Report - 4496TmGAmszliFaJddlAQYLYCUMW.exe

UPX Malicious Packer Malicious Library OS Processor Check PE64 PE File
ScreenShot
Created 2023.04.21 18:13 Machine s1_win7_x6401
Filename 4496TmGAmszliFaJddlAQYLYCUMW.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
1.0
ZERO API file : malware
VT API (file) 23 detected (GenericKD, malicious, confidence, score, FileRepMalware, Misc, AGEN, Mikey, BrowseFox, Casdet, Artemis, ai score=87, susgen, PossibleThreat)
md5 249e72c284e40f491a40290b0b22fc58
sha256 e74e9eef09f0408bc12122664feab0f172a77bda450290cb2c583a1fb09a18b7
ssdeep 49152:Y1LslvY4A5tOYiFozvPfpiE42OwpJM86LB:Y1OvFA5viFLFIO86
imphash 43a682db5d18214091b3a5e4b9713a58
impfuzzy 96:/776E1EQJmT6CCBttYnc0atuLaQRWbPAtDCfTlRKaci5LcKN2a:/7d46Ltsa8+aWQwTGPKN2a
  Network IP location

Signature (2cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14016c110 GetFileAttributesExW
 0x14016c118 OutputDebugStringW
 0x14016c120 FlushViewOfFile
 0x14016c128 CreateFileA
 0x14016c130 WaitForSingleObjectEx
 0x14016c138 DeleteFileA
 0x14016c140 DeleteFileW
 0x14016c148 HeapReAlloc
 0x14016c150 CloseHandle
 0x14016c158 GetSystemInfo
 0x14016c160 HeapAlloc
 0x14016c168 HeapCompact
 0x14016c170 HeapDestroy
 0x14016c178 UnlockFile
 0x14016c180 LocalFree
 0x14016c188 LockFileEx
 0x14016c190 GetFileSize
 0x14016c198 DeleteCriticalSection
 0x14016c1a0 GetCurrentProcessId
 0x14016c1a8 GetProcessHeap
 0x14016c1b0 SystemTimeToFileTime
 0x14016c1b8 WideCharToMultiByte
 0x14016c1c0 GetSystemTimeAsFileTime
 0x14016c1c8 GetSystemTime
 0x14016c1d0 FormatMessageA
 0x14016c1d8 CreateFileMappingW
 0x14016c1e0 MapViewOfFile
 0x14016c1e8 QueryPerformanceCounter
 0x14016c1f0 GetTickCount
 0x14016c1f8 FlushFileBuffers
 0x14016c200 CreateDirectoryW
 0x14016c208 GetCurrentProcess
 0x14016c210 GetUserDefaultUILanguage
 0x14016c218 GetProcAddress
 0x14016c220 GetModuleHandleW
 0x14016c228 CopyFileW
 0x14016c230 QueryFullProcessImageNameW
 0x14016c238 AreFileApisANSI
 0x14016c240 ReadFile
 0x14016c248 TryEnterCriticalSection
 0x14016c250 HeapCreate
 0x14016c258 HeapFree
 0x14016c260 EnterCriticalSection
 0x14016c268 GetFullPathNameW
 0x14016c270 WriteFile
 0x14016c278 GetCurrentDirectoryW
 0x14016c280 GetLastError
 0x14016c288 GetDiskFreeSpaceA
 0x14016c290 FormatMessageW
 0x14016c298 GetTempPathA
 0x14016c2a0 Sleep
 0x14016c2a8 MultiByteToWideChar
 0x14016c2b0 HeapSize
 0x14016c2b8 HeapValidate
 0x14016c2c0 ReadConsoleW
 0x14016c2c8 SetEnvironmentVariableW
 0x14016c2d0 FreeEnvironmentStringsW
 0x14016c2d8 GetEnvironmentStringsW
 0x14016c2e0 GetCommandLineW
 0x14016c2e8 GetCommandLineA
 0x14016c2f0 GetOEMCP
 0x14016c2f8 GetACP
 0x14016c300 IsValidCodePage
 0x14016c308 FindNextFileW
 0x14016c310 FindFirstFileExW
 0x14016c318 FindClose
 0x14016c320 GetTimeZoneInformation
 0x14016c328 GetConsoleMode
 0x14016c330 GetConsoleOutputCP
 0x14016c338 EnumSystemLocalesW
 0x14016c340 GetUserDefaultLCID
 0x14016c348 IsValidLocale
 0x14016c350 GetLocaleInfoW
 0x14016c358 LCMapStringW
 0x14016c360 CompareStringW
 0x14016c368 GetTimeFormatW
 0x14016c370 GetDateFormatW
 0x14016c378 FlsFree
 0x14016c380 FlsSetValue
 0x14016c388 FlsGetValue
 0x14016c390 FlsAlloc
 0x14016c398 SetFilePointerEx
 0x14016c3a0 FileTimeToSystemTime
 0x14016c3a8 SystemTimeToTzSpecificLocalTime
 0x14016c3b0 GetFileInformationByHandle
 0x14016c3b8 GetDriveTypeW
 0x14016c3c0 GetModuleFileNameW
 0x14016c3c8 ExitProcess
 0x14016c3d0 GetModuleHandleExW
 0x14016c3d8 FreeLibraryAndExitThread
 0x14016c3e0 ExitThread
 0x14016c3e8 CreateThread
 0x14016c3f0 SetStdHandle
 0x14016c3f8 RtlUnwind
 0x14016c400 UnmapViewOfFile
 0x14016c408 GetCurrentThreadId
 0x14016c410 GetFileAttributesW
 0x14016c418 CreateFileW
 0x14016c420 WaitForSingleObject
 0x14016c428 CreateMutexW
 0x14016c430 GetTempPathW
 0x14016c438 UnlockFileEx
 0x14016c440 SetEndOfFile
 0x14016c448 GetFullPathNameA
 0x14016c450 SetFilePointer
 0x14016c458 InitializeCriticalSection
 0x14016c460 LeaveCriticalSection
 0x14016c468 LockFile
 0x14016c470 OutputDebugStringA
 0x14016c478 GetDiskFreeSpaceW
 0x14016c480 GetFileAttributesA
 0x14016c488 LoadLibraryExW
 0x14016c490 TlsFree
 0x14016c498 TlsSetValue
 0x14016c4a0 TlsGetValue
 0x14016c4a8 TlsAlloc
 0x14016c4b0 RaiseException
 0x14016c4b8 RtlPcToFileHeader
 0x14016c4c0 WriteConsoleW
 0x14016c4c8 RtlUnwindEx
 0x14016c4d0 GetFileSizeEx
 0x14016c4d8 VerifyVersionInfoW
 0x14016c4e0 VerSetConditionMask
 0x14016c4e8 SleepEx
 0x14016c4f0 WaitForMultipleObjects
 0x14016c4f8 PeekNamedPipe
 0x14016c500 GetFileType
 0x14016c508 GetStdHandle
 0x14016c510 GetEnvironmentVariableA
 0x14016c518 MoveFileExA
 0x14016c520 SetLastError
 0x14016c528 LoadLibraryA
 0x14016c530 GetModuleHandleA
 0x14016c538 FreeLibrary
 0x14016c540 GetSystemDirectoryA
 0x14016c548 QueryPerformanceFrequency
 0x14016c550 AcquireSRWLockExclusive
 0x14016c558 ReleaseSRWLockExclusive
 0x14016c560 TerminateProcess
 0x14016c568 InitializeCriticalSectionEx
 0x14016c570 EncodePointer
 0x14016c578 DecodePointer
 0x14016c580 GetStringTypeW
 0x14016c588 GetCPInfo
 0x14016c590 InitializeCriticalSectionAndSpinCount
 0x14016c598 SetEvent
 0x14016c5a0 ResetEvent
 0x14016c5a8 CreateEventW
 0x14016c5b0 RtlCaptureContext
 0x14016c5b8 RtlLookupFunctionEntry
 0x14016c5c0 RtlVirtualUnwind
 0x14016c5c8 IsDebuggerPresent
 0x14016c5d0 UnhandledExceptionFilter
 0x14016c5d8 SetUnhandledExceptionFilter
 0x14016c5e0 GetStartupInfoW
 0x14016c5e8 IsProcessorFeaturePresent
 0x14016c5f0 InitializeSListHead
USER32.dll
 0x14016c620 EnumWindows
 0x14016c628 GetKeyboardLayout
 0x14016c630 SwitchToThisWindow
 0x14016c638 PostMessageW
 0x14016c640 GetClassNameW
 0x14016c648 FindWindowW
 0x14016c650 GetWindowTextW
ADVAPI32.dll
 0x14016c000 CryptEncrypt
 0x14016c008 CryptImportKey
 0x14016c010 CryptDestroyKey
 0x14016c018 CryptDestroyHash
 0x14016c020 CryptHashData
 0x14016c028 CryptCreateHash
 0x14016c030 CryptGetHashParam
 0x14016c038 CryptReleaseContext
 0x14016c040 CryptAcquireContextA
 0x14016c048 CheckTokenMembership
 0x14016c050 FreeSid
 0x14016c058 RegSetValueExW
 0x14016c060 RegCreateKeyExW
 0x14016c068 AllocateAndInitializeSid
 0x14016c070 RegCloseKey
 0x14016c078 RegQueryValueExW
SHELL32.dll
 0x14016c600 CommandLineToArgvW
 0x14016c608 ShellExecuteExW
 0x14016c610 SHGetKnownFolderPath
ole32.dll
 0x14016c868 CoTaskMemFree
urlmon.dll
 0x14016c878 ObtainUserAgentString
WS2_32.dll
 0x14016c6f8 getpeername
 0x14016c700 gethostname
 0x14016c708 recvfrom
 0x14016c710 freeaddrinfo
 0x14016c718 getaddrinfo
 0x14016c720 recv
 0x14016c728 listen
 0x14016c730 htonl
 0x14016c738 getsockname
 0x14016c740 connect
 0x14016c748 ind
 0x14016c750 accept
 0x14016c758 select
 0x14016c760 __WSAFDIsSet
 0x14016c768 socket
 0x14016c770 htons
 0x14016c778 WSAIoctl
 0x14016c780 setsockopt
 0x14016c788 WSACleanup
 0x14016c790 WSAStartup
 0x14016c798 WSASetLastError
 0x14016c7a0 ntohs
 0x14016c7a8 WSAGetLastError
 0x14016c7b0 closesocket
 0x14016c7b8 WSAWaitForMultipleEvents
 0x14016c7c0 WSAResetEvent
 0x14016c7c8 WSAEventSelect
 0x14016c7d0 WSAEnumNetworkEvents
 0x14016c7d8 WSACreateEvent
 0x14016c7e0 WSACloseEvent
 0x14016c7e8 send
 0x14016c7f0 getsockopt
 0x14016c7f8 ioctlsocket
 0x14016c800 sendto
CRYPT32.dll
 0x14016c088 CryptDecodeObjectEx
 0x14016c090 PFXImportCertStore
 0x14016c098 CryptStringToBinaryA
 0x14016c0a0 CertFreeCertificateContext
 0x14016c0a8 CertFindCertificateInStore
 0x14016c0b0 CertEnumCertificatesInStore
 0x14016c0b8 CertCloseStore
 0x14016c0c0 CertOpenStore
 0x14016c0c8 CertFindExtension
 0x14016c0d0 CertGetNameStringA
 0x14016c0d8 CryptQueryObject
 0x14016c0e0 CertCreateCertificateChainEngine
 0x14016c0e8 CertFreeCertificateChainEngine
 0x14016c0f0 CertGetCertificateChain
 0x14016c0f8 CertFreeCertificateChain
 0x14016c100 CertAddCertificateContextToStore
WLDAP32.dll
 0x14016c660 None
 0x14016c668 None
 0x14016c670 None
 0x14016c678 None
 0x14016c680 None
 0x14016c688 None
 0x14016c690 None
 0x14016c698 None
 0x14016c6a0 None
 0x14016c6a8 None
 0x14016c6b0 None
 0x14016c6b8 None
 0x14016c6c0 None
 0x14016c6c8 None
 0x14016c6d0 None
 0x14016c6d8 None
 0x14016c6e0 None
 0x14016c6e8 None
crypt.dll
 0x14016c810 BCryptGenerateSymmetricKey
 0x14016c818 BCryptCreateHash
 0x14016c820 BCryptGenRandom
 0x14016c828 BCryptFinishHash
 0x14016c830 BCryptDestroyKey
 0x14016c838 BCryptDecrypt
 0x14016c840 BCryptOpenAlgorithmProvider
 0x14016c848 BCryptHashData
 0x14016c850 BCryptDestroyHash
 0x14016c858 BCryptSetProperty

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure