ScreenShot
Created | 2021.06.24 19:55 | Machine | s1_win7_x6401 |
Filename | vbc.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | |||
md5 | f17e854a03ef48b2b2581e329b233510 | ||
sha256 | a39bf71ad924d013133a402cea33e33c57a0fd202dcee7f411a4149535f7e969 | ||
ssdeep | 12288:ebBLrKMu5/zyDPHVQBONb7Q87oWxn9wbKeD:ALrKMQ3ONbVjnWbKe | ||
imphash | 1e17a996886aa2657a4de6c042170d2c | ||
impfuzzy | 48:yEbODA+fmpdVXAZI1qlpoX/OQ9YWaE8cRhV8+UpeLXvGBg:WEZzVXAW4voX/+zE8cRhV8+SeLXB |
Network IP location
Signature (6cnts)
Level | Description |
---|---|
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Foreign language identified in PE resource |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | One or more processes crashed |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
Rules (5cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x44a000 SetVolumeLabelA
0x44a004 SearchPathW
0x44a008 WriteConsoleInputW
0x44a00c TlsGetValue
0x44a010 GetProfileIntW
0x44a014 MapUserPhysicalPages
0x44a018 LoadResource
0x44a01c InterlockedIncrement
0x44a020 InterlockedDecrement
0x44a024 ScrollConsoleScreenBufferW
0x44a028 CreateDirectoryW
0x44a02c GetComputerNameW
0x44a030 GetCommProperties
0x44a034 FreeEnvironmentStringsA
0x44a038 GetModuleHandleW
0x44a03c CreateNamedPipeW
0x44a040 LocalFlags
0x44a044 GetConsoleAliasesLengthA
0x44a048 GetPrivateProfileStringW
0x44a04c GetWindowsDirectoryA
0x44a050 WriteFile
0x44a054 SetCommState
0x44a058 GetCommandLineA
0x44a05c GetSystemWow64DirectoryA
0x44a060 WriteFileGather
0x44a064 CreateDirectoryExW
0x44a068 SetProcessPriorityBoost
0x44a06c FindResourceExA
0x44a070 GlobalAlloc
0x44a074 LoadLibraryW
0x44a078 GetConsoleMode
0x44a07c GetCalendarInfoA
0x44a080 SetSystemTimeAdjustment
0x44a084 GetSystemWindowsDirectoryA
0x44a088 SetConsoleCursorPosition
0x44a08c VerifyVersionInfoA
0x44a090 TerminateProcess
0x44a094 IsDBCSLeadByte
0x44a098 GetBinaryTypeW
0x44a09c GetOverlappedResult
0x44a0a0 lstrlenW
0x44a0a4 SetConsoleTitleA
0x44a0a8 GlobalUnlock
0x44a0ac LCMapStringA
0x44a0b0 GetConsoleOutputCP
0x44a0b4 InterlockedExchange
0x44a0b8 ReleaseActCtx
0x44a0bc GetFileSizeEx
0x44a0c0 SetThreadLocale
0x44a0c4 GetProcAddress
0x44a0c8 SetComputerNameA
0x44a0cc EnterCriticalSection
0x44a0d0 SearchPathA
0x44a0d4 BuildCommDCBW
0x44a0d8 OpenWaitableTimerA
0x44a0dc GetLocalTime
0x44a0e0 GetConsoleScreenBufferInfo
0x44a0e4 IsSystemResumeAutomatic
0x44a0e8 SetConsoleCtrlHandler
0x44a0ec WriteProfileSectionW
0x44a0f0 FindAtomA
0x44a0f4 GetTapeParameters
0x44a0f8 EnumResourceTypesW
0x44a0fc SetConsoleCursorInfo
0x44a100 GetConsoleTitleW
0x44a104 GetCurrentDirectoryA
0x44a108 CompareStringA
0x44a10c GetConsoleCursorInfo
0x44a110 SetThreadAffinityMask
0x44a114 GetVersionExA
0x44a118 DeleteFileW
0x44a11c InterlockedPushEntrySList
0x44a120 GetProfileSectionW
0x44a124 CopyFileExA
0x44a128 AreFileApisANSI
0x44a12c GetVolumeInformationW
0x44a130 GetModuleHandleA
0x44a134 FlushFileBuffers
0x44a138 GetStartupInfoA
0x44a13c HeapValidate
0x44a140 IsBadReadPtr
0x44a144 RaiseException
0x44a148 DeleteCriticalSection
0x44a14c LeaveCriticalSection
0x44a150 GetModuleFileNameW
0x44a154 SetUnhandledExceptionFilter
0x44a158 QueryPerformanceCounter
0x44a15c GetTickCount
0x44a160 GetCurrentThreadId
0x44a164 GetCurrentProcessId
0x44a168 GetSystemTimeAsFileTime
0x44a16c Sleep
0x44a170 ExitProcess
0x44a174 GetModuleFileNameA
0x44a178 GetEnvironmentStrings
0x44a17c FreeEnvironmentStringsW
0x44a180 WideCharToMultiByte
0x44a184 GetLastError
0x44a188 GetEnvironmentStringsW
0x44a18c SetHandleCount
0x44a190 GetStdHandle
0x44a194 GetFileType
0x44a198 TlsAlloc
0x44a19c TlsSetValue
0x44a1a0 TlsFree
0x44a1a4 SetLastError
0x44a1a8 HeapDestroy
0x44a1ac HeapCreate
0x44a1b0 HeapFree
0x44a1b4 VirtualFree
0x44a1b8 HeapAlloc
0x44a1bc GetCurrentProcess
0x44a1c0 UnhandledExceptionFilter
0x44a1c4 IsDebuggerPresent
0x44a1c8 HeapSize
0x44a1cc HeapReAlloc
0x44a1d0 VirtualAlloc
0x44a1d4 GetACP
0x44a1d8 GetOEMCP
0x44a1dc GetCPInfo
0x44a1e0 IsValidCodePage
0x44a1e4 RtlUnwind
0x44a1e8 InitializeCriticalSectionAndSpinCount
0x44a1ec DebugBreak
0x44a1f0 OutputDebugStringA
0x44a1f4 WriteConsoleW
0x44a1f8 OutputDebugStringW
0x44a1fc LoadLibraryA
0x44a200 MultiByteToWideChar
0x44a204 LCMapStringW
0x44a208 GetStringTypeA
0x44a20c GetStringTypeW
0x44a210 GetLocaleInfoA
0x44a214 SetFilePointer
0x44a218 GetConsoleCP
0x44a21c SetStdHandle
0x44a220 WriteConsoleA
0x44a224 CreateFileA
0x44a228 CloseHandle
USER32.dll
0x44a230 GetMenuInfo
0x44a234 GetMessageTime
0x44a238 GetMenuCheckMarkDimensions
EAT(Export Address Table) Library
0x43faa0 _CallPattern@8
KERNEL32.dll
0x44a000 SetVolumeLabelA
0x44a004 SearchPathW
0x44a008 WriteConsoleInputW
0x44a00c TlsGetValue
0x44a010 GetProfileIntW
0x44a014 MapUserPhysicalPages
0x44a018 LoadResource
0x44a01c InterlockedIncrement
0x44a020 InterlockedDecrement
0x44a024 ScrollConsoleScreenBufferW
0x44a028 CreateDirectoryW
0x44a02c GetComputerNameW
0x44a030 GetCommProperties
0x44a034 FreeEnvironmentStringsA
0x44a038 GetModuleHandleW
0x44a03c CreateNamedPipeW
0x44a040 LocalFlags
0x44a044 GetConsoleAliasesLengthA
0x44a048 GetPrivateProfileStringW
0x44a04c GetWindowsDirectoryA
0x44a050 WriteFile
0x44a054 SetCommState
0x44a058 GetCommandLineA
0x44a05c GetSystemWow64DirectoryA
0x44a060 WriteFileGather
0x44a064 CreateDirectoryExW
0x44a068 SetProcessPriorityBoost
0x44a06c FindResourceExA
0x44a070 GlobalAlloc
0x44a074 LoadLibraryW
0x44a078 GetConsoleMode
0x44a07c GetCalendarInfoA
0x44a080 SetSystemTimeAdjustment
0x44a084 GetSystemWindowsDirectoryA
0x44a088 SetConsoleCursorPosition
0x44a08c VerifyVersionInfoA
0x44a090 TerminateProcess
0x44a094 IsDBCSLeadByte
0x44a098 GetBinaryTypeW
0x44a09c GetOverlappedResult
0x44a0a0 lstrlenW
0x44a0a4 SetConsoleTitleA
0x44a0a8 GlobalUnlock
0x44a0ac LCMapStringA
0x44a0b0 GetConsoleOutputCP
0x44a0b4 InterlockedExchange
0x44a0b8 ReleaseActCtx
0x44a0bc GetFileSizeEx
0x44a0c0 SetThreadLocale
0x44a0c4 GetProcAddress
0x44a0c8 SetComputerNameA
0x44a0cc EnterCriticalSection
0x44a0d0 SearchPathA
0x44a0d4 BuildCommDCBW
0x44a0d8 OpenWaitableTimerA
0x44a0dc GetLocalTime
0x44a0e0 GetConsoleScreenBufferInfo
0x44a0e4 IsSystemResumeAutomatic
0x44a0e8 SetConsoleCtrlHandler
0x44a0ec WriteProfileSectionW
0x44a0f0 FindAtomA
0x44a0f4 GetTapeParameters
0x44a0f8 EnumResourceTypesW
0x44a0fc SetConsoleCursorInfo
0x44a100 GetConsoleTitleW
0x44a104 GetCurrentDirectoryA
0x44a108 CompareStringA
0x44a10c GetConsoleCursorInfo
0x44a110 SetThreadAffinityMask
0x44a114 GetVersionExA
0x44a118 DeleteFileW
0x44a11c InterlockedPushEntrySList
0x44a120 GetProfileSectionW
0x44a124 CopyFileExA
0x44a128 AreFileApisANSI
0x44a12c GetVolumeInformationW
0x44a130 GetModuleHandleA
0x44a134 FlushFileBuffers
0x44a138 GetStartupInfoA
0x44a13c HeapValidate
0x44a140 IsBadReadPtr
0x44a144 RaiseException
0x44a148 DeleteCriticalSection
0x44a14c LeaveCriticalSection
0x44a150 GetModuleFileNameW
0x44a154 SetUnhandledExceptionFilter
0x44a158 QueryPerformanceCounter
0x44a15c GetTickCount
0x44a160 GetCurrentThreadId
0x44a164 GetCurrentProcessId
0x44a168 GetSystemTimeAsFileTime
0x44a16c Sleep
0x44a170 ExitProcess
0x44a174 GetModuleFileNameA
0x44a178 GetEnvironmentStrings
0x44a17c FreeEnvironmentStringsW
0x44a180 WideCharToMultiByte
0x44a184 GetLastError
0x44a188 GetEnvironmentStringsW
0x44a18c SetHandleCount
0x44a190 GetStdHandle
0x44a194 GetFileType
0x44a198 TlsAlloc
0x44a19c TlsSetValue
0x44a1a0 TlsFree
0x44a1a4 SetLastError
0x44a1a8 HeapDestroy
0x44a1ac HeapCreate
0x44a1b0 HeapFree
0x44a1b4 VirtualFree
0x44a1b8 HeapAlloc
0x44a1bc GetCurrentProcess
0x44a1c0 UnhandledExceptionFilter
0x44a1c4 IsDebuggerPresent
0x44a1c8 HeapSize
0x44a1cc HeapReAlloc
0x44a1d0 VirtualAlloc
0x44a1d4 GetACP
0x44a1d8 GetOEMCP
0x44a1dc GetCPInfo
0x44a1e0 IsValidCodePage
0x44a1e4 RtlUnwind
0x44a1e8 InitializeCriticalSectionAndSpinCount
0x44a1ec DebugBreak
0x44a1f0 OutputDebugStringA
0x44a1f4 WriteConsoleW
0x44a1f8 OutputDebugStringW
0x44a1fc LoadLibraryA
0x44a200 MultiByteToWideChar
0x44a204 LCMapStringW
0x44a208 GetStringTypeA
0x44a20c GetStringTypeW
0x44a210 GetLocaleInfoA
0x44a214 SetFilePointer
0x44a218 GetConsoleCP
0x44a21c SetStdHandle
0x44a220 WriteConsoleA
0x44a224 CreateFileA
0x44a228 CloseHandle
USER32.dll
0x44a230 GetMenuInfo
0x44a234 GetMessageTime
0x44a238 GetMenuCheckMarkDimensions
EAT(Export Address Table) Library
0x43faa0 _CallPattern@8