Report - cc1be3c6d243a4d8f90e87c84709d44fe442722f59d42b8f18d41f017958bcbc_2688-517c38c042288036.exe_

Gen1 UPX Malicious Packer PE32 PE File
ScreenShot
Created 2023.04.02 13:08 Machine s1_win7_x6401
Filename cc1be3c6d243a4d8f90e87c84709d44fe442722f59d42b8f18d41f017958bcbc_2688-517c38c042288036.exe_
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
0.6
ZERO API file : clean
VT API (file) 1 detected (score)
md5 9fddc313ba5774bdc646aef46d2de313
sha256 cc1be3c6d243a4d8f90e87c84709d44fe442722f59d42b8f18d41f017958bcbc
ssdeep 768:jDNXOLLFM1taXSRqbSEln5IyYpamDjobj8SpM:fNixM16SRqln5IUmDjoXV
imphash ef8a44fe2f9ad4ab85e55004aaa024a9
impfuzzy 48:9ueKK9Mg5dFSV8KUmCSYv/KAS5RkoOX0W+j/gjd50XG5KbbsK:o7K2gDFSV8K8q9cdQG5KbbJ
  Network IP location

Signature (2cnts)

Level Description
notice File has been identified by one AntiVirus engine on VirusTotal as malicious
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x941000 HeapSetInformation
 0x941004 QueryActCtxW
 0x941008 CloseHandle
 0x94100c SetFilePointer
 0x941010 ReadFile
 0x941014 CreateFileW
 0x941018 LocalFree
 0x94101c lstrlenA
 0x941020 WideCharToMultiByte
 0x941024 LocalAlloc
 0x941028 lstrlenW
 0x94102c GetProcAddress
 0x941030 WaitForSingleObject
 0x941034 CreateProcessW
 0x941038 GetCommandLineW
 0x94103c Wow64EnableWow64FsRedirection
 0x941040 GetSystemDirectoryW
 0x941044 GetNativeSystemInfo
 0x941048 IsWow64Process
 0x94104c GetCurrentProcess
 0x941050 SetProcessDEPPolicy
 0x941054 FormatMessageW
 0x941058 GetLastError
 0x94105c LoadLibraryExW
 0x941060 FreeLibrary
 0x941064 ExitProcess
 0x941068 SetErrorMode
 0x94106c DelayLoadFailureHook
 0x941070 InterlockedCompareExchange
 0x941074 LoadLibraryExA
 0x941078 Sleep
 0x94107c GetStartupInfoW
 0x941080 InterlockedExchange
 0x941084 SetUnhandledExceptionFilter
 0x941088 GetModuleHandleA
 0x94108c QueryPerformanceCounter
 0x941090 GetTickCount
 0x941094 GetCurrentThreadId
 0x941098 GetCurrentProcessId
 0x94109c GetSystemTimeAsFileTime
 0x9410a0 TerminateProcess
 0x9410a4 UnhandledExceptionFilter
 0x9410a8 CompareStringW
 0x9410ac ReleaseActCtx
 0x9410b0 DeactivateActCtx
 0x9410b4 GetFileAttributesW
 0x9410b8 SearchPathW
 0x9410bc CreateActCtxW
 0x9410c0 GetModuleHandleW
 0x9410c4 ActivateActCtx
USER32.dll
 0x9410cc LoadIconW
 0x9410d0 CharNextW
 0x9410d4 DefWindowProcW
 0x9410d8 GetClassLongW
 0x9410dc GetClassNameW
 0x9410e0 GetWindow
 0x9410e4 GetWindowLongW
 0x9410e8 SetWindowLongW
 0x9410ec SetClassLongW
 0x9410f0 CreateWindowExW
 0x9410f4 RegisterClassW
 0x9410f8 LoadCursorW
 0x9410fc LoadStringW
 0x941100 MessageBoxW
 0x941104 DestroyWindow
msvcrt.dll
 0x94110c iswalpha
 0x941110 _wtoi
 0x941114 wcschr
 0x941118 __wgetmainargs
 0x94111c memset
 0x941120 _vsnwprintf
 0x941124 __set_app_type
 0x941128 _controlfp
 0x94112c _except_handler4_common
 0x941130 ?terminate@@YAXXZ
 0x941134 __p__fmode
 0x941138 __p__commode
 0x94113c __setusermatherr
 0x941140 _amsg_exit
 0x941144 _initterm
 0x941148 _wcmdln
 0x94114c exit
 0x941150 _XcptFilter
 0x941154 _exit
 0x941158 _cexit
imagehlp.dll
 0x941160 ImageDirectoryEntryToData
ntdll.dll
 0x941168 NtClose
 0x94116c NtOpenProcessToken
 0x941170 NtSetInformationToken
 0x941174 RtlImageNtHeader
 0x941178 NtSetInformationProcess
 0x94117c NtQueryInformationToken

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure