Report - YoDo_Fake.exe

UPX Malicious Library OS Processor Check PE File PE32
ScreenShot
Created 2023.07.12 07:44 Machine s1_win7_x6401
Filename YoDo_Fake.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
6
Behavior Score
1.4
ZERO API
VT API (file) 32 detected (AIDetectMalware, Coins, malicious, high confidence, Artemis, Save, Attribute, HighConfidence, PWSX, AMADEY, YXDGKZ, Static AI, Suspicious PE, SpywareX, CRDB, Detected, ZexaF, hqW@aG9InDn, BScope, Chgt, Generic@AI, RDML, IMGCJz7UY6UvSH03hyjlYA, Outbreak, PossibleThreat, confidence, 100%)
md5 10adfd55d2fe1b14553f911adc389e89
sha256 a1e9ac36f287a51c929becd38de41a536962e7f1c1ef3e954eeb5da0101bd7a3
ssdeep 3072:ceImo5mf7mNlQw2+IvEuyrAAmU9JpdaNKNezb629Tf6O+BUnfvg0I0IM07V4Qr/c:ceGxMUbdqgw
imphash 824637e9faa330dbb88c3aeabc598215
impfuzzy 24:rdvVboGcebnMURBtMS1JbJe1l3eDoLoEOovbOIj4ZHu93v4A5cjAjbRtDBrfRFht:rdV7cUBtMS1J+pXc3g4Arhzht
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
info Checks if process is being debugged by a debugger
info One or more processes crashed

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
cdn.discordapp.com Unknown 162.159.135.233
162.159.134.233 Unknown 162.159.134.233

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x416008 DecodePointer
 0x41600c RaiseException
 0x416010 GetLastError
 0x416014 HeapAlloc
 0x416018 GetProcessHeap
 0x41601c InitializeCriticalSectionEx
 0x416020 DeleteCriticalSection
 0x416024 GetTickCount
 0x416028 IsDebuggerPresent
 0x41602c MultiByteToWideChar
 0x416030 FreeConsole
 0x416034 OutputDebugStringW
 0x416038 EnterCriticalSection
 0x41603c LeaveCriticalSection
 0x416040 CloseHandle
 0x416044 CreateFileW
 0x416048 LoadLibraryA
 0x41604c GetTempPathA
 0x416050 SetFilePointerEx
 0x416054 GetConsoleMode
 0x416058 GetConsoleOutputCP
 0x41605c FlushFileBuffers
 0x416060 LCMapStringW
 0x416064 CompareStringW
 0x416068 UnhandledExceptionFilter
 0x41606c SetUnhandledExceptionFilter
 0x416070 GetCurrentProcess
 0x416074 TerminateProcess
 0x416078 IsProcessorFeaturePresent
 0x41607c QueryPerformanceCounter
 0x416080 GetCurrentProcessId
 0x416084 GetCurrentThreadId
 0x416088 GetSystemTimeAsFileTime
 0x41608c InitializeSListHead
 0x416090 GetStartupInfoW
 0x416094 GetModuleHandleW
 0x416098 RtlUnwind
 0x41609c SetLastError
 0x4160a0 EncodePointer
 0x4160a4 InitializeCriticalSectionAndSpinCount
 0x4160a8 TlsAlloc
 0x4160ac TlsGetValue
 0x4160b0 TlsSetValue
 0x4160b4 TlsFree
 0x4160b8 FreeLibrary
 0x4160bc GetProcAddress
 0x4160c0 LoadLibraryExW
 0x4160c4 GetStdHandle
 0x4160c8 WriteFile
 0x4160cc GetModuleFileNameW
 0x4160d0 ExitProcess
 0x4160d4 GetModuleHandleExW
 0x4160d8 GetCommandLineA
 0x4160dc GetCommandLineW
 0x4160e0 HeapFree
 0x4160e4 HeapSize
 0x4160e8 HeapReAlloc
 0x4160ec FindClose
 0x4160f0 FindFirstFileExW
 0x4160f4 FindNextFileW
 0x4160f8 IsValidCodePage
 0x4160fc GetACP
 0x416100 GetOEMCP
 0x416104 GetCPInfo
 0x416108 WideCharToMultiByte
 0x41610c GetEnvironmentStringsW
 0x416110 FreeEnvironmentStringsW
 0x416114 SetEnvironmentVariableW
 0x416118 SetStdHandle
 0x41611c GetFileType
 0x416120 GetStringTypeW
 0x416124 WriteConsoleW
USER32.dll
 0x41612c CharLowerA
ADVAPI32.dll
 0x416000 GetUserNameA
WINHTTP.dll
 0x416134 WinHttpOpenRequest
 0x416138 WinHttpCloseHandle
 0x41613c WinHttpOpen
 0x416140 WinHttpReadData
 0x416144 WinHttpReceiveResponse
 0x416148 WinHttpQueryDataAvailable
 0x41614c WinHttpSendRequest
 0x416150 WinHttpConnect

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure