Report - explore.exe

UPX Malicious Library OS Processor Check PE64 PE File
ScreenShot
Created 2023.07.26 17:31 Machine s1_win7_x6403
Filename explore.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
7
Behavior Score
3.8
ZERO API
VT API (file) 51 detected (Common, Rekvex, Zusy, Rozena, Vbsa, ABRisk, VDRD, Attribute, HighConfidence, malicious, high confidence, score, TrojanX, Gencirc, Redcap, nksry, R002C0XGP23, Detected, R521258, Artemis, ai score=80, unsafe, Chgt, IE1K4aiQOqH, JMMR, cwKE, susgen, confidence, 100%)
md5 0eb17599a6d6340826cde1fb9555a801
sha256 bf1462ab1a3cf16b7d68d3adf6e045445295dc6aeeb282a8aa2cbdfba764bae5
ssdeep 1536:uszP8laTTjQTUCoL+bfDioMqmmQqVsW3d09dlP9uCZc5:uszEmXQISLioMkQEMh9uC
imphash 3bd4d8d7ac218192f962c78cd0a6d8f2
impfuzzy 24:0McS1o0qtSmlJnc+pl3eDoTY2EOovbO3URZHu93vB3CgBU:AS1YtSkc+pp/YS3vBZe
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice One or more potentially interesting buffers were extracted
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
103.57.228.101 HK POWER LINE DATACENTER 103.57.228.101

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14000e000 VirtualAlloc
 0x14000e008 Sleep
 0x14000e010 WriteConsoleW
 0x14000e018 CloseHandle
 0x14000e020 CreateFileW
 0x14000e028 SetFilePointerEx
 0x14000e030 GetConsoleMode
 0x14000e038 QueryPerformanceCounter
 0x14000e040 GetCurrentProcessId
 0x14000e048 GetCurrentThreadId
 0x14000e050 GetSystemTimeAsFileTime
 0x14000e058 InitializeSListHead
 0x14000e060 RtlCaptureContext
 0x14000e068 RtlLookupFunctionEntry
 0x14000e070 RtlVirtualUnwind
 0x14000e078 IsDebuggerPresent
 0x14000e080 UnhandledExceptionFilter
 0x14000e088 SetUnhandledExceptionFilter
 0x14000e090 GetStartupInfoW
 0x14000e098 IsProcessorFeaturePresent
 0x14000e0a0 GetModuleHandleW
 0x14000e0a8 RtlUnwindEx
 0x14000e0b0 GetLastError
 0x14000e0b8 SetLastError
 0x14000e0c0 EnterCriticalSection
 0x14000e0c8 LeaveCriticalSection
 0x14000e0d0 DeleteCriticalSection
 0x14000e0d8 InitializeCriticalSectionAndSpinCount
 0x14000e0e0 TlsAlloc
 0x14000e0e8 TlsGetValue
 0x14000e0f0 TlsSetValue
 0x14000e0f8 TlsFree
 0x14000e100 FreeLibrary
 0x14000e108 GetProcAddress
 0x14000e110 LoadLibraryExW
 0x14000e118 RaiseException
 0x14000e120 GetStdHandle
 0x14000e128 WriteFile
 0x14000e130 GetModuleFileNameW
 0x14000e138 GetCurrentProcess
 0x14000e140 ExitProcess
 0x14000e148 TerminateProcess
 0x14000e150 GetModuleHandleExW
 0x14000e158 GetCommandLineA
 0x14000e160 GetCommandLineW
 0x14000e168 HeapAlloc
 0x14000e170 HeapFree
 0x14000e178 FindClose
 0x14000e180 FindFirstFileExW
 0x14000e188 FindNextFileW
 0x14000e190 IsValidCodePage
 0x14000e198 GetACP
 0x14000e1a0 GetOEMCP
 0x14000e1a8 GetCPInfo
 0x14000e1b0 MultiByteToWideChar
 0x14000e1b8 WideCharToMultiByte
 0x14000e1c0 GetEnvironmentStringsW
 0x14000e1c8 FreeEnvironmentStringsW
 0x14000e1d0 SetEnvironmentVariableW
 0x14000e1d8 SetStdHandle
 0x14000e1e0 GetFileType
 0x14000e1e8 GetStringTypeW
 0x14000e1f0 CompareStringW
 0x14000e1f8 LCMapStringW
 0x14000e200 GetProcessHeap
 0x14000e208 HeapSize
 0x14000e210 HeapReAlloc
 0x14000e218 FlushFileBuffers
 0x14000e220 GetConsoleOutputCP
WSOCK32.dll
 0x14000e230 send
 0x14000e238 socket
 0x14000e240 connect
 0x14000e248 recv
 0x14000e250 WSAStartup
 0x14000e258 closesocket

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure