Report - nmooul5hrjbg6.channal1.exe

UPX Malicious Library Malicious Packer OS Processor Check PE32 PE File
ScreenShot
Created 2023.04.04 17:13 Machine s1_win7_x6401
Filename nmooul5hrjbg6.channal1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
11
Behavior Score
2.0
ZERO API file : malware
VT API (file) 51 detected (AIDetectNet, Convagent, malicious, high confidence, Zusy, Artemis, unsafe, Save, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, HSZW, score, Vimw, wmado, Steam, high, Static AI, Suspicious PE, Tiggre, Detected, ai score=84, PasswordStealer, Genetic, R002H0CCS23, Generic@AI, RDML, LtCEmfuHjndPWx0RqWlWMw, susgen, HSKS)
md5 b8ff396f094c22492fa957fbcf2d6a94
sha256 d504922abfbd95fed6cc1bcc7558dd44fe268f28a6b990e26b32df0c4ff96e82
ssdeep 12288:cfjlo/jfjO+IQAZr3bH44+Z1E10NydOAh:cfjAhM3bY4yq0NJY
imphash 4a46d3ddf97b254fa034bc59233d41dd
impfuzzy 24:lgcpVWZjS1jtFGhlJBl3eDoNoEOovbOIkFZVvtGMA+EZHu93:lgcpVejS1jtFGnpBc3NFZd1
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

SHELL32.dll
 0x420130 SHCreateShellItemArray
KERNEL32.dll
 0x420000 GetStdHandle
 0x420004 CreateFileW
 0x420008 GetModuleHandleW
 0x42000c MultiByteToWideChar
 0x420010 GetStringTypeW
 0x420014 WideCharToMultiByte
 0x420018 EnterCriticalSection
 0x42001c LeaveCriticalSection
 0x420020 InitializeCriticalSectionEx
 0x420024 DeleteCriticalSection
 0x420028 EncodePointer
 0x42002c DecodePointer
 0x420030 LCMapStringEx
 0x420034 GetCPInfo
 0x420038 IsProcessorFeaturePresent
 0x42003c QueryPerformanceCounter
 0x420040 GetCurrentProcessId
 0x420044 GetCurrentThreadId
 0x420048 GetSystemTimeAsFileTime
 0x42004c InitializeSListHead
 0x420050 IsDebuggerPresent
 0x420054 UnhandledExceptionFilter
 0x420058 SetUnhandledExceptionFilter
 0x42005c GetStartupInfoW
 0x420060 GetCurrentProcess
 0x420064 TerminateProcess
 0x420068 HeapSize
 0x42006c RaiseException
 0x420070 RtlUnwind
 0x420074 GetLastError
 0x420078 SetLastError
 0x42007c InitializeCriticalSectionAndSpinCount
 0x420080 TlsAlloc
 0x420084 TlsGetValue
 0x420088 TlsSetValue
 0x42008c TlsFree
 0x420090 FreeLibrary
 0x420094 GetProcAddress
 0x420098 LoadLibraryExW
 0x42009c WriteConsoleW
 0x4200a0 WriteFile
 0x4200a4 GetModuleFileNameW
 0x4200a8 ExitProcess
 0x4200ac GetModuleHandleExW
 0x4200b0 GetCommandLineA
 0x4200b4 GetCommandLineW
 0x4200b8 HeapFree
 0x4200bc CompareStringW
 0x4200c0 LCMapStringW
 0x4200c4 GetLocaleInfoW
 0x4200c8 IsValidLocale
 0x4200cc GetUserDefaultLCID
 0x4200d0 EnumSystemLocalesW
 0x4200d4 HeapAlloc
 0x4200d8 GetFileType
 0x4200dc GetFileSizeEx
 0x4200e0 SetFilePointerEx
 0x4200e4 CloseHandle
 0x4200e8 FlushFileBuffers
 0x4200ec GetConsoleOutputCP
 0x4200f0 GetConsoleMode
 0x4200f4 ReadFile
 0x4200f8 HeapReAlloc
 0x4200fc FindClose
 0x420100 FindFirstFileExW
 0x420104 FindNextFileW
 0x420108 IsValidCodePage
 0x42010c GetACP
 0x420110 GetOEMCP
 0x420114 GetEnvironmentStringsW
 0x420118 FreeEnvironmentStringsW
 0x42011c SetEnvironmentVariableW
 0x420120 SetStdHandle
 0x420124 GetProcessHeap
 0x420128 ReadConsoleW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure