Report - mscorsvw1.log

VMProtect Malicious Library UPX PE File PE32
ScreenShot
Created 2025.04.23 14:46 Machine s1_win7_x6403
Filename mscorsvw1.log
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
4.8
ZERO API file : clean
VT API (file)
md5 b3b9eb83af47770dbb8e86f95afe9634
sha256 58d939306109bc6626c75ce7ef4ea4615229ca90ba246197427d40ba0197c8e5
ssdeep 98304:aBWUc7GXJhjlaXSvIsadQre5PaRB30ONA4+tIPx7l+7k0yuDB8d:8VT/CSAsayreYb308Dpn0zDB
imphash a63be339d6242a8f92508baf82eec945
impfuzzy 24:1r+Nz2uQG1PssKL+cOPqEWLKvQaQtXJHc9NDI5Q8:tozvQG1PxgWvQnXpcM5Q8
  Network IP location

Signature (12cnts)

Level Description
watch Installs itself for autorun at Windows startup
watch Queries information on disks
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a service
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info Checks amount of memory in system
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://rl.ammyy.com/ LU SERVERS 188.42.129.148 mailcious
rl.ammyy.com LU SERVERS 188.42.129.148 mailcious
aa.kr-ss.com Unknown clean
188.42.129.148 LU SERVERS 188.42.129.148 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

WS2_32.dll
 0xbf8000 WSAGetLastError
GDI32.dll
 0xbf8008 GetDIBits
USER32.dll
 0xbf8010 FindWindowA
SHELL32.dll
 0xbf8018 SHBrowseForFolderW
MSVCP60.dll
 0xbf8020 ??1Init@ios_base@std@@QAE@XZ
MSVCRT.dll
 0xbf8028 _strnicmp
Secur32.dll
 0xbf8030 FreeCredentialsHandle
SETUPAPI.dll
 0xbf8038 SetupDiEnumDeviceInfo
iphlpapi.dll
 0xbf8040 GetAdaptersInfo
ADVAPI32.dll
 0xbf8048 RegOpenKeyExA
SHLWAPI.dll
 0xbf8050 PathGetDriveNumberA
comdlg32.dll
 0xbf8058 GetOpenFileNameW
USERENV.dll
 0xbf8060 LoadUserProfileA
COMCTL32.dll
 0xbf8068 CreateToolbarEx
WININET.dll
 0xbf8070 HttpSendRequestA
DSOUND.dll
 0xbf8078 None
KERNEL32.dll
 0xbf8080 GetVersionExA
WTSAPI32.dll
 0xbf8088 WTSSendMessageW
KERNEL32.dll
 0xbf8090 VirtualQuery
USER32.dll
 0xbf8098 GetUserObjectInformationW
KERNEL32.dll
 0xbf80a0 LocalAlloc
 0xbf80a4 LocalFree
 0xbf80a8 GetModuleFileNameW
 0xbf80ac GetProcessAffinityMask
 0xbf80b0 SetProcessAffinityMask
 0xbf80b4 SetThreadAffinityMask
 0xbf80b8 Sleep
 0xbf80bc ExitProcess
 0xbf80c0 FreeLibrary
 0xbf80c4 LoadLibraryA
 0xbf80c8 GetModuleHandleA
 0xbf80cc GetProcAddress
USER32.dll
 0xbf80d4 GetProcessWindowStation
 0xbf80d8 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure