Report - Optimize.facebook.ads.exe

PE File OS Processor Check PE32
ScreenShot
Created 2021.05.18 09:38 Machine s1_win7_x6401
Filename Optimize.facebook.ads.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.4
ZERO API file : clean
VT API (file) 35 detected (AIDetect, malware2, malicious, high confidence, GenericKD, Unsafe, Save, Attribute, HighConfidence, ai score=85, Wacatac, score, Artemis, R002H09E921, CLOUD, Static AI, Suspicious PE, Behavior, confidence)
md5 a5292f2ae50ae5ca63dd1ae659548c28
sha256 788891968f40e55bf749ecd6d67ba4fcd7c1d890293586f19a462a3e670cbe35
ssdeep 3072:Wpo9pRCZC4uXxON7/IK6zvutuxmZ7TJkF65LyaPsKHuuc6s9Jfra52KR5VjRH40w:clD/Autu4XLtPBHexrK2U5lRHbyeGN
imphash 82c7cc00390cbd2e9edea8a134be6bcb
impfuzzy 24:cfCejtWOovbOGjMh1ulvg1WDHCyl3LPOG3JUsJP:cfCKx331ABhbOGqsJP
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x413d80 CloseHandle
 0x413d84 CreateFileW
 0x413d88 DecodePointer
 0x413d8c DeleteCriticalSection
 0x413d90 EnterCriticalSection
 0x413d94 ExitProcess
 0x413d98 FindClose
 0x413d9c FindFirstFileExW
 0x413da0 FindNextFileW
 0x413da4 FlushFileBuffers
 0x413da8 FreeEnvironmentStringsW
 0x413dac FreeLibrary
 0x413db0 GetACP
 0x413db4 GetCPInfo
 0x413db8 GetCommandLineA
 0x413dbc GetCommandLineW
 0x413dc0 GetConsoleCP
 0x413dc4 GetConsoleMode
 0x413dc8 GetCurrentProcess
 0x413dcc GetCurrentProcessId
 0x413dd0 GetCurrentThreadId
 0x413dd4 GetEnvironmentStringsW
 0x413dd8 GetFileType
 0x413ddc GetLastError
 0x413de0 GetModuleFileNameA
 0x413de4 GetModuleFileNameW
 0x413de8 GetModuleHandleA
 0x413dec GetModuleHandleExW
 0x413df0 GetModuleHandleW
 0x413df4 GetOEMCP
 0x413df8 GetProcAddress
 0x413dfc GetProcessHeap
 0x413e00 GetStartupInfoW
 0x413e04 GetStdHandle
 0x413e08 GetStringTypeW
 0x413e0c GetSystemTimeAsFileTime
 0x413e10 GetTickCount
 0x413e14 HeapAlloc
 0x413e18 HeapFree
 0x413e1c HeapReAlloc
 0x413e20 HeapSize
 0x413e24 InitializeCriticalSectionAndSpinCount
 0x413e28 InitializeSListHead
 0x413e2c IsDebuggerPresent
 0x413e30 IsProcessorFeaturePresent
 0x413e34 IsValidCodePage
 0x413e38 LCMapStringW
 0x413e3c LeaveCriticalSection
 0x413e40 LoadLibraryExW
 0x413e44 MultiByteToWideChar
 0x413e48 QueryPerformanceCounter
 0x413e4c RaiseException
 0x413e50 RtlUnwind
 0x413e54 SetFilePointerEx
 0x413e58 SetLastError
 0x413e5c SetStdHandle
 0x413e60 SetUnhandledExceptionFilter
 0x413e64 TerminateProcess
 0x413e68 TlsAlloc
 0x413e6c TlsFree
 0x413e70 TlsGetValue
 0x413e74 TlsSetValue
 0x413e78 UnhandledExceptionFilter
 0x413e7c WideCharToMultiByte
 0x413e80 WriteConsoleW
 0x413e84 WriteFile
SHELL32.dll
 0x413e8c ShellExecuteA
USER32.dll
 0x413e94 LoadBitmapA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure