Report - bebra.exe

Generic Malware Malicious Packer Malicious Library UPX PE File PE64
ScreenShot
Created 2023.01.22 15:48 Machine s1_win7_x6401
Filename bebra.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
2
Behavior Score
1.4
ZERO API file : malware
VT API (file) 45 detected (PiuffTrojanX, Convagent, GenericKDZ, Trojanpws, Artemis, Unsafe, WinGo, ABRisk, BWYE, Attribute, HighConfidence, a variant of WinGo, Malicious, score, Agen, Majl, AdwareTskLnk, Outbreak, PSWTroj, kcloud, Sabsik, Malware@#7g29j9e3gdh0, Casdet, Detected, R544858, ai score=80, R002H0CAI23, CLOUD, Chgt)
md5 7c3c33a79f460a4536433f5ba99b3fcd
sha256 88dbf134cd4628fc8b97cc1adf5201cae875df1fa5280b3cbc0306478161e9f4
ssdeep 49152:x+ECdxFuMK6Vrb/ThvO90d7HjmAFd4A64nsfJLlvUL8kx/rGEai2XIggXoHmKq8d:wqEXzBhXvZvlTEgAzG5a
imphash 57c9b357ae0cb2f414b0a5873e2f216d
impfuzzy 96:nB0xlCFX7+C4S5O1eTucwOcX8gXj+JG46BRqt3R:nK3CN774S5lTmXxt46Bct3R
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0xbc84fc AddVectoredExceptionHandler
 0xbc8504 AreFileApisANSI
 0xbc850c CloseHandle
 0xbc8514 CreateEventA
 0xbc851c CreateFileA
 0xbc8524 CreateFileMappingA
 0xbc852c CreateFileMappingW
 0xbc8534 CreateFileW
 0xbc853c CreateIoCompletionPort
 0xbc8544 CreateMutexW
 0xbc854c CreateThread
 0xbc8554 CreateWaitableTimerA
 0xbc855c CreateWaitableTimerExW
 0xbc8564 DeleteCriticalSection
 0xbc856c DeleteFileA
 0xbc8574 DeleteFileW
 0xbc857c DuplicateHandle
 0xbc8584 EnterCriticalSection
 0xbc858c ExitProcess
 0xbc8594 FlushFileBuffers
 0xbc859c FlushViewOfFile
 0xbc85a4 FormatMessageA
 0xbc85ac FormatMessageW
 0xbc85b4 FreeEnvironmentStringsW
 0xbc85bc FreeLibrary
 0xbc85c4 GetConsoleMode
 0xbc85cc GetCurrentProcess
 0xbc85d4 GetCurrentProcessId
 0xbc85dc GetCurrentThreadId
 0xbc85e4 GetDiskFreeSpaceA
 0xbc85ec GetDiskFreeSpaceW
 0xbc85f4 GetEnvironmentStringsW
 0xbc85fc GetFileAttributesA
 0xbc8604 GetFileAttributesExW
 0xbc860c GetFileAttributesW
 0xbc8614 GetFileSize
 0xbc861c GetFullPathNameA
 0xbc8624 GetFullPathNameW
 0xbc862c GetLastError
 0xbc8634 GetProcAddress
 0xbc863c GetProcessAffinityMask
 0xbc8644 GetProcessHeap
 0xbc864c GetQueuedCompletionStatusEx
 0xbc8654 GetStartupInfoA
 0xbc865c GetStdHandle
 0xbc8664 GetSystemDirectoryA
 0xbc866c GetSystemInfo
 0xbc8674 GetSystemTime
 0xbc867c GetSystemTimeAsFileTime
 0xbc8684 GetTempPathA
 0xbc868c GetTempPathW
 0xbc8694 GetThreadContext
 0xbc869c GetTickCount
 0xbc86a4 GetVersionExA
 0xbc86ac GetVersionExW
 0xbc86b4 HeapAlloc
 0xbc86bc HeapCompact
 0xbc86c4 HeapCreate
 0xbc86cc HeapDestroy
 0xbc86d4 HeapFree
 0xbc86dc HeapReAlloc
 0xbc86e4 HeapSize
 0xbc86ec HeapValidate
 0xbc86f4 InitializeCriticalSection
 0xbc86fc LeaveCriticalSection
 0xbc8704 LoadLibraryA
 0xbc870c LoadLibraryW
 0xbc8714 LocalFree
 0xbc871c LockFile
 0xbc8724 LockFileEx
 0xbc872c MapViewOfFile
 0xbc8734 MultiByteToWideChar
 0xbc873c OutputDebugStringA
 0xbc8744 OutputDebugStringW
 0xbc874c PostQueuedCompletionStatus
 0xbc8754 QueryPerformanceCounter
 0xbc875c ReadFile
 0xbc8764 ResumeThread
 0xbc876c RtlAddFunctionTable
 0xbc8774 RtlCaptureContext
 0xbc877c RtlLookupFunctionEntry
 0xbc8784 RtlVirtualUnwind
 0xbc878c SetConsoleCtrlHandler
 0xbc8794 SetEndOfFile
 0xbc879c SetErrorMode
 0xbc87a4 SetEvent
 0xbc87ac SetFilePointer
 0xbc87b4 SetProcessPriorityBoost
 0xbc87bc SetThreadContext
 0xbc87c4 SetUnhandledExceptionFilter
 0xbc87cc SetWaitableTimer
 0xbc87d4 Sleep
 0xbc87dc SuspendThread
 0xbc87e4 SwitchToThread
 0xbc87ec SystemTimeToFileTime
 0xbc87f4 TerminateProcess
 0xbc87fc TlsGetValue
 0xbc8804 TryEnterCriticalSection
 0xbc880c UnhandledExceptionFilter
 0xbc8814 UnlockFile
 0xbc881c UnlockFileEx
 0xbc8824 UnmapViewOfFile
 0xbc882c VirtualAlloc
 0xbc8834 VirtualFree
 0xbc883c VirtualProtect
 0xbc8844 VirtualQuery
 0xbc884c WaitForMultipleObjects
 0xbc8854 WaitForSingleObject
 0xbc885c WaitForSingleObjectEx
 0xbc8864 WideCharToMultiByte
 0xbc886c WriteConsoleW
 0xbc8874 WriteFile
 0xbc887c __C_specific_handler
msvcrt.dll
 0xbc888c __getmainargs
 0xbc8894 __initenv
 0xbc889c __iob_func
 0xbc88a4 __lconv_init
 0xbc88ac __set_app_type
 0xbc88b4 __setusermatherr
 0xbc88bc _acmdln
 0xbc88c4 _amsg_exit
 0xbc88cc _beginthread
 0xbc88d4 _beginthreadex
 0xbc88dc _cexit
 0xbc88e4 _endthreadex
 0xbc88ec _errno
 0xbc88f4 _fmode
 0xbc88fc _initterm
 0xbc8904 _localtime64
 0xbc890c _onexit
 0xbc8914 abort
 0xbc891c calloc
 0xbc8924 exit
 0xbc892c fprintf
 0xbc8934 free
 0xbc893c fwrite
 0xbc8944 malloc
 0xbc894c memcmp
 0xbc8954 memcpy
 0xbc895c memmove
 0xbc8964 memset
 0xbc896c qsort
 0xbc8974 realloc
 0xbc897c signal
 0xbc8984 strcmp
 0xbc898c strcspn
 0xbc8994 strlen
 0xbc899c strncmp
 0xbc89a4 strrchr
 0xbc89ac vfprintf

EAT(Export Address Table) Library

0xbc6e50 _cgo_dummy_export
0x734640 authorizerTrampoline
0x734360 callbackTrampoline
0x734520 commitHookTrampoline
0x734480 compareTrampoline
0x734430 doneTrampoline
0x7346c0 preUpdateHookTrampoline
0x734580 rollbackHookTrampoline
0x7343c0 stepTrampoline
0x7345d0 updateHookTrampoline


Similarity measure (PE file only) - Checking for service failure