Report - Op.gg.exe

Themida Packer Malicious Packer Admin Tool (Sysinternals etc ...) Malicious Library PE64 PE File
ScreenShot
Created 2021.10.01 13:52 Machine s1_win7_x6402
Filename Op.gg.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
3
Behavior Score
2.6
ZERO API file : malware
VT API (file) 29 detected (Agentb, trtl, GenericKD, Artemis, GenKryptik, malicious, FKTG, Krypt, rogxp, ai score=80, Wacatac, score, Static AI, Suspicious PE, Behavior, confidence)
md5 ee228a1b9d71fc6381e15e9364bf8fb9
sha256 833766f9eaf2d9a80e31d1da7d2e15c41fd5b9b76458716f86e23218f2014ec7
ssdeep 196608:Q9aZYBt8WuXqGKfgU4p+WYjU6mYejM+iGkbu:icCt8z6lY5pzYrzejrp
imphash ed24c331c5a5c1f988e7e7abd5841036
impfuzzy 3:sUx2AEBggGaAumDVBHLzCS8n:nEBgDLun
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
warning themida_packer themida packer binaries (upload)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x1400940b0 GetModuleHandleA
msvcrt.dll
 0x1400940c0 ___lc_codepage_func
ntdll.dll
 0x1400940d0 RtlAllocateHeap

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure