Report - file.exe

UPX Malicious Library PE File PE32 OS Processor Check
ScreenShot
Created 2021.10.14 09:56 Machine s1_win7_x6402
Filename file.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
1.4
ZERO API file : malware
VT API (file)
md5 e1489864463ec55743b9663fb7084a96
sha256 b1b54db233aed52630b1839a887922afec7d5ca63f8fb0a59718d2bc64364879
ssdeep 12288:DbqaDUpmiwDDi394kYWTbA2Fb/eHYYC82q+TX96EFraatTT4XRJtH8n:ya4pOD+GknbA4b/eHYY9+z96AaapT4XG
imphash ea8aa8524573fdaa0fbe03cd1215da2c
impfuzzy 24:AigqlYJcD1RTiOSMJKOcjtlbeHRnlyv9NT4WajMng+:AjqNnpHcjtFGK9NcWG+
  Network IP location

Signature (5cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x48a000 HeapReAlloc
 0x48a004 UnmapViewOfFile
 0x48a008 EndUpdateResourceW
 0x48a00c GetCurrentProcess
 0x48a010 SleepEx
 0x48a014 BackupSeek
 0x48a018 ReadConsoleW
 0x48a01c FindActCtxSectionStringA
 0x48a020 GetEnvironmentStrings
 0x48a024 GlobalAlloc
 0x48a028 InitAtomTable
 0x48a02c HeapDestroy
 0x48a030 GetModuleFileNameW
 0x48a034 CreateActCtxA
 0x48a038 GetOverlappedResult
 0x48a03c GetACP
 0x48a040 ReleaseSemaphore
 0x48a044 SetLastError
 0x48a048 GetProcAddress
 0x48a04c BeginUpdateResourceW
 0x48a050 ResetEvent
 0x48a054 WriteConsoleA
 0x48a058 DebugSetProcessKillOnExit
 0x48a05c GetModuleHandleA
 0x48a060 GetProcessShutdownParameters
 0x48a064 EraseTape
 0x48a068 VirtualProtect
 0x48a06c FindNextVolumeA
 0x48a070 LCMapStringW
 0x48a074 lstrcpyA
 0x48a078 EncodePointer
 0x48a07c DecodePointer
 0x48a080 GetCommandLineW
 0x48a084 HeapSetInformation
 0x48a088 GetStartupInfoW
 0x48a08c TlsAlloc
 0x48a090 TlsGetValue
 0x48a094 TlsSetValue
 0x48a098 TlsFree
 0x48a09c InterlockedIncrement
 0x48a0a0 GetModuleHandleW
 0x48a0a4 GetCurrentThreadId
 0x48a0a8 GetLastError
 0x48a0ac InterlockedDecrement
 0x48a0b0 HeapAlloc
 0x48a0b4 EnterCriticalSection
 0x48a0b8 LeaveCriticalSection
 0x48a0bc UnhandledExceptionFilter
 0x48a0c0 SetUnhandledExceptionFilter
 0x48a0c4 IsDebuggerPresent
 0x48a0c8 TerminateProcess
 0x48a0cc HeapFree
 0x48a0d0 SetFilePointer
 0x48a0d4 CloseHandle
 0x48a0d8 ExitProcess
 0x48a0dc WriteFile
 0x48a0e0 GetStdHandle
 0x48a0e4 FreeEnvironmentStringsW
 0x48a0e8 GetEnvironmentStringsW
 0x48a0ec SetHandleCount
 0x48a0f0 InitializeCriticalSectionAndSpinCount
 0x48a0f4 GetFileType
 0x48a0f8 DeleteCriticalSection
 0x48a0fc HeapCreate
 0x48a100 QueryPerformanceCounter
 0x48a104 GetTickCount
 0x48a108 GetCurrentProcessId
 0x48a10c GetSystemTimeAsFileTime
 0x48a110 GetCPInfo
 0x48a114 GetOEMCP
 0x48a118 IsValidCodePage
 0x48a11c Sleep
 0x48a120 WideCharToMultiByte
 0x48a124 RtlUnwind
 0x48a128 SetStdHandle
 0x48a12c GetConsoleCP
 0x48a130 GetConsoleMode
 0x48a134 FlushFileBuffers
 0x48a138 LoadLibraryW
 0x48a13c RaiseException
 0x48a140 MultiByteToWideChar
 0x48a144 GetStringTypeW
 0x48a148 IsProcessorFeaturePresent
 0x48a14c WriteConsoleW
 0x48a150 HeapSize
 0x48a154 CreateFileW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure