Report - vbc.exe

PE File OS Processor Check PE32
ScreenShot
Created 2021.04.29 22:23 Machine s1_win7_x6401
Filename vbc.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
1.8
ZERO API file : malware
VT API (file) 29 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Save, Hacktool, ZexaF, my0@au50jfhO, Kryptik, Eldorado, Attribute, HighConfidence, HKQF, FileRepMalware, Fareit, Auto, Static AI, Malicious PE, Predator, score, Artemis, ET#98%, RDMK, cmRtazrWBazOPb83cTFGJQtoYbTp, confidence)
md5 346cf0402aa3f87e686a16da0d73e419
sha256 65309f9f8c2b26c74b9c77c1fc4cb88843021b7e2b6c4c8ed1c2ac743b200bed
ssdeep 3072:TjWsLkxCJiC8g4Lm1TKIso1ayHeHolqQzEwhgFE6LrXENH5hyUh:/XLSop4oTKfoFjzZ2K6Lr0ZyUh
imphash 20a3b8299db6e8582c3eb04a6c72e959
impfuzzy 24:Uj8kx8V/OuqbJcDL1tvTqvKr2epms7tehJK5cxOaNTqdbpluHuOZyvFlRfGNZrKJ:Ujde172epms7to6cvcd10ulfGNZ2drj
  Network IP location

Signature (4cnts)

Level Description
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x446008 FreeLibrary
 0x44600c SystemTimeToTzSpecificLocalTime
 0x446010 GetConsoleAliasA
 0x446014 GetModuleHandleExW
 0x446018 GetTickCount
 0x44601c SetFileTime
 0x446020 TerminateThread
 0x446024 GetLocaleInfoW
 0x446028 SetSystemTimeAdjustment
 0x44602c GetFileAttributesA
 0x446030 SetTimeZoneInformation
 0x446034 GetAtomNameW
 0x446038 ReadFile
 0x44603c lstrcatA
 0x446040 RaiseException
 0x446044 FindResourceW
 0x446048 SetLastError
 0x44604c GetProcAddress
 0x446050 OpenWaitableTimerA
 0x446054 LocalAlloc
 0x446058 SetConsoleOutputCP
 0x44605c GlobalFindAtomW
 0x446060 SetConsoleCursorInfo
 0x446064 GetModuleHandleA
 0x446068 LoadLibraryExA
 0x44606c FindAtomW
 0x446070 FileTimeToLocalFileTime
 0x446074 GetCurrentProcessId
 0x446078 CompareStringW
 0x44607c CompareStringA
 0x446080 LCMapStringA
 0x446084 MapViewOfFile
 0x446088 GetModuleHandleW
 0x44608c Sleep
 0x446090 ExitProcess
 0x446094 GetStartupInfoW
 0x446098 TerminateProcess
 0x44609c GetCurrentProcess
 0x4460a0 UnhandledExceptionFilter
 0x4460a4 SetUnhandledExceptionFilter
 0x4460a8 IsDebuggerPresent
 0x4460ac HeapAlloc
 0x4460b0 TlsGetValue
 0x4460b4 TlsAlloc
 0x4460b8 TlsSetValue
 0x4460bc TlsFree
 0x4460c0 InterlockedIncrement
 0x4460c4 GetCurrentThreadId
 0x4460c8 GetLastError
 0x4460cc InterlockedDecrement
 0x4460d0 GetCurrentThread
 0x4460d4 WriteFile
 0x4460d8 GetStdHandle
 0x4460dc GetModuleFileNameA
 0x4460e0 DeleteCriticalSection
 0x4460e4 LeaveCriticalSection
 0x4460e8 FatalAppExitA
 0x4460ec EnterCriticalSection
 0x4460f0 SetConsoleCtrlHandler
 0x4460f4 InterlockedExchange
 0x4460f8 LoadLibraryA
 0x4460fc InitializeCriticalSectionAndSpinCount
 0x446100 GetModuleFileNameW
 0x446104 FreeEnvironmentStringsW
 0x446108 GetEnvironmentStringsW
 0x44610c GetCommandLineW
 0x446110 SetHandleCount
 0x446114 GetFileType
 0x446118 GetStartupInfoA
 0x44611c HeapCreate
 0x446120 HeapDestroy
 0x446124 VirtualFree
 0x446128 HeapFree
 0x44612c QueryPerformanceCounter
 0x446130 GetSystemTimeAsFileTime
 0x446134 VirtualAlloc
 0x446138 HeapReAlloc
 0x44613c GetCPInfo
 0x446140 GetACP
 0x446144 GetOEMCP
 0x446148 IsValidCodePage
 0x44614c HeapSize
 0x446150 RtlUnwind
 0x446154 GetLocaleInfoA
 0x446158 WideCharToMultiByte
 0x44615c MultiByteToWideChar
 0x446160 LCMapStringW
 0x446164 GetStringTypeA
 0x446168 GetStringTypeW
 0x44616c GetTimeFormatA
 0x446170 GetDateFormatA
 0x446174 GetUserDefaultLCID
 0x446178 EnumSystemLocalesA
 0x44617c IsValidLocale
 0x446180 GetTimeZoneInformation
 0x446184 SetEnvironmentVariableA
USER32.dll
 0x44618c GetDesktopWindow
ADVAPI32.dll
 0x446000 RegCreateKeyW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure