Report - .svchost.exe

Generic Malware UPX PE File PE32
ScreenShot
Created 2021.10.08 11:23 Machine s1_win7_x6401
Filename .svchost.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.0
ZERO API file : malware
VT API (file) 27 detected (AIDetect, malware1, Malicious, high confidence, GenericKD, GuLoader, Save, ZevbaF, hm0@aioLApmi, Attribute, HighConfidence, a variant of Generik, EZLNZWG, FileRepMalware, AGEN, ai score=81, kcloud, Sabsik, score, Static AI, Malicious PE, Unsafe, confidence)
md5 d53b5fa49804ec991df980cb9797676f
sha256 9f3ad0d8c4550adde82264b58d458a065870e1171cfc31856605ea3f4c7ddf4a
ssdeep 1536:PJnYAZYVHclJ5yIevgonlxeA572cgkzNST4Q/ypDvo4xSKD3:P1RxJ5yIQnyA572WzNSv/+7rsKL
imphash cd6cada764d740d8782222f9ccbeed47
impfuzzy 6:HHTb7GU6BBMGq8rT/VC1nq4CRN29lJQUn:nTNvboTY1n9dleU
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
info Checks amount of memory in system
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (4cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

MSVBVM60.DLL
 0x401000 MethCallEngine
 0x401004 None
 0x401008 EVENT_SINK_AddRef
 0x40100c DllFunctionCall
 0x401010 EVENT_SINK_Release
 0x401014 EVENT_SINK_QueryInterface
 0x401018 __vbaExceptHandler
 0x40101c None
 0x401020 None
 0x401024 None
 0x401028 None

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure