Report - Shapeless.exe

UPX Malicious Library OS Processor Check PE File PE32
ScreenShot
Created 2021.08.12 09:45 Machine s1_win7_x6402
Filename Shapeless.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
2
Behavior Score
2.2
ZERO API file : malware
VT API (file) 50 detected (AIDetect, malware1, mBud, malicious, high confidence, GenericKD, Unsafe, Save, GandCrab, confidence, 100%, Kryptik, Eldorado, HMAJ, Upatre, Zenpak, RansomX, CLASSIC, Siggen3, HPGen, UrSnif, habom, RedLineSteal, ssyma, Score, ai score=82, STOP, se8085, Azorult, YR40KC, CoinMiner, Glupteba, R436299, GenericRXAA, BScope, Androm, Static AI, Malicious PE, ZexaF, uq0@aququBA, Genetic, HwoCKlEA)
md5 69e5b67145f3dd4879642cb809a413bc
sha256 87f133407e85aa6bf25c9f7e3571e1e9b63be96c9e2295d6579c0c651eac43c9
ssdeep 6144:HR82snBuYslmjjdDMjT4N9tdWWCIwClf:HR82ku2jjGjTW9H9C5Y
imphash 9d007788623d69514f22ced610d164ef
impfuzzy 48:XdZ8ZewK/MtVjbF9YMrJtRVGAxfg0vc2FdMJ:XXced+V0MrJtXGAxf7vc2Fa
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x430008 lstrlenA
 0x43000c WriteConsoleOutputCharacterA
 0x430010 LocalCompact
 0x430014 MoveFileExW
 0x430018 InterlockedDecrement
 0x43001c GetCurrentProcess
 0x430020 GetSystemWindowsDirectoryW
 0x430024 GetUserDefaultLCID
 0x430028 WriteConsoleInputA
 0x43002c SetEvent
 0x430030 GetSystemDefaultLCID
 0x430034 IsBadReadPtr
 0x430038 GetConsoleAliasesLengthA
 0x43003c GetConsoleTitleA
 0x430040 ReadConsoleW
 0x430044 ReadConsoleOutputA
 0x430048 WriteFile
 0x43004c CreateActCtxW
 0x430050 InitializeCriticalSection
 0x430054 GetVolumePathNameW
 0x430058 FindResourceExA
 0x43005c GetConsoleCP
 0x430060 GlobalAlloc
 0x430064 InterlockedPopEntrySList
 0x430068 LeaveCriticalSection
 0x43006c GetFileAttributesA
 0x430070 DnsHostnameToComputerNameW
 0x430074 lstrcpynW
 0x430078 GetConsoleAliasW
 0x43007c SetConsoleCursorPosition
 0x430080 VerifyVersionInfoA
 0x430084 WriteConsoleW
 0x430088 GetComputerNameA
 0x43008c GetACP
 0x430090 DeactivateActCtx
 0x430094 GetCPInfoExW
 0x430098 GetLastError
 0x43009c GetLongPathNameW
 0x4300a0 GetProcAddress
 0x4300a4 EnumDateFormatsExA
 0x4300a8 GlobalGetAtomNameA
 0x4300ac LoadLibraryA
 0x4300b0 GlobalGetAtomNameW
 0x4300b4 WaitForMultipleObjects
 0x4300b8 SetSystemTime
 0x4300bc SetEnvironmentVariableA
 0x4300c0 SetConsoleTitleW
 0x4300c4 GetModuleHandleA
 0x4300c8 lstrcatW
 0x4300cc UpdateResourceW
 0x4300d0 EraseTape
 0x4300d4 CancelTimerQueueTimer
 0x4300d8 BuildCommDCBA
 0x4300dc VirtualProtect
 0x4300e0 PeekConsoleInputA
 0x4300e4 SetCalendarInfoA
 0x4300e8 FindFirstVolumeA
 0x4300ec EndUpdateResourceA
 0x4300f0 ReadConsoleInputW
 0x4300f4 GetPrivateProfileSectionW
 0x4300f8 AreFileApisANSI
 0x4300fc CreateActCtxA
 0x430100 GetSystemDefaultLangID
 0x430104 UnhandledExceptionFilter
 0x430108 SetUnhandledExceptionFilter
 0x43010c HeapReAlloc
 0x430110 HeapAlloc
 0x430114 GetCommandLineA
 0x430118 GetStartupInfoA
 0x43011c RaiseException
 0x430120 RtlUnwind
 0x430124 GetModuleHandleW
 0x430128 Sleep
 0x43012c ExitProcess
 0x430130 GetStdHandle
 0x430134 GetModuleFileNameA
 0x430138 TerminateProcess
 0x43013c IsDebuggerPresent
 0x430140 HeapFree
 0x430144 DeleteCriticalSection
 0x430148 EnterCriticalSection
 0x43014c HeapCreate
 0x430150 VirtualFree
 0x430154 VirtualAlloc
 0x430158 FreeEnvironmentStringsA
 0x43015c GetEnvironmentStrings
 0x430160 FreeEnvironmentStringsW
 0x430164 WideCharToMultiByte
 0x430168 GetEnvironmentStringsW
 0x43016c SetHandleCount
 0x430170 GetFileType
 0x430174 TlsGetValue
 0x430178 TlsAlloc
 0x43017c TlsSetValue
 0x430180 TlsFree
 0x430184 InterlockedIncrement
 0x430188 SetLastError
 0x43018c GetCurrentThreadId
 0x430190 QueryPerformanceCounter
 0x430194 GetTickCount
 0x430198 GetCurrentProcessId
 0x43019c GetSystemTimeAsFileTime
 0x4301a0 InitializeCriticalSectionAndSpinCount
 0x4301a4 HeapSize
 0x4301a8 GetCPInfo
 0x4301ac GetOEMCP
 0x4301b0 IsValidCodePage
 0x4301b4 GetLocaleInfoA
 0x4301b8 LCMapStringA
 0x4301bc MultiByteToWideChar
 0x4301c0 LCMapStringW
 0x4301c4 GetStringTypeA
 0x4301c8 GetStringTypeW
USER32.dll
 0x4301d0 GetAltTabInfoW
 0x4301d4 RealGetWindowClassA
ADVAPI32.dll
 0x430000 BackupEventLogA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure