Report - denver.exe

Emotet UPX MPRESS PE64 PE File
ScreenShot
Created 2023.06.15 07:26 Machine s1_win7_x6403
Filename denver.exe
Type MS-DOS executable, MZ for MS-DOS
AI Score
3
Behavior Score
1.0
ZERO API file : clean
VT API (file)
md5 539a444f8dff3d9719e36fd9db31b799
sha256 2c5c3ba7eba30cc358b40d494fda79d9d2a6df152bdb7eb1aceb36f3fbcf60c3
ssdeep 98304:GrZtcyQgVa9BjWmic5fcD75vuHgdtZgC:GsRgVa9ltc35WHG7
imphash 79b3362178937bf9559741c46bb9e035
impfuzzy 3:sUx2AEZsS9KTXzW:nERGDW
  Network IP location

Signature (4cnts)

Level Description
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_2_Zero Win32 Trojan Emotet binaries (upload)
watch MPRESS_Zero MPRESS packed file binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32
 0xbed028 GetModuleHandleA
 0xbed030 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure