Report - wvieedr.exe

UPX Malicious Library AntiDebug AntiVM OS Processor Check PE File PE32
ScreenShot
Created 2021.08.13 20:03 Machine s1_win7_x6403
Filename wvieedr.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
7.6
ZERO API file : clean
VT API (file) 42 detected (AIDetect, malware2, malicious, high confidence, GenericKD, HwoCOQcA, SmokeLoader, Unsafe, Save, confidence, 100%, Attribute, HighConfidence, GenKryptik, FIWW, Raccoon, Chapak, Siggen14, Outbreak, FOMP91, kcloud, Sabsik, score, ai score=84, Azorult, Obscure, CLASSIC, Static AI, Suspicious PE, Wacatac, ZexaF, tuW@a8TLpfoH, susgen)
md5 06a029882deabf229f62728afe3baf4f
sha256 f24a559e79ba3121c7e0fed4ac995da056fe6a0dac71b2360f9e340b97117d05
ssdeep 6144:NaBzncNI4Z6pFBJIJZ0xe0cgFVmAS60bwzINf3gf481PJ/ZUt/b3tuV1:0cr0HXIJZ0xeKVmAS60bwSf4JGt/kP
imphash c4bbba65aaf569dae0a87d41cd5cbbf2
impfuzzy 48:mTzUbkYJq3mK8wQyMmaEBcftq9JX852dVp:mVYIPL7MjEBcftwJX852dVp
  Network IP location

Signature (14cnts)

Level Description
danger File has been identified by 42 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Detects Avast Antivirus through the presence of a library
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks if process is being debugged by a debugger
info This executable has a PDB path

Rules (12cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x42a000 GetComputerNameA
 0x42a004 EnumResourceNamesW
 0x42a008 UnregisterWait
 0x42a00c SetPriorityClass
 0x42a010 WriteConsoleInputW
 0x42a014 SetFilePointer
 0x42a018 GetConsoleAliasesLengthW
 0x42a01c InterlockedIncrement
 0x42a020 InterlockedDecrement
 0x42a024 WaitNamedPipeA
 0x42a028 CompareFileTime
 0x42a02c SetEnvironmentVariableW
 0x42a030 CreateDirectoryW
 0x42a034 GlobalLock
 0x42a038 SetEvent
 0x42a03c FreeEnvironmentStringsA
 0x42a040 GetTickCount
 0x42a044 GetCommandLineA
 0x42a048 GlobalAlloc
 0x42a04c AddRefActCtx
 0x42a050 LoadLibraryW
 0x42a054 GetSystemWow64DirectoryW
 0x42a058 IsProcessorFeaturePresent
 0x42a05c CreateSemaphoreA
 0x42a060 ReadFile
 0x42a064 GetModuleFileNameW
 0x42a068 CompareStringW
 0x42a06c lstrlenW
 0x42a070 LCMapStringA
 0x42a074 GetFileSizeEx
 0x42a078 GetStartupInfoA
 0x42a07c OpenMutexW
 0x42a080 GetHandleInformation
 0x42a084 GetCurrentDirectoryW
 0x42a088 SetLastError
 0x42a08c GetProcAddress
 0x42a090 VirtualAlloc
 0x42a094 WriteProfileSectionA
 0x42a098 ReadFileEx
 0x42a09c CopyFileA
 0x42a0a0 GetPrivateProfileStringA
 0x42a0a4 LoadLibraryA
 0x42a0a8 OpenMutexA
 0x42a0ac GetConsoleScreenBufferInfo
 0x42a0b0 GetExitCodeThread
 0x42a0b4 SetCurrentDirectoryW
 0x42a0b8 PostQueuedCompletionStatus
 0x42a0bc FindAtomA
 0x42a0c0 CreateIoCompletionPort
 0x42a0c4 HeapSetInformation
 0x42a0c8 GetConsoleCursorInfo
 0x42a0cc FatalAppExitA
 0x42a0d0 GetCPInfoExA
 0x42a0d4 OpenSemaphoreW
 0x42a0d8 GetVersionExA
 0x42a0dc TlsAlloc
 0x42a0e0 GetSystemTime
 0x42a0e4 CopyFileExA
 0x42a0e8 HeapValidate
 0x42a0ec IsBadReadPtr
 0x42a0f0 RaiseException
 0x42a0f4 EnterCriticalSection
 0x42a0f8 LeaveCriticalSection
 0x42a0fc TerminateProcess
 0x42a100 GetCurrentProcess
 0x42a104 UnhandledExceptionFilter
 0x42a108 SetUnhandledExceptionFilter
 0x42a10c IsDebuggerPresent
 0x42a110 SetHandleCount
 0x42a114 GetStdHandle
 0x42a118 GetFileType
 0x42a11c DeleteCriticalSection
 0x42a120 QueryPerformanceCounter
 0x42a124 GetCurrentThreadId
 0x42a128 GetCurrentProcessId
 0x42a12c GetSystemTimeAsFileTime
 0x42a130 GetModuleHandleW
 0x42a134 Sleep
 0x42a138 ExitProcess
 0x42a13c GetModuleFileNameA
 0x42a140 GetEnvironmentStrings
 0x42a144 FreeEnvironmentStringsW
 0x42a148 WideCharToMultiByte
 0x42a14c GetLastError
 0x42a150 GetEnvironmentStringsW
 0x42a154 TlsGetValue
 0x42a158 TlsSetValue
 0x42a15c TlsFree
 0x42a160 HeapDestroy
 0x42a164 HeapCreate
 0x42a168 HeapFree
 0x42a16c VirtualFree
 0x42a170 WriteFile
 0x42a174 HeapAlloc
 0x42a178 HeapSize
 0x42a17c HeapReAlloc
 0x42a180 GetACP
 0x42a184 GetOEMCP
 0x42a188 GetCPInfo
 0x42a18c IsValidCodePage
 0x42a190 RtlUnwind
 0x42a194 DebugBreak
 0x42a198 OutputDebugStringA
 0x42a19c WriteConsoleW
 0x42a1a0 OutputDebugStringW
 0x42a1a4 MultiByteToWideChar
 0x42a1a8 InitializeCriticalSectionAndSpinCount
 0x42a1ac LCMapStringW
 0x42a1b0 GetStringTypeA
 0x42a1b4 GetStringTypeW
 0x42a1b8 GetLocaleInfoA
 0x42a1bc FlushFileBuffers
 0x42a1c0 GetConsoleCP
 0x42a1c4 GetConsoleMode
 0x42a1c8 CloseHandle
 0x42a1cc SetStdHandle
 0x42a1d0 WriteConsoleA
 0x42a1d4 GetConsoleOutputCP
 0x42a1d8 CreateFileA
 0x42a1dc GetModuleHandleA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure