Report - latestX.exe

PE64 PE File
ScreenShot
Created 2023.08.07 08:28 Machine s1_win7_x6401
Filename latestX.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
2
Behavior Score
1.6
ZERO API file : clean
VT API (file) 40 detected (malicious, high confidence, score, Artemis, Save, Reflo, Kryptik, Eldorado, Attribute, HighConfidence, GenKryptik, GIIA, Molotov, FalseSign, Rcnw, Static AI, Suspicious PE, Xmrig, Detected, R568362, ai score=87, unsafe, tSjl4DNY5BP, Krypt, confidence, 100%)
md5 bae29e49e8190bfbbf0d77ffab8de59d
sha256 f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
ssdeep 49152:MMcDmMRlBdzs3EThgR0uEqBXLdcJAbtNmbOHaGhEospqOziZXAfrrARS7JL2ozPX:dcdrCET8XeospuZXAf0EJyocDKIVDT05
imphash d3be2dc19ba54f7225d7679c3f791cf7
impfuzzy 24:1fPJx+kTdF0tWJd1jIlMblRf5XG6qXZgJkomvlA/GbtcqcJvZJF:1fPL+kT6kSslJJG6qJgk1vm/GbuqcJLF
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
xmr-eu1.nanopool.org GB Online S.a.s. 163.172.154.142 mailcious
pastebin.com US CLOUDFLARENET 104.20.68.143 mailcious
51.68.143.81 FR OVH SAS 51.68.143.81 clean
163.172.154.142 GB Online S.a.s. 163.172.154.142 clean
172.67.34.170 US CLOUDFLARENET 172.67.34.170 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14059c29c CloseHandle
 0x14059c2a4 CreateSemaphoreW
 0x14059c2ac DeleteCriticalSection
 0x14059c2b4 EnterCriticalSection
 0x14059c2bc GetCurrentThreadId
 0x14059c2c4 GetLastError
 0x14059c2cc GetStartupInfoA
 0x14059c2d4 InitializeCriticalSection
 0x14059c2dc IsDBCSLeadByteEx
 0x14059c2e4 LeaveCriticalSection
 0x14059c2ec MultiByteToWideChar
 0x14059c2f4 RaiseException
 0x14059c2fc ReleaseSemaphore
 0x14059c304 RtlCaptureContext
 0x14059c30c RtlLookupFunctionEntry
 0x14059c314 RtlUnwindEx
 0x14059c31c RtlVirtualUnwind
 0x14059c324 SetLastError
 0x14059c32c SetUnhandledExceptionFilter
 0x14059c334 Sleep
 0x14059c33c TlsAlloc
 0x14059c344 TlsFree
 0x14059c34c TlsGetValue
 0x14059c354 TlsSetValue
 0x14059c35c VirtualProtect
 0x14059c364 VirtualQuery
 0x14059c36c WaitForSingleObject
 0x14059c374 WideCharToMultiByte
msvcrt.dll
 0x14059c384 __C_specific_handler
 0x14059c38c ___lc_codepage_func
 0x14059c394 ___mb_cur_max_func
 0x14059c39c __getmainargs
 0x14059c3a4 __initenv
 0x14059c3ac __iob_func
 0x14059c3b4 __set_app_type
 0x14059c3bc __setusermatherr
 0x14059c3c4 _acmdln
 0x14059c3cc _amsg_exit
 0x14059c3d4 _cexit
 0x14059c3dc _commode
 0x14059c3e4 _errno
 0x14059c3ec _fmode
 0x14059c3f4 _initterm
 0x14059c3fc _onexit
 0x14059c404 _wcsicmp
 0x14059c40c _wcsnicmp
 0x14059c414 abort
 0x14059c41c calloc
 0x14059c424 exit
 0x14059c42c fprintf
 0x14059c434 fputc
 0x14059c43c fputs
 0x14059c444 fputwc
 0x14059c44c free
 0x14059c454 fwprintf
 0x14059c45c fwrite
 0x14059c464 localeconv
 0x14059c46c malloc
 0x14059c474 memcpy
 0x14059c47c memset
 0x14059c484 realloc
 0x14059c48c signal
 0x14059c494 strcat
 0x14059c49c strcmp
 0x14059c4a4 strerror
 0x14059c4ac strlen
 0x14059c4b4 strncmp
 0x14059c4bc strstr
 0x14059c4c4 vfprintf
 0x14059c4cc wcscat
 0x14059c4d4 wcscpy
 0x14059c4dc wcslen
 0x14059c4e4 wcsncmp
 0x14059c4ec wcsstr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure