Report - sufile.exe

Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2021.11.07 10:31 Machine s1_win7_x6401
Filename sufile.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
3.0
ZERO API file : clean
VT API (file) 31 detected (malicious, high confidence, Fragtor, Unsafe, Save, confidence, 100%, Hacktool, ZexaF, zq0@a8smW4gI, Kryptik, Eldorado, Lockbit, Static AI, Malicious PE, ai score=85, Sabsik, score, GenericRXQC, ET#98%, RDMK, cmRtazp9RjXtWS2LXXHOPDLL35mZ, susgen)
md5 d68ea9d5b1d16b39aa4e8ec619b7927b
sha256 6f79b33987462d091fff7d7522de014f2b4ca5f20c0d3b0428a0137c33120844
ssdeep 6144:rJ7HM+ushuNFkytziWrQM7GriZYOLT4HxFQQuEGNe8Pai4hV6OQXuzbgwu7igad:N7HvQNtnXnZuoQu28CD2OQXunnj
imphash 80ba2861c278646549335a754dc96d41
impfuzzy 24:AbG2SRFEIaNuvtI4XA9KcDpclllroOovVtUwcpluiyv92/J3I+6nujMfK318n:j1RPXAihn2tbcpsb98unkF8
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 31 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
107.172.73.191 US AS-COLOCROSSING 107.172.73.191 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x44b008 GetDefaultCommConfigW
 0x44b00c QueryPerformanceCounter
 0x44b010 HeapFree
 0x44b014 GetEnvironmentStringsW
 0x44b018 AddConsoleAliasW
 0x44b01c BackupSeek
 0x44b020 GetTickCount
 0x44b024 GlobalAlloc
 0x44b028 GetFirmwareEnvironmentVariableA
 0x44b02c LoadLibraryW
 0x44b030 SizeofResource
 0x44b034 SetConsoleCursorPosition
 0x44b038 SetThreadContext
 0x44b03c GetAtomNameW
 0x44b040 LCMapStringA
 0x44b044 FillConsoleOutputCharacterW
 0x44b048 GetLastError
 0x44b04c GetProcAddress
 0x44b050 VirtualAlloc
 0x44b054 BeginUpdateResourceW
 0x44b058 LoadLibraryA
 0x44b05c WriteConsoleA
 0x44b060 GetModuleFileNameA
 0x44b064 SetConsoleCursorInfo
 0x44b068 UpdateResourceW
 0x44b06c SetFileValidData
 0x44b070 FindNextVolumeA
 0x44b074 lstrcpyW
 0x44b078 WriteConsoleW
 0x44b07c SetProcessAffinityMask
 0x44b080 CreateFileW
 0x44b084 GetStringTypeW
 0x44b088 HeapAlloc
 0x44b08c GetModuleHandleW
 0x44b090 ExitProcess
 0x44b094 DecodePointer
 0x44b098 GetCommandLineA
 0x44b09c HeapSetInformation
 0x44b0a0 GetStartupInfoW
 0x44b0a4 UnhandledExceptionFilter
 0x44b0a8 SetUnhandledExceptionFilter
 0x44b0ac IsDebuggerPresent
 0x44b0b0 EncodePointer
 0x44b0b4 TerminateProcess
 0x44b0b8 GetCurrentProcess
 0x44b0bc IsProcessorFeaturePresent
 0x44b0c0 WriteFile
 0x44b0c4 GetStdHandle
 0x44b0c8 GetModuleFileNameW
 0x44b0cc HeapCreate
 0x44b0d0 EnterCriticalSection
 0x44b0d4 LeaveCriticalSection
 0x44b0d8 InitializeCriticalSectionAndSpinCount
 0x44b0dc RtlUnwind
 0x44b0e0 SetHandleCount
 0x44b0e4 GetFileType
 0x44b0e8 DeleteCriticalSection
 0x44b0ec SetFilePointer
 0x44b0f0 CloseHandle
 0x44b0f4 TlsAlloc
 0x44b0f8 TlsGetValue
 0x44b0fc TlsSetValue
 0x44b100 TlsFree
 0x44b104 InterlockedIncrement
 0x44b108 SetLastError
 0x44b10c GetCurrentThreadId
 0x44b110 InterlockedDecrement
 0x44b114 FreeEnvironmentStringsW
 0x44b118 WideCharToMultiByte
 0x44b11c GetCurrentProcessId
 0x44b120 GetSystemTimeAsFileTime
 0x44b124 RaiseException
 0x44b128 Sleep
 0x44b12c CreateFileA
 0x44b130 GetCPInfo
 0x44b134 GetACP
 0x44b138 GetOEMCP
 0x44b13c IsValidCodePage
 0x44b140 GetConsoleCP
 0x44b144 GetConsoleMode
 0x44b148 SetStdHandle
 0x44b14c FlushFileBuffers
 0x44b150 HeapSize
 0x44b154 HeapReAlloc
 0x44b158 SetEndOfFile
 0x44b15c GetProcessHeap
 0x44b160 MultiByteToWideChar
 0x44b164 ReadFile
 0x44b168 LCMapStringW
USER32.dll
 0x44b170 GetCursorPos
ADVAPI32.dll
 0x44b000 NotifyChangeEventLog

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure