Report - 55aa5e.exe

Emotet Malicious Library UPX VMProtect PE File PE32
ScreenShot
Created 2023.09.06 17:22 Machine s1_win7_x6401
Filename 55aa5e.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
5.2
ZERO API file : malware
VT API (file) 43 detected (AIDetectMalware, malicious, high confidence, GenericKD, Gencbl, Vblk, ZexaF, @J1@a0x67VhG, ABRisk, ZCOY, Attribute, HighConfidence, score, etqk, MalwareX, Gencirc, srnwd, AMADEY, YXDIBZ, Artemis, high, ai score=82, Wacatac, Detected, BotX, R602829, unsafe, Chgt, h21d4noU50C, susgen, confidence)
md5 78eb8723e130e9fa470b87208650fe31
sha256 a03e2e89dce3e17342eb06426afccb493b05ecc4b41b6f702a2104222a7867ca
ssdeep 98304:nS43xahSd6uMY2YDrL+HAiREyJTtJ+BbMdEULa0kGlV35spy45MXFoWMmwTns7ct:nkYBrwEy8BbDGV35spuVRM9nRpc7v+D
imphash ecb125da1bbce59b61a3dc18c66efab2
impfuzzy 6:AqFRgKLbV6n9GjXA8VyH/JLGMZ/OiBJAEnERGDW:7RgZ9Ww8sZGMZGqAJcDW
  Network IP location

Signature (13cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (6cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_2_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x7c6000 GetVersionExW
ADVAPI32.dll
 0x7c6008 RegCloseKey
SHELL32.dll
 0x7c6010 ShellExecuteA
WININET.dll
 0x7c6018 HttpOpenRequestA
KERNEL32.dll
 0x7c6020 GetSystemTimeAsFileTime
USER32.dll
 0x7c6028 CharUpperBuffW
KERNEL32.dll
 0x7c6030 LocalAlloc
 0x7c6034 LocalFree
 0x7c6038 GetModuleFileNameW
 0x7c603c ExitProcess
 0x7c6040 LoadLibraryA
 0x7c6044 GetModuleHandleA
 0x7c6048 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure