Report - f2f16bc7-e50f-45d2-9d83-c860d538d8ed

UPX Malicious Library OS Processor Check PE32 PE File
ScreenShot
Created 2023.03.20 09:47 Machine s1_win7_x6403
Filename f2f16bc7-e50f-45d2-9d83-c860d538d8ed
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
3.8
ZERO API file : malware
VT API (file) 20 detected (AIDetectNet, malicious, high confidence, Save, confidence, Attribute, HighConfidence, VMProtect, score, Generic ML PUA, Static AI, Suspicious PE, Sabsik, Generic@AI, RDML, fD7xnyp691p8Vr4OIQrX6A, susgen, ZexaF, @J0@aa@hO@hi)
md5 f5d957a42f578847664cacb8a4c3d695
sha256 00978d16ecc2b0f6cf039b3bef087a8542d2092d8f95f36104f2329f7bf362dc
ssdeep 196608:ZOtzW0BrGc/4GmLcBh8YSZIEqsyZr2caC78:kVW6Gc//B/xEh+a
imphash f0e8db307701582115b12426e04e3928
impfuzzy 96:AJcpVY3S1RtaMDpJE0j21AXJ+Zcp+qjwSttLyuua:/J1Z+Ra
  Network IP location

Signature (9cnts)

Level Description
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Queries information on disks
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.106.92.104 RU NTX Technologies s.r.o. 185.106.92.104 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x838000 DeviceIoControl
 0x838004 CreateToolhelp32Snapshot
 0x838008 GetTickCount64
 0x83800c Process32NextW
 0x838010 CreateFileA
 0x838014 Process32FirstW
 0x838018 CloseHandle
 0x83801c GetSystemInfo
 0x838020 GetProcAddress
 0x838024 GlobalMemoryStatusEx
 0x838028 GetModuleFileNameA
 0x83802c IsDebuggerPresent
 0x838030 GetComputerNameA
 0x838034 Sleep
 0x838038 CreateDirectoryA
 0x83803c WriteConsoleW
 0x838040 HeapSize
 0x838044 CreateFileW
 0x838048 GetProcessHeap
 0x83804c SetStdHandle
 0x838050 SetEnvironmentVariableW
 0x838054 FreeEnvironmentStringsW
 0x838058 GlobalUnlock
 0x83805c GlobalLock
 0x838060 GlobalFree
 0x838064 GetModuleHandleW
 0x838068 GlobalAlloc
 0x83806c GetEnvironmentStringsW
 0x838070 GetOEMCP
 0x838074 GetACP
 0x838078 IsValidCodePage
 0x83807c FindNextFileW
 0x838080 FindFirstFileExW
 0x838084 FindClose
 0x838088 MultiByteToWideChar
 0x83808c WideCharToMultiByte
 0x838090 LCMapStringEx
 0x838094 EnterCriticalSection
 0x838098 LeaveCriticalSection
 0x83809c InitializeCriticalSectionEx
 0x8380a0 DeleteCriticalSection
 0x8380a4 EncodePointer
 0x8380a8 DecodePointer
 0x8380ac CompareStringEx
 0x8380b0 GetCPInfo
 0x8380b4 GetStringTypeW
 0x8380b8 IsProcessorFeaturePresent
 0x8380bc QueryPerformanceCounter
 0x8380c0 GetCurrentProcessId
 0x8380c4 GetCurrentThreadId
 0x8380c8 GetSystemTimeAsFileTime
 0x8380cc InitializeSListHead
 0x8380d0 UnhandledExceptionFilter
 0x8380d4 SetUnhandledExceptionFilter
 0x8380d8 GetStartupInfoW
 0x8380dc GetCurrentProcess
 0x8380e0 TerminateProcess
 0x8380e4 RtlUnwind
 0x8380e8 RaiseException
 0x8380ec GetLastError
 0x8380f0 SetLastError
 0x8380f4 InitializeCriticalSectionAndSpinCount
 0x8380f8 TlsAlloc
 0x8380fc TlsGetValue
 0x838100 TlsSetValue
 0x838104 TlsFree
 0x838108 FreeLibrary
 0x83810c LoadLibraryExW
 0x838110 GetStdHandle
 0x838114 WriteFile
 0x838118 GetModuleFileNameW
 0x83811c ExitProcess
 0x838120 GetModuleHandleExW
 0x838124 GetCommandLineA
 0x838128 GetCommandLineW
 0x83812c HeapReAlloc
 0x838130 CompareStringW
 0x838134 LCMapStringW
 0x838138 GetLocaleInfoW
 0x83813c IsValidLocale
 0x838140 GetUserDefaultLCID
 0x838144 EnumSystemLocalesW
 0x838148 HeapFree
 0x83814c GetFileSizeEx
 0x838150 SetFilePointerEx
 0x838154 GetFileType
 0x838158 FlushFileBuffers
 0x83815c GetConsoleOutputCP
 0x838160 GetConsoleMode
 0x838164 HeapAlloc
 0x838168 ReadFile
 0x83816c ReadConsoleW
 0x838170 SetEndOfFile
USER32.dll
 0x838178 EmptyClipboard
 0x83817c GetClipboardData
 0x838180 OpenClipboard
 0x838184 CloseClipboard
 0x838188 SetClipboardData
ADVAPI32.dll
 0x838190 RegSetValueExA
 0x838194 RegOpenKeyExW
 0x838198 GetUserNameA
 0x83819c RegCloseKey
SHELL32.dll
 0x8381a4 ShellExecuteA
 0x8381a8 SHGetFolderPathA
WININET.dll
 0x8381b0 InternetCloseHandle
 0x8381b4 HttpOpenRequestA
 0x8381b8 InternetOpenA
 0x8381bc HttpSendRequestW
 0x8381c0 InternetConnectA
 0x8381c4 InternetReadFile
KERNEL32.dll
 0x8381cc GetSystemTimeAsFileTime
 0x8381d0 GetModuleHandleA
 0x8381d4 CreateEventA
 0x8381d8 GetModuleFileNameW
 0x8381dc TerminateProcess
 0x8381e0 GetCurrentProcess
 0x8381e4 CreateToolhelp32Snapshot
 0x8381e8 Thread32First
 0x8381ec GetCurrentProcessId
 0x8381f0 GetCurrentThreadId
 0x8381f4 OpenThread
 0x8381f8 Thread32Next
 0x8381fc CloseHandle
 0x838200 SuspendThread
 0x838204 ResumeThread
 0x838208 WriteProcessMemory
 0x83820c GetSystemInfo
 0x838210 VirtualAlloc
 0x838214 VirtualProtect
 0x838218 VirtualFree
 0x83821c GetProcessAffinityMask
 0x838220 SetProcessAffinityMask
 0x838224 GetCurrentThread
 0x838228 SetThreadAffinityMask
 0x83822c Sleep
 0x838230 LoadLibraryA
 0x838234 FreeLibrary
 0x838238 GetTickCount
 0x83823c SystemTimeToFileTime
 0x838240 FileTimeToSystemTime
 0x838244 GlobalFree
 0x838248 LocalAlloc
 0x83824c LocalFree
 0x838250 GetProcAddress
 0x838254 ExitProcess
 0x838258 EnterCriticalSection
 0x83825c LeaveCriticalSection
 0x838260 InitializeCriticalSection
 0x838264 DeleteCriticalSection
 0x838268 GetModuleHandleW
 0x83826c LoadResource
 0x838270 MultiByteToWideChar
 0x838274 FindResourceExW
 0x838278 FindResourceExA
 0x83827c WideCharToMultiByte
 0x838280 GetThreadLocale
 0x838284 GetUserDefaultLCID
 0x838288 GetSystemDefaultLCID
 0x83828c EnumResourceNamesA
 0x838290 EnumResourceNamesW
 0x838294 EnumResourceLanguagesA
 0x838298 EnumResourceLanguagesW
 0x83829c EnumResourceTypesA
 0x8382a0 EnumResourceTypesW
 0x8382a4 CreateFileW
 0x8382a8 LoadLibraryW
 0x8382ac GetLastError
 0x8382b0 FlushFileBuffers
 0x8382b4 WriteConsoleW
 0x8382b8 SetStdHandle
 0x8382bc IsProcessorFeaturePresent
 0x8382c0 DecodePointer
 0x8382c4 GetCommandLineA
 0x8382c8 RaiseException
 0x8382cc HeapFree
 0x8382d0 GetCPInfo
 0x8382d4 InterlockedIncrement
 0x8382d8 InterlockedDecrement
 0x8382dc GetACP
 0x8382e0 GetOEMCP
 0x8382e4 IsValidCodePage
 0x8382e8 EncodePointer
 0x8382ec TlsAlloc
 0x8382f0 TlsGetValue
 0x8382f4 TlsSetValue
 0x8382f8 TlsFree
 0x8382fc SetLastError
 0x838300 UnhandledExceptionFilter
 0x838304 SetUnhandledExceptionFilter
 0x838308 IsDebuggerPresent
 0x83830c HeapAlloc
 0x838310 LCMapStringW
 0x838314 GetStringTypeW
 0x838318 SetHandleCount
 0x83831c GetStdHandle
 0x838320 InitializeCriticalSectionAndSpinCount
 0x838324 GetFileType
 0x838328 GetStartupInfoW
 0x83832c GetModuleFileNameA
 0x838330 FreeEnvironmentStringsW
 0x838334 GetEnvironmentStringsW
 0x838338 HeapCreate
 0x83833c HeapDestroy
 0x838340 QueryPerformanceCounter
 0x838344 HeapSize
 0x838348 WriteFile
 0x83834c RtlUnwind
 0x838350 SetFilePointer
 0x838354 GetConsoleCP
 0x838358 GetConsoleMode
 0x83835c HeapReAlloc
 0x838360 VirtualQuery
USER32.dll
 0x838368 CharUpperBuffW
KERNEL32.dll
 0x838370 LocalAlloc
 0x838374 LocalFree
 0x838378 GetModuleFileNameW
 0x83837c ExitProcess
 0x838380 LoadLibraryA
 0x838384 GetModuleHandleA
 0x838388 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure