Report - Rhay_92.exe

UPX Malicious Packer OS Processor Check PE File PE32
ScreenShot
Created 2023.08.07 18:39 Machine s1_win7_x6403
Filename Rhay_92.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
7
Behavior Score
2.0
ZERO API file : malware
VT API (file) 22 detected (AIDetectMalware, malicious, high confidence, Artemis, Save, confidence, 100%, ZexaE, My0@aukbgPxk, Attribute, HighConfidence, GenKryptik, GMOJ, score, CrypterX, Static AI, Suspicious PE, Rhadamanthys, Kryptik, CLOUD, Outbreak)
md5 664bffe24693a7575ffcdaf2e33d6188
sha256 7de67b4ae3475e1243c80ba446a8502ce25fec327288d81a28be69706b4d9d81
ssdeep 12288:2sjkDPRpsdgMGzN4wcZsHJHOa+YVFMKePHNPhaTGoXx4unuLT0Y9XEWSGqXUTjHL:2sjkDPRpcgMGzN43OHOKVF4vzErh4tfh
imphash 497393145c34e7a583c61d69d8db0bdb
impfuzzy 6:5rOM7y+j77ElCA15ujGMK971BOGDkBIJv/A+mvEETOHMREcJ8iPEcJ/TQF:wIy+j7A/lvbDrvscwXJXPXJcF
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 22 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x411000 GetCurrentProcess
 0x411004 VirtualAlloc
 0x411008 lstrlenA
 0x41100c WaitForSingleObject
 0x411010 GetModuleHandleA
 0x411014 CreateFileA
 0x411018 CloseHandle
 0x41101c FreeConsole
 0x411020 K32GetModuleInformation
 0x411024 CreateThread
 0x411028 HeapAlloc
 0x41102c GetProcAddress
 0x411030 CreateFileMappingA
 0x411034 FreeLibrary
 0x411038 MapViewOfFile
 0x41103c TerminateProcess
 0x411040 UnhandledExceptionFilter
 0x411044 SetUnhandledExceptionFilter
 0x411048 IsProcessorFeaturePresent

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure