Report - 1.exe

VMProtect Malicious Library PE File PE32
ScreenShot
Created 2021.10.19 16:51 Machine s1_win7_x6402
Filename 1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
4.4
ZERO API file : malware
VT API (file) 38 detected (AIDetect, malware1, Tasker, malicious, high confidence, MulDrop18, GenericKD, Artemis, Unsafe, Save, confidence, ZexaF, @F0@aWLuuJoi, Attribute, HighConfidence, a variant of Generik, JHPBIMJ, Generik, Pkhf, VMProtBad, Outbreak, kcloud, Sabsik, ai score=81, Generic@ML, RDML, 9k1xlOebjzDuuUGbWT4hXw, Static AI, Malicious PE, PossibleThreat, FileRepMalware, susgen)
md5 bfbbb8571fc1d4dbd8053e5154cda305
sha256 8d3acf2f0ec215aa77026016f145230bf44a3a6c411349f1e49f86561380bb60
ssdeep 98304:mEzyXcTqaJ9IyyPc2iBZ83hHla+FOuWyVO5mo8/xCV:NzlTq742iBIHllFOhyxXw
imphash 2c58ba983cbcad8b3c06c5b4f999bb55
impfuzzy 12:8QwDiQ5kBZGoQtXJxZGb9AJcDfA5kLfP9m:8Qw2Q58QtXJHc9NDI5Q8
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
watch Checks the version of Bios
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
91.136.8.131 GB Internet Names for Business 91.136.8.131 mailcious
185.121.177.177 AQ Silent Ghost e.U. 185.121.177.177 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x999000 VirtualAlloc
USER32.dll
 0x999008 MessageBoxW
WTSAPI32.dll
 0x999010 WTSSendMessageW
KERNEL32.dll
 0x999018 VirtualQuery
USER32.dll
 0x999020 GetProcessWindowStation
KERNEL32.dll
 0x999028 LocalAlloc
 0x99902c LocalFree
 0x999030 GetModuleFileNameW
 0x999034 GetProcessAffinityMask
 0x999038 SetProcessAffinityMask
 0x99903c SetThreadAffinityMask
 0x999040 Sleep
 0x999044 ExitProcess
 0x999048 FreeLibrary
 0x99904c LoadLibraryA
 0x999050 GetModuleHandleA
 0x999054 GetProcAddress
USER32.dll
 0x99905c GetProcessWindowStation
 0x999060 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure