Report - aa.exe

Malicious Library UPX PE32 OS Processor Check PE File
ScreenShot
Created 2023.01.26 11:09 Machine s1_win7_x6401
Filename aa.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score Not founds Behavior Score
2.0
ZERO API file : clean
VT API (file) 40 detected (malicious, high confidence, GenericKDZ, Unsafe, Save, ZexaF, @tW@aeGmUuKe, Kryptik, Eldorado, HNYD, Mikey, ET#85%, RDMK, cmRtazqWyLW, bwChOVjL2d4meqOC, A + Mal, Siggen16, Static AI, Suspicious PE, 16VOW5Z, dube, ASMalwS, StopCrypt, score, MalPE, R463375, ai score=83, BScope, Convagent, GdSda, KigWFWB16O4, susgen, GenKryptik, ERHN, CrypterX, confidence)
md5 4901ce4dd0d78d01170732498f3e8c49
sha256 ecb21bb34f3981624dc19bc634c3f085275cb53d542f460304307e8febe2f295
ssdeep 49152:zTQrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr7:z
imphash 7e7dada750fd85eb5f5f9954ddaa9f24
impfuzzy 24:2krklbkP1+YyYSpJcDaoZy4ftgcfdYuehwIeyv5HuO2T4QjMFl9hjM2l9n:5uuZtgcfFeeIL2cd14U9
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x412000 DosDateTimeToFileTime
 0x412004 GetConsoleAliasesLengthW
 0x412008 GetStringTypeA
 0x41200c FindResourceExW
 0x412010 InterlockedIncrement
 0x412014 GetConsoleAliasA
 0x412018 GetCurrentActCtx
 0x41201c WriteConsoleInputA
 0x412020 GetConsoleTitleA
 0x412024 ReadConsoleW
 0x412028 SetFileTime
 0x41202c InitializeCriticalSection
 0x412030 GlobalAlloc
 0x412034 GetLocaleInfoW
 0x412038 ReadConsoleInputA
 0x41203c ReadFileScatter
 0x412040 GetVersionExW
 0x412044 GetWriteWatch
 0x412048 GetFileAttributesW
 0x41204c WriteConsoleW
 0x412050 TerminateProcess
 0x412054 SetComputerNameExW
 0x412058 CreateActCtxA
 0x41205c SetLastError
 0x412060 GetProcAddress
 0x412064 GetLongPathNameA
 0x412068 VirtualAlloc
 0x41206c HeapUnlock
 0x412070 GetAtomNameA
 0x412074 DnsHostnameToComputerNameA
 0x412078 OpenJobObjectW
 0x41207c GetModuleFileNameA
 0x412080 SetConsoleTitleW
 0x412084 GetModuleHandleA
 0x412088 ReleaseMutex
 0x41208c EnumCalendarInfoExA
 0x412090 CreateThread
 0x412094 SwitchToThread
 0x412098 HeapAlloc
 0x41209c GetStartupInfoW
 0x4120a0 GetCurrentProcess
 0x4120a4 UnhandledExceptionFilter
 0x4120a8 SetUnhandledExceptionFilter
 0x4120ac IsDebuggerPresent
 0x4120b0 DeleteCriticalSection
 0x4120b4 LeaveCriticalSection
 0x4120b8 EnterCriticalSection
 0x4120bc HeapFree
 0x4120c0 VirtualFree
 0x4120c4 HeapReAlloc
 0x4120c8 HeapCreate
 0x4120cc GetModuleHandleW
 0x4120d0 Sleep
 0x4120d4 ExitProcess
 0x4120d8 WriteFile
 0x4120dc GetStdHandle
 0x4120e0 RtlUnwind
 0x4120e4 GetLastError
 0x4120e8 TlsGetValue
 0x4120ec TlsAlloc
 0x4120f0 TlsSetValue
 0x4120f4 TlsFree
 0x4120f8 GetCurrentThreadId
 0x4120fc InterlockedDecrement
 0x412100 SetHandleCount
 0x412104 GetFileType
 0x412108 GetStartupInfoA
 0x41210c GetModuleFileNameW
 0x412110 FreeEnvironmentStringsW
 0x412114 GetEnvironmentStringsW
 0x412118 GetCommandLineW
 0x41211c QueryPerformanceCounter
 0x412120 GetTickCount
 0x412124 GetCurrentProcessId
 0x412128 GetSystemTimeAsFileTime
 0x41212c SetFilePointer
 0x412130 WideCharToMultiByte
 0x412134 GetConsoleCP
 0x412138 GetConsoleMode
 0x41213c GetCPInfo
 0x412140 GetACP
 0x412144 GetOEMCP
 0x412148 IsValidCodePage
 0x41214c InitializeCriticalSectionAndSpinCount
 0x412150 LoadLibraryA
 0x412154 CloseHandle
 0x412158 CreateFileA
 0x41215c RaiseException
 0x412160 SetStdHandle
 0x412164 WriteConsoleA
 0x412168 GetConsoleOutputCP
 0x41216c MultiByteToWideChar
 0x412170 LCMapStringA
 0x412174 LCMapStringW
 0x412178 GetStringTypeW
 0x41217c GetLocaleInfoA
 0x412180 HeapSize
 0x412184 FlushFileBuffers
 0x412188 SetEndOfFile
 0x41218c GetProcessHeap
 0x412190 ReadFile
USER32.dll
 0x412198 ShowCaret

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure