Report - snd16061.exe

Gen1 Generic Malware Malicious Library UPX Admin Tool (Sysinternals etc ...) Antivirus Malicious Packer Anti_VM PE File PE32 DLL OS Processor Check GIF Format Lnk Format
ScreenShot
Created 2025.04.18 11:51 Machine s1_win7_x6401
Filename snd16061.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive
AI Score
3
Behavior Score
8.6
ZERO API file : clean
VT API (file) 54 detected (AIDetectMalware, ChePro, Malicious, score, Ghanarava, Netsupportrat, GenericKD, Unsafe, Veh9, confidence, 100%, moderate confidence, multiple detections, nixe, TrojanBanker, jpnujo, zxgsm, Siggen30, Tool, NetSup, RemoteAdmin, Detected, Malware@#1zi5aixmnm5u8, HackTool, EQYN, NetSupport, Artemis, Tiggre, Netsupportmanager, Simw, myez5VmqQPE, susgen, nQvk)
md5 e24d2cdf95e080f2b6a1db32352d8a3c
sha256 d2f9dc8e7278a2ec0aa634536ac8d23db209aba8ca0e109ce80469c27517ab33
ssdeep 49152:XMHaSOxCBcuLX54FiFdrAskBlVgEKEZv5zauP+Tx77KZbYj57O7Tfle:XM6FMBcuEEdrAstEnv53P+xhOfM
imphash dbb1eb5c3476069287a73206929932fd
impfuzzy 48:dROaOGpw+vceo7nhzN54lzvSv6pfn56UyLlotn6gxSY4jS+EQhXUXCAk+09ok/Kc:dRZzwA87nKCy07dCaqUt5PuKTfD
  Network IP location

Signature (19cnts)

Level Description
danger File has been identified by 54 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Installs itself for autorun at Windows startup
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries
notice Executes one or more WMI queries which can be used to identify virtual machines
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info Queries for the computername
info This executable has a PDB path

Rules (19cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info lnk_file_format Microsoft Windows Shortcut File Format binaries (download)
info Lnk_Format_Zero LNK Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://geo.netsupportsoftware.com/location/loca.asp US CLOUDFLARENET 172.67.68.212 clean
geo.netsupportsoftware.com US CLOUDFLARENET 172.67.68.212 clean
Jalalymola11.com Unknown clean
Jalalymola17.com AZ Azeronline Information Services 5.10.250.244 clean
104.26.1.231 US CLOUDFLARENET 104.26.1.231 clean
5.10.250.240 AZ Azeronline Information Services 5.10.250.240 clean

Suricata ids

PE API

IAT(Import Address Table) Library

COMCTL32.dll
 0x41302c InitCommonControlsEx
 0x413030 None
SHLWAPI.dll
 0x4131bc SHAutoComplete
KERNEL32.dll
 0x41306c DeleteFileW
 0x413070 DeleteFileA
 0x413074 CreateDirectoryA
 0x413078 CreateDirectoryW
 0x41307c FindClose
 0x413080 FindNextFileA
 0x413084 FindFirstFileA
 0x413088 FindNextFileW
 0x41308c FindFirstFileW
 0x413090 GetTickCount
 0x413094 WideCharToMultiByte
 0x413098 GlobalAlloc
 0x41309c GetVersionExW
 0x4130a0 GetFullPathNameA
 0x4130a4 GetFullPathNameW
 0x4130a8 GetModuleFileNameW
 0x4130ac FindResourceW
 0x4130b0 GetModuleHandleW
 0x4130b4 HeapAlloc
 0x4130b8 GetProcessHeap
 0x4130bc HeapFree
 0x4130c0 HeapReAlloc
 0x4130c4 CompareStringA
 0x4130c8 ExitProcess
 0x4130cc GetLocaleInfoW
 0x4130d0 GetNumberFormatW
 0x4130d4 SetFileAttributesW
 0x4130d8 GetDateFormatW
 0x4130dc GetTimeFormatW
 0x4130e0 FileTimeToSystemTime
 0x4130e4 FileTimeToLocalFileTime
 0x4130e8 ExpandEnvironmentStringsW
 0x4130ec WaitForSingleObject
 0x4130f0 Sleep
 0x4130f4 GetTempPathW
 0x4130f8 MoveFileExW
 0x4130fc UnmapViewOfFile
 0x413100 GetCommandLineW
 0x413104 MapViewOfFile
 0x413108 CreateFileMappingW
 0x41310c OpenFileMappingW
 0x413110 SetEnvironmentVariableW
 0x413114 GetProcAddress
 0x413118 LocalFileTimeToFileTime
 0x41311c SystemTimeToFileTime
 0x413120 GetSystemTime
 0x413124 MultiByteToWideChar
 0x413128 CompareStringW
 0x41312c IsDBCSLeadByte
 0x413130 GetCPInfo
 0x413134 SetCurrentDirectoryW
 0x413138 LoadLibraryW
 0x41313c FreeLibrary
 0x413140 SetFileAttributesA
 0x413144 GetFileAttributesW
 0x413148 GetFileAttributesA
 0x41314c WriteFile
 0x413150 GetStdHandle
 0x413154 ReadFile
 0x413158 GetCurrentDirectoryW
 0x41315c CreateFileW
 0x413160 CreateFileA
 0x413164 GetFileType
 0x413168 SetEndOfFile
 0x41316c SetFilePointer
 0x413170 MoveFileW
 0x413174 SetFileTime
 0x413178 GetCurrentProcess
 0x41317c CloseHandle
 0x413180 SetLastError
 0x413184 GetLastError
 0x413188 DosDateTimeToFileTime
USER32.dll
 0x4131c4 wvsprintfW
 0x4131c8 ReleaseDC
 0x4131cc GetDC
 0x4131d0 SendMessageW
 0x4131d4 SetDlgItemTextW
 0x4131d8 SetFocus
 0x4131dc EndDialog
 0x4131e0 DestroyIcon
 0x4131e4 SendDlgItemMessageW
 0x4131e8 GetDlgItemTextW
 0x4131ec GetClassNameW
 0x4131f0 DialogBoxParamW
 0x4131f4 IsWindowVisible
 0x4131f8 WaitForInputIdle
 0x4131fc SetForegroundWindow
 0x413200 GetSysColor
 0x413204 PostMessageW
 0x413208 LoadBitmapW
 0x41320c LoadIconW
 0x413210 CharToOemA
 0x413214 OemToCharA
 0x413218 FindWindowExW
 0x41321c wvsprintfA
 0x413220 GetParent
 0x413224 MapWindowPoints
 0x413228 CreateWindowExW
 0x41322c UpdateWindow
 0x413230 SetWindowTextW
 0x413234 LoadCursorW
 0x413238 RegisterClassExW
 0x41323c SetWindowLongW
 0x413240 GetWindowLongW
 0x413244 DefWindowProcW
 0x413248 PeekMessageW
 0x41324c GetMessageW
 0x413250 TranslateMessage
 0x413254 DispatchMessageW
 0x413258 DestroyWindow
 0x41325c GetClientRect
 0x413260 IsWindow
 0x413264 CharToOemBuffW
 0x413268 MessageBoxW
 0x41326c ShowWindow
 0x413270 GetDlgItem
 0x413274 EnableWindow
 0x413278 OemToCharBuffA
 0x41327c CharUpperA
 0x413280 CharToOemBuffA
 0x413284 LoadStringW
 0x413288 SetWindowPos
 0x41328c GetWindowTextW
 0x413290 GetSystemMetrics
 0x413294 GetWindow
 0x413298 CharUpperW
 0x41329c GetWindowRect
 0x4132a0 CopyRect
GDI32.dll
 0x413048 GetDeviceCaps
 0x41304c GetObjectW
 0x413050 CreateCompatibleBitmap
 0x413054 SelectObject
 0x413058 StretchBlt
 0x41305c CreateCompatibleDC
 0x413060 DeleteObject
 0x413064 DeleteDC
COMDLG32.dll
 0x413038 GetOpenFileNameW
 0x41303c CommDlgExtendedError
 0x413040 GetSaveFileNameW
ADVAPI32.dll
 0x413000 RegOpenKeyExW
 0x413004 LookupPrivilegeValueW
 0x413008 OpenProcessToken
 0x41300c RegQueryValueExW
 0x413010 RegCreateKeyExW
 0x413014 RegSetValueExW
 0x413018 RegCloseKey
 0x41301c SetFileSecurityW
 0x413020 SetFileSecurityA
 0x413024 AdjustTokenPrivileges
SHELL32.dll
 0x413198 SHChangeNotify
 0x41319c ShellExecuteExW
 0x4131a0 SHFileOperationW
 0x4131a4 SHGetFileInfoW
 0x4131a8 SHGetSpecialFolderLocation
 0x4131ac SHGetMalloc
 0x4131b0 SHBrowseForFolderW
 0x4131b4 SHGetPathFromIDListW
ole32.dll
 0x4132a8 CreateStreamOnHGlobal
 0x4132ac OleInitialize
 0x4132b0 CoCreateInstance
 0x4132b4 OleUninitialize
 0x4132b8 CLSIDFromString
OLEAUT32.dll
 0x413190 VariantInit

EAT(Export Address Table) Library



Similarity measure (PE file only) - Checking for service failure