Report - 1516_1636380988_6400.exe

Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2021.11.10 18:05 Machine s1_win7_x6403
Filename 1516_1636380988_6400.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.2
ZERO API file : clean
VT API (file) 26 detected (AIDetect, malware2, malicious, high confidence, Unsafe, Save, Hacktool, confidence, ZexaF, oq0@a8HT8SmI, Kryptik, Eldorado, HNFX, ET#94%, RDMK, cmRtazrHplUJEYo9lvRrJ78j4tVs, R + Troj, Krypt, Emotet, Static AI, Malicious PE, Krypter, score, StopCrypt)
md5 08cb82859479b33dc1d0738b985db28c
sha256 8db223a1ffa1b3b3788ee9f0e050cc64f7b5cbefa8745e95e00391f7babcce58
ssdeep 6144:vLDuP9cE7VUV+/7yfpO7JTx4uzbgwu6QigabwVf:DDxE7VUVPOL4unn5
imphash 60ab4a93298436a0ea920c16b7e59caa
impfuzzy 24:NSQkq+fma/91cDku9jvbG2UdQRiOovVtlrcQnlyv9GG5/J3IoCq7jM69ATn:Nx8bBI2tlrcIK95hhJmT
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x415000 HeapCompact
 0x415004 CommConfigDialogA
 0x415008 GetSystemWindowsDirectoryW
 0x41500c QueryPerformanceCounter
 0x415010 GetEnvironmentStringsW
 0x415014 SetConsoleScreenBufferSize
 0x415018 AddConsoleAliasW
 0x41501c BackupSeek
 0x415020 GetTickCount
 0x415024 ReadConsoleW
 0x415028 SizeofResource
 0x41502c GetProcessHandleCount
 0x415030 FindNextVolumeW
 0x415034 WriteConsoleW
 0x415038 GetAtomNameW
 0x41503c LCMapStringA
 0x415040 GetLastError
 0x415044 GetProcAddress
 0x415048 VirtualAlloc
 0x41504c GetFirmwareEnvironmentVariableW
 0x415050 LoadLibraryA
 0x415054 LocalAlloc
 0x415058 BeginUpdateResourceA
 0x41505c SetSystemTime
 0x415060 GetModuleFileNameA
 0x415064 GetDefaultCommConfigA
 0x415068 SetConsoleCursorInfo
 0x41506c UpdateResourceW
 0x415070 GetProcessAffinityMask
 0x415074 SetFileValidData
 0x415078 lstrcpyA
 0x41507c CreateFileW
 0x415080 GetStringTypeW
 0x415084 HeapAlloc
 0x415088 EncodePointer
 0x41508c DecodePointer
 0x415090 GetCommandLineA
 0x415094 HeapSetInformation
 0x415098 GetStartupInfoW
 0x41509c UnhandledExceptionFilter
 0x4150a0 SetUnhandledExceptionFilter
 0x4150a4 IsDebuggerPresent
 0x4150a8 TerminateProcess
 0x4150ac GetCurrentProcess
 0x4150b0 GetModuleHandleW
 0x4150b4 ExitProcess
 0x4150b8 WriteFile
 0x4150bc GetStdHandle
 0x4150c0 GetModuleFileNameW
 0x4150c4 HeapCreate
 0x4150c8 Sleep
 0x4150cc HeapSize
 0x4150d0 EnterCriticalSection
 0x4150d4 LeaveCriticalSection
 0x4150d8 SetHandleCount
 0x4150dc InitializeCriticalSectionAndSpinCount
 0x4150e0 GetFileType
 0x4150e4 DeleteCriticalSection
 0x4150e8 SetFilePointer
 0x4150ec HeapFree
 0x4150f0 CloseHandle
 0x4150f4 FreeEnvironmentStringsW
 0x4150f8 WideCharToMultiByte
 0x4150fc TlsAlloc
 0x415100 TlsGetValue
 0x415104 TlsSetValue
 0x415108 TlsFree
 0x41510c InterlockedIncrement
 0x415110 SetLastError
 0x415114 GetCurrentThreadId
 0x415118 InterlockedDecrement
 0x41511c GetCurrentProcessId
 0x415120 GetSystemTimeAsFileTime
 0x415124 LoadLibraryW
 0x415128 HeapReAlloc
 0x41512c RtlUnwind
 0x415130 GetCPInfo
 0x415134 GetACP
 0x415138 GetOEMCP
 0x41513c IsValidCodePage
 0x415140 SetStdHandle
 0x415144 GetConsoleCP
 0x415148 GetConsoleMode
 0x41514c FlushFileBuffers
 0x415150 RaiseException
 0x415154 IsProcessorFeaturePresent
 0x415158 LCMapStringW
 0x41515c MultiByteToWideChar
USER32.dll
 0x415164 SetCursorPos

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure