Report - 7870_1636781441_9630.exe

Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2021.11.14 18:29 Machine s1_win7_x6403
Filename 7870_1636781441_9630.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
2.0
ZERO API file : clean
VT API (file) 36 detected (malicious, high confidence, GenericKD, Lockbit, FSWW, confidence, 100%, Kryptik, Eldorado, HNHS, TrojanX, Fragtor, Generic@ML, RDML, PBn+Xk+pWpxG, xVVbIIZow, DownLoader43, bxidk, kcloud, score, CoinMiner, Glupteba, R449923, GenericKDZ, R002C0WKD21, Static AI, Malicious PE, susgen, GdSda)
md5 d985b4cfdceecc3c0fe4f3e4fda4e416
sha256 a8b37d6b073ee045ae63473cb1a592c974e896b19e3db06d552f955901c06db7
ssdeep 3072:X7UuBgLClgxDRXr8FszykHszuubqbgLt0ODpZa9uD6Vdyhkd:2LClgxDVwq4r4gRVwVf
imphash 620327c357b4e134c44aeeb41890b58a
impfuzzy 24:4q+fsZBCr1uAUDlcDAm2bG2Aq9l1SBoOLUcjtnlyv9Gj7/J3I+OSEoaMjAfou:QUZAYL1+ngcjtnK9A6SEoZAfR
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x417008 GetCurrentActCtx
 0x41700c GetEnvironmentStringsW
 0x417010 SetConsoleScreenBufferSize
 0x417014 GetSystemDefaultLCID
 0x417018 GetTickCount
 0x41701c GetProcessHeap
 0x417020 GetSystemTimeAsFileTime
 0x417024 ReadConsoleW
 0x417028 SetHandleCount
 0x41702c GetConsoleCP
 0x417030 GlobalAlloc
 0x417034 GetFirmwareEnvironmentVariableA
 0x417038 Sleep
 0x41703c GetProcessHandleCount
 0x417040 GetSystemWindowsDirectoryA
 0x417044 DeleteVolumeMountPointW
 0x417048 FindNextVolumeW
 0x41704c GetFileAttributesW
 0x417050 WriteConsoleW
 0x417054 GetLastError
 0x417058 GetProcAddress
 0x41705c VirtualAlloc
 0x417060 BackupWrite
 0x417064 VirtualAllocEx
 0x417068 GetAtomNameA
 0x41706c LoadLibraryA
 0x417070 GetDefaultCommConfigA
 0x417074 GetConsoleCursorInfo
 0x417078 QueryPerformanceFrequency
 0x41707c CloseHandle
 0x417080 DeleteAtom
 0x417084 lstrcpyW
 0x417088 LCMapStringW
 0x41708c CommConfigDialogW
 0x417090 HeapAlloc
 0x417094 GetModuleHandleW
 0x417098 ExitProcess
 0x41709c DecodePointer
 0x4170a0 GetCommandLineW
 0x4170a4 HeapSetInformation
 0x4170a8 GetStartupInfoW
 0x4170ac EncodePointer
 0x4170b0 IsProcessorFeaturePresent
 0x4170b4 WriteFile
 0x4170b8 GetStdHandle
 0x4170bc GetModuleFileNameW
 0x4170c0 HeapCreate
 0x4170c4 EnterCriticalSection
 0x4170c8 LeaveCriticalSection
 0x4170cc UnhandledExceptionFilter
 0x4170d0 SetUnhandledExceptionFilter
 0x4170d4 IsDebuggerPresent
 0x4170d8 TerminateProcess
 0x4170dc GetCurrentProcess
 0x4170e0 InitializeCriticalSectionAndSpinCount
 0x4170e4 GetFileType
 0x4170e8 DeleteCriticalSection
 0x4170ec SetFilePointer
 0x4170f0 HeapFree
 0x4170f4 LoadLibraryW
 0x4170f8 TlsAlloc
 0x4170fc TlsGetValue
 0x417100 TlsSetValue
 0x417104 TlsFree
 0x417108 InterlockedIncrement
 0x41710c SetLastError
 0x417110 GetCurrentThreadId
 0x417114 InterlockedDecrement
 0x417118 FreeEnvironmentStringsW
 0x41711c QueryPerformanceCounter
 0x417120 GetCurrentProcessId
 0x417124 RaiseException
 0x417128 GetCPInfo
 0x41712c GetACP
 0x417130 GetOEMCP
 0x417134 IsValidCodePage
 0x417138 WideCharToMultiByte
 0x41713c RtlUnwind
 0x417140 SetStdHandle
 0x417144 GetConsoleMode
 0x417148 FlushFileBuffers
 0x41714c HeapSize
 0x417150 HeapReAlloc
 0x417154 MultiByteToWideChar
 0x417158 GetStringTypeW
 0x41715c CreateFileW
USER32.dll
 0x417164 ClipCursor
ADVAPI32.dll
 0x417000 AdjustTokenGroups

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure