Report - rtpehnnzbxoa.exe

Generic Malware Malicious Library Malicious Packer UPX PE File PE64
ScreenShot
Created 2022.12.19 10:07 Machine s1_win7_x6403
Filename rtpehnnzbxoa.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
2
Behavior Score
1.4
ZERO API file : malware
VT API (file) 43 detected (PenTiumD, BroPass, malicious, high confidence, GenericKDZ, Abcv, TrojanPSW, Attribute, HighConfidence, a variant of WinGo, score, Convagent, CLOUD, AGEN, PRIVATELOADER, YXCLQZ, AdwareTskLnk, Sabsik, PSWTroj, kcloud, Trickbot, Detected, R535068, Artemis, ai score=83, QQPass, QQRob, Mzfl)
md5 31e5f2a6588723aadefaf5595482d955
sha256 0278ab4f0298aa6e8066c14cf2b0063a09ac96e8bac365ddf192092dc17b42af
ssdeep 49152:RfKECgAG4VFdurb/TxvO90d7HjmAFd4A64nsfJl6QnJ8FxaUbSCItEptH8uLuX2K:RIn+1uGgaMfUTEUAz2Xa/
imphash 57c9b357ae0cb2f414b0a5873e2f216d
impfuzzy 96:nB0xlCFX7+C4S5O1eTucwOcX8gXj+JG46BRqt3R:nK3CN774S5lTmXxt46Bct3R
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0xbc54fc AddVectoredExceptionHandler
 0xbc5504 AreFileApisANSI
 0xbc550c CloseHandle
 0xbc5514 CreateEventA
 0xbc551c CreateFileA
 0xbc5524 CreateFileMappingA
 0xbc552c CreateFileMappingW
 0xbc5534 CreateFileW
 0xbc553c CreateIoCompletionPort
 0xbc5544 CreateMutexW
 0xbc554c CreateThread
 0xbc5554 CreateWaitableTimerA
 0xbc555c CreateWaitableTimerExW
 0xbc5564 DeleteCriticalSection
 0xbc556c DeleteFileA
 0xbc5574 DeleteFileW
 0xbc557c DuplicateHandle
 0xbc5584 EnterCriticalSection
 0xbc558c ExitProcess
 0xbc5594 FlushFileBuffers
 0xbc559c FlushViewOfFile
 0xbc55a4 FormatMessageA
 0xbc55ac FormatMessageW
 0xbc55b4 FreeEnvironmentStringsW
 0xbc55bc FreeLibrary
 0xbc55c4 GetConsoleMode
 0xbc55cc GetCurrentProcess
 0xbc55d4 GetCurrentProcessId
 0xbc55dc GetCurrentThreadId
 0xbc55e4 GetDiskFreeSpaceA
 0xbc55ec GetDiskFreeSpaceW
 0xbc55f4 GetEnvironmentStringsW
 0xbc55fc GetFileAttributesA
 0xbc5604 GetFileAttributesExW
 0xbc560c GetFileAttributesW
 0xbc5614 GetFileSize
 0xbc561c GetFullPathNameA
 0xbc5624 GetFullPathNameW
 0xbc562c GetLastError
 0xbc5634 GetProcAddress
 0xbc563c GetProcessAffinityMask
 0xbc5644 GetProcessHeap
 0xbc564c GetQueuedCompletionStatusEx
 0xbc5654 GetStartupInfoA
 0xbc565c GetStdHandle
 0xbc5664 GetSystemDirectoryA
 0xbc566c GetSystemInfo
 0xbc5674 GetSystemTime
 0xbc567c GetSystemTimeAsFileTime
 0xbc5684 GetTempPathA
 0xbc568c GetTempPathW
 0xbc5694 GetThreadContext
 0xbc569c GetTickCount
 0xbc56a4 GetVersionExA
 0xbc56ac GetVersionExW
 0xbc56b4 HeapAlloc
 0xbc56bc HeapCompact
 0xbc56c4 HeapCreate
 0xbc56cc HeapDestroy
 0xbc56d4 HeapFree
 0xbc56dc HeapReAlloc
 0xbc56e4 HeapSize
 0xbc56ec HeapValidate
 0xbc56f4 InitializeCriticalSection
 0xbc56fc LeaveCriticalSection
 0xbc5704 LoadLibraryA
 0xbc570c LoadLibraryW
 0xbc5714 LocalFree
 0xbc571c LockFile
 0xbc5724 LockFileEx
 0xbc572c MapViewOfFile
 0xbc5734 MultiByteToWideChar
 0xbc573c OutputDebugStringA
 0xbc5744 OutputDebugStringW
 0xbc574c PostQueuedCompletionStatus
 0xbc5754 QueryPerformanceCounter
 0xbc575c ReadFile
 0xbc5764 ResumeThread
 0xbc576c RtlAddFunctionTable
 0xbc5774 RtlCaptureContext
 0xbc577c RtlLookupFunctionEntry
 0xbc5784 RtlVirtualUnwind
 0xbc578c SetConsoleCtrlHandler
 0xbc5794 SetEndOfFile
 0xbc579c SetErrorMode
 0xbc57a4 SetEvent
 0xbc57ac SetFilePointer
 0xbc57b4 SetProcessPriorityBoost
 0xbc57bc SetThreadContext
 0xbc57c4 SetUnhandledExceptionFilter
 0xbc57cc SetWaitableTimer
 0xbc57d4 Sleep
 0xbc57dc SuspendThread
 0xbc57e4 SwitchToThread
 0xbc57ec SystemTimeToFileTime
 0xbc57f4 TerminateProcess
 0xbc57fc TlsGetValue
 0xbc5804 TryEnterCriticalSection
 0xbc580c UnhandledExceptionFilter
 0xbc5814 UnlockFile
 0xbc581c UnlockFileEx
 0xbc5824 UnmapViewOfFile
 0xbc582c VirtualAlloc
 0xbc5834 VirtualFree
 0xbc583c VirtualProtect
 0xbc5844 VirtualQuery
 0xbc584c WaitForMultipleObjects
 0xbc5854 WaitForSingleObject
 0xbc585c WaitForSingleObjectEx
 0xbc5864 WideCharToMultiByte
 0xbc586c WriteConsoleW
 0xbc5874 WriteFile
 0xbc587c __C_specific_handler
msvcrt.dll
 0xbc588c __getmainargs
 0xbc5894 __initenv
 0xbc589c __iob_func
 0xbc58a4 __lconv_init
 0xbc58ac __set_app_type
 0xbc58b4 __setusermatherr
 0xbc58bc _acmdln
 0xbc58c4 _amsg_exit
 0xbc58cc _beginthread
 0xbc58d4 _beginthreadex
 0xbc58dc _cexit
 0xbc58e4 _endthreadex
 0xbc58ec _errno
 0xbc58f4 _fmode
 0xbc58fc _initterm
 0xbc5904 _localtime64
 0xbc590c _onexit
 0xbc5914 abort
 0xbc591c calloc
 0xbc5924 exit
 0xbc592c fprintf
 0xbc5934 free
 0xbc593c fwrite
 0xbc5944 malloc
 0xbc594c memcmp
 0xbc5954 memcpy
 0xbc595c memmove
 0xbc5964 memset
 0xbc596c qsort
 0xbc5974 realloc
 0xbc597c signal
 0xbc5984 strcmp
 0xbc598c strcspn
 0xbc5994 strlen
 0xbc599c strncmp
 0xbc59a4 strrchr
 0xbc59ac vfprintf

EAT(Export Address Table) Library

0xbc3e10 _cgo_dummy_export
0x733a60 authorizerTrampoline
0x733780 callbackTrampoline
0x733940 commitHookTrampoline
0x7338a0 compareTrampoline
0x733850 doneTrampoline
0x733ae0 preUpdateHookTrampoline
0x7339a0 rollbackHookTrampoline
0x7337e0 stepTrampoline
0x7339f0 updateHookTrampoline


Similarity measure (PE file only) - Checking for service failure