Report - WeaponGrand.exe

VMProtect PE32 PE File
ScreenShot
Created 2021.07.01 18:09 Machine s1_win7_x6401
Filename WeaponGrand.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
2
Behavior Score
3.2
ZERO API file : clean
VT API (file) 46 detected (AIDetect, malware1, malicious, high confidence, Bulz, Gofot, Unsafe, Save, ZexaF, @F0@amxgdgij, LKNO, Attribute, HighConfidence, a variant of Generik, EBRZWEX, Generic@ML, RDMK, okUlmWh58GnN+FTAdcaxmA, R002C0RFN21, R + Mal, VMProtBad, ai score=89, ASMalwS, kcloud, Tnega, score, TScope, Wrgp, Static AI, Malicious PE, confidence, 100%)
md5 db2f659dc03c430d809eff66e99c42f8
sha256 b4949bab111ac8d8e02355953e179e395541d5dfcc23682d60efc7499074018f
ssdeep 98304:NFlS9ZuvFerXLR4pHitnG7Nvg/cH7vEoxAC/tewIOjmuCJwmQCQIJb8g:NXogFerF4UtnQvgUbsaAC/cwc5QCQI
imphash 7fb05647d0537b5b517720efafc40fb4
impfuzzy 12:t5/k/UyVnGv6SWTsd4x8BQ5kBZGoQtXJxZGb9AJcDfA5kLfP9m:t5/3AGv6SWTsK8BQ58QtXJHc9NDI5Q8
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info Checks amount of memory in system
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x7c0000 CreateThread
USER32.dll
 0x7c0008 wsprintfA
ADVAPI32.dll
 0x7c0010 CryptImportKey
SensApi.dll
 0x7c0018 IsNetworkAlive
USERENV.dll
 0x7c0020 CreateEnvironmentBlock
WTSAPI32.dll
 0x7c0028 WTSQueryUserToken
SHLWAPI.dll
 0x7c0030 PathStripPathA
WININET.dll
 0x7c0038 DeleteUrlCacheEntry
urlmon.dll
 0x7c0040 URLDownloadToFileA
PSAPI.DLL
 0x7c0048 EnumProcesses
WS2_32.dll
 0x7c0050 getsockopt
WLDAP32.dll
 0x7c0058 None
IPHLPAPI.DLL
 0x7c0060 GetAdaptersInfo
MSVCR100.dll
 0x7c0068 _except_handler4_common
WTSAPI32.dll
 0x7c0070 WTSSendMessageW
KERNEL32.dll
 0x7c0078 VirtualQuery
USER32.dll
 0x7c0080 GetProcessWindowStation
KERNEL32.dll
 0x7c0088 LocalAlloc
 0x7c008c LocalFree
 0x7c0090 GetModuleFileNameW
 0x7c0094 GetProcessAffinityMask
 0x7c0098 SetProcessAffinityMask
 0x7c009c SetThreadAffinityMask
 0x7c00a0 Sleep
 0x7c00a4 ExitProcess
 0x7c00a8 FreeLibrary
 0x7c00ac LoadLibraryA
 0x7c00b0 GetModuleHandleA
 0x7c00b4 GetProcAddress
USER32.dll
 0x7c00bc GetProcessWindowStation
 0x7c00c0 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure