Report - itzdarth_crypted%281%29.exe

PE File PE32
ScreenShot
Created 2023.05.17 17:34 Machine s1_win7_x6403
Filename itzdarth_crypted%281%29.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
3
Behavior Score
6.2
ZERO API file : malware
VT API (file) 23 detected (Lazy, Zusy, malicious, Attribute, HighConfidence, high confidence, score, Convagent, ai score=86, Sabsik, susgen, ZexaF, 1pJfaSxxWcl, confidence)
md5 37c966c35a3a7e31650e555624b25455
sha256 25f389ab134c71a9a28c99f28ba3d9d02f31763ab0c92ab87b6e5560d9fe518c
ssdeep 98304:PoUXsDnsMyiJk4L34ugZG0cMORsH8PYG6GhwG4DMkyM2MG//Dt:wZsMyiJk4T4uhFqGhwGAMd//J
imphash c19c5a27cf193c3f49f1a5b91054e502
impfuzzy 3:swBJAEPw1MO/OywS9KTXzhAXwEQaxRGUpH:dBJAEoZ/OEGDzyRH
  Network IP location

Signature (15cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
watch Detects the presence of Wine emulator
watch Detects virtualization software with SCSI Disk Identifier trick(s)
watch Looks for the Windows Idle Time to determine the uptime
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Executes one or more WMI queries
notice Executes one or more WMI queries which can be used to identify virtual machines
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x134603c LoadLibraryA
 0x1346040 ExitProcess
 0x1346044 GetProcAddress
 0x1346048 VirtualProtect
msvcrt.dll
 0x1346050 _iob

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure