Report - BalomaKeaft.exe

VMProtect PE32 PE File
ScreenShot
Created 2021.07.02 09:19 Machine s1_win7_x6401
Filename BalomaKeaft.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
2
Behavior Score
3.2
ZERO API file : clean
VT API (file) 43 detected (AIDetect, malware2, malicious, high confidence, Bulz, Gofot, HgIASXMA, Save, ZexaF, @F0@aiYfI1ej, ACMF, Attribute, HighConfidence, Generic@ML, RDML, 61evESLAVBOadQ1jZN0D, R049C0RFS21, R + Mal, VMProtBad, kcloud, Tnega, score, Artemis, ai score=82, TScope, Unsafe, Static AI, Malicious PE, confidence, 100%)
md5 c0de5b33ab30d3257451f2aff84d4e51
sha256 5ac7fc154a948a26d0b7469dda7495f712cb15d055692e6cd989c07c92fee9f7
ssdeep 98304:BhAvjJHXMQtJPpe7gM9vJR4YWUH1NUzqRYzczRBV7XYRhhY812kCU3ItR:BhQJHXMQvPWzLR4YfH1NEAY49BBeY814
imphash 7fb05647d0537b5b517720efafc40fb4
impfuzzy 12:t5/k/UyVnGv6SWTsd4x8BQ5kBZGoQtXJxZGb9AJcDfA5kLfP9m:t5/3AGv6SWTsK8BQ58QtXJHc9NDI5Q8
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info Checks amount of memory in system
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0xbf5000 CreateThread
USER32.dll
 0xbf5008 wsprintfA
ADVAPI32.dll
 0xbf5010 CryptImportKey
SensApi.dll
 0xbf5018 IsNetworkAlive
USERENV.dll
 0xbf5020 CreateEnvironmentBlock
WTSAPI32.dll
 0xbf5028 WTSQueryUserToken
SHLWAPI.dll
 0xbf5030 PathStripPathA
WININET.dll
 0xbf5038 DeleteUrlCacheEntry
urlmon.dll
 0xbf5040 URLDownloadToFileA
PSAPI.DLL
 0xbf5048 EnumProcesses
WS2_32.dll
 0xbf5050 getsockopt
WLDAP32.dll
 0xbf5058 None
IPHLPAPI.DLL
 0xbf5060 GetAdaptersInfo
MSVCR100.dll
 0xbf5068 _except_handler4_common
WTSAPI32.dll
 0xbf5070 WTSSendMessageW
KERNEL32.dll
 0xbf5078 VirtualQuery
USER32.dll
 0xbf5080 GetProcessWindowStation
KERNEL32.dll
 0xbf5088 LocalAlloc
 0xbf508c LocalFree
 0xbf5090 GetModuleFileNameW
 0xbf5094 GetProcessAffinityMask
 0xbf5098 SetProcessAffinityMask
 0xbf509c SetThreadAffinityMask
 0xbf50a0 Sleep
 0xbf50a4 ExitProcess
 0xbf50a8 FreeLibrary
 0xbf50ac LoadLibraryA
 0xbf50b0 GetModuleHandleA
 0xbf50b4 GetProcAddress
USER32.dll
 0xbf50bc GetProcessWindowStation
 0xbf50c0 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure