Report - Install_WinX64X86.exe

Themida Packer Malicious Library PE File PE64
ScreenShot
Created 2023.09.02 18:40 Machine s1_win7_x6403
Filename Install_WinX64X86.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
2
Behavior Score
3.0
ZERO API file : malware
VT API (file) 21 detected (AIDetectMalware, Vo3u, malicious, confidence, 100%, Attribute, HighConfidence, high confidence, score, Static AI, Suspicious PE, GrayWare, Wacapew, Casdet, Artemis, Outbreak, PossibleThreat, PALLAS)
md5 ebd57653d474ebeb5c5df2c19df6912b
sha256 f4b17c300b847ffaee23c8391d8e9816f97e1cecf6ea453dafd3e57da73fd32a
ssdeep 98304:3hzMQFcIKsJatIXw4KpLwrWA5dgedb7a2ZO3u0f9gedfjp6/dgWxVwnSM61n3:3hzrFcIKdQlCwrWNeF7JZO3ucgedfj0R
imphash 0130bd85ad1b4bdd4689797fdfbef9b9
impfuzzy 24:zdOov+x0Jb9ttDRXIlyvp688T4Rfr1tQzRS5ROaT:zIFs4KpkcRfZtW4RlT
  Network IP location

Signature (5cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed

Rules (4cnts)

Level Name Description Collection
warning themida_packer themida packer binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
156.236.72.121 US HK Kwaifong Group Limited 156.236.72.121 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x14018d578 GetModuleHandleA
 0x14018d580 VirtualProtect
 0x14018d588 GetModuleHandleW
 0x14018d590 GetModuleFileNameW
 0x14018d598 GetCurrentThreadId
 0x14018d5a0 FlsSetValue
 0x14018d5a8 GetCommandLineA
 0x14018d5b0 RtlUnwindEx
 0x14018d5b8 EncodePointer
 0x14018d5c0 FlsGetValue
 0x14018d5c8 FlsFree
 0x14018d5d0 SetLastError
 0x14018d5d8 GetLastError
 0x14018d5e0 FlsAlloc
 0x14018d5e8 HeapFree
 0x14018d5f0 Sleep
 0x14018d5f8 GetProcAddress
 0x14018d600 ExitProcess
 0x14018d608 DecodePointer
 0x14018d610 SetHandleCount
 0x14018d618 GetStdHandle
 0x14018d620 InitializeCriticalSectionAndSpinCount
 0x14018d628 GetFileType
 0x14018d630 GetStartupInfoW
 0x14018d638 DeleteCriticalSection
 0x14018d640 GetModuleFileNameA
 0x14018d648 FreeEnvironmentStringsW
 0x14018d650 WideCharToMultiByte
 0x14018d658 GetEnvironmentStringsW
 0x14018d660 HeapSetInformation
 0x14018d668 GetVersion
 0x14018d670 HeapCreate
 0x14018d678 HeapDestroy
 0x14018d680 QueryPerformanceCounter
 0x14018d688 GetTickCount
 0x14018d690 GetCurrentProcessId
 0x14018d698 GetSystemTimeAsFileTime
 0x14018d6a0 LeaveCriticalSection
 0x14018d6a8 EnterCriticalSection
 0x14018d6b0 GetCPInfo
 0x14018d6b8 GetACP
 0x14018d6c0 GetOEMCP
 0x14018d6c8 IsValidCodePage
 0x14018d6d0 HeapAlloc
 0x14018d6d8 HeapReAlloc
 0x14018d6e0 LoadLibraryW
 0x14018d6e8 UnhandledExceptionFilter
 0x14018d6f0 SetUnhandledExceptionFilter
 0x14018d6f8 IsDebuggerPresent
 0x14018d700 RtlVirtualUnwind
 0x14018d708 RtlLookupFunctionEntry
 0x14018d710 RtlCaptureContext
 0x14018d718 TerminateProcess
 0x14018d720 GetCurrentProcess
 0x14018d728 WriteFile
 0x14018d730 LCMapStringW
 0x14018d738 MultiByteToWideChar
 0x14018d740 GetStringTypeW
 0x14018d748 HeapSize
USER32.dll
 0x14018d758 ShowWindow
ADVAPI32.dll
 0x14018d768 ConvertSidToStringSidW
SHELL32.dll
 0x14018d778 SHGetFolderPathW
CRYPT32.dll
 0x14018d788 CryptUnprotectData
NETAPI32.dll
 0x14018d798 NetUserEnum
WS2_32.dll
 0x14018d7a8 recv

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure