Report - filename.exe

Generic Malware Malicious Packer PE File OS Processor Check PE32
ScreenShot
Created 2021.06.08 13:21 Machine s1_win7_x6402
Filename filename.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.6
ZERO API file : malware
VT API (file)
md5 b962ee63b8f28568191028fa44df69ee
sha256 7b8b6dd0f2e3dd6475137e3f236d89b3a1abf66779f2f1ef1d9cc779f33dc327
ssdeep 12288:EFBqGRucn2cPp4/H5Yp9LWVApDeD5DDMcPcDNVO7L:GfD+xHjDFDgA7L
imphash f6fd925686f2488c5f12dd7bfb580a41
impfuzzy 48:XioG9eHTK88dP6xK11YLgF+eTAcIe4V8Ca9mxWBg:XosUP6mKGDTAcIe4V8P9mxD
  Network IP location

Signature (7cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x473008 lstrlenA
 0x47300c CopyFileExW
 0x473010 SetEndOfFile
 0x473014 HeapAlloc
 0x473018 InterlockedIncrement
 0x47301c WritePrivateProfileSectionA
 0x473020 SetEnvironmentVariableW
 0x473024 GetModuleHandleExW
 0x473028 GetProfileSectionA
 0x47302c SetVolumeMountPointW
 0x473030 OpenSemaphoreA
 0x473034 EnumTimeFormatsW
 0x473038 CreateActCtxW
 0x47303c GetDriveTypeA
 0x473040 TlsSetValue
 0x473044 LoadLibraryW
 0x473048 TerminateThread
 0x47304c ReadConsoleInputA
 0x473050 CopyFileW
 0x473054 GetPrivateProfileStructW
 0x473058 GlobalFlags
 0x47305c WritePrivateProfileStructW
 0x473060 SetConsoleMode
 0x473064 VerifyVersionInfoA
 0x473068 WriteConsoleW
 0x47306c GetBinaryTypeA
 0x473070 GetAtomNameW
 0x473074 IsDBCSLeadByte
 0x473078 ReadFile
 0x47307c CreateFileW
 0x473080 GetOverlappedResult
 0x473084 CompareStringW
 0x473088 GetACP
 0x47308c CreateDirectoryA
 0x473090 InterlockedExchange
 0x473094 SetCurrentDirectoryA
 0x473098 FindFirstFileA
 0x47309c GlobalFix
 0x4730a0 SetLastError
 0x4730a4 GetThreadLocale
 0x4730a8 GetProcAddress
 0x4730ac GetComputerNameExW
 0x4730b0 IsValidCodePage
 0x4730b4 SetComputerNameA
 0x4730b8 BuildCommDCBW
 0x4730bc GetTempFileNameA
 0x4730c0 ResetEvent
 0x4730c4 OpenWaitableTimerA
 0x4730c8 LoadLibraryA
 0x4730cc OpenMutexA
 0x4730d0 WriteConsoleA
 0x4730d4 UnhandledExceptionFilter
 0x4730d8 LocalAlloc
 0x4730dc GetFileType
 0x4730e0 AddAtomW
 0x4730e4 WriteProfileSectionW
 0x4730e8 SetCommMask
 0x4730ec SetSystemTime
 0x4730f0 GetModuleFileNameA
 0x4730f4 SetConsoleCursorInfo
 0x4730f8 SetConsoleTitleW
 0x4730fc GetModuleHandleA
 0x473100 FreeEnvironmentStringsW
 0x473104 RequestWakeupLatency
 0x473108 GetCurrentDirectoryA
 0x47310c GetCPInfoExA
 0x473110 SetCalendarInfoA
 0x473114 GetVersionExA
 0x473118 ReadConsoleOutputCharacterW
 0x47311c LCMapStringW
 0x473120 GetVolumeInformationW
 0x473124 GetHandleInformation
 0x473128 FillConsoleOutputCharacterA
 0x47312c GetCommandLineW
 0x473130 HeapSetInformation
 0x473134 GetStartupInfoW
 0x473138 InterlockedDecrement
 0x47313c DecodePointer
 0x473140 GetModuleHandleW
 0x473144 ExitProcess
 0x473148 TerminateProcess
 0x47314c GetCurrentProcess
 0x473150 SetUnhandledExceptionFilter
 0x473154 IsDebuggerPresent
 0x473158 EncodePointer
 0x47315c GetLastError
 0x473160 GetModuleFileNameW
 0x473164 WriteFile
 0x473168 GetStdHandle
 0x47316c EnterCriticalSection
 0x473170 LeaveCriticalSection
 0x473174 SetHandleCount
 0x473178 InitializeCriticalSectionAndSpinCount
 0x47317c DeleteCriticalSection
 0x473180 IsProcessorFeaturePresent
 0x473184 QueryPerformanceCounter
 0x473188 GetTickCount
 0x47318c GetCurrentThreadId
 0x473190 GetCurrentProcessId
 0x473194 GetSystemTimeAsFileTime
 0x473198 GetEnvironmentStringsW
 0x47319c HeapValidate
 0x4731a0 IsBadReadPtr
 0x4731a4 TlsAlloc
 0x4731a8 TlsGetValue
 0x4731ac TlsFree
 0x4731b0 HeapCreate
 0x4731b4 GetOEMCP
 0x4731b8 GetCPInfo
 0x4731bc OutputDebugStringA
 0x4731c0 OutputDebugStringW
 0x4731c4 RtlUnwind
 0x4731c8 MultiByteToWideChar
 0x4731cc RaiseException
 0x4731d0 HeapReAlloc
 0x4731d4 HeapSize
 0x4731d8 HeapQueryInformation
 0x4731dc HeapFree
 0x4731e0 WideCharToMultiByte
 0x4731e4 GetStringTypeW
 0x4731e8 FlushFileBuffers
 0x4731ec GetConsoleCP
 0x4731f0 GetConsoleMode
 0x4731f4 CloseHandle
 0x4731f8 SetStdHandle
 0x4731fc SetFilePointer
USER32.dll
 0x473204 GetMessageTime
 0x473208 GetMenuCheckMarkDimensions
ADVAPI32.dll
 0x473000 AdjustTokenPrivileges

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure