Report - sufile.exe

UPX Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.08.17 09:33 Machine s1_win7_x6401
Filename sufile.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.6
ZERO API file : malware
VT API (file) 42 detected (AIDetect, malware2, malicious, high confidence, Jaik, Unsafe, Save, confidence, 100%, ZexaF, xq0@ay72YedG, Kryptik, Eldorado, Attribute, HighConfidence, HMCH, Racealer, PWSX, CLASSIC, HPGen, Emotet, Static AI, Malicious PE, susgen, ai score=85, Sabsik, score, CoinMiner, Glupteba, R437351, BScope, MachineLearning, Anomalous, Zurgop, HMCE, Genetic, QVM10)
md5 0ca116299ae13d37e2368d09f208fd2d
sha256 4934962518447fe675fc3e72322d7e8eb1521bddcd45eae280f98d0b4d138c01
ssdeep 6144:CLKsmMA1zQULl9z6mSXMhAuyygEdbHLmDHIDR/AI7c/mnUIqq:CWsy6RCg2iC/A1RIq
imphash a93d3aeb5048cb343bc92212709955c9
impfuzzy 48:kKPEcr59fWdFo7PFHYzrJtOPQc7kuHcnH2c:kir7CFo7ezrJtOPQc7pcnHj
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 42 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x446008 EnumDateFormatsExW
 0x44600c EndUpdateResourceW
 0x446010 InterlockedIncrement
 0x446014 MoveFileExW
 0x446018 GetConsoleAliasA
 0x44601c InterlockedDecrement
 0x446020 WritePrivateProfileSectionA
 0x446024 GetSystemWindowsDirectoryW
 0x446028 GetEnvironmentStringsW
 0x44602c WaitForSingleObject
 0x446030 SetConsoleScreenBufferSize
 0x446034 GetComputerNameW
 0x446038 SetEvent
 0x44603c GetConsoleAliasesLengthA
 0x446040 GetConsoleTitleA
 0x446044 ReadConsoleOutputA
 0x446048 GetUserDefaultLangID
 0x44604c CreateActCtxW
 0x446050 GetConsoleCP
 0x446054 GetVersionExW
 0x446058 GetFileAttributesA
 0x44605c DnsHostnameToComputerNameW
 0x446060 lstrcpynW
 0x446064 VerifyVersionInfoA
 0x446068 IsBadWritePtr
 0x44606c GetModuleFileNameW
 0x446070 GetCompressedFileSizeA
 0x446074 GetSystemDirectoryA
 0x446078 CreateFileW
 0x44607c lstrcatA
 0x446080 GetACP
 0x446084 GetVolumePathNameA
 0x446088 lstrlenW
 0x44608c SetConsoleTitleA
 0x446090 FlushFileBuffers
 0x446094 InterlockedExchange
 0x446098 GetLastError
 0x44609c GetProcAddress
 0x4460a0 BeginUpdateResourceW
 0x4460a4 CreateTimerQueueTimer
 0x4460a8 LocalLock
 0x4460ac EnterCriticalSection
 0x4460b0 GetLocalTime
 0x4460b4 WriteConsoleA
 0x4460b8 GetProcessId
 0x4460bc LocalAlloc
 0x4460c0 CreateTapePartition
 0x4460c4 SetConsoleDisplayMode
 0x4460c8 GlobalGetAtomNameW
 0x4460cc SetEnvironmentVariableA
 0x4460d0 GetModuleHandleA
 0x4460d4 CancelTimerQueueTimer
 0x4460d8 BuildCommDCBA
 0x4460dc VirtualProtect
 0x4460e0 PeekConsoleInputA
 0x4460e4 WriteConsoleOutputAttribute
 0x4460e8 SetCalendarInfoA
 0x4460ec FindFirstVolumeW
 0x4460f0 AreFileApisANSI
 0x4460f4 LCMapStringW
 0x4460f8 GetSystemDefaultLangID
 0x4460fc UnhandledExceptionFilter
 0x446100 SetUnhandledExceptionFilter
 0x446104 GetModuleHandleW
 0x446108 Sleep
 0x44610c ExitProcess
 0x446110 GetStartupInfoW
 0x446114 WriteFile
 0x446118 GetStdHandle
 0x44611c GetModuleFileNameA
 0x446120 HeapAlloc
 0x446124 TlsGetValue
 0x446128 TlsAlloc
 0x44612c TlsSetValue
 0x446130 TlsFree
 0x446134 SetLastError
 0x446138 GetCurrentThreadId
 0x44613c DeleteCriticalSection
 0x446140 LeaveCriticalSection
 0x446144 TerminateProcess
 0x446148 GetCurrentProcess
 0x44614c IsDebuggerPresent
 0x446150 LoadLibraryA
 0x446154 InitializeCriticalSectionAndSpinCount
 0x446158 FreeEnvironmentStringsW
 0x44615c GetCommandLineW
 0x446160 SetHandleCount
 0x446164 GetFileType
 0x446168 GetStartupInfoA
 0x44616c HeapCreate
 0x446170 VirtualFree
 0x446174 HeapFree
 0x446178 QueryPerformanceCounter
 0x44617c GetTickCount
 0x446180 GetCurrentProcessId
 0x446184 GetSystemTimeAsFileTime
 0x446188 RaiseException
 0x44618c VirtualAlloc
 0x446190 HeapReAlloc
 0x446194 GetCPInfo
 0x446198 GetOEMCP
 0x44619c IsValidCodePage
 0x4461a0 RtlUnwind
 0x4461a4 HeapSize
 0x4461a8 GetLocaleInfoA
 0x4461ac WideCharToMultiByte
 0x4461b0 GetStringTypeA
 0x4461b4 MultiByteToWideChar
 0x4461b8 GetStringTypeW
 0x4461bc LCMapStringA
USER32.dll
 0x4461c4 RealGetWindowClassA
ADVAPI32.dll
 0x446000 AdjustTokenPrivileges

EAT(Export Address Table) Library

0x401003 @GetAnotherVice@12
0x401000 @SetFirstEverVice@4


Similarity measure (PE file only) - Checking for service failure