Report - index.exe

UPX Malicious Library OS Processor Check PE File PE32
ScreenShot
Created 2023.08.10 07:47 Machine s1_win7_x6403
Filename index.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
4.4
ZERO API file : clean
VT API (file)
md5 18462ea23f4eb50b95c5c3c30674f26c
sha256 fbf003e40568ccf053e2abd44541c8a2da441970e6e59231612de39ee0d0273e
ssdeep 12288:QNVVsrGvaRlb2nZS1dUpSp3fHdwBhT3eTcS5x:8VTPnZSXUpShfWBhT3ewS5
imphash c4d010441c17e8245adced7fdcad59f4
impfuzzy 24:UeDWjO/2pNcxBQFQHuOovbOZyvDh/J3IeRT4KgKHk9pxjMBLvApCwuQ+u9OAwR1E:UOYcxB73uDjhcKgKH6YLYpCHA+/M
  Network IP location

Signature (11cnts)

Level Description
watch Attempts to remove evidence of file being downloaded from the Internet
watch Communicates with host for which no DNS query was performed
watch Expresses interest in specific running processes
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
5.8.18.42 MD IP Volume inc 5.8.18.42 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x415014 FreeLibrary
 0x415018 GetProcAddress
 0x41501c GetLastError
 0x415020 LoadLibraryExW
 0x415024 CreateFileA
 0x415028 SetEndOfFile
 0x41502c GetModuleFileNameW
 0x415030 WideCharToMultiByte
 0x415034 GetFileAttributesW
 0x415038 ExpandEnvironmentStringsW
 0x41503c MultiByteToWideChar
 0x415040 HeapFree
 0x415044 GetVersionExA
 0x415048 HeapAlloc
 0x41504c GetProcessHeap
 0x415050 GetFullPathNameW
 0x415054 EnterCriticalSection
 0x415058 LeaveCriticalSection
 0x41505c GetFullPathNameA
 0x415060 GetCurrentProcess
 0x415064 SetUnhandledExceptionFilter
 0x415068 GetModuleHandleA
 0x41506c ExitProcess
 0x415070 WriteFile
 0x415074 GetStdHandle
 0x415078 GetModuleFileNameA
 0x41507c FreeEnvironmentStringsA
 0x415080 GetEnvironmentStrings
 0x415084 FreeEnvironmentStringsW
 0x415088 GetEnvironmentStringsW
 0x41508c GetCommandLineA
 0x415090 GetCommandLineW
 0x415094 SetHandleCount
 0x415098 GetFileType
 0x41509c GetStartupInfoA
 0x4150a0 DeleteCriticalSection
 0x4150a4 TlsGetValue
 0x4150a8 TlsAlloc
 0x4150ac TlsSetValue
 0x4150b0 TlsFree
 0x4150b4 InterlockedIncrement
 0x4150b8 SetLastError
 0x4150bc GetCurrentThreadId
 0x4150c0 InterlockedDecrement
 0x4150c4 HeapDestroy
 0x4150c8 HeapCreate
 0x4150cc VirtualFree
 0x4150d0 QueryPerformanceCounter
 0x4150d4 GetTickCount
 0x4150d8 GetCurrentProcessId
 0x4150dc GetSystemTimeAsFileTime
 0x4150e0 TerminateProcess
 0x4150e4 UnhandledExceptionFilter
 0x4150e8 IsDebuggerPresent
 0x4150ec GetCPInfo
 0x4150f0 GetACP
 0x4150f4 GetOEMCP
 0x4150f8 IsValidCodePage
 0x4150fc Sleep
 0x415100 VirtualAlloc
 0x415104 HeapReAlloc
 0x415108 RtlUnwind
 0x41510c CloseHandle
 0x415110 RaiseException
 0x415114 GetDriveTypeA
 0x415118 ReadFile
 0x41511c SetFilePointer
 0x415120 SetStdHandle
 0x415124 LoadLibraryA
 0x415128 InitializeCriticalSection
 0x41512c GetConsoleCP
 0x415130 GetConsoleMode
 0x415134 LCMapStringA
 0x415138 LCMapStringW
 0x41513c GetStringTypeA
 0x415140 GetStringTypeW
 0x415144 GetLocaleInfoA
 0x415148 GetCurrentDirectoryA
 0x41514c FlushFileBuffers
 0x415150 CompareStringA
 0x415154 CompareStringW
 0x415158 SetEnvironmentVariableA
 0x41515c CreateFileW
 0x415160 HeapSize
 0x415164 WriteConsoleA
 0x415168 GetConsoleOutputCP
 0x41516c WriteConsoleW
 0x415170 SetEnvironmentVariableW
USER32.dll
 0x415178 MessageBoxW
ADVAPI32.dll
 0x415000 RegQueryValueExW
 0x415004 RegCloseKey
 0x415008 RegEnumKeyExW
 0x41500c RegOpenKeyExW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure