Report - knfl.exe

Generic Malware Antivirus Malicious Library UPX AntiDebug AntiVM PE File PE64 OS Processor Check
ScreenShot
Created 2025.05.02 09:14 Machine s1_win7_x6401
Filename knfl.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
5.8
ZERO API
VT API (file) 19 detected (Unsafe, Tflower, malicious, confidence, high confidence, Kryptik@AI, RDML, vvmGpHFuNtdpoJVlNx7q6A, Static AI, Suspicious PE, Detected, Kepavll, Artemis, Oader, Fflw, susgen)
md5 1ba63abea41132cba32f200b48172a8f
sha256 a300e62cdad3282467bd71fb7cd7931a734a84528f1b49a2874409a8301c048b
ssdeep 24576:hg+J6MdwgOs1QQbCn+DzeQVLMJk0HCzx2gaMNfg:zMJVizI
imphash 510a3588f1d3089e62364976381d5c62
impfuzzy 24:Yj1dcpVPOK02tMSYEoeDRGchyJe1lh7Qkv7rT/XuFZoSOovbOPZHu9pGMJh:icpVPO+tMSGoGc/rQuDuFZA3kh
  Network IP location

Signature (17cnts)

Level Description
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch The process powershell.exe wrote an executable file to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (17cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1401aa000 CloseHandle
 0x1401aa008 WaitForSingleObject
 0x1401aa010 Sleep
 0x1401aa018 GetExitCodeProcess
 0x1401aa020 CreateFileW
 0x1401aa028 ReadConsoleW
 0x1401aa030 ReadFile
 0x1401aa038 EnterCriticalSection
 0x1401aa040 LeaveCriticalSection
 0x1401aa048 InitializeCriticalSectionEx
 0x1401aa050 DeleteCriticalSection
 0x1401aa058 GetCurrentThreadId
 0x1401aa060 IsDebuggerPresent
 0x1401aa068 RaiseException
 0x1401aa070 MultiByteToWideChar
 0x1401aa078 WideCharToMultiByte
 0x1401aa080 RtlCaptureContext
 0x1401aa088 RtlLookupFunctionEntry
 0x1401aa090 RtlVirtualUnwind
 0x1401aa098 UnhandledExceptionFilter
 0x1401aa0a0 SetUnhandledExceptionFilter
 0x1401aa0a8 GetCurrentProcess
 0x1401aa0b0 TerminateProcess
 0x1401aa0b8 IsProcessorFeaturePresent
 0x1401aa0c0 QueryPerformanceCounter
 0x1401aa0c8 GetCurrentProcessId
 0x1401aa0d0 GetSystemTimeAsFileTime
 0x1401aa0d8 InitializeSListHead
 0x1401aa0e0 GetStartupInfoW
 0x1401aa0e8 GetModuleHandleW
 0x1401aa0f0 GetLastError
 0x1401aa0f8 HeapAlloc
 0x1401aa100 HeapFree
 0x1401aa108 GetProcessHeap
 0x1401aa110 VirtualQuery
 0x1401aa118 FreeLibrary
 0x1401aa120 GetProcAddress
 0x1401aa128 RtlPcToFileHeader
 0x1401aa130 RtlUnwindEx
 0x1401aa138 InterlockedPushEntrySList
 0x1401aa140 InterlockedFlushSList
 0x1401aa148 GetModuleFileNameW
 0x1401aa150 LoadLibraryExW
 0x1401aa158 SetLastError
 0x1401aa160 EncodePointer
 0x1401aa168 InitializeCriticalSectionAndSpinCount
 0x1401aa170 TlsAlloc
 0x1401aa178 TlsGetValue
 0x1401aa180 TlsSetValue
 0x1401aa188 TlsFree
 0x1401aa190 GetModuleHandleExW
 0x1401aa198 GetStdHandle
 0x1401aa1a0 WriteFile
 0x1401aa1a8 ExitProcess
 0x1401aa1b0 HeapSize
 0x1401aa1b8 HeapValidate
 0x1401aa1c0 GetSystemInfo
 0x1401aa1c8 GetCurrentThread
 0x1401aa1d0 GetFileType
 0x1401aa1d8 OutputDebugStringW
 0x1401aa1e0 WriteConsoleW
 0x1401aa1e8 SetConsoleCtrlHandler
 0x1401aa1f0 GetTempPathW
 0x1401aa1f8 FlsAlloc
 0x1401aa200 FlsGetValue
 0x1401aa208 FlsSetValue
 0x1401aa210 FlsFree
 0x1401aa218 GetDateFormatW
 0x1401aa220 GetTimeFormatW
 0x1401aa228 CompareStringW
 0x1401aa230 LCMapStringW
 0x1401aa238 GetLocaleInfoW
 0x1401aa240 IsValidLocale
 0x1401aa248 GetUserDefaultLCID
 0x1401aa250 EnumSystemLocalesW
 0x1401aa258 FindClose
 0x1401aa260 FindFirstFileExW
 0x1401aa268 FindNextFileW
 0x1401aa270 IsValidCodePage
 0x1401aa278 GetACP
 0x1401aa280 GetOEMCP
 0x1401aa288 GetCPInfo
 0x1401aa290 GetCommandLineA
 0x1401aa298 GetCommandLineW
 0x1401aa2a0 GetEnvironmentStringsW
 0x1401aa2a8 FreeEnvironmentStringsW
 0x1401aa2b0 SetEnvironmentVariableW
 0x1401aa2b8 SetStdHandle
 0x1401aa2c0 GetStringTypeW
 0x1401aa2c8 HeapReAlloc
 0x1401aa2d0 HeapQueryInformation
 0x1401aa2d8 GetFileSizeEx
 0x1401aa2e0 SetFilePointerEx
 0x1401aa2e8 FlushFileBuffers
 0x1401aa2f0 GetConsoleOutputCP
 0x1401aa2f8 GetConsoleMode
 0x1401aa300 RtlUnwind
SHELL32.dll
 0x1401aa3f8 ShellExecuteExW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure