Report - zapo.exe

PE File PE32
ScreenShot
Created 2023.06.14 09:49 Machine s1_win7_x6403
Filename zapo.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
2.4
ZERO API file : malware
VT API (file) 36 detected (AIDetectMalware, Artemis, MachineLearning, Anomalous, 100%, Save, EmailWorm, malicious, confidence, high confidence, score, RATX, Quasar, CLOUD, VBObfus, high, Static AI, Suspicious PE, ALUM0W, Detected, BScope, Wacatac, R014H01FD23, susgen, PossibleThreat)
md5 eebc680d6a397eb6c40f449d6a13bf6f
sha256 27653c130226419be628d8d4bc593e0082b07a6a5cc87e0fe232d7910bd25565
ssdeep 12288:h6kit4htKxmmnYZ3oHp5EAUVb8k7BsSJMSA5O71:h6kJtE75XzWQk7BsTN
imphash 8b0a93b5aecf88d01125f53f0af8c15f
impfuzzy 24:n9wwzxQjDlVgkyxxbukrrxlYTiEAm/ESFNmpSzEzglDGxmkSRlxDTSwC:nqwzxQvgkQx5rrxlYGEAmlFNmcQzglif
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

MSVBVM60.DLL
 0x401000 _CIcos
 0x401004 _adj_fptan
 0x401008 __vbaFreeVar
 0x40100c __vbaAryMove
 0x401010 __vbaLenBstr
 0x401014 _adj_fdiv_m64
 0x401018 None
 0x40101c _adj_fprem1
 0x401020 __vbaStrCat
 0x401024 __vbaSetSystemError
 0x401028 __vbaHresultCheckObj
 0x40102c _adj_fdiv_m32
 0x401030 None
 0x401034 __vbaAryDestruct
 0x401038 _adj_fdiv_m16i
 0x40103c _adj_fdivr_m16i
 0x401040 _CIsin
 0x401044 None
 0x401048 __vbaChkstk
 0x40104c __vbaGenerateBoundsError
 0x401050 __vbaAryConstruct2
 0x401054 DllFunctionCall
 0x401058 __vbaLbound
 0x40105c _adj_fpatan
 0x401060 __vbaRedim
 0x401064 __vbaUI1I2
 0x401068 _CIsqrt
 0x40106c __vbaExceptHandler
 0x401070 _adj_fprem
 0x401074 _adj_fdivr_m64
 0x401078 __vbaFPException
 0x40107c __vbaUbound
 0x401080 __vbaStrVarVal
 0x401084 None
 0x401088 _CIlog
 0x40108c __vbaErrorOverflow
 0x401090 __vbaVar2Vec
 0x401094 __vbaNew2
 0x401098 _adj_fdiv_m32i
 0x40109c _adj_fdivr_m32i
 0x4010a0 __vbaStrCopy
 0x4010a4 _adj_fdivr_m32
 0x4010a8 _adj_fdiv_r
 0x4010ac None
 0x4010b0 __vbaAryLock
 0x4010b4 __vbaVarDup
 0x4010b8 __vbaVarCopy
 0x4010bc _CIatan
 0x4010c0 __vbaStrMove
 0x4010c4 _allmul
 0x4010c8 _CItan
 0x4010cc __vbaAryUnlock
 0x4010d0 _CIexp
 0x4010d4 __vbaFreeStr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure