Report - nlauncher.exe

Gen1 Gen2 NPKI Generic Malware Themida Packer UPX Malicious Library Malicious Packer PE File PE64
ScreenShot
Created 2022.10.12 23:11 Machine s1_win7_x6403
Filename nlauncher.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
2.8
ZERO API file : clean
VT API (file) 12 detected (malicious, moderate confidence, Unsafe, a variant of WinGo, Probably Heur, ExeHeaderL, moderate, score, PasswordStealer, Zenpak, RDR6JvETRMK, susgen)
md5 fe3cb9edf4b588d8914cbdc12379def8
sha256 b813f93f24761505af2792be190b5cc19838252fcbdeea9946216964f7649ee8
ssdeep 196608:BJrDZMUFXFKj6JzwzFBxUmucoJ07KgXjz+kVUC:LVM6VKuBwzLqhK7KgXvPt
imphash 0d54db7fa2e518e83dc2999e4a3a4172
impfuzzy 3:sUx2AEBggGaAumDZ:nEBgDL7
  Network IP location

Signature (7cnts)

Level Description
watch File has been identified by 12 AntiVirus engines on VirusTotal as malicious
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (10cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (upload)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
warning themida_packer themida packer binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x140e15080 GetModuleHandleA
msvcrt.dll
 0x140e15090 ___lc_codepage_func

EAT(Export Address Table) Library

0x140e032a0 _cgo_dummy_export
0x1404acc20 authorizerTrampoline
0x1404ac940 callbackTrampoline
0x1404acb00 commitHookTrampoline
0x1404aca60 compareTrampoline
0x1404aca10 doneTrampoline
0x1404acca0 preUpdateHookTrampoline
0x1404acb60 rollbackHookTrampoline
0x1404ac9a0 stepTrampoline
0x1404acbb0 updateHookTrampoline


Similarity measure (PE file only) - Checking for service failure