Report - Zc3.exe

XMRig Miner Gen1 Generic Malware Malicious Library Malicious Packer UPX PE File MZP Format PE32 PE64 OS Processor Check
ScreenShot
Created 2025.05.01 10:07 Machine s1_win7_x6403
Filename Zc3.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
5.2
ZERO API file : malware
VT API (file) 25 detected (HLLPPhilis, Unsafe, Save, malicious, confidence, high confidence, CoinMiner, MalwareX, Reincarnation, Miners, HackTool, XMRMiner, CLASSIC, Tool, InstSrv, SchoolGirl, Real Protect, moderate, score, Generic ML PUA, Static AI, Suspicious PE, ShadowBrokers, GenericRXAA, BScope, Qhost, Gencirc)
md5 427b11f7f59e5efcfc03e8f14e88a58f
sha256 e2a0f035d64258fb0ace43738d7c37f88a9b572e208c690a4db2c531f9f97eaf
ssdeep 49152:rwT7Zu4MNIOoOVAYoqJD8YkY0VNB72YvnU1KZqLlmqBBLfJ:ra7hMNIaVAYoE8rYgVvnU1KZqLRn
imphash de1fa96ad5bc81910ffb7ed552e29d0d
impfuzzy 96:8cfpH1/jT3O5c/4Npxr0Uu1pwq6V6p1DwPOQD:n3m4FkFV6p2POQD
  Network IP location

Signature (12cnts)

Level Description
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious
watch Created a service where a service was also not started
watch Installs itself for autorun at Windows startup
notice A process created a hidden window
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Uses Windows utilities for basic Windows functionality
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (15cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
danger XMRig_Miner_IN XMRig Miner binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info mzp_file_format MZP(Delphi) file format binaries (download)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
gulf.moneroocean.stream FI Solteq Oyj 5.104.84.79 mailcious
5.104.84.79 FI Solteq Oyj 5.104.84.79 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0xe20104 DeleteCriticalSection
 0xe20108 LeaveCriticalSection
 0xe2010c EnterCriticalSection
 0xe20110 InitializeCriticalSection
 0xe20114 VirtualFree
 0xe20118 VirtualAlloc
 0xe2011c LocalFree
 0xe20120 LocalAlloc
 0xe20124 GetVersion
 0xe20128 GetCurrentThreadId
 0xe2012c InterlockedDecrement
 0xe20130 InterlockedIncrement
 0xe20134 VirtualQuery
 0xe20138 WideCharToMultiByte
 0xe2013c SetCurrentDirectoryA
 0xe20140 MultiByteToWideChar
 0xe20144 lstrlenA
 0xe20148 lstrcpynA
 0xe2014c LoadLibraryExA
 0xe20150 GetThreadLocale
 0xe20154 GetStartupInfoA
 0xe20158 GetProcAddress
 0xe2015c GetModuleHandleA
 0xe20160 GetModuleFileNameA
 0xe20164 GetLocaleInfoA
 0xe20168 GetLastError
 0xe2016c GetCurrentDirectoryA
 0xe20170 GetCommandLineA
 0xe20174 FreeLibrary
 0xe20178 FindFirstFileA
 0xe2017c FindClose
 0xe20180 ExitProcess
 0xe20184 WriteFile
 0xe20188 UnhandledExceptionFilter
 0xe2018c SetFilePointer
 0xe20190 SetEndOfFile
 0xe20194 RtlUnwind
 0xe20198 ReadFile
 0xe2019c RaiseException
 0xe201a0 GetStdHandle
 0xe201a4 GetFileSize
 0xe201a8 GetFileType
 0xe201ac CreateFileA
 0xe201b0 CloseHandle
user32.dll
 0xe201b8 GetKeyboardType
 0xe201bc LoadStringA
 0xe201c0 MessageBoxA
 0xe201c4 CharNextA
advapi32.dll
 0xe201cc RegQueryValueExA
 0xe201d0 RegOpenKeyExA
 0xe201d4 RegCloseKey
oleaut32.dll
 0xe201dc SysFreeString
 0xe201e0 SysReAllocStringLen
 0xe201e4 SysAllocStringLen
kernel32.dll
 0xe201ec TlsSetValue
 0xe201f0 TlsGetValue
 0xe201f4 LocalAlloc
 0xe201f8 GetModuleHandleA
kernel32.dll
 0xe20200 WriteFile
 0xe20204 WaitForSingleObject
 0xe20208 VirtualQuery
 0xe2020c SetFileTime
 0xe20210 SetFilePointer
 0xe20214 SetFileAttributesA
 0xe20218 SetEvent
 0xe2021c SetEndOfFile
 0xe20220 ResetEvent
 0xe20224 RemoveDirectoryA
 0xe20228 ReadFile
 0xe2022c MoveFileExA
 0xe20230 LocalFileTimeToFileTime
 0xe20234 LeaveCriticalSection
 0xe20238 InitializeCriticalSection
 0xe2023c GlobalUnlock
 0xe20240 GlobalHandle
 0xe20244 GlobalFree
 0xe20248 GetVersionExA
 0xe2024c GetThreadLocale
 0xe20250 GetTempPathA
 0xe20254 GetSystemDefaultLangID
 0xe20258 GetStringTypeExA
 0xe2025c GetStdHandle
 0xe20260 GetProcAddress
 0xe20264 GetModuleHandleA
 0xe20268 GetModuleFileNameA
 0xe2026c GetLocaleInfoA
 0xe20270 GetLocalTime
 0xe20274 GetLastError
 0xe20278 GetFullPathNameA
 0xe2027c GetFileAttributesA
 0xe20280 GetExitCodeProcess
 0xe20284 GetDiskFreeSpaceA
 0xe20288 GetDateFormatA
 0xe2028c GetCurrentThreadId
 0xe20290 GetCPInfo
 0xe20294 GetACP
 0xe20298 FormatMessageA
 0xe2029c FindNextFileA
 0xe202a0 FindFirstFileA
 0xe202a4 FindClose
 0xe202a8 FileTimeToLocalFileTime
 0xe202ac FileTimeToDosDateTime
 0xe202b0 ExpandEnvironmentStringsA
 0xe202b4 EnumCalendarInfoA
 0xe202b8 EnterCriticalSection
 0xe202bc DosDateTimeToFileTime
 0xe202c0 DeleteFileA
 0xe202c4 DeleteCriticalSection
 0xe202c8 CreateMutexA
 0xe202cc CreateFileA
 0xe202d0 CreateEventA
 0xe202d4 CreateDirectoryA
 0xe202d8 CompareStringA
 0xe202dc CloseHandle
gdi32.dll
 0xe202e4 TextOutA
 0xe202e8 SetTextColor
 0xe202ec SetBkColor
 0xe202f0 SelectObject
 0xe202f4 GetTextExtentPoint32A
 0xe202f8 ExtTextOutA
 0xe202fc DeleteObject
 0xe20300 CreateFontA
user32.dll
 0xe20308 CreateWindowExA
 0xe2030c RegisterClassExA
 0xe20310 PeekMessageA
 0xe20314 MessageBoxA
 0xe20318 LoadStringA
 0xe2031c InvalidateRect
 0xe20320 GetSystemMetrics
 0xe20324 GetSysColor
 0xe20328 EndPaint
 0xe2032c DrawEdge
 0xe20330 DispatchMessageA
 0xe20334 DestroyWindow
 0xe20338 DefWindowProcA
 0xe2033c BeginPaint
 0xe20340 CharNextA
 0xe20344 CharUpperBuffA
 0xe20348 CharToOemA
kernel32.dll
 0xe20350 Sleep
shell32.dll
 0xe20358 ShellExecuteExA
 0xe2035c ShellExecuteA
shell32.dll
 0xe20364 SHGetSpecialFolderLocation
 0xe20368 SHGetPathFromIDListA
 0xe2036c SHBrowseForFolderA
oleaut32.dll
 0xe20374 SafeArrayPtrOfIndex
 0xe20378 SafeArrayGetUBound
 0xe2037c SafeArrayGetLBound
 0xe20380 SafeArrayCreate
 0xe20384 VariantChangeType
 0xe20388 VariantCopy
 0xe2038c VariantClear
 0xe20390 VariantInit

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure