Report - maza54ter.exe

Emotet Gen
ScreenShot
Created 2021.03.24 10:30 Machine s1_win7_x6401
Filename maza54ter.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
5.8
ZERO API file : malware
VT API (file) 8 detected (malicious, high confidence, Generic@ML, RDML, VSEtmkkSAetxOIiyg2uwHw, Emotet, score, confidence)
md5 06bab8c2471bf909b73801d1cb458678
sha256 055234a3607c09868727f44eb871614aba6b3b01ac60174501f127ca0be24642
ssdeep 12288:0GrOiraom1pPA1sGPdqdr6NuR4BKbydWwkBnO7WlK:RhaH1pPYdurWuReqh0WU
imphash 7dae3610b92e1224c0550f535f27ee05
impfuzzy 192:Y8zcuSlKJQu7kZ5cP+zU0H/3MVIGGcRcXcxy6KPSDK/3Q3FE:0u0b6kl3MVcEIjSDc3Q3FE
  Network IP location

Signature (16cnts)

Level Description
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Creates hidden or system file
notice File has been identified by 8 AntiVirus engines on VirusTotal as malicious
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info Queries for the computername
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (13cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_1_Zero Win32 Trojan Emotet binaries (upload)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check Signature Zero binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsPacked Entropy Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info keylogger Run a keylogger binaries (upload)
info screenshot Take screenshot binaries (upload)
info win_files_operation Affect private profile binaries (upload)
info win_private_profile Affect private profile binaries (upload)
info win_registry Affect system registries binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://68.201.55.46/yas54/TEST22-PC_W617601.C331F771F893F7792557E9BBDAD959C5/5/file/ US TWC-11427-TEXAS 68.201.55.46 clean
156.19.152.218 US CHARTER-20115 156.19.152.218 clean
65.158.28.70 US CENTURYLINK-US-LEGACY-QWEST 65.158.28.70 clean
73.103.36.158 US COMCAST-7922 73.103.36.158 mailcious
68.201.55.46 US TWC-11427-TEXAS 68.201.55.46 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x44018c SetUnhandledExceptionFilter
 0x440190 LCMapStringA
 0x440194 LCMapStringW
 0x440198 GetStringTypeA
 0x44019c GetStringTypeW
 0x4401a0 Sleep
 0x4401a4 IsBadReadPtr
 0x4401a8 IsBadCodePtr
 0x4401ac IsBadWritePtr
 0x4401b0 SetStdHandle
 0x4401b4 CompareStringA
 0x4401b8 CompareStringW
 0x4401bc SetEnvironmentVariableA
 0x4401c0 VirtualAlloc
 0x4401c4 GetProfileStringA
 0x4401c8 InterlockedExchange
 0x4401cc VirtualFree
 0x4401d0 HeapCreate
 0x4401d4 HeapDestroy
 0x4401d8 GetFileType
 0x4401dc GetStdHandle
 0x4401e0 SetHandleCount
 0x4401e4 GetEnvironmentStringsW
 0x4401e8 GetEnvironmentStrings
 0x4401ec FreeEnvironmentStringsW
 0x4401f0 FreeEnvironmentStringsA
 0x4401f4 UnhandledExceptionFilter
 0x4401f8 GetTimeZoneInformation
 0x4401fc GetACP
 0x440200 HeapSize
 0x440204 HeapReAlloc
 0x440208 RaiseException
 0x44020c TerminateProcess
 0x440210 HeapFree
 0x440214 HeapAlloc
 0x440218 GetCommandLineA
 0x44021c GetStartupInfoA
 0x440220 RtlUnwind
 0x440224 FileTimeToLocalFileTime
 0x440228 FileTimeToSystemTime
 0x44022c SetErrorMode
 0x440230 CopyFileA
 0x440234 FormatMessageA
 0x440238 lstrlenW
 0x44023c GlobalSize
 0x440240 SystemTimeToFileTime
 0x440244 LocalFileTimeToFileTime
 0x440248 GetFileSize
 0x44024c GetShortPathNameA
 0x440250 GetStringTypeExA
 0x440254 GetVolumeInformationA
 0x440258 FindFirstFileA
 0x44025c FindClose
 0x440260 DeleteFileA
 0x440264 MoveFileA
 0x440268 SetEndOfFile
 0x44026c UnlockFile
 0x440270 LockFile
 0x440274 FlushFileBuffers
 0x440278 SetFilePointer
 0x44027c WriteFile
 0x440280 ReadFile
 0x440284 CreateFileA
 0x440288 GetCurrentProcess
 0x44028c DuplicateHandle
 0x440290 GetOEMCP
 0x440294 GetCPInfo
 0x440298 GetThreadLocale
 0x44029c GetProcessVersion
 0x4402a0 GetCurrentDirectoryA
 0x4402a4 TlsGetValue
 0x4402a8 LocalReAlloc
 0x4402ac TlsSetValue
 0x4402b0 EnterCriticalSection
 0x4402b4 GlobalReAlloc
 0x4402b8 LeaveCriticalSection
 0x4402bc TlsFree
 0x4402c0 GlobalHandle
 0x4402c4 DeleteCriticalSection
 0x4402c8 TlsAlloc
 0x4402cc InitializeCriticalSection
 0x4402d0 LocalFree
 0x4402d4 LocalAlloc
 0x4402d8 SizeofResource
 0x4402dc GlobalFlags
 0x4402e0 SetLastError
 0x4402e4 WideCharToMultiByte
 0x4402e8 InterlockedDecrement
 0x4402ec InterlockedIncrement
 0x4402f0 GetProfileIntA
 0x4402f4 MulDiv
 0x4402f8 MultiByteToWideChar
 0x4402fc GetLastError
 0x440300 GetDiskFreeSpaceA
 0x440304 GetFileTime
 0x440308 SetFileTime
 0x44030c GetFullPathNameA
 0x440310 GetTempFileNameA
 0x440314 lstrcpynA
 0x440318 GetFileAttributesA
 0x44031c LoadLibraryA
 0x440320 FreeLibrary
 0x440324 GetVersion
 0x440328 lstrcatA
 0x44032c GlobalGetAtomNameA
 0x440330 GlobalFindAtomA
 0x440334 lstrcpyA
 0x440338 GetModuleHandleA
 0x44033c GetTickCount
 0x440340 lstrlenA
 0x440344 WritePrivateProfileStringA
 0x440348 GetPrivateProfileStringA
 0x44034c GetPrivateProfileIntA
 0x440350 GlobalAddAtomA
 0x440354 CloseHandle
 0x440358 GetModuleFileNameA
 0x44035c GlobalDeleteAtom
 0x440360 lstrcmpiA
 0x440364 GetCurrentThread
 0x440368 GetCurrentThreadId
 0x44036c lstrcmpA
 0x440370 LockResource
 0x440374 FindResourceA
 0x440378 LoadResource
 0x44037c ExitProcess
 0x440380 LoadLibraryW
 0x440384 GetProcAddress
 0x440388 GlobalUnlock
 0x44038c GlobalAlloc
 0x440390 GlobalLock
 0x440394 GlobalFree
USER32.dll
 0x4403e0 LockWindowUpdate
 0x4403e4 ReleaseCapture
 0x4403e8 IsClipboardFormatAvailable
 0x4403ec InflateRect
 0x4403f0 InvalidateRect
 0x4403f4 PtInRect
 0x4403f8 FillRect
 0x4403fc SetRect
 0x440400 GetDC
 0x440404 ReleaseDC
 0x440408 LoadCursorA
 0x44040c DestroyCursor
 0x440410 LoadIconA
 0x440414 MapWindowPoints
 0x440418 GetSysColor
 0x44041c AdjustWindowRectEx
 0x440420 ScreenToClient
 0x440424 EqualRect
 0x440428 DeferWindowPos
 0x44042c BeginDeferWindowPos
 0x440430 CopyRect
 0x440434 EndDeferWindowPos
 0x440438 ScrollWindow
 0x44043c GetScrollInfo
 0x440440 SetScrollInfo
 0x440444 ShowScrollBar
 0x440448 GetScrollRange
 0x44044c SetScrollRange
 0x440450 GetScrollPos
 0x440454 SetScrollPos
 0x440458 GetTopWindow
 0x44045c IsChild
 0x440460 GetCapture
 0x440464 WinHelpA
 0x440468 GetClassInfoA
 0x44046c RegisterClassA
 0x440470 GetMenu
 0x440474 GetMenuItemCount
 0x440478 GetSubMenu
 0x44047c GetMenuItemID
 0x440480 DefWindowProcA
 0x440484 CreateWindowExA
 0x440488 GetClassLongA
 0x44048c SetPropA
 0x440490 UnhookWindowsHookEx
 0x440494 GetPropA
 0x440498 CallWindowProcA
 0x44049c RemovePropA
 0x4404a0 GetMessageTime
 0x4404a4 GetMessagePos
 0x4404a8 GetForegroundWindow
 0x4404ac SetForegroundWindow
 0x4404b0 RegisterWindowMessageA
 0x4404b4 OffsetRect
 0x4404b8 IntersectRect
 0x4404bc SystemParametersInfoA
 0x4404c0 IsIconic
 0x4404c4 GetWindowPlacement
 0x4404c8 GetWindowRect
 0x4404cc GetDCEx
 0x4404d0 GetWindow
 0x4404d4 SetWindowContextHelpId
 0x4404d8 RegisterClipboardFormatA
 0x4404dc GetTabbedTextExtentA
 0x4404e0 SetFocus
 0x4404e4 ShowWindow
 0x4404e8 SetWindowPos
 0x4404ec MoveWindow
 0x4404f0 SetWindowLongA
 0x4404f4 GetDlgCtrlID
 0x4404f8 GetWindowTextLengthA
 0x4404fc GetWindowTextA
 0x440500 SetWindowTextA
 0x440504 IsDialogMessageA
 0x440508 SetDlgItemTextA
 0x44050c SendDlgItemMessageA
 0x440510 GetMenuCheckMarkDimensions
 0x440514 LoadBitmapA
 0x440518 GetMenuState
 0x44051c ModifyMenuA
 0x440520 SetMenuItemBitmaps
 0x440524 CheckMenuItem
 0x440528 EnableMenuItem
 0x44052c GetFocus
 0x440530 GetMessageA
 0x440534 TranslateMessage
 0x440538 DispatchMessageA
 0x44053c GetKeyState
 0x440540 CallNextHookEx
 0x440544 ValidateRect
 0x440548 IsWindowVisible
 0x44054c PeekMessageA
 0x440550 UpdateWindow
 0x440554 UnregisterClassA
 0x440558 HideCaret
 0x44055c ShowCaret
 0x440560 ExcludeUpdateRgn
 0x440564 DrawFocusRect
 0x440568 DefDlgProcA
 0x44056c IsWindowUnicode
 0x440570 EnableWindow
 0x440574 GetClientRect
 0x440578 FindWindowA
 0x44057c GetCursorPos
 0x440580 SetWindowsHookExA
 0x440584 GetLastActivePopup
 0x440588 MessageBoxA
 0x44058c SetCursor
 0x440590 ShowOwnedPopups
 0x440594 PostMessageA
 0x440598 PostQuitMessage
 0x44059c GetNextDlgTabItem
 0x4405a0 EndDialog
 0x4405a4 GetActiveWindow
 0x4405a8 SetActiveWindow
 0x4405ac IsWindow
 0x4405b0 GetSystemMetrics
 0x4405b4 CreateDialogIndirectParamA
 0x4405b8 InvertRect
 0x4405bc WindowFromPoint
 0x4405c0 KillTimer
 0x4405c4 SetTimer
 0x4405c8 MapDialogRect
 0x4405cc DestroyWindow
 0x4405d0 GetParent
 0x4405d4 GetWindowLongA
 0x4405d8 GetDlgItem
 0x4405dc IsWindowEnabled
 0x4405e0 OpenClipboard
 0x4405e4 EmptyClipboard
 0x4405e8 SetClipboardData
 0x4405ec CloseClipboard
 0x4405f0 SendMessageA
 0x4405f4 CharUpperA
 0x4405f8 MessageBeep
 0x4405fc GetNextDlgGroupItem
 0x440600 CopyAcceleratorTableA
 0x440604 CharNextA
 0x440608 PostThreadMessageA
 0x44060c DestroyIcon
 0x440610 LoadStringA
 0x440614 GetSysColorBrush
 0x440618 GetMenuStringA
 0x44061c InsertMenuA
 0x440620 GrayStringA
 0x440624 DrawTextA
 0x440628 TabbedTextOutA
 0x44062c EndPaint
 0x440630 BeginPaint
 0x440634 GetWindowDC
 0x440638 ClientToScreen
 0x44063c GetClassNameA
 0x440640 GetSystemMenu
 0x440644 DeleteMenu
 0x440648 AppendMenuA
 0x44064c SetParent
 0x440650 IsZoomed
 0x440654 BringWindowToTop
 0x440658 UnpackDDElParam
 0x44065c ReuseDDElParam
 0x440660 SetMenu
 0x440664 LoadMenuA
 0x440668 DestroyMenu
 0x44066c GetDesktopWindow
 0x440670 TranslateAcceleratorA
 0x440674 LoadAcceleratorsA
 0x440678 SetRectEmpty
 0x44067c wsprintfA
 0x440680 IsRectEmpty
 0x440684 SetCapture
GDI32.dll
 0x440048 StretchDIBits
 0x44004c CreateCompatibleDC
 0x440050 CreateCompatibleBitmap
 0x440054 DeleteObject
 0x440058 GetCharWidthA
 0x44005c CreateFontA
 0x440060 CreateFontIndirectA
 0x440064 SaveDC
 0x440068 RestoreDC
 0x44006c SetBkMode
 0x440070 SetPolyFillMode
 0x440074 SetROP2
 0x440078 SetStretchBltMode
 0x44007c SetMapMode
 0x440080 SetViewportOrgEx
 0x440084 OffsetViewportOrgEx
 0x440088 SetViewportExtEx
 0x44008c ScaleViewportExtEx
 0x440090 SetWindowOrgEx
 0x440094 SetWindowExtEx
 0x440098 ScaleWindowExtEx
 0x44009c SelectClipRgn
 0x4400a0 ExcludeClipRect
 0x4400a4 IntersectClipRect
 0x4400a8 MoveToEx
 0x4400ac LineTo
 0x4400b0 SetTextAlign
 0x4400b4 GetCurrentPositionEx
 0x4400b8 GetTextMetricsA
 0x4400bc CreateRectRgn
 0x4400c0 GetViewportExtEx
 0x4400c4 GetWindowExtEx
 0x4400c8 CreateSolidBrush
 0x4400cc CreatePatternBrush
 0x4400d0 PtVisible
 0x4400d4 RectVisible
 0x4400d8 TextOutA
 0x4400dc ExtTextOutA
 0x4400e0 Escape
 0x4400e4 GetTextColor
 0x4400e8 GetBkColor
 0x4400ec LPtoDP
 0x4400f0 GetNearestColor
 0x4400f4 GetStretchBltMode
 0x4400f8 GetPolyFillMode
 0x4400fc GetTextAlign
 0x440100 GetBkMode
 0x440104 GetROP2
 0x440108 GetTextFaceA
 0x44010c GetWindowOrgEx
 0x440110 GetMapMode
 0x440114 SetRectRgn
 0x440118 CombineRgn
 0x44011c CopyMetaFileA
 0x440120 BitBlt
 0x440124 SelectObject
 0x440128 GetTextExtentPoint32A
 0x44012c CreateRectRgnIndirect
 0x440130 DeleteDC
 0x440134 CreateDCA
 0x440138 SetAbortProc
 0x44013c StartDocA
 0x440140 StartPage
 0x440144 EndPage
 0x440148 EndDoc
 0x44014c AbortDoc
 0x440150 GetViewportOrgEx
 0x440154 CreatePen
 0x440158 DPtoLP
 0x44015c Rectangle
 0x440160 GetStockObject
 0x440164 PatBlt
 0x440168 GetDeviceCaps
 0x44016c GetObjectA
 0x440170 SetBkColor
 0x440174 SetTextColor
 0x440178 GetClipBox
 0x44017c CreateDIBitmap
 0x440180 GetTextExtentPointA
 0x440184 CreateBitmap
comdlg32.dll
 0x44069c GetSaveFileNameA
 0x4406a0 GetFileTitleA
 0x4406a4 GetOpenFileNameA
 0x4406a8 CommDlgExtendedError
 0x4406ac PrintDlgA
WINSPOOL.DRV
 0x44068c OpenPrinterA
 0x440690 DocumentPropertiesA
 0x440694 ClosePrinter
ADVAPI32.dll
 0x440000 GetFileSecurityA
 0x440004 RegCloseKey
 0x440008 RegEnumKeyA
 0x44000c RegOpenKeyA
 0x440010 RegDeleteKeyA
 0x440014 RegCreateKeyExA
 0x440018 RegOpenKeyExA
 0x44001c RegQueryValueExA
 0x440020 RegSetValueExA
 0x440024 RegSetValueA
 0x440028 RegCreateKeyA
 0x44002c RegQueryValueA
 0x440030 SetFileSecurityA
 0x440034 RegDeleteValueA
SHELL32.dll
 0x4403cc ExtractIconA
 0x4403d0 DragFinish
 0x4403d4 DragQueryFileA
 0x4403d8 SHGetFileInfoA
COMCTL32.dll
 0x44003c None
 0x440040 ImageList_Destroy
oledlg.dll
 0x440714 None
ole32.dll
 0x4406b4 OleDuplicateData
 0x4406b8 CreateStreamOnHGlobal
 0x4406bc CoTaskMemAlloc
 0x4406c0 CreateILockBytesOnHGlobal
 0x4406c4 StgCreateDocfileOnILockBytes
 0x4406c8 StgOpenStorageOnILockBytes
 0x4406cc CoRevokeClassObject
 0x4406d0 CoGetClassObject
 0x4406d4 CoRegisterMessageFilter
 0x4406d8 DoDragDrop
 0x4406dc OleFlushClipboard
 0x4406e0 OleGetClipboard
 0x4406e4 ReleaseStgMedium
 0x4406e8 CoTaskMemFree
 0x4406ec RevokeDragDrop
 0x4406f0 CoLockObjectExternal
 0x4406f4 RegisterDragDrop
 0x4406f8 CLSIDFromString
 0x4406fc CLSIDFromProgID
 0x440700 CoFreeUnusedLibraries
 0x440704 OleUninitialize
 0x440708 OleInitialize
 0x44070c OleIsCurrentClipboard
OLEPRO32.DLL
 0x4403c4 None
OLEAUT32.dll
 0x44039c SysAllocStringByteLen
 0x4403a0 SysFreeString
 0x4403a4 SysAllocStringLen
 0x4403a8 VariantClear
 0x4403ac VariantTimeToSystemTime
 0x4403b0 VariantChangeType
 0x4403b4 SysAllocString
 0x4403b8 VariantCopy
 0x4403bc SysStringLen

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure