ScreenShot
Created | 2023.05.17 17:34 | Machine | s1_win7_x6403 |
Filename | itzdarth_crypted%281%29.exe | ||
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 23 detected (Lazy, Zusy, malicious, Attribute, HighConfidence, high confidence, score, Convagent, ai score=86, Sabsik, susgen, ZexaF, 1pJfaSxxWcl, confidence) | ||
md5 | 37c966c35a3a7e31650e555624b25455 | ||
sha256 | 25f389ab134c71a9a28c99f28ba3d9d02f31763ab0c92ab87b6e5560d9fe518c | ||
ssdeep | 98304:PoUXsDnsMyiJk4L34ugZG0cMORsH8PYG6GhwG4DMkyM2MG//Dt:wZsMyiJk4T4uhFqGhwGAMd//J | ||
imphash | c19c5a27cf193c3f49f1a5b91054e502 | ||
impfuzzy | 3:swBJAEPw1MO/OywS9KTXzhAXwEQaxRGUpH:dBJAEoZ/OEGDzyRH |
Network IP location
Signature (15cnts)
Level | Description |
---|---|
warning | File has been identified by 23 AntiVirus engines on VirusTotal as malicious |
watch | Detects the presence of Wine emulator |
watch | Detects virtualization software with SCSI Disk Identifier trick(s) |
watch | Looks for the Windows Idle Time to determine the uptime |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a suspicious process |
notice | Executes one or more WMI queries |
notice | Executes one or more WMI queries which can be used to identify virtual machines |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Uses Windows utilities for basic Windows functionality |
info | Checks if process is being debugged by a debugger |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
Rules (2cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.DLL
0x134603c LoadLibraryA
0x1346040 ExitProcess
0x1346044 GetProcAddress
0x1346048 VirtualProtect
msvcrt.dll
0x1346050 _iob
EAT(Export Address Table) is none
KERNEL32.DLL
0x134603c LoadLibraryA
0x1346040 ExitProcess
0x1346044 GetProcAddress
0x1346048 VirtualProtect
msvcrt.dll
0x1346050 _iob
EAT(Export Address Table) is none