Report - 7993_1636371023_9825.exe

Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2021.11.10 18:16 Machine s1_win7_x6403
Filename 7993_1636371023_9825.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.4
ZERO API file : clean
VT API (file) 36 detected (AIDetect, malware1, malicious, high confidence, GenericKD, Krypter, confidence, ZexaF, Rq0@a45Bk2fI, Kryptik, Eldorado, HNFV, Injuke, R002C0DK921, R + Troj, Krypt, StopCrypt, StellarStealer, npwfu, STOP, CoinMiner, Glupteba, R449277, ai score=83, Generic@ML, RDMK, 5zGJmTjjJ802hdG3zrhekg, Static AI, Malicious PE, GenericKDZ)
md5 bde1dbafbe609f7da66db66356d8f9e3
sha256 d17dadc2bb57905c88308f79228810b1f7fd28dfafe07717e2b4bf0d8e014f86
ssdeep 12288:frUIw9C3QOmmaTdHNF29u4+Boc7Ia3MNpLyYKTRmkCdIVunnn7s:QIVjmmaTdHNkcOc7Ia32Z1KNmNdDA
imphash b1d7987a638c820f79c0e265e27eaa61
impfuzzy 24:6S0kIa5LUNfIB1cDku9jvbG2UdQRiOovVtlrcQnlyv9GG5/J3Io77jM69ATn:6BnQBI2tlrcIK95h7JmT
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x483000 CommConfigDialogA
 0x483004 QueryPerformanceCounter
 0x483008 GetEnvironmentStringsW
 0x48300c AddConsoleAliasW
 0x483010 BackupSeek
 0x483014 GetTickCount
 0x483018 ReadConsoleW
 0x48301c LoadLibraryW
 0x483020 SizeofResource
 0x483024 GetProcessHandleCount
 0x483028 GetSystemWindowsDirectoryA
 0x48302c FindNextVolumeW
 0x483030 HeapValidate
 0x483034 SetConsoleCursorPosition
 0x483038 WriteConsoleW
 0x48303c GetAtomNameW
 0x483040 LCMapStringA
 0x483044 GetLastError
 0x483048 GetProcAddress
 0x48304c VirtualAlloc
 0x483050 GetFirmwareEnvironmentVariableW
 0x483054 LoadLibraryA
 0x483058 LocalAlloc
 0x48305c BeginUpdateResourceA
 0x483060 SetSystemTime
 0x483064 GetModuleFileNameA
 0x483068 GetDefaultCommConfigA
 0x48306c SetConsoleCursorInfo
 0x483070 UpdateResourceW
 0x483074 GetProcessAffinityMask
 0x483078 SetFileValidData
 0x48307c lstrcpyA
 0x483080 CreateFileW
 0x483084 GetStringTypeW
 0x483088 HeapAlloc
 0x48308c EncodePointer
 0x483090 DecodePointer
 0x483094 GetCommandLineA
 0x483098 HeapSetInformation
 0x48309c GetStartupInfoW
 0x4830a0 UnhandledExceptionFilter
 0x4830a4 SetUnhandledExceptionFilter
 0x4830a8 IsDebuggerPresent
 0x4830ac TerminateProcess
 0x4830b0 GetCurrentProcess
 0x4830b4 GetModuleHandleW
 0x4830b8 ExitProcess
 0x4830bc WriteFile
 0x4830c0 GetStdHandle
 0x4830c4 GetModuleFileNameW
 0x4830c8 HeapCreate
 0x4830cc Sleep
 0x4830d0 HeapSize
 0x4830d4 EnterCriticalSection
 0x4830d8 LeaveCriticalSection
 0x4830dc SetHandleCount
 0x4830e0 InitializeCriticalSectionAndSpinCount
 0x4830e4 GetFileType
 0x4830e8 DeleteCriticalSection
 0x4830ec SetFilePointer
 0x4830f0 HeapFree
 0x4830f4 CloseHandle
 0x4830f8 FreeEnvironmentStringsW
 0x4830fc WideCharToMultiByte
 0x483100 TlsAlloc
 0x483104 TlsGetValue
 0x483108 TlsSetValue
 0x48310c TlsFree
 0x483110 InterlockedIncrement
 0x483114 SetLastError
 0x483118 GetCurrentThreadId
 0x48311c InterlockedDecrement
 0x483120 GetCurrentProcessId
 0x483124 GetSystemTimeAsFileTime
 0x483128 HeapReAlloc
 0x48312c RtlUnwind
 0x483130 GetCPInfo
 0x483134 GetACP
 0x483138 GetOEMCP
 0x48313c IsValidCodePage
 0x483140 SetStdHandle
 0x483144 GetConsoleCP
 0x483148 GetConsoleMode
 0x48314c FlushFileBuffers
 0x483150 RaiseException
 0x483154 IsProcessorFeaturePresent
 0x483158 LCMapStringW
 0x48315c MultiByteToWideChar
USER32.dll
 0x483164 SetCursorPos

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure