Report - system.exe

PE File PE64
ScreenShot
Created 2021.06.24 20:14 Machine s1_win7_x6401
Filename system.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
9
Behavior Score
2.4
ZERO API file : clean
VT API (file) 32 detected (GenericKD, Shelma, malicious, JBYL, Artemis, vzrvm, ai score=82, Wacatac, score, Static AI, Suspicious PE, confidence)
md5 7b7ba402f370903873c0dd6bb8dcfb3a
sha256 cb948541d3ea253dd2921211c05a42414a9cd537bf847b9bdb0008daa01d40ea
ssdeep 384:OulS8EquIf3U0FlbhwInQ/2gGDfTtT62l85uCAStlS6e/cL4af0SYbQ/FMh8ti9E:HM89uIf3UEw3gD8ztlSn/cWRQ3t+E
imphash d436d9450bd90861c524284cde9d6442
impfuzzy 24:3Efg1JmncJ8a0meB0MC95XGDZ8kbkoDqoZn:3Efg1ccJLeSzJGV8kbkoqE
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
warning Generates some ICMP traffic
notice Allocates read-write-execute memory (usually to unpack itself)
info One or more processes crashed

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
cdn-0.dns.wanglaoji.xyz Unknown clean

Suricata ids

PE API

IAT(Import Address Table) Library

DNSAPI.dll
 0x408218 DnsQuery_A
KERNEL32.dll
 0x408228 DeleteCriticalSection
 0x408230 EnterCriticalSection
 0x408238 GetCurrentProcess
 0x408240 GetCurrentProcessId
 0x408248 GetCurrentThreadId
 0x408250 GetLastError
 0x408258 GetStartupInfoA
 0x408260 GetSystemTimeAsFileTime
 0x408268 GetTickCount
 0x408270 InitializeCriticalSection
 0x408278 LeaveCriticalSection
 0x408280 QueryPerformanceCounter
 0x408288 RtlAddFunctionTable
 0x408290 RtlCaptureContext
 0x408298 RtlLookupFunctionEntry
 0x4082a0 RtlVirtualUnwind
 0x4082a8 SetUnhandledExceptionFilter
 0x4082b0 Sleep
 0x4082b8 TerminateProcess
 0x4082c0 TlsGetValue
 0x4082c8 UnhandledExceptionFilter
 0x4082d0 VirtualAlloc
 0x4082d8 VirtualProtect
 0x4082e0 VirtualQuery
msvcrt.dll
 0x4082f0 __C_specific_handler
 0x4082f8 __dllonexit
 0x408300 __getmainargs
 0x408308 __initenv
 0x408310 __iob_func
 0x408318 __lconv_init
 0x408320 __set_app_type
 0x408328 __setusermatherr
 0x408330 _acmdln
 0x408338 _amsg_exit
 0x408340 _cexit
 0x408348 _fmode
 0x408350 _initterm
 0x408358 _lock
 0x408360 _onexit
 0x408368 _unlock
 0x408370 _vsnprintf
 0x408378 abort
 0x408380 calloc
 0x408388 exit
 0x408390 fprintf
 0x408398 free
 0x4083a0 fwrite
 0x4083a8 malloc
 0x4083b0 memcpy
 0x4083b8 signal
 0x4083c0 strlen
 0x4083c8 strncmp
 0x4083d0 vfprintf

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure