Report - 186.exe

Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2021.11.03 09:45 Machine s1_win7_x6403
Filename 186.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
2.4
ZERO API file : clean
VT API (file) 36 detected (AIDetect, malware1, malicious, high confidence, Fragtor, Artemis, Unsafe, Save, ZexaF, ju0@amljTtkG, Cutwail, FileRepMalware, ET#90%, RDMK, cmRtazojXs, cX1vJUSd9OI1yal2N, R + Troj, Krypt, susgen, kcloud, score, ai score=88, Static AI, Malicious PE, GenKryptik, FMYB, confidence, 100%)
md5 357d55e0c7821d2c4bbd26e92ee6a71b
sha256 5b3a8ff94b27ba20933e4850821591f20b6c1bf2d9141bb3870d81b8a457ed83
ssdeep 3072:PJZSej9g7vNe7XZwyfS5zSKSwBwaXFZMRX:x4yg7vaVS5zF7I9
imphash 5ab65f2363f526ecd7d1ca8b33f4bca1
impfuzzy 24:vhEq+fIeWS+IIFD0OR/uAkhWzLO7Zt5cpluiRv9jI/J3IntGSmjMzO3n:GAy+NRj6Ft5cpsS9aNS5O3
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x4019000 LoadResource
 0x4019004 HeapAlloc
 0x4019008 SetMailslotInfo
 0x401900c GetEnvironmentStringsW
 0x4019010 SetConsoleScreenBufferSize
 0x4019014 SetEvent
 0x4019018 FlushConsoleInputBuffer
 0x401901c GetTickCount
 0x4019020 TlsSetValue
 0x4019024 FindResourceExA
 0x4019028 GlobalAlloc
 0x401902c LoadLibraryW
 0x4019030 InitAtomTable
 0x4019034 FindNextVolumeW
 0x4019038 WriteConsoleW
 0x401903c CreateActCtxA
 0x4019040 BindIoCompletionCallback
 0x4019044 GetProcAddress
 0x4019048 VirtualAlloc
 0x401904c BeginUpdateResourceW
 0x4019050 PrepareTape
 0x4019054 GetAtomNameA
 0x4019058 LoadLibraryA
 0x401905c WriteConsoleA
 0x4019060 SetEnvironmentVariableA
 0x4019064 GetModuleFileNameA
 0x4019068 FindFirstChangeNotificationA
 0x401906c GetProcessAffinityMask
 0x4019070 AddConsoleAliasA
 0x4019074 CreateFileW
 0x4019078 GetProcessHeap
 0x401907c DecodePointer
 0x4019080 EncodePointer
 0x4019084 GetModuleHandleW
 0x4019088 ExitProcess
 0x401908c GetCommandLineW
 0x4019090 HeapSetInformation
 0x4019094 GetStartupInfoW
 0x4019098 IsProcessorFeaturePresent
 0x401909c ReadFile
 0x40190a0 UnhandledExceptionFilter
 0x40190a4 SetUnhandledExceptionFilter
 0x40190a8 IsDebuggerPresent
 0x40190ac TerminateProcess
 0x40190b0 GetCurrentProcess
 0x40190b4 EnterCriticalSection
 0x40190b8 LeaveCriticalSection
 0x40190bc InitializeCriticalSectionAndSpinCount
 0x40190c0 RtlUnwind
 0x40190c4 SetHandleCount
 0x40190c8 GetStdHandle
 0x40190cc GetFileType
 0x40190d0 DeleteCriticalSection
 0x40190d4 GetLastError
 0x40190d8 SetFilePointer
 0x40190dc TlsAlloc
 0x40190e0 TlsGetValue
 0x40190e4 TlsFree
 0x40190e8 InterlockedIncrement
 0x40190ec SetLastError
 0x40190f0 GetCurrentThreadId
 0x40190f4 InterlockedDecrement
 0x40190f8 HeapFree
 0x40190fc CloseHandle
 0x4019100 WriteFile
 0x4019104 GetModuleFileNameW
 0x4019108 FreeEnvironmentStringsW
 0x401910c HeapCreate
 0x4019110 QueryPerformanceCounter
 0x4019114 GetCurrentProcessId
 0x4019118 GetSystemTimeAsFileTime
 0x401911c MultiByteToWideChar
 0x4019120 Sleep
 0x4019124 GetCPInfo
 0x4019128 GetACP
 0x401912c GetOEMCP
 0x4019130 IsValidCodePage
 0x4019134 WideCharToMultiByte
 0x4019138 CreateFileA
 0x401913c SetStdHandle
 0x4019140 GetConsoleCP
 0x4019144 GetConsoleMode
 0x4019148 FlushFileBuffers
 0x401914c HeapSize
 0x4019150 RaiseException
 0x4019154 HeapReAlloc
 0x4019158 LCMapStringW
 0x401915c GetStringTypeW
 0x4019160 SetEndOfFile
USER32.dll
 0x4019168 GetCursorPos

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure