Report - file.exe

UPX Malicious Library OS Processor Check PE File PE32
ScreenShot
Created 2021.08.09 09:28 Machine s1_win7_x6402
Filename file.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
2.0
ZERO API file : malware
VT API (file) 32 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Save, ZexaF, Lq0@a87sMNw, Kryptik, HLZW, FileRepMalware, SoftPulse, Static AI, Malicious PE, Azorult, SL2CMN, score, Artemis, CLASSIC, UrSnif, susgen, Genetic, confidence, QVM10)
md5 8472ae9fabd1a6ed08801c724d1f7370
sha256 b82f56d700f46d03d91ab996e3affd374c44312213dfa4440e0a8926f5433b0e
ssdeep 12288:Yue8smsP0aIyb0SrfHZvTStzmMbP+jzh9C5:U8stMbyb0SrfZrStnmjl9
imphash e4703f951d731209d4eda0f101cdb509
impfuzzy 48:XRZqqZPwKuFhzg/nrPYTtRVGAxcgYvc2vdMf:X7xPAhU8TtXGAxc7vc2vM
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x475008 lstrlenA
 0x47500c FindResourceExW
 0x475010 LocalCompact
 0x475014 UpdateResourceA
 0x475018 MoveFileExW
 0x47501c InterlockedDecrement
 0x475020 GetCurrentProcess
 0x475024 GetUserDefaultLCID
 0x475028 SetConsoleScreenBufferSize
 0x47502c WriteConsoleInputA
 0x475030 GetComputerNameW
 0x475034 SetEvent
 0x475038 GetSystemDefaultLCID
 0x47503c GetProcessHeap
 0x475040 IsBadReadPtr
 0x475044 GetConsoleAliasesLengthA
 0x475048 GetConsoleTitleA
 0x47504c ReadConsoleW
 0x475050 ReadConsoleOutputA
 0x475054 WriteFile
 0x475058 CreateActCtxW
 0x47505c GetVolumePathNameW
 0x475060 ActivateActCtx
 0x475064 GetConsoleCP
 0x475068 GlobalAlloc
 0x47506c TerminateThread
 0x475070 ReadConsoleInputA
 0x475074 GetSystemWindowsDirectoryA
 0x475078 SetConsoleCP
 0x47507c InterlockedPopEntrySList
 0x475080 GetFileAttributesA
 0x475084 DnsHostnameToComputerNameW
 0x475088 lstrcpynW
 0x47508c GetConsoleAliasW
 0x475090 SetTimeZoneInformation
 0x475094 WriteConsoleOutputCharacterW
 0x475098 WriteConsoleW
 0x47509c GetMailslotInfo
 0x4750a0 CreateActCtxA
 0x4750a4 GetCPInfoExW
 0x4750a8 GetLastError
 0x4750ac GetLongPathNameW
 0x4750b0 SetLastError
 0x4750b4 GetProcAddress
 0x4750b8 EnumDateFormatsExA
 0x4750bc EnterCriticalSection
 0x4750c0 GlobalGetAtomNameA
 0x4750c4 BuildCommDCBW
 0x4750c8 LoadLibraryA
 0x4750cc GetProfileStringA
 0x4750d0 GlobalGetAtomNameW
 0x4750d4 WaitForMultipleObjects
 0x4750d8 SetSystemTime
 0x4750dc SetEnvironmentVariableA
 0x4750e0 SetConsoleTitleW
 0x4750e4 GetModuleHandleA
 0x4750e8 lstrcatW
 0x4750ec EraseTape
 0x4750f0 CancelTimerQueueTimer
 0x4750f4 GetPrivateProfileSectionA
 0x4750f8 VirtualProtect
 0x4750fc PeekConsoleInputA
 0x475100 SetCalendarInfoA
 0x475104 EndUpdateResourceA
 0x475108 FindFirstVolumeW
 0x47510c AreFileApisANSI
 0x475110 VerifyVersionInfoA
 0x475114 UnhandledExceptionFilter
 0x475118 SetUnhandledExceptionFilter
 0x47511c HeapReAlloc
 0x475120 HeapAlloc
 0x475124 GetCommandLineA
 0x475128 GetStartupInfoA
 0x47512c RaiseException
 0x475130 RtlUnwind
 0x475134 GetModuleHandleW
 0x475138 Sleep
 0x47513c ExitProcess
 0x475140 GetStdHandle
 0x475144 GetModuleFileNameA
 0x475148 TerminateProcess
 0x47514c IsDebuggerPresent
 0x475150 HeapFree
 0x475154 DeleteCriticalSection
 0x475158 LeaveCriticalSection
 0x47515c HeapCreate
 0x475160 VirtualFree
 0x475164 VirtualAlloc
 0x475168 FreeEnvironmentStringsA
 0x47516c GetEnvironmentStrings
 0x475170 FreeEnvironmentStringsW
 0x475174 WideCharToMultiByte
 0x475178 GetEnvironmentStringsW
 0x47517c SetHandleCount
 0x475180 GetFileType
 0x475184 TlsGetValue
 0x475188 TlsAlloc
 0x47518c TlsSetValue
 0x475190 TlsFree
 0x475194 InterlockedIncrement
 0x475198 GetCurrentThreadId
 0x47519c QueryPerformanceCounter
 0x4751a0 GetTickCount
 0x4751a4 GetCurrentProcessId
 0x4751a8 GetSystemTimeAsFileTime
 0x4751ac InitializeCriticalSectionAndSpinCount
 0x4751b0 HeapSize
 0x4751b4 GetCPInfo
 0x4751b8 GetACP
 0x4751bc GetOEMCP
 0x4751c0 IsValidCodePage
 0x4751c4 GetLocaleInfoA
 0x4751c8 LCMapStringA
 0x4751cc MultiByteToWideChar
 0x4751d0 LCMapStringW
 0x4751d4 GetStringTypeA
 0x4751d8 GetStringTypeW
USER32.dll
 0x4751e0 GetAltTabInfoW
 0x4751e4 RealGetWindowClassA
ADVAPI32.dll
 0x475000 BackupEventLogW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure