Report - a.exe

PE File PE64
ScreenShot
Created 2023.08.25 09:36 Machine s1_win7_x6401
Filename a.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
2
Behavior Score
1.0
ZERO API file : clean
VT API (file) 13 detected (AIDetectMalware, malicious, Attribute, HighConfidence, high confidence, score, EPACK, Gen2, BlackLotus, Krypt, Static AI, Suspicious PE, susgen, confidence, 100%)
md5 009a6a218685242e3525785807bfb86d
sha256 14855a24a8cb106e17384e66642522690d5603b77dc9b98769198898d36ccc3a
ssdeep 49152:3LzuaR9Zp3CBHgMNoYRhRQfrf5n9sBFJT5VuSdtBZV4zqWrHgDF08OaBJOVhR7N8:NR9WBHgM6Ybq96bAk000PaQCfolwxk+
imphash 84364258335aa120aa66630a9ee645bf
impfuzzy 12:YRJRJJoARZqRVPXJHqV0MHHGf5XGXKiEG6eGJwk6lm/GaJqhiZJn:8fjBcVK0MGf5XGf6Zykom/GCqgZJn
  Network IP location

Signature (2cnts)

Level Description
watch File has been identified by 13 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14057c190 DeleteCriticalSection
 0x14057c198 EnterCriticalSection
 0x14057c1a0 GetLastError
 0x14057c1a8 InitializeCriticalSection
 0x14057c1b0 LeaveCriticalSection
 0x14057c1b8 SetUnhandledExceptionFilter
 0x14057c1c0 Sleep
 0x14057c1c8 TlsGetValue
 0x14057c1d0 VirtualProtect
 0x14057c1d8 VirtualQuery
msvcrt.dll
 0x14057c1e8 __C_specific_handler
 0x14057c1f0 __getmainargs
 0x14057c1f8 __initenv
 0x14057c200 __iob_func
 0x14057c208 __set_app_type
 0x14057c210 __setusermatherr
 0x14057c218 _amsg_exit
 0x14057c220 _cexit
 0x14057c228 _commode
 0x14057c230 _fmode
 0x14057c238 _initterm
 0x14057c240 _onexit
 0x14057c248 abort
 0x14057c250 calloc
 0x14057c258 exit
 0x14057c260 fprintf
 0x14057c268 fputs
 0x14057c270 free
 0x14057c278 malloc
 0x14057c280 signal
 0x14057c288 strlen
 0x14057c290 strncmp
 0x14057c298 vfprintf
 0x14057c2a0 wcscat
 0x14057c2a8 wcscpy
 0x14057c2b0 wcslen
 0x14057c2b8 wcsncmp
 0x14057c2c0 wcsstr
 0x14057c2c8 _wcsnicmp
 0x14057c2d0 _wcsicmp

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure