Report - 5332_1635879205_5518.exe

Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2021.11.03 16:52 Machine s1_win7_x6401
Filename 5332_1635879205_5518.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
2.8
ZERO API file : clean
VT API (file) 35 detected (AIDetect, malware1, malicious, high confidence, Jaik, Unsafe, Save, Hacktool, Kryptik, Eldorado, HNEE, Injuke, TrojanX, Lockbit, A + Troj, Krypt, Static AI, Malicious PE, RedLine, score, ai score=80, ET#90%, RDMK, cmRtazpb8RJbG4OX, 03p6eeMjZXu, susgen, ZexaF, uu0@a8RtIyfI, Genetic, confidence, 100%)
md5 4fb120e5975e3a7b4c59a1cf7b8ebc75
sha256 2d1fb307892909f07593797b2fdf7474ece2ca8d27fb5b54dfb4439c880e8143
ssdeep 6144:yMYlQUYFPySR/4bHfg9FDsiP4nld5ncKq7su/kRWBw+Tpi3OV37hGPVpD6q9Eua:MuUIBYYHDs5ld5crYewgrhGPVpD6q9
imphash 2d072324798956717a479868e71b5c9d
impfuzzy 24:vhWu9ESebIwD0ORvkhzzLONt5cpluiRv9jI/J3In19GSA6jMzVTn:Ra5i6Nt5cpsS9avS4VT
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x446000 LoadResource
 0x446004 HeapAlloc
 0x446008 SetMailslotInfo
 0x44600c SetEnvironmentVariableW
 0x446010 GetEnvironmentStringsW
 0x446014 SetEvent
 0x446018 FlushConsoleInputBuffer
 0x44601c GetTickCount
 0x446020 TlsSetValue
 0x446024 GlobalAlloc
 0x446028 SetConsoleCursorPosition
 0x44602c WriteConsoleW
 0x446030 GetModuleFileNameW
 0x446034 GetProcAddress
 0x446038 VirtualAlloc
 0x44603c BeginUpdateResourceW
 0x446040 PrepareTape
 0x446044 GetAtomNameA
 0x446048 LoadLibraryA
 0x44604c WriteConsoleA
 0x446050 FindFirstChangeNotificationA
 0x446054 GetProcessAffinityMask
 0x446058 AddConsoleAliasA
 0x44605c FindNextVolumeA
 0x446060 CreateFileW
 0x446064 GetProcessHeap
 0x446068 DecodePointer
 0x44606c EncodePointer
 0x446070 GetModuleHandleW
 0x446074 ExitProcess
 0x446078 GetCommandLineW
 0x44607c HeapSetInformation
 0x446080 GetStartupInfoW
 0x446084 IsProcessorFeaturePresent
 0x446088 UnhandledExceptionFilter
 0x44608c SetUnhandledExceptionFilter
 0x446090 IsDebuggerPresent
 0x446094 TerminateProcess
 0x446098 GetCurrentProcess
 0x44609c EnterCriticalSection
 0x4460a0 LeaveCriticalSection
 0x4460a4 InitializeCriticalSectionAndSpinCount
 0x4460a8 RtlUnwind
 0x4460ac SetHandleCount
 0x4460b0 GetStdHandle
 0x4460b4 GetFileType
 0x4460b8 DeleteCriticalSection
 0x4460bc GetLastError
 0x4460c0 SetFilePointer
 0x4460c4 TlsAlloc
 0x4460c8 TlsGetValue
 0x4460cc TlsFree
 0x4460d0 InterlockedIncrement
 0x4460d4 SetLastError
 0x4460d8 GetCurrentThreadId
 0x4460dc InterlockedDecrement
 0x4460e0 HeapFree
 0x4460e4 CloseHandle
 0x4460e8 LoadLibraryW
 0x4460ec WriteFile
 0x4460f0 FreeEnvironmentStringsW
 0x4460f4 HeapCreate
 0x4460f8 QueryPerformanceCounter
 0x4460fc GetCurrentProcessId
 0x446100 GetSystemTimeAsFileTime
 0x446104 ReadFile
 0x446108 Sleep
 0x44610c GetCPInfo
 0x446110 GetACP
 0x446114 GetOEMCP
 0x446118 IsValidCodePage
 0x44611c WideCharToMultiByte
 0x446120 CreateFileA
 0x446124 SetStdHandle
 0x446128 GetConsoleCP
 0x44612c GetConsoleMode
 0x446130 FlushFileBuffers
 0x446134 HeapSize
 0x446138 RaiseException
 0x44613c MultiByteToWideChar
 0x446140 HeapReAlloc
 0x446144 LCMapStringW
 0x446148 GetStringTypeW
 0x44614c SetEndOfFile
USER32.dll
 0x446154 SetCursorPos

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure