Report - elevator.exe

UPX Malicious Library OS Processor Check PE64 PE File
ScreenShot
Created 2023.07.22 21:43 Machine s1_win7_x6403
Filename elevator.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
4
Behavior Score
1.0
ZERO API file : malware
VT API (file) 19 detected (Common, malicious, moderate confidence, Artemis, score, Sabsik, Elevator, unsafe, Sdum, wfZBXt833vN, PossibleThreat)
md5 5f6c86ec159f2b0d99f88bc3c3c6a641
sha256 4348d0d550e739807bfdd89524fbeb7f4300193f4cb9aa5a62dc219640be59a2
ssdeep 3072:9+bwPB64+8ZFjwMVuG74CHy/8c77uv6tvkNN0P3ohdeaEK8aTVcZIaKW:9+bwp64JjtVuG7Hy/7uv6tvNPVs+K
imphash 7cd0bbb42d4b316f99f5cabd76b4bcaa
impfuzzy 48:qWm9FvrXlYXPMvRWLeeduGdLy/ahLR7/7hy4FMPbBMLSQMBm:qWmrvrXlYXUvRWqeduGdL6avTdy4FKE
  Network IP location

Signature (3cnts)

Level Description
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140030020 GetCurrentProcess
 0x140030028 CloseHandle
 0x140030030 GetCurrentThread
 0x140030038 TerminateProcess
 0x140030040 AcquireSRWLockExclusive
 0x140030048 ReleaseSRWLockExclusive
 0x140030050 RtlCaptureContext
 0x140030058 ReleaseMutex
 0x140030060 WaitForSingleObjectEx
 0x140030068 LoadLibraryA
 0x140030070 CreateMutexA
 0x140030078 RtlLookupFunctionEntry
 0x140030080 GetLastError
 0x140030088 FormatMessageW
 0x140030090 FreeLibrary
 0x140030098 GetProcessHeap
 0x1400300a0 HeapFree
 0x1400300a8 HeapAlloc
 0x1400300b0 WaitForSingleObject
 0x1400300b8 ReleaseSRWLockShared
 0x1400300c0 AddVectoredExceptionHandler
 0x1400300c8 SetThreadStackGuarantee
 0x1400300d0 SetLastError
 0x1400300d8 GetCurrentDirectoryW
 0x1400300e0 GetEnvironmentVariableW
 0x1400300e8 SetThreadContext
 0x1400300f0 GetCommandLineW
 0x1400300f8 GetStdHandle
 0x140030100 GetCurrentProcessId
 0x140030108 QueryPerformanceCounter
 0x140030110 TryAcquireSRWLockExclusive
 0x140030118 HeapReAlloc
 0x140030120 AcquireSRWLockShared
 0x140030128 GetModuleHandleW
 0x140030130 GetModuleFileNameW
 0x140030138 TlsGetValue
 0x140030140 TlsSetValue
 0x140030148 GetSystemTimeAsFileTime
 0x140030150 GetConsoleMode
 0x140030158 WriteConsoleW
 0x140030160 GetThreadContext
 0x140030168 GetSystemInfo
 0x140030170 GetProcAddress
 0x140030178 GetModuleHandleA
 0x140030180 LoadLibraryExW
 0x140030188 TlsFree
 0x140030190 TlsAlloc
 0x140030198 InitializeCriticalSectionAndSpinCount
 0x1400301a0 DeleteCriticalSection
 0x1400301a8 EncodePointer
 0x1400301b0 RaiseException
 0x1400301b8 RtlPcToFileHeader
 0x1400301c0 RtlUnwindEx
 0x1400301c8 IsProcessorFeaturePresent
 0x1400301d0 SetUnhandledExceptionFilter
 0x1400301d8 UnhandledExceptionFilter
 0x1400301e0 IsDebuggerPresent
 0x1400301e8 RtlVirtualUnwind
 0x1400301f0 InitializeSListHead
 0x1400301f8 GetCurrentThreadId
ADVAPI32.dll
 0x140030000 RegQueryValueExW
 0x140030008 RegOpenKeyExW
 0x140030010 SystemFunction036
PSAPI.DLL
 0x140030208 EnumProcessModulesEx
 0x140030210 GetModuleBaseNameW
USER32.dll
 0x140030220 GetSystemMetrics
crypt.dll
 0x140030348 BCryptCloseAlgorithmProvider
 0x140030350 BCryptOpenAlgorithmProvider
 0x140030358 BCryptGenRandom
api-ms-win-crt-string-l1-1-0.dll
 0x140030330 strcpy_s
 0x140030338 wcsncmp
api-ms-win-crt-runtime-l1-1-0.dll
 0x140030278 terminate
 0x140030280 _crt_atexit
 0x140030288 _register_onexit_function
 0x140030290 _initialize_onexit_table
 0x140030298 _seh_filter_exe
 0x1400302a0 _set_app_type
 0x1400302a8 __p___argc
 0x1400302b0 _register_thread_local_exe_atexit_callback
 0x1400302b8 _configure_narrow_argv
 0x1400302c0 _initialize_narrow_environment
 0x1400302c8 _get_initial_narrow_environment
 0x1400302d0 __p___argv
 0x1400302d8 _initterm
 0x1400302e0 _c_exit
 0x1400302e8 _cexit
 0x1400302f0 abort
 0x1400302f8 _initterm_e
 0x140030300 _exit
 0x140030308 exit
api-ms-win-crt-math-l1-1-0.dll
 0x140030268 __setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll
 0x140030318 __p__commode
 0x140030320 _set_fmode
api-ms-win-crt-locale-l1-1-0.dll
 0x140030258 _configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll
 0x140030230 calloc
 0x140030238 malloc
 0x140030240 _set_new_mode
 0x140030248 free

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure