Report - pub1.exe

UPX Malicious Library PE File PE32
ScreenShot
Created 2021.08.19 19:15 Machine s1_win7_x6402
Filename pub1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
2.6
ZERO API file : malware
VT API (file) 22 detected (AIDetect, malware2, malicious, high confidence, Unsafe, Save, confidence, 100%, ZexaF, rqW@aGfdXufK, Attribute, HighConfidence, Static AI, Malicious PE, Sabsik, score, Artemis, Azorult, Obscure, CLASSIC, Glupteba, susgen, QVM10)
md5 9a055238742093cce2d43b885779cdb2
sha256 271ef3d1c323cc5e26fc653259ee79c6c06cf38509c37b0d669710841a60f5a6
ssdeep 6144:Tdu9QJPA6Tq46V+YXZCYkQGbdb2zE3ujwaaRIFB/M3c6:5pA6W46V+wCYkxBKWu9rFN6
imphash 8f4452ee838d99d134cdfb5637fb01d7
impfuzzy 48:O9ZzCOxOD6raq8JEYIV1i5YlGXHOtaELtQkfcJSoXr/g0:0Zw+MIVk5YlGXHfELtQkfcJSur/g0
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 22 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
46.99.175.149 AL IPKO Telecommunications LLC 46.99.175.149 mailcious
179.189.229.254 BR America-NET Ltda. 179.189.229.254 mailcious
46.99.188.223 AL IPKO Telecommunications LLC 46.99.188.223 clean
221.147.172.5 KR Korea Telecom 221.147.172.5 clean
182.253.210.130 ID BIZNET NETWORKS 182.253.210.130 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41d000 GetComputerNameA
 0x41d004 GetThreadContext
 0x41d008 FileTimeToDosDateTime
 0x41d00c UnregisterWait
 0x41d010 GetNativeSystemInfo
 0x41d014 SetFilePointer
 0x41d018 lstrlenA
 0x41d01c GetConsoleAliasesLengthW
 0x41d020 SetLocalTime
 0x41d024 InterlockedIncrement
 0x41d028 GetQueuedCompletionStatus
 0x41d02c InterlockedDecrement
 0x41d030 GetSystemWindowsDirectoryW
 0x41d034 WaitForSingleObject
 0x41d038 FreeEnvironmentStringsA
 0x41d03c GetTickCount
 0x41d040 WaitNamedPipeW
 0x41d044 WriteFile
 0x41d048 SetCommState
 0x41d04c GetCommandLineA
 0x41d050 TlsSetValue
 0x41d054 GetPriorityClass
 0x41d058 AddRefActCtx
 0x41d05c LoadLibraryW
 0x41d060 GetConsoleMode
 0x41d064 CopyFileW
 0x41d068 GetVersionExW
 0x41d06c SetConsoleMode
 0x41d070 GetBinaryTypeA
 0x41d074 TerminateProcess
 0x41d078 IsDBCSLeadByte
 0x41d07c GetOverlappedResult
 0x41d080 CompareStringW
 0x41d084 GlobalUnlock
 0x41d088 VerifyVersionInfoW
 0x41d08c CreateDirectoryA
 0x41d090 GetFileSizeEx
 0x41d094 GetStartupInfoA
 0x41d098 OpenMutexW
 0x41d09c GetLastError
 0x41d0a0 ReadConsoleOutputCharacterA
 0x41d0a4 GetProcAddress
 0x41d0a8 VirtualAlloc
 0x41d0ac WriteProfileSectionA
 0x41d0b0 DisableThreadLibraryCalls
 0x41d0b4 GetPrivateProfileStringA
 0x41d0b8 ResetEvent
 0x41d0bc OpenWaitableTimerA
 0x41d0c0 LoadLibraryA
 0x41d0c4 CreateSemaphoreW
 0x41d0c8 LocalAlloc
 0x41d0cc SetCurrentDirectoryW
 0x41d0d0 WriteProfileSectionW
 0x41d0d4 HeapWalk
 0x41d0d8 Process32NextW
 0x41d0dc WriteProfileStringA
 0x41d0e0 SetConsoleCursorInfo
 0x41d0e4 CreateIoCompletionPort
 0x41d0e8 GetModuleHandleA
 0x41d0ec EnumResourceNamesA
 0x41d0f0 FatalAppExitA
 0x41d0f4 GetCurrentThreadId
 0x41d0f8 GetCPInfoExA
 0x41d0fc SetThreadAffinityMask
 0x41d100 OpenSemaphoreW
 0x41d104 FindAtomW
 0x41d108 LCMapStringW
 0x41d10c CopyFileExA
 0x41d110 DeleteFileA
 0x41d114 WideCharToMultiByte
 0x41d118 HeapValidate
 0x41d11c IsBadReadPtr
 0x41d120 RaiseException
 0x41d124 GetCurrentProcess
 0x41d128 UnhandledExceptionFilter
 0x41d12c SetUnhandledExceptionFilter
 0x41d130 IsDebuggerPresent
 0x41d134 GetModuleFileNameW
 0x41d138 GetACP
 0x41d13c GetOEMCP
 0x41d140 GetCPInfo
 0x41d144 IsValidCodePage
 0x41d148 TlsGetValue
 0x41d14c GetModuleHandleW
 0x41d150 TlsAlloc
 0x41d154 TlsFree
 0x41d158 SetLastError
 0x41d15c Sleep
 0x41d160 ExitProcess
 0x41d164 DeleteCriticalSection
 0x41d168 EnterCriticalSection
 0x41d16c LeaveCriticalSection
 0x41d170 QueryPerformanceCounter
 0x41d174 GetCurrentProcessId
 0x41d178 GetSystemTimeAsFileTime
 0x41d17c GetModuleFileNameA
 0x41d180 GetEnvironmentStrings
 0x41d184 FreeEnvironmentStringsW
 0x41d188 GetEnvironmentStringsW
 0x41d18c SetHandleCount
 0x41d190 GetStdHandle
 0x41d194 GetFileType
 0x41d198 HeapDestroy
 0x41d19c HeapCreate
 0x41d1a0 HeapFree
 0x41d1a4 VirtualFree
 0x41d1a8 HeapAlloc
 0x41d1ac HeapSize
 0x41d1b0 HeapReAlloc
 0x41d1b4 DebugBreak
 0x41d1b8 OutputDebugStringA
 0x41d1bc WriteConsoleW
 0x41d1c0 OutputDebugStringW
 0x41d1c4 RtlUnwind
 0x41d1c8 MultiByteToWideChar
 0x41d1cc LCMapStringA
 0x41d1d0 GetStringTypeA
 0x41d1d4 GetStringTypeW
 0x41d1d8 GetLocaleInfoA
 0x41d1dc InitializeCriticalSectionAndSpinCount
 0x41d1e0 GetConsoleCP
 0x41d1e4 SetStdHandle
 0x41d1e8 WriteConsoleA
 0x41d1ec GetConsoleOutputCP
 0x41d1f0 CreateFileA
 0x41d1f4 CloseHandle
 0x41d1f8 FlushFileBuffers

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure