Report - printui.exe

Gen1 UPX Malicious Packer PE64 PE File
ScreenShot
Created 2023.06.14 09:44 Machine s1_win7_x6401
Filename printui.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
2
Behavior Score
0.4
ZERO API file : malware
VT API (file)
md5 fcab17a170881b4ecedfc91ab91cd1f4
sha256 e7d57cbe651e668904a6b154b97642d64f5b09546d1f20350c7ca5946f985f5f
ssdeep 768:5eiAnXaz5vI1iQfCIWVM9G4qW4ne+S/ly+PKAoXRZX6fbX57UWkCRPPA7/Qns:PcXEVIPd4n+lbeRZIbSQPPA7Z
imphash de8c59512ca98fb3e224769147985370
impfuzzy 24:F1/m1wIuKmkjXDp4JpOUbgfdN0WES//KA+VZ/4CMWTGgq51As:z/FKx4iAglN0WX//KAy/4CjTG9L
  Network IP location

Signature (2cnts)

Level Description
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x140002150 RegQueryValueExW
 0x140002158 RegDeleteValueW
 0x140002160 RegOpenKeyExW
 0x140002168 RegSetValueExW
 0x140002170 RegCreateKeyExW
 0x140002178 RegDeleteKeyExW
 0x140002180 RegCloseKey
KERNEL32.dll
 0x1400021a0 HeapSetInformation
 0x1400021a8 GetProcAddress
 0x1400021b0 FreeLibrary
 0x1400021b8 GetCurrentProcessId
 0x1400021c0 GetLastError
 0x1400021c8 GetCommandLineW
 0x1400021d0 LoadLibraryW
 0x1400021d8 QueryPerformanceCounter
 0x1400021e0 GetModuleHandleW
 0x1400021e8 SetUnhandledExceptionFilter
 0x1400021f0 GetStartupInfoW
 0x1400021f8 Sleep
 0x140002200 GetSystemTimeAsFileTime
 0x140002208 GetTickCount
 0x140002210 UnhandledExceptionFilter
 0x140002218 GetCurrentProcess
 0x140002220 TerminateProcess
 0x140002228 GetCurrentThreadId
GDI32.dll
 0x140002190 GetStockObject
USER32.dll
 0x140002238 RegisterClassW
 0x140002240 CreateWindowExW
 0x140002248 DestroyWindow
 0x140002250 DefWindowProcW
 0x140002258 LoadCursorW
msvcrt.dll
 0x140002268 _fmode
 0x140002270 _commode
 0x140002278 ?terminate@@YAXXZ
 0x140002280 __C_specific_handler
 0x140002288 __wgetmainargs
 0x140002290 _amsg_exit
 0x140002298 _XcptFilter
 0x1400022a0 iswspace
 0x1400022a8 _wcmdln
 0x1400022b0 _initterm
 0x1400022b8 __setusermatherr
 0x1400022c0 _cexit
 0x1400022c8 _exit
 0x1400022d0 exit
 0x1400022d8 __set_app_type
 0x1400022e0 memset
ntdll.dll
 0x1400022f0 RtlCaptureContext
 0x1400022f8 RtlLookupFunctionEntry
 0x140002300 RtlVirtualUnwind

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure