Report - csgo%20cheat%20new%2001062021.exe

PE File PE32
ScreenShot
Created 2021.06.14 13:53 Machine s1_win7_x6402
Filename csgo%20cheat%20new%2001062021.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
AI Score
8
Behavior Score
5.4
ZERO API file : malware
VT API (file) 59 detected (AIDetect, malware1, malicious, high confidence, Winlock, Graftor, Somhoveran, Artemis, Unsafe, Gimemo, Gandcrab, Eldorado, LockScreen, ATUS, Ransomware, cdqu, foalcc, Gmie, GenericRXEQ, Static AI, Malicious PE, susgen, Strictor, oiuya, ai score=100, kcloud, score, R334889, TScope, Delf, CLASSIC, GenAsa, lI5wcVyzMzo, 100%, Genetic, confidence)
md5 b97b650ca091ac961cf92c1a071d5625
sha256 7247a615b6fe4bad954c3b15691e4cdf308fca5075444b326bd5e4c101dd39ba
ssdeep 6144:2fMG9RFsULVxbPEdGV0AIsBVjvx9/LB6pK9:ZGV5bYGdIsDvx
imphash c4c241d9a2484a3f79da3f4d2aeccd54
impfuzzy 6:dBJAEHGDzyRlbRmVOZ/EwRgsuVM4PiKOm3E7s2btMyyTch:VA/DzqYOZ9Rgi4KK3E9ITC
  Network IP location

Signature (12cnts)

Level Description
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice Allocates read-write-execute memory (usually to unpack itself)
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
info Checks amount of memory in system
info Queries for the computername
info The executable uses a known packer

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x4de8ec LoadLibraryA
 0x4de8f0 GetProcAddress
 0x4de8f4 VirtualProtect
 0x4de8f8 VirtualAlloc
 0x4de8fc VirtualFree
 0x4de900 ExitProcess
advapi32.dll
 0x4de908 RegCloseKey
comctl32.dll
 0x4de910 ImageList_Add
gdi32.dll
 0x4de918 SaveDC
oleaut32.dll
 0x4de920 VariantCopy
shell32.dll
 0x4de928 ShellExecuteA
user32.dll
 0x4de930 GetDC
version.dll
 0x4de938 VerQueryValueA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure