Report - pb1105.exe

Malicious Library VMProtect PE File PE64
ScreenShot
Created 2022.12.08 16:24 Machine s1_win7_x6403
Filename pb1105.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
6
Behavior Score
2.0
ZERO API file : malware
VT API (file) 26 detected (Unsafe, VMProtect, Eldorado, Attribute, HighConfidence, malicious, high confidence, L suspicious, Fabookie, AGEN, CoinMiner, score, Generic ML PUA, Static AI, Suspicious PE, Detected, Wacatac, R536217, mWGo1POf65L)
md5 ec7b5f5ae9b483d08fcbbe0d1f02752d
sha256 38bd43cab9e6f0ac78c43b4277805dd3c6643ce5d119497ce06122acbf3e7d30
ssdeep 49152:dbrlG3UY0v7ml0aq3bVmSd6EqGLKVw9qvDbHepLb6jyhR9lKufDQ2sREpW3ez++w:Frlcl0dRdd7LKQ83eNbhhRqnD
imphash 5222e722e78d4a06ff55b37fdde0c333
impfuzzy 6:T7REWN7Ag/JLGDgJLgJtXIKFJQQZ/OIA+m1BJAEnERGDfA7VSNLAcPh/MKm:T7Rr3ZGoQtXJxZGb9AJcDfA5kLfP9m
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14043b000 ReadFile
WINHTTP.dll
 0x14043b010 WinHttpCloseHandle
KERNEL32.dll
 0x14043b020 LocalAlloc
 0x14043b028 LocalFree
 0x14043b030 GetModuleFileNameW
 0x14043b038 GetProcessAffinityMask
 0x14043b040 SetProcessAffinityMask
 0x14043b048 SetThreadAffinityMask
 0x14043b050 Sleep
 0x14043b058 ExitProcess
 0x14043b060 FreeLibrary
 0x14043b068 LoadLibraryA
 0x14043b070 GetModuleHandleA
 0x14043b078 GetProcAddress
USER32.dll
 0x14043b088 GetProcessWindowStation
 0x14043b090 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure