Report - 32ja.exe

Emotet Generic Malware Confuser .NET Malicious Library UPX Malicious Packer Anti_VM AntiDebug AntiVM PE File PE32 OS Processor Check DLL PE64 ftp ZIP Format
ScreenShot
Created 2025.04.26 14:30 Machine s1_win7_x6401
Filename 32ja.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
10.6
ZERO API file : malware
VT API (file) 59 detected (AIDetectMalware, ShadowBrokers, Malicious, score, GenericRI, S14127141, PWSZbot, GenericKD, Unsafe, Save, confidence, 100%, Genus, Attribute, HighConfidence, high confidence, multiple detections, Tool, erpjbl, Zegost, CLOUD, bhlos, PcClient, WMINE, high, Vools, Static AI, Malicious SFX, Antavmu, AGEN, GrayWare, SafeGuard, Malware@#yv6r777s7mb6, Vindor, NoobyProtect, Detected, possible, Threat, Untrusted, Certificate, Kajl, ivI7Xr566q8)
md5 765e85042d83c00e6afcd972a51638d1
sha256 86db694cf3e5543f9f2a405afeeb9bf113daf6b9f07ccfdb7a1f478c96e51076
ssdeep 98304:i5TJXv2bedNmNA9dRLC6ZfpaH/jztKgOdizi9+HnAlD/L:i1ObedNmSZZfQHO0ziQAlDj
imphash 67d7f876c6b5aee2756e4dc028e1eaaa
impfuzzy 48:dBN1BLR4q+X1y28cf+jOivCtd/9qL9OMtIGfSY1bLEJ6HKnBLn6g6UylFvEkRSv3:dBBLR41X198cf+jDvg/IL9OM21m6
  Network IP location

Signature (22cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
watch Operates on local firewall's policies and settings
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks whether any human activity is being performed by constantly checking whether the foreground window changed
notice Creates a service
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Foreign language identified in PE resource
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info This executable has a PDB path

Rules (30cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_RL_Gen_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch ConfuserEx_Zero Confuser .NET binaries (download)
watch ConfuserEx_Zero Confuser .NET binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info ftp_command ftp command binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info zip_file_format ZIP file format binaries (download)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
e.0000o.xyz US PONYNET 198.98.57.188 clean
d.drawal.tk Unknown mailcious
198.98.57.188 US PONYNET 198.98.57.188 clean

Suricata ids

PE API

IAT(Import Address Table) Library

COMCTL32.dll
 0x447000 InitCommonControlsEx
SHELL32.dll
 0x4471cc SHBrowseForFolderW
 0x4471d0 SHGetFileInfoW
 0x4471d4 SHGetPathFromIDListW
 0x4471d8 ShellExecuteExW
 0x4471dc SHGetMalloc
 0x4471e0 ShellExecuteW
 0x4471e4 CommandLineToArgvW
KERNEL32.dll
 0x447014 FlushFileBuffers
 0x447018 WriteConsoleW
 0x44701c SetStdHandle
 0x447020 SetFilePointerEx
 0x447024 FreeLibrary
 0x447028 HeapAlloc
 0x44702c HeapFree
 0x447030 GetProcessHeap
 0x447034 LoadLibraryW
 0x447038 GetLastError
 0x44703c GetProcAddress
 0x447040 GetFileAttributesW
 0x447044 CloseHandle
 0x447048 GetCurrentProcess
 0x44704c GetModuleHandleW
 0x447050 GetVersionExW
 0x447054 CreateProcessW
 0x447058 WaitForSingleObject
 0x44705c InitializeCriticalSectionAndSpinCount
 0x447060 ExpandEnvironmentStringsW
 0x447064 GetModuleFileNameW
 0x447068 GetCurrentDirectoryW
 0x44706c SetCurrentDirectoryW
 0x447070 LocalFree
 0x447074 SetFileApisToOEM
 0x447078 GetEnvironmentVariableW
 0x44707c SetPriorityClass
 0x447080 GetCurrentThread
 0x447084 SetThreadPriority
 0x447088 GetCommandLineW
 0x44708c FindFirstFileW
 0x447090 FindClose
 0x447094 FindNextFileW
 0x447098 CreateFileW
 0x44709c GetLongPathNameW
 0x4470a0 GetCurrentThreadId
 0x4470a4 LoadLibraryExW
 0x4470a8 InitializeCriticalSection
 0x4470ac LeaveCriticalSection
 0x4470b0 EnterCriticalSection
 0x4470b4 DeleteCriticalSection
 0x4470b8 FindResourceW
 0x4470bc SetEndOfFile
 0x4470c0 SetFileTime
 0x4470c4 WriteFile
 0x4470c8 VirtualAlloc
 0x4470cc ResumeThread
 0x4470d0 WideCharToMultiByte
 0x4470d4 GetACP
 0x4470d8 MultiByteToWideChar
 0x4470dc GetFileSize
 0x4470e0 SetFilePointer
 0x4470e4 ReadFile
 0x4470e8 GetFullPathNameW
 0x4470ec GetTempFileNameW
 0x4470f0 MoveFileExW
 0x4470f4 CreateDirectoryW
 0x4470f8 lstrlenW
 0x4470fc GetTempPathW
 0x447100 MoveFileW
 0x447104 RemoveDirectoryW
 0x447108 GetWindowsDirectoryW
 0x44710c DeleteFileW
 0x447110 SetFileAttributesW
 0x447114 SetEvent
 0x447118 Sleep
 0x44711c ResetEvent
 0x447120 CreateEventW
 0x447124 FileTimeToSystemTime
 0x447128 GetConsoleMode
 0x44712c GetConsoleCP
 0x447130 OutputDebugStringW
 0x447134 LCMapStringW
 0x447138 HeapReAlloc
 0x44713c GetStringTypeW
 0x447140 GetCPInfo
 0x447144 GetOEMCP
 0x447148 IsValidCodePage
 0x44714c FreeEnvironmentStringsW
 0x447150 GetEnvironmentStringsW
 0x447154 GetCurrentProcessId
 0x447158 QueryPerformanceCounter
 0x44715c GetFileType
 0x447160 GetStdHandle
 0x447164 GetStartupInfoW
 0x447168 TlsFree
 0x44716c TlsSetValue
 0x447170 TlsGetValue
 0x447174 TlsAlloc
 0x447178 TerminateProcess
 0x44717c SetLastError
 0x447180 InterlockedExchangeAdd
 0x447184 VirtualFree
 0x447188 WaitForMultipleObjects
 0x44718c FormatMessageW
 0x447190 SetUnhandledExceptionFilter
 0x447194 UnhandledExceptionFilter
 0x447198 HeapSize
 0x44719c GetModuleHandleExW
 0x4471a0 ExitProcess
 0x4471a4 RtlUnwind
 0x4471a8 RaiseException
 0x4471ac EncodePointer
 0x4471b0 DecodePointer
 0x4471b4 IsDebuggerPresent
 0x4471b8 IsProcessorFeaturePresent
 0x4471bc GetSystemTimeAsFileTime
 0x4471c0 CreateThread
 0x4471c4 ExitThread
USER32.dll
 0x4471ec KillTimer
 0x4471f0 TranslateMessage
 0x4471f4 IsDialogMessageW
 0x4471f8 LoadIconW
 0x4471fc CreateDialogParamW
 0x447200 IsWindowVisible
 0x447204 EnableWindow
 0x447208 DispatchMessageW
 0x44720c DestroyIcon
 0x447210 IsWindow
 0x447214 ShowWindow
 0x447218 PostQuitMessage
 0x44721c GetWindowRect
 0x447220 PostMessageW
 0x447224 DialogBoxParamW
 0x447228 SetWindowPos
 0x44722c GetSystemMetrics
 0x447230 SetFocus
 0x447234 GetWindowTextW
 0x447238 GetDlgItem
 0x44723c EndDialog
 0x447240 SendMessageW
 0x447244 SetWindowTextW
 0x447248 GetMessageW
 0x44724c ScreenToClient
 0x447250 SetTimer
 0x447254 GetDesktopWindow
 0x447258 LoadStringW
 0x44725c MessageBoxW
GDI32.dll
 0x447008 CreateSolidBrush
 0x44700c DeleteObject
ole32.dll
 0x447264 CoInitialize
 0x447268 CoInitializeEx
 0x44726c CoUninitialize
 0x447270 CoCreateInstance

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure