Report - public.exe

Malicious Library UPX Malicious Packer PE File PE32
ScreenShot
Created 2023.08.24 17:54 Machine s1_win7_x6401
Filename public.exe
Type PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
3.8
ZERO API file : clean
VT API (file) 3 detected (AIDetectMalware, Malicious, Generic@AI, RDML, ZiUsBLym9NWu0JdGsMsoIA)
md5 d9d80ab4056a3d27e3b1783411b0d77f
sha256 d21bc1ba9cc1deca462d9b4b2f5617b7d5081ed29b0246640b46e81ed75634d8
ssdeep 24576:PPCkTOzoniTpGNRHcBBTzUYLBOmfc/tZHCXpDowoAzBtF60B0gxXV8IU/oH8CL86:oBiYgC3/0O0c78D18qWJ02rtkb5yq
imphash 9cbefe68f395e67356e2a5d8d1b285c0
impfuzzy 24:UbVjhNwO+VuT2oLtXOr6kwmDruMztxdEr6tP:KwO+VAXOmGx0oP
  Network IP location

Signature (6cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
notice File has been identified by 3 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
35.174.153.211 US AMAZON-AES 35.174.153.211 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x5970e0 WriteFile
 0x5970e4 WriteConsoleW
 0x5970e8 WaitForMultipleObjects
 0x5970ec WaitForSingleObject
 0x5970f0 VirtualQuery
 0x5970f4 VirtualFree
 0x5970f8 VirtualAlloc
 0x5970fc SwitchToThread
 0x597100 SuspendThread
 0x597104 SetWaitableTimer
 0x597108 SetUnhandledExceptionFilter
 0x59710c SetProcessPriorityBoost
 0x597110 SetEvent
 0x597114 SetErrorMode
 0x597118 SetConsoleCtrlHandler
 0x59711c ResumeThread
 0x597120 PostQueuedCompletionStatus
 0x597124 LoadLibraryA
 0x597128 LoadLibraryW
 0x59712c SetThreadContext
 0x597130 GetThreadContext
 0x597134 GetSystemInfo
 0x597138 GetSystemDirectoryA
 0x59713c GetStdHandle
 0x597140 GetQueuedCompletionStatusEx
 0x597144 GetProcessAffinityMask
 0x597148 GetProcAddress
 0x59714c GetEnvironmentStringsW
 0x597150 GetConsoleMode
 0x597154 FreeEnvironmentStringsW
 0x597158 ExitProcess
 0x59715c DuplicateHandle
 0x597160 CreateWaitableTimerExW
 0x597164 CreateThread
 0x597168 CreateIoCompletionPort
 0x59716c CreateFileA
 0x597170 CreateEventA
 0x597174 CloseHandle
 0x597178 AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure