Report - server.exe

Generic Malware UPX Malicious Library OS Processor Check PE32 PE File
ScreenShot
Created 2023.03.21 17:48 Machine s1_win7_x6402
Filename server.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
2.0
ZERO API file : clean
VT API (file) 27 detected (AIDetectNet, malicious, high confidence, score, Save, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, HTCA, Zenpak, CrypterX, Lockbit, high, STOP, Sabsik, Detected, GenericRXVP, Azorult, unsafe, CLASSIC, Static AI, Suspicious PE, susgen)
md5 68d4bfeb87777e1c8766088077822341
sha256 308110773533c5740fd92d77094da83152f98230cd9635bc8f7dcd7dce910c75
ssdeep 3072:MB324Mujr+zpEwSQCah3vidXxwz45BGyEG:F4vDwSxOWxwU5BG
imphash 0c16d61a145a6038e0c4acd3e1db8764
impfuzzy 24:3bG2AtrckWdmm8uvdpV473JcDD1QvOgIPOAOovhzIlyv9jtU8j8EhI3T4+ojMAgk:yhSSO10O5OvAcK9jtrL8cvgAj
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x401000 PulseEvent
 0x401004 SetDefaultCommConfigA
 0x401008 FindFirstFileW
 0x40100c EnumCalendarInfoA
 0x401010 _llseek
 0x401014 GetConsoleAliasA
 0x401018 GetCurrentProcess
 0x40101c InterlockedCompareExchange
 0x401020 SleepEx
 0x401024 GetWindowsDirectoryA
 0x401028 EnumTimeFormatsW
 0x40102c WriteFileGather
 0x401030 EnumResourceTypesA
 0x401034 ActivateActCtx
 0x401038 GlobalAlloc
 0x40103c GetFirmwareEnvironmentVariableA
 0x401040 LoadLibraryW
 0x401044 Sleep
 0x401048 ReadConsoleInputA
 0x40104c LeaveCriticalSection
 0x401050 GetFileAttributesW
 0x401054 WritePrivateProfileSectionW
 0x401058 TerminateProcess
 0x40105c IsDBCSLeadByte
 0x401060 lstrcmpW
 0x401064 GlobalUnlock
 0x401068 RaiseException
 0x40106c SetLastError
 0x401070 GetProcAddress
 0x401074 GlobalGetAtomNameA
 0x401078 OpenWaitableTimerA
 0x40107c AddAtomA
 0x401080 FindFirstVolumeMountPointA
 0x401084 GetModuleHandleA
 0x401088 FindNextFileW
 0x40108c GetShortPathNameW
 0x401090 GetCPInfoExA
 0x401094 SetCalendarInfoA
 0x401098 ReadConsoleInputW
 0x40109c DeleteFileW
 0x4010a0 EnumCalendarInfoExA
 0x4010a4 LocalFree
 0x4010a8 CopyFileExA
 0x4010ac GetLastError
 0x4010b0 DeleteFileA
 0x4010b4 GetCommandLineA
 0x4010b8 HeapSetInformation
 0x4010bc GetStartupInfoW
 0x4010c0 EnterCriticalSection
 0x4010c4 SetFilePointer
 0x4010c8 SetHandleCount
 0x4010cc GetStdHandle
 0x4010d0 InitializeCriticalSectionAndSpinCount
 0x4010d4 GetFileType
 0x4010d8 DeleteCriticalSection
 0x4010dc UnhandledExceptionFilter
 0x4010e0 SetUnhandledExceptionFilter
 0x4010e4 IsDebuggerPresent
 0x4010e8 EncodePointer
 0x4010ec DecodePointer
 0x4010f0 GetModuleHandleW
 0x4010f4 ExitProcess
 0x4010f8 WriteFile
 0x4010fc GetModuleFileNameW
 0x401100 GetModuleFileNameA
 0x401104 FreeEnvironmentStringsW
 0x401108 WideCharToMultiByte
 0x40110c GetEnvironmentStringsW
 0x401110 TlsAlloc
 0x401114 TlsGetValue
 0x401118 TlsSetValue
 0x40111c TlsFree
 0x401120 InterlockedIncrement
 0x401124 GetCurrentThreadId
 0x401128 InterlockedDecrement
 0x40112c HeapCreate
 0x401130 QueryPerformanceCounter
 0x401134 GetTickCount
 0x401138 GetCurrentProcessId
 0x40113c GetSystemTimeAsFileTime
 0x401140 HeapFree
 0x401144 SetStdHandle
 0x401148 GetConsoleCP
 0x40114c GetConsoleMode
 0x401150 FlushFileBuffers
 0x401154 RtlUnwind
 0x401158 GetCPInfo
 0x40115c GetACP
 0x401160 GetOEMCP
 0x401164 IsValidCodePage
 0x401168 HeapAlloc
 0x40116c HeapReAlloc
 0x401170 WriteConsoleW
 0x401174 MultiByteToWideChar
 0x401178 IsProcessorFeaturePresent
 0x40117c LCMapStringW
 0x401180 GetStringTypeW
 0x401184 HeapSize
 0x401188 CloseHandle
 0x40118c CreateFileW
USER32.dll
 0x401194 LoadMenuA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure