Report - vbc.exe

Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.10.01 09:26 Machine s1_win7_x6402
Filename vbc.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
2.4
ZERO API file : clean
VT API (file) 28 detected (Jorik, m7pK, malicious, high confidence, Unsafe, Save, confidence, ZexaF, puW@aK, w@YkO, Eldorado, Attribute, HighConfidence, Kryptik, HMRO, CLASSIC, Sabsik, score, BScope, Static AI, Suspicious PE, HMRM)
md5 18e6b6c1a6f3f7aaa2be58edaa8c1121
sha256 137db6baaee41625a255900d2e76eb3c42575398bf06b92e2a0ef50a40305cc1
ssdeep 3072:vTOpv191RkD/Xa4BtPoQD0aLC7yDzbatkOzXn907k8BzMBpY8hLV3LJE:vTiv8D/XTPoQzmkuwg88hLX
imphash 1f41e0ca4ea9e1d12338209135b5bab4
impfuzzy 48:XydaO5JQSXcdbQFvOlqvxtTV8PK9LaTcEa3r:XyzPhXcZQFvUwxtTV8PQOTcEa3r
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x419008 lstrlenA
 0x41900c CopyFileExW
 0x419010 FreeLibrary
 0x419014 InterlockedIncrement
 0x419018 GetQueuedCompletionStatus
 0x41901c GetCommState
 0x419020 GetProfileStringW
 0x419024 CallNamedPipeW
 0x419028 GetNumberFormatA
 0x41902c FindResourceExA
 0x419030 GlobalAlloc
 0x419034 GetPrivateProfileIntA
 0x419038 GetSystemDirectoryW
 0x41903c SetFileShortNameW
 0x419040 GetVolumeInformationA
 0x419044 LoadLibraryW
 0x419048 GetSystemWow64DirectoryW
 0x41904c GetSystemWindowsDirectoryA
 0x419050 HeapDestroy
 0x419054 GetBinaryTypeA
 0x419058 GetCompressedFileSizeA
 0x41905c CreateActCtxA
 0x419060 GetStartupInfoW
 0x419064 GetThreadContext
 0x419068 SetThreadLocale
 0x41906c GetStdHandle
 0x419070 GetCPInfoExW
 0x419074 GetLastError
 0x419078 SetLastError
 0x41907c GetProcAddress
 0x419080 CreateNamedPipeA
 0x419084 SearchPathA
 0x419088 LoadLibraryA
 0x41908c CreateSemaphoreW
 0x419090 FindAtomA
 0x419094 SetSystemTime
 0x419098 GetModuleFileNameA
 0x41909c FindNextFileA
 0x4190a0 CreateIoCompletionPort
 0x4190a4 FindFirstChangeNotificationA
 0x4190a8 HeapSetInformation
 0x4190ac FreeEnvironmentStringsW
 0x4190b0 GetCurrentDirectoryA
 0x4190b4 TerminateJobObject
 0x4190b8 FindAtomW
 0x4190bc UnregisterWaitEx
 0x4190c0 DeleteFileA
 0x4190c4 LCMapStringA
 0x4190c8 GetCommandLineW
 0x4190cc CloseHandle
 0x4190d0 CreateFileW
 0x4190d4 InterlockedDecrement
 0x4190d8 DecodePointer
 0x4190dc GetModuleHandleW
 0x4190e0 ExitProcess
 0x4190e4 TerminateProcess
 0x4190e8 GetCurrentProcess
 0x4190ec UnhandledExceptionFilter
 0x4190f0 SetUnhandledExceptionFilter
 0x4190f4 IsDebuggerPresent
 0x4190f8 EncodePointer
 0x4190fc GetModuleFileNameW
 0x419100 WriteFile
 0x419104 QueryPerformanceCounter
 0x419108 GetTickCount
 0x41910c GetCurrentThreadId
 0x419110 GetCurrentProcessId
 0x419114 GetSystemTimeAsFileTime
 0x419118 GetEnvironmentStringsW
 0x41911c SetHandleCount
 0x419120 InitializeCriticalSectionAndSpinCount
 0x419124 GetFileType
 0x419128 DeleteCriticalSection
 0x41912c HeapValidate
 0x419130 IsBadReadPtr
 0x419134 TlsAlloc
 0x419138 TlsGetValue
 0x41913c TlsSetValue
 0x419140 TlsFree
 0x419144 HeapCreate
 0x419148 GetACP
 0x41914c GetOEMCP
 0x419150 GetCPInfo
 0x419154 IsValidCodePage
 0x419158 EnterCriticalSection
 0x41915c LeaveCriticalSection
 0x419160 HeapAlloc
 0x419164 HeapReAlloc
 0x419168 HeapSize
 0x41916c HeapQueryInformation
 0x419170 HeapFree
 0x419174 RtlUnwind
 0x419178 WideCharToMultiByte
 0x41917c LCMapStringW
 0x419180 MultiByteToWideChar
 0x419184 GetStringTypeW
 0x419188 OutputDebugStringA
 0x41918c WriteConsoleW
 0x419190 OutputDebugStringW
 0x419194 IsProcessorFeaturePresent
 0x419198 SetFilePointer
 0x41919c GetConsoleCP
 0x4191a0 GetConsoleMode
 0x4191a4 RaiseException
 0x4191a8 SetStdHandle
 0x4191ac FlushFileBuffers
ADVAPI32.dll
 0x419000 AbortSystemShutdownA
WINHTTP.dll
 0x4191b4 WinHttpOpen

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure