Report - TinyTake_v_5_2_19.exe

VMProtect
ScreenShot
Created 2021.04.16 18:08 Machine s1_win7_x6401
Filename TinyTake_v_5_2_19.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
5
Behavior Score
5.6
ZERO API file : malware
VT API (file) 13 detected (malicious, high confidence, Unsafe, MdeClass, ET#77%, RDMK, cmRtazrfphQBIiuXBGJXy8DkQRfP, Static AI, Malicious PE, score, ZexaF, @VX@aWW3dae, InvalidSig)
md5 6f6ef1b4659a3e4724c20f551541161b
sha256 1323a36dcdb2fb1d4b3db599aae14d129abb52ab35f92c1b63cae9eda4c143bb
ssdeep 196608:5KWsXRNhZ2kwvBuworNg7US1iuFjo5/dGTFdMS6:knRcg0d7MS6
imphash 898d2213a85b483d34c574804fb124bd
impfuzzy 12:oHQZpQ5kBZGoQtXJxZGb9AJcDfA5kLfP9m:YmpQ58QtXJHc9NDI5Q8
  Network IP location

Signature (10cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
warning Generates some ICMP traffic
watch Communicates with host for which no DNS query was performed
watch File has been identified by 13 AntiVirus engines on VirusTotal as malicious
watch Network activity contains more than one unique useragent
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (7cnts)

Level Name Description Collection
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDigitalSignature DigitalSignature Check binaries (upload)
info HasOverlay Overlay Check binaries (upload)
info IsPacked Entropy Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
45.85.90.7 SG Security Firewall Ltd 45.85.90.7 clean
45.138.27.125 Unknown 45.138.27.125 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.DLL
 0xfeb000 GetUserNameW
KERNEL32.dll
 0xfeb008 CreateThread
msvcrt.dll
 0xfeb010 _strdup
msvcrt.dll
 0xfeb018 __getmainargs
USER32.dll
 0xfeb020 BeginPaint
WTSAPI32.dll
 0xfeb028 WTSSendMessageW
KERNEL32.dll
 0xfeb030 VirtualQuery
USER32.dll
 0xfeb038 GetProcessWindowStation
KERNEL32.dll
 0xfeb040 LocalAlloc
 0xfeb044 LocalFree
 0xfeb048 GetModuleFileNameW
 0xfeb04c GetProcessAffinityMask
 0xfeb050 SetProcessAffinityMask
 0xfeb054 SetThreadAffinityMask
 0xfeb058 Sleep
 0xfeb05c ExitProcess
 0xfeb060 FreeLibrary
 0xfeb064 LoadLibraryA
 0xfeb068 GetModuleHandleA
 0xfeb06c GetProcAddress
USER32.dll
 0xfeb074 GetProcessWindowStation
 0xfeb078 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure