Report - OK.exe

UPX PE File PE32
ScreenShot
Created 2021.12.30 10:58 Machine s1_win7_x6403
Filename OK.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
6
Behavior Score
1.6
ZERO API file : malware
VT API (file) 51 detected (malicious, high confidence, score, Perite, Pate, Parite, confidence, 100%, Pinfi, Heuristics, bysj, gen@1dp8c4, A + W32, ai score=83, FileInfector, ET#88%, RDMK, cmRtazoixqeM0mEvccfTKoTxDUaH, Static AI, Malicious PE)
md5 36c087cb423663c91959f045aa116c22
sha256 402410a6afb5e119cbabd9f69bbc5e22ed0f2777a459fc81e02feb737f45e706
ssdeep 3072:ybVcCJGB0z9goLCg9yd7HhSqCNJ+KntK2g33dfEwIjYKlSMpPEpTptc:ybiCJK0+oWg9yd70NJPntiewIUKkMqI
imphash 88f775776887c3897bf5575da16525a3
impfuzzy 24:V0DfjgVG1BzeLDUdAh5h0XGHqXNELCA27uDkFTK:jc1leLwdAhj0XGKXNELCcF
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x402000 LoadLibraryA
 0x402004 GetProcAddress
 0x402008 WaitForSingleObject
 0x40200c CreateEventA
 0x402010 Sleep
 0x402014 ExitProcess
 0x402018 CreateThread
 0x40201c VirtualAlloc
 0x402020 GetCurrentProcessId
 0x402024 GetCurrentThreadId
 0x402028 GetTickCount
 0x40202c QueryPerformanceCounter
 0x402030 GetModuleHandleA
 0x402034 SetUnhandledExceptionFilter
 0x402038 UnhandledExceptionFilter
 0x40203c GetCurrentProcess
 0x402040 TerminateProcess
 0x402044 InterlockedCompareExchange
 0x402048 InterlockedExchange
 0x40204c GetSystemTimeAsFileTime
msvcrt.dll
 0x40207c _controlfp
 0x402080 exit
 0x402084 ?terminate@@YAXXZ
 0x402088 __set_app_type
 0x40208c _initterm
 0x402090 __p__fmode
 0x402094 __p__commode
 0x402098 __setusermatherr
 0x40209c _amsg_exit
 0x4020a0 _XcptFilter
 0x4020a4 _exit
 0x4020a8 _cexit
 0x4020ac __getmainargs
 0x4020b0 ??1type_info@@UAE@XZ
 0x4020b4 ??3@YAXPAX@Z
 0x4020b8 __CxxFrameHandler3
 0x4020bc ??2@YAPAXI@Z
 0x4020c0 memset
 0x4020c4 memcpy
 0x4020c8 _except_handler4_common
WS2_32.dll
 0x402054 WSAStartup
 0x402058 gethostbyname
 0x40205c socket
 0x402060 recv
 0x402064 WSACleanup
 0x402068 send
 0x40206c htons
 0x402070 connect
 0x402074 closesocket

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure