Report - runvd.exe

UPX Malicious Library OS Processor Check PE File PE32
ScreenShot
Created 2021.08.13 09:46 Machine s1_win7_x6402
Filename runvd.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.2
ZERO API file : clean
VT API (file) 26 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Save, confidence, Kryptik, Eldorado, Attribute, HighConfidence, Chapak, CLASSIC, Azorult, score, Artemis, MachineLearning, Anomalous, 100%, Static AI, Malicious PE, susgen, ZexaF, Iq0@aCKYV4gG, QVM10)
md5 a945644533a405a16423fbf5b9a37069
sha256 a5483d1124967a58176f75409270ba071fe0f2f337ffd3b106659852565502f0
ssdeep 12288:V2VRggveXe6UvZRLGkWVx30BwQTvwAW8aLlcCO1Xnmi:V2VygmZYZRL8xiwQzW8TXmi
imphash 21f8cbe210ac78e50bb44fcc94551c73
impfuzzy 24:j4FckrkRBZaj3+frkrKbCzDkXV4B/cPJcDS1DXPFDZvMyuJ0ct5OovolXFQ8Ryva:KzaZXzkrKh17PFZM1t8Dc9TIcR7GHwdC
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x470000 GetComputerNameA
 0x470004 lstrlenA
 0x470008 GetConsoleAliasesLengthW
 0x47000c MoveFileExA
 0x470010 InterlockedDecrement
 0x470014 ReadConsoleOutputAttribute
 0x470018 GetUserDefaultLCID
 0x47001c WaitForSingleObject
 0x470020 SetConsoleScreenBufferSize
 0x470024 SetEvent
 0x470028 IsBadReadPtr
 0x47002c GetUserDefaultLangID
 0x470030 GetVolumePathNameW
 0x470034 GetConsoleCP
 0x470038 LocalShrink
 0x47003c GetSystemWindowsDirectoryA
 0x470040 ReadConsoleOutputW
 0x470044 GetFileAttributesA
 0x470048 lstrcpynW
 0x47004c GetConsoleAliasW
 0x470050 VerifyVersionInfoA
 0x470054 WriteConsoleW
 0x470058 WritePrivateProfileSectionW
 0x47005c ReadFile
 0x470060 GetCompressedFileSizeA
 0x470064 GetSystemDirectoryA
 0x470068 CreateFileW
 0x47006c CreateActCtxA
 0x470070 lstrcatA
 0x470074 GetACP
 0x470078 VerifyVersionInfoW
 0x47007c SetLastError
 0x470080 GetProcAddress
 0x470084 PeekConsoleInputW
 0x470088 EnumDateFormatsExA
 0x47008c GetConsoleDisplayMode
 0x470090 EnterCriticalSection
 0x470094 BuildCommDCBW
 0x470098 GetLocalTime
 0x47009c GetProcessId
 0x4700a0 LocalAlloc
 0x4700a4 DeleteTimerQueue
 0x4700a8 SetCalendarInfoW
 0x4700ac DnsHostnameToComputerNameA
 0x4700b0 CreateTapePartition
 0x4700b4 SetFileApisToANSI
 0x4700b8 GlobalGetAtomNameW
 0x4700bc SetEnvironmentVariableA
 0x4700c0 SetConsoleTitleW
 0x4700c4 GetModuleHandleA
 0x4700c8 UpdateResourceW
 0x4700cc GetConsoleTitleW
 0x4700d0 VirtualProtect
 0x4700d4 EndUpdateResourceA
 0x4700d8 GetVersionExA
 0x4700dc FindFirstVolumeW
 0x4700e0 UnhandledExceptionFilter
 0x4700e4 SetUnhandledExceptionFilter
 0x4700e8 GetCommandLineA
 0x4700ec GetStartupInfoA
 0x4700f0 GetModuleHandleW
 0x4700f4 Sleep
 0x4700f8 ExitProcess
 0x4700fc GetLastError
 0x470100 WriteFile
 0x470104 GetStdHandle
 0x470108 GetModuleFileNameA
 0x47010c HeapAlloc
 0x470110 FreeEnvironmentStringsA
 0x470114 GetEnvironmentStrings
 0x470118 FreeEnvironmentStringsW
 0x47011c WideCharToMultiByte
 0x470120 GetEnvironmentStringsW
 0x470124 SetHandleCount
 0x470128 GetFileType
 0x47012c DeleteCriticalSection
 0x470130 TlsGetValue
 0x470134 TlsAlloc
 0x470138 TlsSetValue
 0x47013c TlsFree
 0x470140 InterlockedIncrement
 0x470144 GetCurrentThreadId
 0x470148 HeapCreate
 0x47014c VirtualFree
 0x470150 HeapFree
 0x470154 QueryPerformanceCounter
 0x470158 GetTickCount
 0x47015c GetCurrentProcessId
 0x470160 GetSystemTimeAsFileTime
 0x470164 LeaveCriticalSection
 0x470168 TerminateProcess
 0x47016c GetCurrentProcess
 0x470170 IsDebuggerPresent
 0x470174 LoadLibraryA
 0x470178 InitializeCriticalSectionAndSpinCount
 0x47017c RaiseException
 0x470180 VirtualAlloc
 0x470184 HeapReAlloc
 0x470188 GetCPInfo
 0x47018c GetOEMCP
 0x470190 IsValidCodePage
 0x470194 RtlUnwind
 0x470198 HeapSize
 0x47019c GetLocaleInfoA
 0x4701a0 LCMapStringA
 0x4701a4 MultiByteToWideChar
 0x4701a8 LCMapStringW
 0x4701ac GetStringTypeA
 0x4701b0 GetStringTypeW
USER32.dll
 0x4701b8 RealGetWindowClassW

EAT(Export Address Table) Library

0x401000 @GetOtherVice@16


Similarity measure (PE file only) - Checking for service failure