Report - alfile.exe

UPX Malicious Library OS Processor Check PE File PE32
ScreenShot
Created 2021.08.12 09:20 Machine s1_win7_x6401
Filename alfile.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
1.8
ZERO API file : clean
VT API (file) 23 detected (AIDetect, malware2, malicious, high confidence, Unsafe, Save, ZexaF, Eq0@aeaCEAei, Kryptik, Eldorado, CLASSIC, VirRansom, Static AI, Malicious PE, Sabsik, score, TrojanPSW, Racealer, MachineLearning, Anomalous, 100%, confidence, QVM10)
md5 9292c91e8862b1f54b316ac8aee11bc7
sha256 e665bb787c49613e205566af779144156b86b3609c7dcea163dcc8e83f0b5594
ssdeep 6144:4/M/hyUlUO7IEQ5BkUdexAcYRSElCsDv9ueBMeKJPKykoQUXg8n7knGyHM:4/M8fmI/zFPrSYCSv4e50KhoQUDnI
imphash aa13d15d6dd2e094d4aa7be42a7367ea
impfuzzy 24:XckrkRqWiZaj3+fUdNrKbCzdxkXV4BsJcDS1DXTDZvMKuJjdRGt5OovolXFQ8Ryl:XzTZX6NrKS817TZMxGt8Dc9TIcEGHwdC
  Network IP location

Signature (4cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x45d000 lstrlenA
 0x45d004 GetConsoleAliasesLengthW
 0x45d008 MoveFileExA
 0x45d00c InterlockedDecrement
 0x45d010 ReadConsoleOutputAttribute
 0x45d014 GetProfileStringW
 0x45d018 GetUserDefaultLCID
 0x45d01c WaitForSingleObject
 0x45d020 SetConsoleScreenBufferSize
 0x45d024 GetComputerNameW
 0x45d028 SetEvent
 0x45d02c IsBadReadPtr
 0x45d030 ReadConsoleOutputA
 0x45d034 GetUserDefaultLangID
 0x45d038 GetVolumePathNameW
 0x45d03c GetConsoleCP
 0x45d040 LocalShrink
 0x45d044 GetSystemWindowsDirectoryA
 0x45d048 InterlockedPopEntrySList
 0x45d04c LeaveCriticalSection
 0x45d050 GetFileAttributesA
 0x45d054 lstrcpynW
 0x45d058 GetConsoleAliasW
 0x45d05c VerifyVersionInfoA
 0x45d060 WriteConsoleW
 0x45d064 WritePrivateProfileSectionW
 0x45d068 ReadFile
 0x45d06c CreateFileW
 0x45d070 CreateActCtxA
 0x45d074 GetACP
 0x45d078 VerifyVersionInfoW
 0x45d07c SetLastError
 0x45d080 GetProcAddress
 0x45d084 PeekConsoleInputW
 0x45d088 EnumDateFormatsExA
 0x45d08c GetConsoleDisplayMode
 0x45d090 EnterCriticalSection
 0x45d094 GetProcessId
 0x45d098 LocalAlloc
 0x45d09c DeleteTimerQueue
 0x45d0a0 SetCalendarInfoW
 0x45d0a4 DnsHostnameToComputerNameA
 0x45d0a8 CreateTapePartition
 0x45d0ac SetFileApisToANSI
 0x45d0b0 GlobalGetAtomNameW
 0x45d0b4 SetSystemTime
 0x45d0b8 SetEnvironmentVariableA
 0x45d0bc SetConsoleTitleW
 0x45d0c0 GetModuleHandleA
 0x45d0c4 lstrcatW
 0x45d0c8 UpdateResourceW
 0x45d0cc CancelTimerQueueTimer
 0x45d0d0 GetConsoleTitleW
 0x45d0d4 BuildCommDCBA
 0x45d0d8 VirtualProtect
 0x45d0dc EndUpdateResourceA
 0x45d0e0 GetVersionExA
 0x45d0e4 FindFirstVolumeW
 0x45d0e8 UnhandledExceptionFilter
 0x45d0ec SetUnhandledExceptionFilter
 0x45d0f0 GetCommandLineA
 0x45d0f4 GetStartupInfoA
 0x45d0f8 GetModuleHandleW
 0x45d0fc Sleep
 0x45d100 ExitProcess
 0x45d104 GetLastError
 0x45d108 WriteFile
 0x45d10c GetStdHandle
 0x45d110 GetModuleFileNameA
 0x45d114 HeapAlloc
 0x45d118 FreeEnvironmentStringsA
 0x45d11c GetEnvironmentStrings
 0x45d120 FreeEnvironmentStringsW
 0x45d124 WideCharToMultiByte
 0x45d128 GetEnvironmentStringsW
 0x45d12c SetHandleCount
 0x45d130 GetFileType
 0x45d134 DeleteCriticalSection
 0x45d138 TlsGetValue
 0x45d13c TlsAlloc
 0x45d140 TlsSetValue
 0x45d144 TlsFree
 0x45d148 InterlockedIncrement
 0x45d14c GetCurrentThreadId
 0x45d150 HeapCreate
 0x45d154 VirtualFree
 0x45d158 HeapFree
 0x45d15c QueryPerformanceCounter
 0x45d160 GetTickCount
 0x45d164 GetCurrentProcessId
 0x45d168 GetSystemTimeAsFileTime
 0x45d16c TerminateProcess
 0x45d170 GetCurrentProcess
 0x45d174 IsDebuggerPresent
 0x45d178 LoadLibraryA
 0x45d17c InitializeCriticalSectionAndSpinCount
 0x45d180 RaiseException
 0x45d184 VirtualAlloc
 0x45d188 HeapReAlloc
 0x45d18c GetCPInfo
 0x45d190 GetOEMCP
 0x45d194 IsValidCodePage
 0x45d198 RtlUnwind
 0x45d19c HeapSize
 0x45d1a0 GetLocaleInfoA
 0x45d1a4 LCMapStringA
 0x45d1a8 MultiByteToWideChar
 0x45d1ac LCMapStringW
 0x45d1b0 GetStringTypeA
 0x45d1b4 GetStringTypeW
USER32.dll
 0x45d1bc RealGetWindowClassW

EAT(Export Address Table) Library

0x401000 @GetOtherVice@16


Similarity measure (PE file only) - Checking for service failure