Report - vbc.exe

UPX Malicious Library PE File PE32 OS Processor Check
ScreenShot
Created 2021.10.15 09:41 Machine s1_win7_x6402
Filename vbc.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.4
ZERO API file : malware
VT API (file) 37 detected (AIDetect, malware1, malicious, high confidence, Siggen15, Fragtor, Artemis, Unsafe, Save, confidence, 100%, Hacktool, ZexaF, py0@a0wr5oaO, Eldorado, Attribute, HighConfidence, GenKryptik, FMAB, Androm, A + Troj, Krypt, MultiPlug, susgen, ai score=85, kcloud, Sabsik, score, MalPE, R445259, Generic@ML, RDML, 3qeKzgpQUKwbtEjv0wuA, Static AI, Malicious PE, Genetic)
md5 10397feb14b5e8aad2b1e8fd3686763c
sha256 61469a1a12ec1dadb9f884a0f07c23d7de89e77cb687bb6919c555de6ca8dc22
ssdeep 3072:AulhjgrOAFE8CpF3kmW9WtXm5tv4vmVQHboS9D98aShyuy6inoeZcECxc43E:FrjgrHGM81gtA+0Vx98aC3ScEWjE
imphash ea8aa8524573fdaa0fbe03cd1215da2c
impfuzzy 24:AigqlYJcD1RTiOSMJKOcjtlbeHRnlyv9NT4WajMng+:AjqNnpHcjtFGK9NcWG+
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41d000 HeapReAlloc
 0x41d004 UnmapViewOfFile
 0x41d008 EndUpdateResourceW
 0x41d00c GetCurrentProcess
 0x41d010 SleepEx
 0x41d014 BackupSeek
 0x41d018 ReadConsoleW
 0x41d01c FindActCtxSectionStringA
 0x41d020 GetEnvironmentStrings
 0x41d024 GlobalAlloc
 0x41d028 InitAtomTable
 0x41d02c HeapDestroy
 0x41d030 GetModuleFileNameW
 0x41d034 CreateActCtxA
 0x41d038 GetOverlappedResult
 0x41d03c GetACP
 0x41d040 ReleaseSemaphore
 0x41d044 SetLastError
 0x41d048 GetProcAddress
 0x41d04c BeginUpdateResourceW
 0x41d050 ResetEvent
 0x41d054 WriteConsoleA
 0x41d058 DebugSetProcessKillOnExit
 0x41d05c GetModuleHandleA
 0x41d060 GetProcessShutdownParameters
 0x41d064 EraseTape
 0x41d068 VirtualProtect
 0x41d06c FindNextVolumeA
 0x41d070 LCMapStringW
 0x41d074 lstrcpyA
 0x41d078 EncodePointer
 0x41d07c DecodePointer
 0x41d080 GetCommandLineW
 0x41d084 HeapSetInformation
 0x41d088 GetStartupInfoW
 0x41d08c TlsAlloc
 0x41d090 TlsGetValue
 0x41d094 TlsSetValue
 0x41d098 TlsFree
 0x41d09c InterlockedIncrement
 0x41d0a0 GetModuleHandleW
 0x41d0a4 GetCurrentThreadId
 0x41d0a8 GetLastError
 0x41d0ac InterlockedDecrement
 0x41d0b0 HeapAlloc
 0x41d0b4 EnterCriticalSection
 0x41d0b8 LeaveCriticalSection
 0x41d0bc UnhandledExceptionFilter
 0x41d0c0 SetUnhandledExceptionFilter
 0x41d0c4 IsDebuggerPresent
 0x41d0c8 TerminateProcess
 0x41d0cc HeapFree
 0x41d0d0 SetFilePointer
 0x41d0d4 CloseHandle
 0x41d0d8 ExitProcess
 0x41d0dc WriteFile
 0x41d0e0 GetStdHandle
 0x41d0e4 FreeEnvironmentStringsW
 0x41d0e8 GetEnvironmentStringsW
 0x41d0ec SetHandleCount
 0x41d0f0 InitializeCriticalSectionAndSpinCount
 0x41d0f4 GetFileType
 0x41d0f8 DeleteCriticalSection
 0x41d0fc HeapCreate
 0x41d100 QueryPerformanceCounter
 0x41d104 GetTickCount
 0x41d108 GetCurrentProcessId
 0x41d10c GetSystemTimeAsFileTime
 0x41d110 GetCPInfo
 0x41d114 GetOEMCP
 0x41d118 IsValidCodePage
 0x41d11c Sleep
 0x41d120 WideCharToMultiByte
 0x41d124 RtlUnwind
 0x41d128 SetStdHandle
 0x41d12c GetConsoleCP
 0x41d130 GetConsoleMode
 0x41d134 FlushFileBuffers
 0x41d138 LoadLibraryW
 0x41d13c RaiseException
 0x41d140 MultiByteToWideChar
 0x41d144 GetStringTypeW
 0x41d148 IsProcessorFeaturePresent
 0x41d14c WriteConsoleW
 0x41d150 HeapSize
 0x41d154 CreateFileW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure