818 CoTaskMemAlloc
 0x8bb81c StringFromCLSID
version.dll
 0x8bb824 GetFileVersionInfoSizeW
 0x8bb828 VerQueryValueW
 0x8bb82c GetFileVersionInfoW
user32.dll
 0x8bb834 IsWindow
 0x8bb838 FindWindowExW
 0x8bb83c TranslateMessage
 0x8bb840 CharLowerBuffA
 0x8bb844 CharLowerBuffW
 0x8bb848 CharUpperW
 0x8bb84c PeekMessageA
 0x8bb850 PeekMessageW
 0x8bb854 GetSystemMetrics
 0x8bb858 MessageBoxW
 0x8bb85c PostThreadMessageW
 0x8bb860 WaitMessage
 0x8bb864 CharUpperBuffA
 0x8bb868 CharUpperBuffW
 0x8bb86c GetWindowThreadProcessId
 0x8bb870 CharNextW
 0x8bb874 MsgWaitForMultipleObjects
 0x8bb878 LoadStringW
 0x8bb87c IsWindowUnicode
 0x8bb880 MsgWaitForMultipleObjectsEx
 0x8bb884 DispatchMessageW
 0x8bb888 DispatchMessageA
iphlpapi.dll
 0x8bb890 GetAdaptersInfo
oleaut32.dll
 0x8bb898 SafeArrayPutElement
 0x8bb89c SetErrorInfo
 0x8bb8a0 GetErrorInfo
 0x8bb8a4 VariantInit
 0x8bb8a8 VariantClear
 0x8bb8ac SysFreeString
 0x8bb8b0 SafeArrayAccessData
 0x8bb8b4 SysReAllocStringLen
 0x8bb8b8 SafeArrayCreate
 0x8bb8bc CreateErrorInfo
 0x8bb8c0 SafeArrayGetElement
 0x8bb8c4 SysAllocStringLen
 0x8bb8c8 SafeArrayUnaccessData
 0x8bb8cc SafeArrayPtrOfIndex
 0x8bb8d0 VariantCopy
 0x8bb8d4 SafeArrayGetUBound
 0x8bb8d8 SafeArrayGetLBound
 0x8bb8dc VariantCopyInd
 0x8bb8e0 VariantChangeType
msvcrt.dll
 0x8bb8e8 isupper
 0x8bb8ec isalpha
 0x8bb8f0 isalnum
 0x8bb8f4 toupper
 0x8bb8f8 memchr
 0x8bb8fc memcmp
 0x8bb900 memcpy
 0x8bb904 memset
 0x8bb908 isprint
 0x8bb90c isspace
 0x8bb910 iscntrl
 0x8bb914 isxdigit
 0x8bb918 ispunct
 0x8bb91c isgraph
 0x8bb920 islower
 0x8bb924 tolower
advapi32.dll
 0x8bb92c RegSetValueExW
 0x8bb930 RegConnectRegistryW
 0x8bb934 GetUserNameW
 0x8bb938 RegQueryInfoKeyW
 0x8bb93c RegUnLoadKeyW
 0x8bb940 RegSaveKeyW
 0x8bb944 RegReplaceKeyW
 0x8bb948 RegCreateKeyExW
 0x8bb94c SetEntriesInAclW
 0x8bb950 RegLoadKeyW
 0x8bb954 RegEnumKeyExW
 0x8bb958 RegDeleteKeyW
 0x8bb95c RegOpenKeyExA
 0x8bb960 RegOpenKeyExW
 0x8bb964 FreeSid
 0x8bb968 AllocateAndInitializeSid
 0x8bb96c RegDeleteValueW
 0x8bb970 RegFlushKey
 0x8bb974 SetNamedSecurityInfoW
 0x8bb978 RegQueryValueExA
 0x8bb97c RegQueryValueExW
 0x8bb980 RegEnumValueW
 0x8bb984 RegCloseKey
 0x8bb988 RegRestoreKeyW
winhttp.dll
 0x8bb990 WinHttpGetIEProxyConfigForCurrentUser
 0x8bb994 WinHttpSetTimeouts
 0x8bb998 WinHttpSetStatusCallback
 0x8bb99c WinHttpConnect
 0x8bb9a0 WinHttpReceiveResponse
 0x8bb9a4 WinHttpQueryAuthSchemes
 0x8bb9a8 WinHttpGetProxyForUrl
 0x8bb9ac WinHttpReadData
 0x8bb9b0 WinHttpCloseHandle
 0x8bb9b4 WinHttpQueryHeaders
 0x8bb9b8 WinHttpOpenRequest
 0x8bb9bc WinHttpAddRequestHeaders
 0x8bb9c0 WinHttpOpen
 0x8bb9c4 WinHttpWriteData
 0x8bb9c8 WinHttpSetCredentials
 0x8bb9cc WinHttpQueryDataAvailable
 0x8bb9d0 WinHttpSetOption
 0x8bb9d4 WinHttpSendRequest
 0x8bb9d8 WinHttpQueryOption

EAT(Export Address Table) Library

0x515f8c Lock
0x515f94 MainThreadRequest
0x515f90 UnLock
0x41353c __dbk_fcall_wrapper
0x834648 dbkFCallWrapperAddr


Similarity measure (PE file only) - Checking for service failure