Report - 71c95442-4415-4ad2-b550-28ba52dceec5

UPX Malicious Library AntiDebug AntiVM OS Processor Check PE File PE32
ScreenShot
Created 2023.05.12 09:28 Machine s1_win7_x6403
Filename 71c95442-4415-4ad2-b550-28ba52dceec5
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
7
Behavior Score
7.8
ZERO API file : malware
VT API (file) 43 detected (AIDetectMalware, GenericKDZ, GenericRXVX, Kryptik, Veq9, Evader, Eldorado, malicious, high confidence, HTLQ, score, ccmw, PWSX, FalseSign, Gflw, AGEN, Inject4, R002C0DEB23, Artemis, moderate, ai score=83, RedLine, Detected, BScope, Bobik, unsafe, DcRat, zlu7nUQDNuH, Outbreak, Coins, confidence)
md5 c21947b75b1bbec904d0d954d5571fce
sha256 a43a25d2bb5a2770100e7e2bfbfc2bcb06534354468a4a7e9b70109dead13385
ssdeep 3072:mTj8y0Z+a0MT1+fjipy74f7MXCKbTyKodImL4yjPXFGRlefGRvUw90E5HBdrTJfe:m3nI+LMTs2X7MXCsorjPVG26UwX5HB9M
imphash ae64f100c0f22c43c95a1d2055ef681a
impfuzzy 48:fldo+fcMMnt2uDcoRcRZsyGwtJACeD4uKQU:fHo+fcMMntBDcwc737
  Network IP location

Signature (16cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch One or more of the buffers contains an embedded PE file
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info Queries for the computername

Rules (13cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41d034 GetLocaleInfoW
 0x41d038 WriteConsoleA
 0x41d03c LoadLibraryA
 0x41d040 GetConsoleOutputCP
 0x41d044 WriteConsoleW
 0x41d048 SetStdHandle
 0x41d04c CreateFileA
 0x41d050 GetCurrentProcess
 0x41d054 GetVersion
 0x41d058 GetModuleHandleA
 0x41d05c MultiByteToWideChar
 0x41d060 InitializeCriticalSectionAndSpinCount
 0x41d064 GetProcAddress
 0x41d068 WideCharToMultiByte
 0x41d06c InterlockedIncrement
 0x41d070 InterlockedDecrement
 0x41d074 InterlockedExchange
 0x41d078 Sleep
 0x41d07c InitializeCriticalSection
 0x41d080 DeleteCriticalSection
 0x41d084 EnterCriticalSection
 0x41d088 LeaveCriticalSection
 0x41d08c RtlUnwind
 0x41d090 RaiseException
 0x41d094 TerminateProcess
 0x41d098 UnhandledExceptionFilter
 0x41d09c SetUnhandledExceptionFilter
 0x41d0a0 IsDebuggerPresent
 0x41d0a4 GetCommandLineA
 0x41d0a8 GetCPInfo
 0x41d0ac GetLastError
 0x41d0b0 HeapFree
 0x41d0b4 LCMapStringA
 0x41d0b8 LCMapStringW
 0x41d0bc HeapAlloc
 0x41d0c0 GetModuleHandleW
 0x41d0c4 TlsGetValue
 0x41d0c8 TlsAlloc
 0x41d0cc TlsSetValue
 0x41d0d0 TlsFree
 0x41d0d4 SetLastError
 0x41d0d8 GetCurrentThreadId
 0x41d0dc ExitProcess
 0x41d0e0 WriteFile
 0x41d0e4 GetStdHandle
 0x41d0e8 GetModuleFileNameA
 0x41d0ec FreeEnvironmentStringsA
 0x41d0f0 GetEnvironmentStrings
 0x41d0f4 FreeEnvironmentStringsW
 0x41d0f8 GetEnvironmentStringsW
 0x41d0fc SetHandleCount
 0x41d100 GetFileType
 0x41d104 GetStartupInfoA
 0x41d108 HeapCreate
 0x41d10c VirtualFree
 0x41d110 QueryPerformanceCounter
 0x41d114 GetTickCount
 0x41d118 GetCurrentProcessId
 0x41d11c GetSystemTimeAsFileTime
 0x41d120 GetStringTypeA
 0x41d124 GetStringTypeW
 0x41d128 HeapSize
 0x41d12c VirtualAlloc
 0x41d130 HeapReAlloc
 0x41d134 GetACP
 0x41d138 GetOEMCP
 0x41d13c IsValidCodePage
 0x41d140 GetUserDefaultLCID
 0x41d144 GetLocaleInfoA
 0x41d148 EnumSystemLocalesA
 0x41d14c IsValidLocale
 0x41d150 GetConsoleCP
 0x41d154 GetConsoleMode
 0x41d158 FlushFileBuffers
 0x41d15c ReadFile
 0x41d160 SetFilePointer
 0x41d164 CloseHandle
USER32.dll
 0x41d16c GetClassInfoA
 0x41d170 CallWindowProcA
 0x41d174 SetWindowLongA
 0x41d178 IsDlgButtonChecked
 0x41d17c SetWindowTextA
 0x41d180 CheckDlgButton
 0x41d184 GetActiveWindow
 0x41d188 LoadCursorA
 0x41d18c MessageBoxA
 0x41d190 wsprintfA
 0x41d194 GetDlgItemTextA
GDI32.dll
 0x41d014 GetStockObject
 0x41d018 DeleteObject
 0x41d01c SetBkMode
 0x41d020 SetTextColor
 0x41d024 CreateFontIndirectA
 0x41d028 SelectObject
 0x41d02c GetObjectA
COMDLG32.dll
 0x41d008 GetSaveFileNameA
 0x41d00c GetOpenFileNameA
ADVAPI32.dll
 0x41d000 RegDeleteKeyA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure