Report - msvs.exe

Emotet UPX MPRESS PE64 PE File
ScreenShot
Created 2023.07.19 07:23 Machine s1_win7_x6401
Filename msvs.exe
Type MS-DOS executable, MZ for MS-DOS
AI Score
3
Behavior Score
1.4
ZERO API
VT API (file)
md5 e1cd1c30f4761a2bf4c878ef0a723435
sha256 b20d74c759e6d677148c3cf1ddac1056631d69ec738f098d2c8103782d8d82c6
ssdeep 98304:jBFr1GYY6ihQXeuhAgNcpdWK07pWUd/nwdAS:1/7kdEQUd/nwuS
imphash 79b3362178937bf9559741c46bb9e035
impfuzzy 3:sUx2AEZsS9KTXzW:nERGDW
  Network IP location

Signature (5cnts)

Level Description
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_2_Zero Win32 Trojan Emotet binaries (upload)
watch MPRESS_Zero MPRESS packed file binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32
 0xd27028 GetModuleHandleA
 0xd27030 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure