Report - %E5%A4%A9%E9%99%8D%E6%BF%80%E5%85%89%E7%82%AE-%E5%9B%BE%E5%83%8F%E7%95%8C%E9%9D%A2%E7%89%88.exe

Anti_VM PE File PE32
ScreenShot
Created 2021.05.26 09:25 Machine s1_win7_x6402
Filename %E5%A4%A9%E9%99%8D%E6%BF%80%E5%85%89%E7%82%AE-%E5%9B%BE%E5%83%8F%E7%95%8C%E9%9D%A2%E7%89%88.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
3.8
ZERO API file : malware
VT API (file) 52 detected (AIDetect, malware1, malicious, high confidence, Symmi, Unsafe, Save, NoobyProtect, Eldorado, Attribute, HighConfidence, G suspicious, Blackv, eemzdg, Hacktool, mDyH, Gencirc, OSCF@5rs7jr, DownLoader22, ai score=100, ASMalwS, Occamy, score, CaptchaSteal, R110021, ZexaF, 6v1@aqlYMCfb, CLOUD, GenAsa, QGnqpFXWMWM, Static AI, Malicious PE, susgen, confidence, 100%)
md5 81df021fd7a1275df23a861bb0dd436a
sha256 9ca94f1c18262ad64ee1e51d395d74b76377619f5589c20102a0e593e78e39d0
ssdeep 49152:X+q1dc9mJkFLmtKbz+UcURvXDVN20wdkwVufr77fGrg5y:X+q1UmuYtKb5cERN2necX
imphash 09dce4c0468af4dfd0932b9a46511d5c
impfuzzy 6:AAi53mIQNutXmJJcJOqkMbOKSDquVMXXURveG02WWZn2yILw:ti53/QsX+mOqMKSYUO2P2hLw
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x6662d2 GetLocalTime
USER32.dll
 0x6662de GetForegroundWindow
GDI32.dll
 0x6662ea GetTextMetricsA
WINMM.dll
 0x6662f6 midiStreamStop
WINSPOOL.DRV
 0x666302 ClosePrinter
ADVAPI32.dll
 0x66630e RegOpenKeyExA
SHELL32.dll
 0x66631a ShellExecuteA
ole32.dll
 0x666326 CLSIDFromProgID
OLEAUT32.dll
 0x666332 SafeArrayGetUBound
COMCTL32.dll
 0x66633e ImageList_Destroy
WS2_32.dll
 0x66634a inet_ntoa
comdlg32.dll
 0x666356 GetSaveFileNameA
MSVCRT.dll
 0x666362 strncpy
IPHLPAPI.DLL
 0x66636e GetInterfaceInfo
PSAPI.DLL
 0x66637a GetMappedFileNameW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure