Report - bmw1.exe

UPX OS Processor Check PE32 PE File
ScreenShot
Created 2021.06.27 18:53 Machine s1_win7_x6402
Filename bmw1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
3.4
ZERO API file : clean
VT API (file) 23 detected (AIDetect, malware2, malicious, high confidence, Unsafe, Save, Attribute, HighConfidence, A + Troj, Kryptik, STOP, SMYXBFX, Emotet, susgen, Static AI, Suspicious PE, Racealer, Caynamer, score, Generic@ML, RDML, 1ztE7LQtpSZM9HpnF2XqMg, ZexaF, vuW@a8aTVDnG, confidence, 100%)
md5 64a80a26bd8286a8f3a170606a8b60b0
sha256 c419b1af2376413571432c670eae9a4f88dfff9d5fd013022e788afbfc589925
ssdeep 6144:zDX8iqcxrRXGl1PzIO1ElL0Sio7izeaCEbPyqtlLZ6:zHWlR8OqLio7iVbfl1
imphash c55a6c5b8dc5009c74a01bc124b7b217
impfuzzy 48:YwRb1lNB8Onh87uX5JyPlp+gFOZ+fc3MaE1t0IUccBipQBg:YU9fnCuXaPvJ6+fclE1t0DccBip/
  Network IP location

Signature (8cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x439000 ExitProcess
 0x439004 GetVolumeNameForVolumeMountPointA
 0x439008 GetCommandLineW
 0x43900c SetVolumeLabelA
 0x439010 GetFileSize
 0x439014 CreateMutexW
 0x439018 WriteConsoleInputW
 0x43901c WritePrivateProfileStructA
 0x439020 GetConsoleAliasesLengthW
 0x439024 GetProfileIntW
 0x439028 GetDefaultCommConfigW
 0x43902c FindResourceExW
 0x439030 SetConsoleTextAttribute
 0x439034 InterlockedDecrement
 0x439038 ZombifyActCtx
 0x43903c ScrollConsoleScreenBufferW
 0x439040 GetNamedPipeHandleStateA
 0x439044 GetComputerNameW
 0x439048 FreeEnvironmentStringsA
 0x43904c GetProcessPriorityBoost
 0x439050 GetCommConfig
 0x439054 GetPrivateProfileStringW
 0x439058 WriteFile
 0x43905c FindActCtxSectionStringA
 0x439060 SetCommState
 0x439064 CreateDirectoryExW
 0x439068 TlsSetValue
 0x43906c ActivateActCtx
 0x439070 GlobalAlloc
 0x439074 GetSystemDirectoryW
 0x439078 GetConsoleMode
 0x43907c SizeofResource
 0x439080 GetCalendarInfoA
 0x439084 ReadFileScatter
 0x439088 GetSystemWow64DirectoryW
 0x43908c SetSystemTimeAdjustment
 0x439090 GetSystemWindowsDirectoryA
 0x439094 GlobalFlags
 0x439098 SetConsoleCursorPosition
 0x43909c GetBinaryTypeA
 0x4390a0 IsDBCSLeadByte
 0x4390a4 GetOverlappedResult
 0x4390a8 CompareStringW
 0x4390ac lstrlenW
 0x4390b0 SetConsoleTitleA
 0x4390b4 GlobalUnlock
 0x4390b8 CreateDirectoryA
 0x4390bc SetCurrentDirectoryA
 0x4390c0 SetThreadLocale
 0x4390c4 ReadConsoleOutputCharacterA
 0x4390c8 WriteProfileSectionA
 0x4390cc FreeUserPhysicalPages
 0x4390d0 SetComputerNameA
 0x4390d4 SearchPathA
 0x4390d8 GetLocalTime
 0x4390dc GetAtomNameA
 0x4390e0 LoadLibraryA
 0x4390e4 IsSystemResumeAutomatic
 0x4390e8 SetConsoleOutputCP
 0x4390ec SetConsoleWindowInfo
 0x4390f0 GetTapeParameters
 0x4390f4 WTSGetActiveConsoleSessionId
 0x4390f8 SetConsoleCursorInfo
 0x4390fc GetModuleHandleA
 0x439100 VirtualProtect
 0x439104 GetCurrentDirectoryA
 0x439108 CompareStringA
 0x43910c GetConsoleCursorInfo
 0x439110 FindAtomW
 0x439114 WriteFileEx
 0x439118 GetWindowsDirectoryW
 0x43911c FileTimeToLocalFileTime
 0x439120 InterlockedPushEntrySList
 0x439124 GetProfileSectionW
 0x439128 LCMapStringW
 0x43912c CopyFileExA
 0x439130 CommConfigDialogW
 0x439134 DeleteFileA
 0x439138 CreateFileA
 0x43913c InterlockedIncrement
 0x439140 Sleep
 0x439144 InitializeCriticalSection
 0x439148 DeleteCriticalSection
 0x43914c EnterCriticalSection
 0x439150 LeaveCriticalSection
 0x439154 MultiByteToWideChar
 0x439158 GetCommandLineA
 0x43915c GetStartupInfoA
 0x439160 HeapValidate
 0x439164 IsBadReadPtr
 0x439168 RaiseException
 0x43916c UnhandledExceptionFilter
 0x439170 SetUnhandledExceptionFilter
 0x439174 RtlUnwind
 0x439178 GetModuleFileNameW
 0x43917c TerminateProcess
 0x439180 GetCurrentProcess
 0x439184 IsDebuggerPresent
 0x439188 SetHandleCount
 0x43918c GetStdHandle
 0x439190 GetFileType
 0x439194 GetACP
 0x439198 GetOEMCP
 0x43919c GetCPInfo
 0x4391a0 IsValidCodePage
 0x4391a4 GetProcAddress
 0x4391a8 TlsGetValue
 0x4391ac GetModuleHandleW
 0x4391b0 TlsAlloc
 0x4391b4 GetCurrentThreadId
 0x4391b8 TlsFree
 0x4391bc SetLastError
 0x4391c0 GetLastError
 0x4391c4 QueryPerformanceCounter
 0x4391c8 GetTickCount
 0x4391cc GetCurrentProcessId
 0x4391d0 GetSystemTimeAsFileTime
 0x4391d4 GetModuleFileNameA
 0x4391d8 GetEnvironmentStrings
 0x4391dc FreeEnvironmentStringsW
 0x4391e0 WideCharToMultiByte
 0x4391e4 GetEnvironmentStringsW
 0x4391e8 HeapDestroy
 0x4391ec HeapCreate
 0x4391f0 HeapFree
 0x4391f4 VirtualFree
 0x4391f8 HeapAlloc
 0x4391fc HeapSize
 0x439200 HeapReAlloc
 0x439204 VirtualAlloc
 0x439208 GetStringTypeA
 0x43920c GetStringTypeW
 0x439210 GetLocaleInfoA
 0x439214 FlushFileBuffers
 0x439218 GetConsoleCP
 0x43921c DebugBreak
 0x439220 OutputDebugStringA
 0x439224 WriteConsoleW
 0x439228 OutputDebugStringW
 0x43922c LoadLibraryW
 0x439230 InitializeCriticalSectionAndSpinCount
 0x439234 SetFilePointer
 0x439238 LCMapStringA
 0x43923c SetStdHandle
 0x439240 WriteConsoleA
 0x439244 GetConsoleOutputCP
 0x439248 CloseHandle
USER32.dll
 0x439250 GetMessageTime
 0x439254 GetMenuCheckMarkDimensions

EAT(Export Address Table) Library

0x42ea30 _CallPattern@8


Similarity measure (PE file only) - Checking for service failure