Report - 5674d7511aa1fce0a68969dc57375b63.exe

UPX Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.08.15 12:36 Machine s1_win7_x6402
Filename 5674d7511aa1fce0a68969dc57375b63.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.0
ZERO API file : clean
VT API (file) 16 detected (malicious, high confidence, Unsafe, Save, confidence, ZexaF, @t1@aCntotnG, Attribute, HighConfidence, Static AI, Malicious PE, Sabsik, score, BScope, Kryptik, CLASSIC, QVM10)
md5 7532236d0a13e60372fe249271fc4fd8
sha256 c6f854eef6df8c64f425c3275317db7395e8fbf9cdcc70e2c309c2c3f2ff3277
ssdeep 98304:l0wjM58N8EFWebbT7WPyWNlthbkrbRCJiQL3UlPBTyw:l0wj15vXGyWNjhXJihhyw
imphash 6b22ece31495fe337ab5b098b4e30ca3
impfuzzy 48:k5ZXEUg/XdljM+RFxrWt/7suD+cnU5nemU:kDaVljMwrWt/7l+cnU5nep
  Network IP location

Signature (5cnts)

Level Description
watch File has been identified by 16 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x849000 EnumDateFormatsExW
 0x849004 MoveFileExA
 0x849008 EndUpdateResourceW
 0x84900c InterlockedIncrement
 0x849010 InterlockedDecrement
 0x849014 ReadConsoleOutputAttribute
 0x849018 GetSystemWindowsDirectoryW
 0x84901c GetEnvironmentStringsW
 0x849020 GetUserDefaultLCID
 0x849024 WaitForSingleObject
 0x849028 SetConsoleScreenBufferSize
 0x84902c GetComputerNameW
 0x849030 SetEvent
 0x849034 GetConsoleAliasesLengthA
 0x849038 CreateActCtxW
 0x84903c GetConsoleCP
 0x849040 LocalShrink
 0x849044 ReadConsoleOutputW
 0x849048 GetVersionExW
 0x84904c GetFileAttributesA
 0x849050 lstrcpynW
 0x849054 GetConsoleAliasW
 0x849058 VerifyVersionInfoA
 0x84905c WriteConsoleW
 0x849060 WritePrivateProfileSectionW
 0x849064 IsBadWritePtr
 0x849068 ReadFile
 0x84906c GetModuleFileNameW
 0x849070 GetCompressedFileSizeA
 0x849074 GetSystemDirectoryA
 0x849078 CreateFileW
 0x84907c lstrcatA
 0x849080 GetACP
 0x849084 GetVolumePathNameA
 0x849088 lstrlenW
 0x84908c SetConsoleTitleA
 0x849090 VerifyVersionInfoW
 0x849094 InterlockedExchange
 0x849098 GetLastError
 0x84909c GetProcAddress
 0x8490a0 EnterCriticalSection
 0x8490a4 GetLocalTime
 0x8490a8 GetProcessId
 0x8490ac LocalAlloc
 0x8490b0 SetCalendarInfoW
 0x8490b4 DnsHostnameToComputerNameA
 0x8490b8 CreateTapePartition
 0x8490bc SetConsoleDisplayMode
 0x8490c0 SetFileApisToANSI
 0x8490c4 GlobalGetAtomNameW
 0x8490c8 SetEnvironmentVariableA
 0x8490cc GetModuleHandleA
 0x8490d0 UpdateResourceW
 0x8490d4 CancelTimerQueueTimer
 0x8490d8 GetConsoleTitleW
 0x8490dc BuildCommDCBA
 0x8490e0 VirtualProtect
 0x8490e4 PeekConsoleInputA
 0x8490e8 FindFirstVolumeW
 0x8490ec GetSystemDefaultLangID
 0x8490f0 GetStartupInfoW
 0x8490f4 HeapAlloc
 0x8490f8 UnhandledExceptionFilter
 0x8490fc SetUnhandledExceptionFilter
 0x849100 GetModuleHandleW
 0x849104 TlsGetValue
 0x849108 TlsAlloc
 0x84910c TlsSetValue
 0x849110 TlsFree
 0x849114 SetLastError
 0x849118 GetCurrentThreadId
 0x84911c Sleep
 0x849120 ExitProcess
 0x849124 WriteFile
 0x849128 GetStdHandle
 0x84912c GetModuleFileNameA
 0x849130 FreeEnvironmentStringsW
 0x849134 GetCommandLineW
 0x849138 SetHandleCount
 0x84913c GetFileType
 0x849140 GetStartupInfoA
 0x849144 DeleteCriticalSection
 0x849148 HeapCreate
 0x84914c VirtualFree
 0x849150 HeapFree
 0x849154 QueryPerformanceCounter
 0x849158 GetTickCount
 0x84915c GetCurrentProcessId
 0x849160 GetSystemTimeAsFileTime
 0x849164 RaiseException
 0x849168 TerminateProcess
 0x84916c GetCurrentProcess
 0x849170 IsDebuggerPresent
 0x849174 LeaveCriticalSection
 0x849178 VirtualAlloc
 0x84917c HeapReAlloc
 0x849180 GetCPInfo
 0x849184 GetOEMCP
 0x849188 IsValidCodePage
 0x84918c RtlUnwind
 0x849190 LoadLibraryA
 0x849194 InitializeCriticalSectionAndSpinCount
 0x849198 GetLocaleInfoA
 0x84919c GetStringTypeA
 0x8491a0 MultiByteToWideChar
 0x8491a4 GetStringTypeW
 0x8491a8 LCMapStringA
 0x8491ac WideCharToMultiByte
 0x8491b0 LCMapStringW
 0x8491b4 HeapSize
USER32.dll
 0x8491bc RealGetWindowClassA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure