Report - Finance.exe

Generic Malware Malicious Library UPX Antivirus AntiDebug AntiVM PE File PE64 DLL PE32 .NET DLL
ScreenShot
Created 2025.04.29 10:31 Machine s1_win7_x6401
Filename Finance.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
12
Behavior Score
13.8
ZERO API file : malware
VT API (file) 51 detected (AIDetectMalware, Malicious, score, Unsafe, Boxter, Save, confidence, Dnldr24, BBST, Attribute, HighConfidence, high confidence, a variant of Generik, KSCCFWO, Badur, PowerShell, MeterpreterShellCode, CLOUD, AGEN, SpyBot, Cometer, high, Static AI, Suspicious PE, cbdzv, Detected, SchoolBoy, Gandcrab, Wacatac, Kryptik, Artemis, R002H09DS25, GenAsa, VpprgU3GNoU, susgen)
md5 70dbf2129ad10943c505dfc8f75a0e12
sha256 6f783fddc42681870d2a3184acff7a68833c212b7e8e34c5b92aee88f16d66f7
ssdeep 3072:Jpvb7RV/8hhb3dLUK94IgqHniOSyaZoc7QNPnP9TBfWSE6j:z9VkhhrdYK94IgqHniOSyaZoc7QNPnPD
imphash 13c32f913271e5cf427548b785e74521
impfuzzy 48:Y/aG/qexWBCp51GN1OI4knlUYQOrSZ/gln6g/KAwEUEkE/1WSY+09AFXEvyAobFn:YCmqexYCp51GN1h4knlZk6FNwy
  Network IP location

Signature (32cnts)

Level Description
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Creates a suspicious Powershell process
watch Deletes executed files from disk
watch Network communications indicative of a potential document or script payload download was initiated by the process powershell.exe
watch One or more non-whitelisted processes were created
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch The process powershell.exe wrote an executable file to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Poweshell is sending data to a remote host
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice URL downloaded by powershell script
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Uses Windows APIs to generate a cryptographic key

Rules (18cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Is_DotNET_DLL (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://212.227.245.12/c.aes DE 1&1 Ionos Se 212.227.245.12 clean
https://85.215.173.244/ DE Strato AG 85.215.173.244 clean
85.215.173.244 DE Strato AG 85.215.173.244 clean
212.227.245.12 DE 1&1 Ionos Se 212.227.245.12 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x14001d6d8 memset
 0x14001d6e0 wcsncmp
 0x14001d6e8 memmove
 0x14001d6f0 wcsncpy
 0x14001d6f8 wcsstr
 0x14001d700 _wcsnicmp
 0x14001d708 _wcsicmp
 0x14001d710 wcslen
 0x14001d718 wcscpy
 0x14001d720 wcscmp
 0x14001d728 memcpy
 0x14001d730 tolower
 0x14001d738 wcscat
 0x14001d740 malloc
 0x14001d748 free
KERNEL32.dll
 0x14001d758 GetModuleHandleW
 0x14001d760 HeapCreate
 0x14001d768 GetStdHandle
 0x14001d770 HeapDestroy
 0x14001d778 ExitProcess
 0x14001d780 WriteFile
 0x14001d788 LoadLibraryExW
 0x14001d790 EnumResourceTypesW
 0x14001d798 FreeLibrary
 0x14001d7a0 RemoveDirectoryW
 0x14001d7a8 GetExitCodeProcess
 0x14001d7b0 EnumResourceNamesW
 0x14001d7b8 GetCommandLineW
 0x14001d7c0 LoadResource
 0x14001d7c8 SizeofResource
 0x14001d7d0 FreeResource
 0x14001d7d8 FindResourceW
 0x14001d7e0 GetShortPathNameW
 0x14001d7e8 GetTempFileNameW
 0x14001d7f0 EnterCriticalSection
 0x14001d7f8 CloseHandle
 0x14001d800 LeaveCriticalSection
 0x14001d808 InitializeCriticalSection
 0x14001d810 WaitForSingleObject
 0x14001d818 TerminateThread
 0x14001d820 CreateThread
 0x14001d828 Sleep
 0x14001d830 WideCharToMultiByte
 0x14001d838 HeapAlloc
 0x14001d840 HeapFree
 0x14001d848 LoadLibraryW
 0x14001d850 GetProcAddress
 0x14001d858 GetCurrentProcessId
 0x14001d860 GetCurrentThreadId
 0x14001d868 GetModuleFileNameW
 0x14001d870 GetEnvironmentVariableW
 0x14001d878 SetEnvironmentVariableW
 0x14001d880 GetCurrentProcess
 0x14001d888 TerminateProcess
 0x14001d890 RtlLookupFunctionEntry
 0x14001d898 RtlVirtualUnwind
 0x14001d8a0 RemoveVectoredExceptionHandler
 0x14001d8a8 AddVectoredExceptionHandler
 0x14001d8b0 HeapSize
 0x14001d8b8 MultiByteToWideChar
 0x14001d8c0 CreateDirectoryW
 0x14001d8c8 SetFileAttributesW
 0x14001d8d0 DeleteFileW
 0x14001d8d8 GetCurrentDirectoryW
 0x14001d8e0 SetCurrentDirectoryW
 0x14001d8e8 GetTempPathW
 0x14001d8f0 CreateFileW
 0x14001d8f8 SetFilePointer
 0x14001d900 TlsFree
 0x14001d908 TlsGetValue
 0x14001d910 TlsSetValue
 0x14001d918 TlsAlloc
 0x14001d920 HeapReAlloc
 0x14001d928 DeleteCriticalSection
 0x14001d930 GetLastError
 0x14001d938 SetLastError
 0x14001d940 UnregisterWait
 0x14001d948 GetCurrentThread
 0x14001d950 DuplicateHandle
 0x14001d958 RegisterWaitForSingleObject
SHELL32.DLL
 0x14001d968 ShellExecuteExW
 0x14001d970 SHGetFolderLocation
 0x14001d978 SHGetPathFromIDListW
WINMM.DLL
 0x14001d988 timeBeginPeriod
OLE32.DLL
 0x14001d998 CoInitialize
 0x14001d9a0 CoTaskMemFree
SHLWAPI.DLL
 0x14001d9b0 PathQuoteSpacesW
 0x14001d9b8 PathAddBackslashW
 0x14001d9c0 PathRemoveBackslashW
 0x14001d9c8 PathRemoveArgsW
 0x14001d9d0 PathRenameExtensionW
USER32.DLL
 0x14001d9e0 CharUpperW
 0x14001d9e8 CharLowerW
 0x14001d9f0 MessageBoxW
 0x14001d9f8 SendMessageW
 0x14001da00 PostMessageW
 0x14001da08 DefWindowProcW
 0x14001da10 GetWindowLongPtrW
 0x14001da18 GetWindowTextLengthW
 0x14001da20 GetWindowTextW
 0x14001da28 EnableWindow
 0x14001da30 DestroyWindow
 0x14001da38 UnregisterClassW
 0x14001da40 LoadIconW
 0x14001da48 LoadCursorW
 0x14001da50 RegisterClassExW
 0x14001da58 IsWindowEnabled
 0x14001da60 GetSystemMetrics
 0x14001da68 CreateWindowExW
 0x14001da70 SetWindowLongPtrW
 0x14001da78 SetFocus
 0x14001da80 CreateAcceleratorTableW
 0x14001da88 SetForegroundWindow
 0x14001da90 BringWindowToTop
 0x14001da98 GetMessageW
 0x14001daa0 TranslateAcceleratorW
 0x14001daa8 TranslateMessage
 0x14001dab0 DispatchMessageW
 0x14001dab8 DestroyAcceleratorTable
 0x14001dac0 GetForegroundWindow
 0x14001dac8 GetWindowThreadProcessId
 0x14001dad0 IsWindowVisible
 0x14001dad8 EnumWindows
 0x14001dae0 SetWindowPos
GDI32.DLL
 0x14001daf0 GetStockObject
COMCTL32.DLL
 0x14001db00 InitCommonControlsEx

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure