Report - vbc.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.09.01 07:39 Machine s1_win7_x6402
Filename vbc.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.0
ZERO API file : clean
VT API (file) 39 detected (AIDetect, malware2, malicious, high confidence, Fragtor, Unsafe, Save, Hacktool, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, HMHD, FileRepMetagen, Static AI, Malicious PE, Azorult, score, MalPE, R439497, Artemis, ai score=84, BScope, Blocker, CLASSIC, GenKryptik, FJUH, ZexaF, qq0@amMlyoaG, susgen)
md5 94db0490bbaf3752ea87c1785513dccb
sha256 99de69831f2ae92832201028176727cc4f140246f0ee00ce795e51584e2bc8c1
ssdeep 6144:HzLfg3tObV9jGB7oLEASigFVg8uNsIY6xA:HzbICoKLEAohB
imphash 41ae3a1dcdcc3462598a2d3012d6e252
impfuzzy 24:e9bG2Sl8u9EI4k1ZruqfuDaqkbRKQb8zm2zO+6dx+cjtrlFTZKJ3zlORyvuTmjMv:J1JrNNb8CfJdx+cjtfT4zRu/A5U
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 39 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x418000 CreateTimerQueue
 0x418004 GetDefaultCommConfigW
 0x418008 EndUpdateResourceW
 0x41800c InterlockedIncrement
 0x418010 SetEnvironmentVariableW
 0x418014 GetEnvironmentStringsW
 0x418018 AddConsoleAliasW
 0x41801c EnumCalendarInfoExW
 0x418020 GetConsoleTitleA
 0x418024 ReadConsoleW
 0x418028 WriteFile
 0x41802c GetUserDefaultLangID
 0x418030 GetEnvironmentStrings
 0x418034 GlobalAlloc
 0x418038 SetVolumeMountPointA
 0x41803c GetSystemWindowsDirectoryA
 0x418040 WriteConsoleOutputA
 0x418044 lstrcpynW
 0x418048 HeapReAlloc
 0x41804c HeapQueryInformation
 0x418050 GetModuleFileNameW
 0x418054 GetACP
 0x418058 LCMapStringA
 0x41805c GetProcAddress
 0x418060 GetComputerNameExW
 0x418064 FreeUserPhysicalPages
 0x418068 EnterCriticalSection
 0x41806c VerLanguageNameW
 0x418070 GetLocalTime
 0x418074 LoadLibraryA
 0x418078 WaitForMultipleObjects
 0x41807c VirtualProtect
 0x418080 PeekConsoleInputA
 0x418084 GetCPInfoExA
 0x418088 GetVersionExA
 0x41808c ReadConsoleInputW
 0x418090 GetVersion
 0x418094 DeleteTimerQueueTimer
 0x418098 GetCurrentProcessId
 0x41809c FindNextVolumeA
 0x4180a0 CreateThread
 0x4180a4 CreateFileA
 0x4180a8 PulseEvent
 0x4180ac VerifyVersionInfoA
 0x4180b0 GetCommandLineW
 0x4180b4 SetStdHandle
 0x4180b8 SetFilePointer
 0x4180bc WideCharToMultiByte
 0x4180c0 InterlockedDecrement
 0x4180c4 InterlockedExchange
 0x4180c8 MultiByteToWideChar
 0x4180cc Sleep
 0x4180d0 InitializeCriticalSection
 0x4180d4 DeleteCriticalSection
 0x4180d8 LeaveCriticalSection
 0x4180dc UnhandledExceptionFilter
 0x4180e0 SetUnhandledExceptionFilter
 0x4180e4 GetLastError
 0x4180e8 HeapFree
 0x4180ec TerminateProcess
 0x4180f0 GetCurrentProcess
 0x4180f4 IsDebuggerPresent
 0x4180f8 GetModuleHandleW
 0x4180fc ExitProcess
 0x418100 GetStartupInfoW
 0x418104 GetCPInfo
 0x418108 RtlUnwind
 0x41810c LCMapStringW
 0x418110 GetStringTypeW
 0x418114 GetStdHandle
 0x418118 GetModuleFileNameA
 0x41811c HeapAlloc
 0x418120 HeapCreate
 0x418124 VirtualFree
 0x418128 VirtualAlloc
 0x41812c TlsGetValue
 0x418130 TlsAlloc
 0x418134 TlsSetValue
 0x418138 TlsFree
 0x41813c SetLastError
 0x418140 GetCurrentThreadId
 0x418144 InitializeCriticalSectionAndSpinCount
 0x418148 FreeEnvironmentStringsW
 0x41814c SetHandleCount
 0x418150 GetFileType
 0x418154 GetStartupInfoA
 0x418158 QueryPerformanceCounter
 0x41815c GetTickCount
 0x418160 GetSystemTimeAsFileTime
 0x418164 GetStringTypeA
 0x418168 HeapSize
 0x41816c GetOEMCP
 0x418170 IsValidCodePage
 0x418174 GetLocaleInfoA
 0x418178 GetConsoleCP
 0x41817c GetConsoleMode
 0x418180 FlushFileBuffers
 0x418184 CloseHandle
 0x418188 WriteConsoleA
 0x41818c GetConsoleOutputCP
 0x418190 WriteConsoleW
USER32.dll
 0x418198 ScreenToClient
 0x41819c RealGetWindowClassA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure