ScreenShot
Created | 2023.06.07 07:40 | Machine | s1_win7_x6403 |
Filename | Installer.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 32 detected (Malicious, score, Artemis, ABTrojan, NOOJ, Attribute, HighConfidence, moderate confidence, a variant of Generik, GBPWGOK, Sharik, GenericKD, XPACK, 2JINIY, Sabsik, Casdet, Detected, unsafe, Chgt, CLOUD, PossibleThreat, ZexaF, rx2@aSHzUKhi, confidence) | ||
md5 | 38b258c567b378058ac5cad63ab59584 | ||
sha256 | 686495bd2f04f2402b3543efd574a707caac0003dd682909db87da286173e771 | ||
ssdeep | 98304:jgYLkFZCB1bZZ68WY2V0FR0NupgokfAGzeV77+tl:jgYLkFZCB1bZZ68WY2Vz8ppkfhzet+r | ||
imphash | 6014bca529f51ea59e3dfde00eb5ba7d | ||
impfuzzy | 3:sse0JSxKW/MKL8ssO7Sx3+l0+xJaOJafcAVQrvoSWLcvbsh0zJzslFJOYAJcRTSw:/lGMKlFYTQ0cvbpmzlT6QhAS |
Network IP location
Signature (5cnts)
Level | Description |
---|---|
danger | File has been identified by 32 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Performs some HTTP requests |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks if process is being debugged by a debugger |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (22cnts) ?
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x54b000 CreateFileW
0x54b004 GetFileInformationByHandle
0x54b008 GetFileSize
0x54b00c SetEndOfFile
0x54b010 SetFilePointer
0x54b014 IsProcessorFeaturePresent
0x54b018 GetVersion
0x54b01c DeleteAtom
0x54b020 AddAtomW
0x54b024 FindAtomW
0x54b028 GetAtomNameW
EAT(Export Address Table) is none
KERNEL32.dll
0x54b000 CreateFileW
0x54b004 GetFileInformationByHandle
0x54b008 GetFileSize
0x54b00c SetEndOfFile
0x54b010 SetFilePointer
0x54b014 IsProcessorFeaturePresent
0x54b018 GetVersion
0x54b01c DeleteAtom
0x54b020 AddAtomW
0x54b024 FindAtomW
0x54b028 GetAtomNameW
EAT(Export Address Table) is none