Report - VBC.EXE

Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2021.11.11 12:35 Machine s1_win7_x6401
Filename VBC.EXE
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
2.6
ZERO API file : clean
VT API (file) 41 detected (malicious, high confidence, score, GenericRXAA, Unsafe, Save, Fragtor, Kryptik, Eldorado, HNGM, Androm, MalwareX, Outbreak, kcloud, Azorult, ai score=88, R002H0CKA21, Generic@ML, RDML, 24hpgEJ7BhoRqq0yag, Static AI, Malicious PE, ZexaF, pq0@aykHwLaI, confidence, 100%, susgen)
md5 b550e23e12e99746ced6f79b59c015bc
sha256 3adcd6bfdb97a238c80d0cf8554fe4cabc22c50e03bd16985f8fcc02deb90f05
ssdeep 3072:F7ecgDLAj8q4qZQdAGhCMdRYKK2MZpCyQtWrxpzbgqruXhs7sxkgaBChU/pZa9ul:7U68yZQdrPrYT0Tuzbgwu6QigabwVf
imphash f6b674b76a065863a80dcff24fafdbed
impfuzzy 24:6SNbG2SBkq+fma/qFLycDeu9jLjjfiOovVtlOcQnlyv9G45/J3IoBq7jM6KgwYu:6B1B8AF52tlOcIK9nhIJ/k
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 41 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41d008 CommConfigDialogA
 0x41d00c GetDefaultCommConfigW
 0x41d010 GetSystemWindowsDirectoryW
 0x41d014 QueryPerformanceCounter
 0x41d018 GetEnvironmentStringsW
 0x41d01c SetConsoleScreenBufferSize
 0x41d020 AddConsoleAliasW
 0x41d024 BackupSeek
 0x41d028 GetTickCount
 0x41d02c GetProcessHeap
 0x41d030 GetSystemTimeAsFileTime
 0x41d034 ReadConsoleW
 0x41d038 SizeofResource
 0x41d03c GetProcessHandleCount
 0x41d040 InitAtomTable
 0x41d044 HeapValidate
 0x41d048 GetModuleFileNameW
 0x41d04c DeactivateActCtx
 0x41d050 GetLastError
 0x41d054 GetProcAddress
 0x41d058 VirtualAlloc
 0x41d05c HeapSize
 0x41d060 BeginUpdateResourceW
 0x41d064 GetFirmwareEnvironmentVariableW
 0x41d068 LoadLibraryA
 0x41d06c WriteConsoleA
 0x41d070 LocalAlloc
 0x41d074 GetProcessAffinityMask
 0x41d078 GetConsoleCursorInfo
 0x41d07c DeleteAtom
 0x41d080 FindNextVolumeA
 0x41d084 LCMapStringW
 0x41d088 lstrcpyA
 0x41d08c WriteConsoleW
 0x41d090 GetAtomNameW
 0x41d094 CreateFileW
 0x41d098 HeapAlloc
 0x41d09c EncodePointer
 0x41d0a0 DecodePointer
 0x41d0a4 GetCommandLineA
 0x41d0a8 HeapSetInformation
 0x41d0ac GetStartupInfoW
 0x41d0b0 UnhandledExceptionFilter
 0x41d0b4 SetUnhandledExceptionFilter
 0x41d0b8 IsDebuggerPresent
 0x41d0bc TerminateProcess
 0x41d0c0 GetCurrentProcess
 0x41d0c4 GetModuleHandleW
 0x41d0c8 ExitProcess
 0x41d0cc WriteFile
 0x41d0d0 GetStdHandle
 0x41d0d4 HeapCreate
 0x41d0d8 Sleep
 0x41d0dc EnterCriticalSection
 0x41d0e0 LeaveCriticalSection
 0x41d0e4 SetHandleCount
 0x41d0e8 InitializeCriticalSectionAndSpinCount
 0x41d0ec GetFileType
 0x41d0f0 DeleteCriticalSection
 0x41d0f4 SetFilePointer
 0x41d0f8 HeapFree
 0x41d0fc CloseHandle
 0x41d100 GetModuleFileNameA
 0x41d104 FreeEnvironmentStringsW
 0x41d108 WideCharToMultiByte
 0x41d10c TlsAlloc
 0x41d110 TlsGetValue
 0x41d114 TlsSetValue
 0x41d118 TlsFree
 0x41d11c InterlockedIncrement
 0x41d120 SetLastError
 0x41d124 GetCurrentThreadId
 0x41d128 InterlockedDecrement
 0x41d12c GetCurrentProcessId
 0x41d130 LoadLibraryW
 0x41d134 HeapReAlloc
 0x41d138 RtlUnwind
 0x41d13c GetCPInfo
 0x41d140 GetACP
 0x41d144 GetOEMCP
 0x41d148 IsValidCodePage
 0x41d14c SetStdHandle
 0x41d150 GetConsoleCP
 0x41d154 GetConsoleMode
 0x41d158 FlushFileBuffers
 0x41d15c RaiseException
 0x41d160 IsProcessorFeaturePresent
 0x41d164 MultiByteToWideChar
 0x41d168 GetStringTypeW
USER32.dll
 0x41d170 MessageBeep
ADVAPI32.dll
 0x41d000 AdjustTokenGroups

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure