Report - fortnite3.exe

UPX Malicious Library ASPack OS Processor Check PE File PE32
ScreenShot
Created 2023.06.30 17:48 Machine s1_win7_x6401
Filename fortnite3.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
1.4
ZERO API file : malware
VT API (file) 55 detected (AIDetectMalware, Tasker, Doina, GenericRXTY, unsafe, Save, ClipBanker, malicious, Eldorado, Attribute, HighConfidence, Windows, score, jqazlz, BankerX, Gencirc, AGEN, DownLoader45, NetLoader, Static AI, Malicious PE, AllCome, Detected, BScope, ai score=87, GdSda, lsD8x0cCYBV, 6kedH1o, AllcomeClipper, susgen, confidence, 100%)
md5 ed0a563d3d57d03356187c1a2fbcce3f
sha256 ed78295a1b60b7053383c7f2a4837c62cb5625d7d57b5f4121df45660a000c65
ssdeep 3072:kBHLe0crYUAc3W3RBjJ9wUZBva7oRrADruYQLeT8YGjjsxf:k1vcruc3WBBEUy7oL3jjwf
imphash ed5e7a68bd9d3fcbe4fc8ca66473351b
impfuzzy 24:7ZjCv2MUZHjtMS1OmjsnDYc+MMdlJe1l39ro6XhviSOovbOGA/ZllaDB9+we:ntMS1Otkc+MMWpZNe3GA/Zlla9gwe
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
dba692117be7b6d3480fe5220fdd58b38bf.xyz Unknown mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x415000 GlobalAlloc
 0x415004 GlobalLock
 0x415008 GlobalUnlock
 0x41500c CopyFileA
 0x415010 SetFileAttributesA
 0x415014 CreateDirectoryA
 0x415018 Process32First
 0x41501c CreateMutexA
 0x415020 WaitForSingleObject
 0x415024 CreateToolhelp32Snapshot
 0x415028 Process32Next
 0x41502c CloseHandle
 0x415030 GetModuleFileNameA
 0x415034 MultiByteToWideChar
 0x415038 CreateFileW
 0x41503c DecodePointer
 0x415040 GetConsoleMode
 0x415044 GetConsoleOutputCP
 0x415048 FlushFileBuffers
 0x41504c HeapReAlloc
 0x415050 HeapSize
 0x415054 SetFilePointerEx
 0x415058 GetProcessHeap
 0x41505c GetStringTypeW
 0x415060 SetStdHandle
 0x415064 FreeEnvironmentStringsW
 0x415068 GetEnvironmentStringsW
 0x41506c WideCharToMultiByte
 0x415070 UnhandledExceptionFilter
 0x415074 SetUnhandledExceptionFilter
 0x415078 GetCurrentProcess
 0x41507c TerminateProcess
 0x415080 IsProcessorFeaturePresent
 0x415084 QueryPerformanceCounter
 0x415088 GetCurrentProcessId
 0x41508c GetCurrentThreadId
 0x415090 GetSystemTimeAsFileTime
 0x415094 InitializeSListHead
 0x415098 IsDebuggerPresent
 0x41509c GetStartupInfoW
 0x4150a0 GetModuleHandleW
 0x4150a4 QueryPerformanceFrequency
 0x4150a8 WaitForSingleObjectEx
 0x4150ac Sleep
 0x4150b0 GetExitCodeThread
 0x4150b4 InitializeCriticalSectionEx
 0x4150b8 GetProcAddress
 0x4150bc EnterCriticalSection
 0x4150c0 LeaveCriticalSection
 0x4150c4 DeleteCriticalSection
 0x4150c8 RtlUnwind
 0x4150cc RaiseException
 0x4150d0 GetLastError
 0x4150d4 SetLastError
 0x4150d8 EncodePointer
 0x4150dc InitializeCriticalSectionAndSpinCount
 0x4150e0 TlsAlloc
 0x4150e4 TlsGetValue
 0x4150e8 TlsSetValue
 0x4150ec TlsFree
 0x4150f0 FreeLibrary
 0x4150f4 LoadLibraryExW
 0x4150f8 ExitProcess
 0x4150fc GetModuleHandleExW
 0x415100 CreateThread
 0x415104 ExitThread
 0x415108 FreeLibraryAndExitThread
 0x41510c GetStdHandle
 0x415110 WriteFile
 0x415114 GetModuleFileNameW
 0x415118 HeapFree
 0x41511c HeapAlloc
 0x415120 GetFileType
 0x415124 LCMapStringW
 0x415128 FindClose
 0x41512c FindFirstFileExW
 0x415130 FindNextFileW
 0x415134 IsValidCodePage
 0x415138 GetACP
 0x41513c GetOEMCP
 0x415140 GetCPInfo
 0x415144 GetCommandLineA
 0x415148 GetCommandLineW
 0x41514c WriteConsoleW
USER32.dll
 0x415160 OpenClipboard
 0x415164 GetClipboardData
 0x415168 SetClipboardData
 0x41516c CloseClipboard
 0x415170 EmptyClipboard
 0x415174 GetKeyState
 0x415178 LoadStringA
SHELL32.dll
 0x415154 ShellExecuteA
 0x415158 SHGetSpecialFolderPathA
urlmon.dll
 0x415194 IsValidURL
WININET.dll
 0x415180 InternetCloseHandle
 0x415184 InternetOpenUrlA
 0x415188 InternetOpenA
 0x41518c InternetReadFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure