Report - 2.exe

Themida Packer Malicious Packer PE32 PE File
ScreenShot
Created 2022.05.25 09:48 Machine s1_win7_x6403
Filename 2.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
4.2
ZERO API file : clean
VT API (file)
md5 046804d6a8900b2fff9596823db0ce93
sha256 abde95665f00d689ae82d87023f15c909e8648e5d320b7fe680cdf910ec489ad
ssdeep 49152:9hgfaw6+fnvkWEp/z0IKbj4nJegtcpuyAtX2ZWLT/XMEWKBK1MJ5FdLOJegTZkyW:9hgfXrfnwYJboJntX2ZQLXMEP1OJeg6b
imphash 01d1b984e99e67b6f7ae46199d7dfd92
impfuzzy 6:nEJt2MxdLBZFTuYbsxAdtuO1wSZoMe6zAn:EJt2GTk4tuIwSoKAn
  Network IP location

Signature (9cnts)

Level Description
watch Checks for the presence of known windows from debuggers and forensic tools
watch Checks the version of Bios
watch Detects Virtual Machines through their custom firmware
watch Detects VirtualBox through the presence of a registry key
watch Detects VMWare through the in instruction feature
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
warning themida_packer themida packer binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x47a200 GetModuleHandleA
USER32.dll
 0x47a208 SetForegroundWindow
GDI32.dll
 0x47a210 CreateCompatibleBitmap
ADVAPI32.dll
 0x47a218 CryptAcquireContextA
SHELL32.dll
 0x47a220 ShellExecuteW
SHLWAPI.dll
 0x47a228 PathFileExistsW
WINMM.dll
 0x47a230 PlaySoundW
WS2_32.dll
 0x47a238 send
urlmon.dll
 0x47a240 URLDownloadToFileW
gdiplus.dll
 0x47a248 GdiplusStartup

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure