Report - f429fjd4uf84u.sdfh

Gen2 Malicious Library UPX PE32 OS Processor Check PE File
ScreenShot
Created 2022.12.05 17:03 Machine s1_win7_x6403
Filename f429fjd4uf84u.sdfh
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.0
ZERO API
VT API (file) 48 detected (GenericKD, Lazy, Save, ZexaF, @x0@aGbBpmhi, ABRisk, QMYD, Attribute, HighConfidence, malicious, high confidence, AEWZ, score, Generic@AI, RDML, uGA8, e3H2FlUP9SOAUUilQ, Malware@#lf2h65387aqp, AGEN, ehea, Phonzy, kcloud, Malgent, Detected, Artemis, ai score=100, Unsafe, Chgt, R002H0CKE22, Sgil, Static AI, Suspicious PE, PossibleThreat, FileRepMalware)
md5 8cd1ea50f8f4c45055400e70da52b326
sha256 66552cbe03b205cba08a2524fb93303dec5edf51188758b08d12624db1ee73e1
ssdeep 98304:Zr+dbd33oSpsJu9oR+bY11UhoIwBOqF85EiqrvBb2s4U5OoNkI9xFvPrBtOs6ha:x+BzpWu891ZDBOr+iqrpbTLp/U
imphash cf016c4fba6ba7bde12c075b1bf716d1
impfuzzy 24:NlD7P10teX7MdlJeDc+pl39YoBUSOovbO3iv2GMD5:DeteX7Mic+ppCX30C5
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 48 AntiVirus engines on VirusTotal as malicious
notice A process attempted to delay the analysis task.
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x415000 GetCurrentProcess
 0x415004 GetStdHandle
 0x415008 GetCurrentThread
 0x41500c LoadLibraryA
 0x415010 FreeConsole
 0x415014 GetProcAddress
 0x415018 GetCurrentProcessId
 0x41501c GetConsoleWindow
 0x415020 GetEnvironmentStringsW
 0x415024 WriteConsoleW
 0x415028 CloseHandle
 0x41502c CreateFileW
 0x415030 UnhandledExceptionFilter
 0x415034 SetUnhandledExceptionFilter
 0x415038 TerminateProcess
 0x41503c IsProcessorFeaturePresent
 0x415040 QueryPerformanceCounter
 0x415044 GetCurrentThreadId
 0x415048 GetSystemTimeAsFileTime
 0x41504c InitializeSListHead
 0x415050 IsDebuggerPresent
 0x415054 GetStartupInfoW
 0x415058 GetModuleHandleW
 0x41505c RtlUnwind
 0x415060 RaiseException
 0x415064 GetLastError
 0x415068 SetLastError
 0x41506c EncodePointer
 0x415070 EnterCriticalSection
 0x415074 LeaveCriticalSection
 0x415078 DeleteCriticalSection
 0x41507c InitializeCriticalSectionAndSpinCount
 0x415080 TlsAlloc
 0x415084 TlsGetValue
 0x415088 TlsSetValue
 0x41508c TlsFree
 0x415090 FreeLibrary
 0x415094 LoadLibraryExW
 0x415098 WriteFile
 0x41509c GetModuleFileNameW
 0x4150a0 ExitProcess
 0x4150a4 GetModuleHandleExW
 0x4150a8 HeapAlloc
 0x4150ac HeapFree
 0x4150b0 FindClose
 0x4150b4 FindFirstFileExW
 0x4150b8 FindNextFileW
 0x4150bc IsValidCodePage
 0x4150c0 GetACP
 0x4150c4 GetOEMCP
 0x4150c8 GetCPInfo
 0x4150cc GetCommandLineA
 0x4150d0 GetCommandLineW
 0x4150d4 MultiByteToWideChar
 0x4150d8 WideCharToMultiByte
 0x4150dc FreeEnvironmentStringsW
 0x4150e0 SetStdHandle
 0x4150e4 GetFileType
 0x4150e8 GetStringTypeW
 0x4150ec LCMapStringW
 0x4150f0 GetProcessHeap
 0x4150f4 HeapSize
 0x4150f8 HeapReAlloc
 0x4150fc FlushFileBuffers
 0x415100 GetConsoleOutputCP
 0x415104 GetConsoleMode
 0x415108 SetFilePointerEx
 0x41510c DecodePointer
USER32.dll
 0x415114 GetCapture

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure