Report - msmnr.exe

Themida Packer Generic Malware UPX Admin Tool (Sysinternals etc ...) PE64 PE File
ScreenShot
Created 2023.07.19 07:22 Machine s1_win7_x6403
Filename msmnr.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
5
Behavior Score
1.8
ZERO API
VT API (file)
md5 c74b706ecaa058e6e71e7b4b64dff9df
sha256 c2520a713db1ddda557dc6d4ace41e12d02bde143df9275e5fcc48a0fea8a21f
ssdeep 196608:1eEh/wahCzMraCScy0AP9juUvsIsbr2wSPjxcntvAa9VkGhAUCc:1eEx/hwMLzwaUvIrkPafkGhn
imphash 35a81d16af9f2ba6d515f11152d0364b
impfuzzy 3:sUx2AEBgG9MMGmi/yn:nEBgkMGiq
  Network IP location

Signature (5cnts)

Level Description
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
warning themida_packer themida packer binaries (upload)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x140a51080 GetModuleHandleA
msvcrt.dll
 0x140a51090 __C_specific_handler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure