Report - 9009282736273.exe

UPX Malicious Library MZP Format PE File PE32
ScreenShot
Created 2023.07.04 11:14 Machine s1_win7_x6401
Filename 9009282736273.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.6
ZERO API file : clean
VT API (file) 32 detected (AIDetectMalware, Noon, Save, malicious, Genus, ModiLoader, Eldorado, Attribute, HighConfidence, high confidence, score, MalwareX, DownLoader45, Static AI, Malicious PE, Leonem, Detected, Artemis, BScope, Formbook, unsafe, Chgt, F0D1C00G323, CLASSIC, susgen, confidence)
md5 7b9d1ae776aabfa0caa2a92ac560e5ff
sha256 6a7be0b8db3655e564255f25f80cdda361dcb00b477622db0bab226502860433
ssdeep 12288:VPRdmMlUOv2nhg+kX0WmSJXkP4xIMlnXkr:VJddU7nS+FJSiPvMlnXk
imphash 3017302c71a8b0116bc175d1193f72e4
impfuzzy 192:f340G1QTbuuArSUvK9RqooqEopCPbOQ0H:f3Q1WAA9LkPbOQE
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x4a11a4 DeleteCriticalSection
 0x4a11a8 LeaveCriticalSection
 0x4a11ac EnterCriticalSection
 0x4a11b0 InitializeCriticalSection
 0x4a11b4 VirtualFree
 0x4a11b8 VirtualAlloc
 0x4a11bc LocalFree
 0x4a11c0 LocalAlloc
 0x4a11c4 GetVersion
 0x4a11c8 GetCurrentThreadId
 0x4a11cc InterlockedDecrement
 0x4a11d0 InterlockedIncrement
 0x4a11d4 VirtualQuery
 0x4a11d8 WideCharToMultiByte
 0x4a11dc MultiByteToWideChar
 0x4a11e0 lstrlenA
 0x4a11e4 lstrcpynA
 0x4a11e8 LoadLibraryExA
 0x4a11ec GetThreadLocale
 0x4a11f0 GetStartupInfoA
 0x4a11f4 GetProcAddress
 0x4a11f8 GetModuleHandleA
 0x4a11fc GetModuleFileNameA
 0x4a1200 GetLocaleInfoA
 0x4a1204 GetCommandLineA
 0x4a1208 FreeLibrary
 0x4a120c FindFirstFileA
 0x4a1210 FindClose
 0x4a1214 ExitProcess
 0x4a1218 WriteFile
 0x4a121c UnhandledExceptionFilter
 0x4a1220 RtlUnwind
 0x4a1224 RaiseException
 0x4a1228 GetStdHandle
user32.dll
 0x4a1230 GetKeyboardType
 0x4a1234 LoadStringA
 0x4a1238 MessageBoxA
 0x4a123c CharNextA
advapi32.dll
 0x4a1244 RegQueryValueExA
 0x4a1248 RegOpenKeyExA
 0x4a124c RegCloseKey
oleaut32.dll
 0x4a1254 SysFreeString
 0x4a1258 SysReAllocStringLen
 0x4a125c SysAllocStringLen
kernel32.dll
 0x4a1264 TlsSetValue
 0x4a1268 TlsGetValue
 0x4a126c LocalAlloc
 0x4a1270 GetModuleHandleA
advapi32.dll
 0x4a1278 RegQueryValueExA
 0x4a127c RegOpenKeyExA
 0x4a1280 RegCloseKey
kernel32.dll
 0x4a1288 lstrcpyA
 0x4a128c WriteFile
 0x4a1290 WaitForSingleObject
 0x4a1294 VirtualQuery
 0x4a1298 VirtualProtect
 0x4a129c VirtualAlloc
 0x4a12a0 Sleep
 0x4a12a4 SizeofResource
 0x4a12a8 SetThreadLocale
 0x4a12ac SetFilePointer
 0x4a12b0 SetEvent
 0x4a12b4 SetErrorMode
 0x4a12b8 SetEndOfFile
 0x4a12bc ResetEvent
 0x4a12c0 ReadFile
 0x4a12c4 MultiByteToWideChar
 0x4a12c8 MulDiv
 0x4a12cc LockResource
 0x4a12d0 LoadResource
 0x4a12d4 LoadLibraryExA
 0x4a12d8 LoadLibraryA
 0x4a12dc LeaveCriticalSection
 0x4a12e0 InitializeCriticalSection
 0x4a12e4 GlobalUnlock
 0x4a12e8 GlobalReAlloc
 0x4a12ec GlobalHandle
 0x4a12f0 GlobalLock
 0x4a12f4 GlobalFree
 0x4a12f8 GlobalFindAtomA
 0x4a12fc GlobalDeleteAtom
 0x4a1300 GlobalAlloc
 0x4a1304 GlobalAddAtomA
 0x4a1308 GetVersionExA
 0x4a130c GetVersion
 0x4a1310 GetTickCount
 0x4a1314 GetThreadLocale
 0x4a1318 GetSystemInfo
 0x4a131c GetStringTypeExA
 0x4a1320 GetStdHandle
 0x4a1324 GetProcAddress
 0x4a1328 GetModuleHandleA
 0x4a132c GetModuleFileNameA
 0x4a1330 GetLocaleInfoA
 0x4a1334 GetLocalTime
 0x4a1338 GetLastError
 0x4a133c GetFullPathNameA
 0x4a1340 GetDiskFreeSpaceA
 0x4a1344 GetDateFormatA
 0x4a1348 GetCurrentThreadId
 0x4a134c GetCurrentProcessId
 0x4a1350 GetCurrentProcess
 0x4a1354 GetCPInfo
 0x4a1358 GetACP
 0x4a135c FreeResource
 0x4a1360 InterlockedExchange
 0x4a1364 FreeLibrary
 0x4a1368 FormatMessageA
 0x4a136c FindResourceA
 0x4a1370 EnumCalendarInfoA
 0x4a1374 EnterCriticalSection
 0x4a1378 DeleteCriticalSection
 0x4a137c CreateThread
 0x4a1380 CreateFileA
 0x4a1384 CreateEventA
 0x4a1388 CompareStringA
 0x4a138c CloseHandle
version.dll
 0x4a1394 VerQueryValueA
 0x4a1398 GetFileVersionInfoSizeA
 0x4a139c GetFileVersionInfoA
gdi32.dll
 0x4a13a4 UnrealizeObject
 0x4a13a8 StretchBlt
 0x4a13ac SetWindowOrgEx
 0x4a13b0 SetViewportOrgEx
 0x4a13b4 SetTextColor
 0x4a13b8 SetStretchBltMode
 0x4a13bc SetROP2
 0x4a13c0 SetPixel
 0x4a13c4 SetDIBColorTable
 0x4a13c8 SetBrushOrgEx
 0x4a13cc SetBkMode
 0x4a13d0 SetBkColor
 0x4a13d4 SelectPalette
 0x4a13d8 SelectObject
 0x4a13dc SaveDC
 0x4a13e0 RestoreDC
 0x4a13e4 RectVisible
 0x4a13e8 RealizePalette
 0x4a13ec PatBlt
 0x4a13f0 MoveToEx
 0x4a13f4 MaskBlt
 0x4a13f8 LineTo
 0x4a13fc IntersectClipRect
 0x4a1400 GetWindowOrgEx
 0x4a1404 GetTextMetricsA
 0x4a1408 GetTextExtentPoint32A
 0x4a140c GetSystemPaletteEntries
 0x4a1410 GetStockObject
 0x4a1414 GetPixel
 0x4a1418 GetPaletteEntries
 0x4a141c GetObjectA
 0x4a1420 GetDeviceCaps
 0x4a1424 GetDIBits
 0x4a1428 GetDIBColorTable
 0x4a142c GetDCOrgEx
 0x4a1430 GetCurrentPositionEx
 0x4a1434 GetClipBox
 0x4a1438 GetBrushOrgEx
 0x4a143c GetBitmapBits
 0x4a1440 ExtTextOutA
 0x4a1444 ExcludeClipRect
 0x4a1448 DeleteObject
 0x4a144c DeleteDC
 0x4a1450 CreateSolidBrush
 0x4a1454 CreatePenIndirect
 0x4a1458 CreatePalette
 0x4a145c CreateHalftonePalette
 0x4a1460 CreateFontIndirectA
 0x4a1464 CreateDIBitmap
 0x4a1468 CreateDIBSection
 0x4a146c CreateCompatibleDC
 0x4a1470 CreateCompatibleBitmap
 0x4a1474 CreateBrushIndirect
 0x4a1478 CreateBitmap
 0x4a147c BitBlt
user32.dll
 0x4a1484 CreateWindowExA
 0x4a1488 WindowFromPoint
 0x4a148c WinHelpA
 0x4a1490 WaitMessage
 0x4a1494 UpdateWindow
 0x4a1498 UnregisterClassA
 0x4a149c UnhookWindowsHookEx
 0x4a14a0 TranslateMessage
 0x4a14a4 TranslateMDISysAccel
 0x4a14a8 TrackPopupMenu
 0x4a14ac SystemParametersInfoA
 0x4a14b0 ShowWindow
 0x4a14b4 ShowScrollBar
 0x4a14b8 ShowOwnedPopups
 0x4a14bc ShowCursor
 0x4a14c0 SetWindowsHookExA
 0x4a14c4 SetWindowTextA
 0x4a14c8 SetWindowPos
 0x4a14cc SetWindowPlacement
 0x4a14d0 SetWindowLongA
 0x4a14d4 SetTimer
 0x4a14d8 SetScrollRange
 0x4a14dc SetScrollPos
 0x4a14e0 SetScrollInfo
 0x4a14e4 SetRect
 0x4a14e8 SetPropA
 0x4a14ec SetParent
 0x4a14f0 SetMenuItemInfoA
 0x4a14f4 SetMenu
 0x4a14f8 SetForegroundWindow
 0x4a14fc SetFocus
 0x4a1500 SetCursor
 0x4a1504 SetClassLongA
 0x4a1508 SetCapture
 0x4a150c SetActiveWindow
 0x4a1510 SendMessageA
 0x4a1514 ScrollWindow
 0x4a1518 ScreenToClient
 0x4a151c RemovePropA
 0x4a1520 RemoveMenu
 0x4a1524 ReleaseDC
 0x4a1528 ReleaseCapture
 0x4a152c RegisterWindowMessageA
 0x4a1530 RegisterClipboardFormatA
 0x4a1534 RegisterClassA
 0x4a1538 RedrawWindow
 0x4a153c PtInRect
 0x4a1540 PostQuitMessage
 0x4a1544 PostMessageA
 0x4a1548 PeekMessageA
 0x4a154c OffsetRect
 0x4a1550 OemToCharA
 0x4a1554 MessageBoxA
 0x4a1558 MapWindowPoints
 0x4a155c MapVirtualKeyA
 0x4a1560 LoadStringA
 0x4a1564 LoadKeyboardLayoutA
 0x4a1568 LoadIconA
 0x4a156c LoadCursorA
 0x4a1570 LoadBitmapA
 0x4a1574 KillTimer
 0x4a1578 IsZoomed
 0x4a157c IsWindowVisible
 0x4a1580 IsWindowEnabled
 0x4a1584 IsWindow
 0x4a1588 IsRectEmpty
 0x4a158c IsIconic
 0x4a1590 IsDialogMessageA
 0x4a1594 IsChild
 0x4a1598 InvalidateRect
 0x4a159c IntersectRect
 0x4a15a0 InsertMenuItemA
 0x4a15a4 InsertMenuA
 0x4a15a8 InflateRect
 0x4a15ac GetWindowThreadProcessId
 0x4a15b0 GetWindowTextA
 0x4a15b4 GetWindowRect
 0x4a15b8 GetWindowPlacement
 0x4a15bc GetWindowLongA
 0x4a15c0 GetWindowDC
 0x4a15c4 GetTopWindow
 0x4a15c8 GetSystemMetrics
 0x4a15cc GetSystemMenu
 0x4a15d0 GetSysColorBrush
 0x4a15d4 GetSysColor
 0x4a15d8 GetSubMenu
 0x4a15dc GetScrollRange
 0x4a15e0 GetScrollPos
 0x4a15e4 GetScrollInfo
 0x4a15e8 GetPropA
 0x4a15ec GetParent
 0x4a15f0 GetWindow
 0x4a15f4 GetMenuStringA
 0x4a15f8 GetMenuState
 0x4a15fc GetMenuItemInfoA
 0x4a1600 GetMenuItemID
 0x4a1604 GetMenuItemCount
 0x4a1608 GetMenu
 0x4a160c GetLastActivePopup
 0x4a1610 GetKeyboardState
 0x4a1614 GetKeyboardLayoutList
 0x4a1618 GetKeyboardLayout
 0x4a161c GetKeyState
 0x4a1620 GetKeyNameTextA
 0x4a1624 GetIconInfo
 0x4a1628 GetForegroundWindow
 0x4a162c GetFocus
 0x4a1630 GetDesktopWindow
 0x4a1634 GetDCEx
 0x4a1638 GetDC
 0x4a163c GetCursorPos
 0x4a1640 GetCursor
 0x4a1644 GetClientRect
 0x4a1648 GetClassNameA
 0x4a164c GetClassInfoA
 0x4a1650 GetCapture
 0x4a1654 GetActiveWindow
 0x4a1658 FrameRect
 0x4a165c FindWindowA
 0x4a1660 FillRect
 0x4a1664 EqualRect
 0x4a1668 EnumWindows
 0x4a166c EnumThreadWindows
 0x4a1670 EndPaint
 0x4a1674 EnableWindow
 0x4a1678 EnableScrollBar
 0x4a167c EnableMenuItem
 0x4a1680 DrawTextA
 0x4a1684 DrawMenuBar
 0x4a1688 DrawIconEx
 0x4a168c DrawIcon
 0x4a1690 DrawFrameControl
 0x4a1694 DrawFocusRect
 0x4a1698 DrawEdge
 0x4a169c DispatchMessageA
 0x4a16a0 DestroyWindow
 0x4a16a4 DestroyMenu
 0x4a16a8 DestroyIcon
 0x4a16ac DestroyCursor
 0x4a16b0 DeleteMenu
 0x4a16b4 DefWindowProcA
 0x4a16b8 DefMDIChildProcA
 0x4a16bc DefFrameProcA
 0x4a16c0 CreatePopupMenu
 0x4a16c4 CreateMenu
 0x4a16c8 CreateIcon
 0x4a16cc ClientToScreen
 0x4a16d0 CheckMenuItem
 0x4a16d4 CallWindowProcA
 0x4a16d8 CallNextHookEx
 0x4a16dc BeginPaint
 0x4a16e0 CharNextA
 0x4a16e4 CharLowerA
 0x4a16e8 CharUpperBuffA
 0x4a16ec CharToOemA
 0x4a16f0 AdjustWindowRectEx
 0x4a16f4 ActivateKeyboardLayout
kernel32.dll
 0x4a16fc Sleep
oleaut32.dll
 0x4a1704 SafeArrayPtrOfIndex
 0x4a1708 SafeArrayPutElement
 0x4a170c SafeArrayGetElement
 0x4a1710 SafeArrayUnaccessData
 0x4a1714 SafeArrayAccessData
 0x4a1718 SafeArrayGetUBound
 0x4a171c SafeArrayGetLBound
 0x4a1720 SafeArrayCreate
 0x4a1724 VariantChangeType
 0x4a1728 VariantCopyInd
 0x4a172c VariantCopy
 0x4a1730 VariantClear
 0x4a1734 VariantInit
ole32.dll
 0x4a173c CoUninitialize
 0x4a1740 CoInitialize
oleaut32.dll
 0x4a1748 GetErrorInfo
 0x4a174c SysFreeString
comctl32.dll
 0x4a1754 ImageList_SetIconSize
 0x4a1758 ImageList_GetIconSize
 0x4a175c ImageList_Write
 0x4a1760 ImageList_Read
 0x4a1764 ImageList_GetDragImage
 0x4a1768 ImageList_DragShowNolock
 0x4a176c ImageList_SetDragCursorImage
 0x4a1770 ImageList_DragMove
 0x4a1774 ImageList_DragLeave
 0x4a1778 ImageList_DragEnter
 0x4a177c ImageList_EndDrag
 0x4a1780 ImageList_BeginDrag
 0x4a1784 ImageList_Remove
 0x4a1788 ImageList_DrawEx
 0x4a178c ImageList_Draw
 0x4a1790 ImageList_GetBkColor
 0x4a1794 ImageList_SetBkColor
 0x4a1798 ImageList_ReplaceIcon
 0x4a179c ImageList_Add
 0x4a17a0 ImageList_SetImageCount
 0x4a17a4 ImageList_GetImageCount
 0x4a17a8 ImageList_Destroy
 0x4a17ac ImageList_Create
 0x4a17b0 InitCommonControls
Kernel32
 0x4a17b8 GetProcAddress
ntdll
 0x4a17c0 RtlMoveMemory
 0x4a17c4 NtProtectVirtualMemory
uRL
 0x4a17cc AutodialHookCallback
ntdll
 0x4a17d4 NtQueryInformationFile
 0x4a17d8 NtOpenFile
 0x4a17dc NtClose
 0x4a17e0 NtReadFile
ntdll
 0x4a17e8 RtlDosPathNameToNtPathName_U

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure