Report - videoLan.exe

PE64 PE File
ScreenShot
Created 2023.07.28 17:39 Machine s1_win7_x6403
Filename videoLan.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
1
Behavior Score
2.0
ZERO API file : clean
VT API (file) 41 detected (Common, malicious, high confidence, Barys, unsafe, score, GenKryptik, Eldorado, Attribute, HighConfidence, GIIA, Tedy, Reflo, jxokdc, Siggen21, R002C0XGM23, Static AI, Suspicious PE, Wacatac, Detected, R570614, ai score=83, Gencirc, Krypt, Chgt, confidence, 100%)
md5 62472c78b3ab085422418e49dd2aa11c
sha256 ef256556b6749f441874b9d86e2c35c693fdc6d358ce2bb58bb2ba2e2cd939d5
ssdeep 98304:wvwPndUBiFUg37BdTNJsl1cHZMjcXW7afr02BlDXFqv+nxRZWP/iSMgCW7owLCyy:wIPndf9uBGLfgWxR8XEguyk6QIOb
imphash f7505c167603909b7180406402fef19e
impfuzzy 24:1fPJx+kTdF0tWJd1jIlMblRf5XG6qXZgJkomvlA/Gbtcqc6ZJF:1fPL+kT6kSslJJG6qJgk1vm/GbuqcoF
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 41 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
mine.bmpool.org RO MivoCloud SRL 5.252.178.30 mailcious
5.252.178.30 RO MivoCloud SRL 5.252.178.30 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1405b928c CloseHandle
 0x1405b9294 CreateSemaphoreW
 0x1405b929c DeleteCriticalSection
 0x1405b92a4 EnterCriticalSection
 0x1405b92ac GetCurrentThreadId
 0x1405b92b4 GetLastError
 0x1405b92bc GetStartupInfoA
 0x1405b92c4 InitializeCriticalSection
 0x1405b92cc IsDBCSLeadByteEx
 0x1405b92d4 LeaveCriticalSection
 0x1405b92dc MultiByteToWideChar
 0x1405b92e4 RaiseException
 0x1405b92ec ReleaseSemaphore
 0x1405b92f4 RtlCaptureContext
 0x1405b92fc RtlLookupFunctionEntry
 0x1405b9304 RtlUnwindEx
 0x1405b930c RtlVirtualUnwind
 0x1405b9314 SetLastError
 0x1405b931c SetUnhandledExceptionFilter
 0x1405b9324 Sleep
 0x1405b932c TlsAlloc
 0x1405b9334 TlsFree
 0x1405b933c TlsGetValue
 0x1405b9344 TlsSetValue
 0x1405b934c VirtualProtect
 0x1405b9354 VirtualQuery
 0x1405b935c WaitForSingleObject
 0x1405b9364 WideCharToMultiByte
msvcrt.dll
 0x1405b9374 __C_specific_handler
 0x1405b937c ___lc_codepage_func
 0x1405b9384 ___mb_cur_max_func
 0x1405b938c __getmainargs
 0x1405b9394 __initenv
 0x1405b939c __iob_func
 0x1405b93a4 __set_app_type
 0x1405b93ac __setusermatherr
 0x1405b93b4 _acmdln
 0x1405b93bc _amsg_exit
 0x1405b93c4 _cexit
 0x1405b93cc _commode
 0x1405b93d4 _errno
 0x1405b93dc _fmode
 0x1405b93e4 _initterm
 0x1405b93ec _onexit
 0x1405b93f4 _wcsicmp
 0x1405b93fc _wcsnicmp
 0x1405b9404 abort
 0x1405b940c calloc
 0x1405b9414 exit
 0x1405b941c fprintf
 0x1405b9424 fputc
 0x1405b942c fputs
 0x1405b9434 fputwc
 0x1405b943c free
 0x1405b9444 fwprintf
 0x1405b944c fwrite
 0x1405b9454 localeconv
 0x1405b945c malloc
 0x1405b9464 memcpy
 0x1405b946c memset
 0x1405b9474 realloc
 0x1405b947c signal
 0x1405b9484 strcmp
 0x1405b948c strerror
 0x1405b9494 strlen
 0x1405b949c strncmp
 0x1405b94a4 vfprintf
 0x1405b94ac wcscat
 0x1405b94b4 wcscpy
 0x1405b94bc wcslen
 0x1405b94c4 wcsncmp
 0x1405b94cc wcsstr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure