Report - 123.exe

PE File PE64
ScreenShot
Created 2023.09.07 17:47 Machine s1_win7_x6403
Filename 123.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
1
Behavior Score
1.8
ZERO API file : malware
VT API (file) 31 detected (AIDetectMalware, malicious, high confidence, Molotov, Eldorado, Attribute, HighConfidence, score, Reflo, CrypterX, Gencirc, Sabsik, Detected, ai score=86, G0bkKzjdiCR, GenKryptik, GIIA)
md5 4c328b215a84c1b2c982a3268b4a0cea
sha256 3761032e760a2bcc61854a0c7cf22e8e991af0ed60fac92b981853eadda00d1a
ssdeep 196608:OB+EV10gI3ZrS8kJ9SW1Y9ILzsjTL0UkhtUuQ:OB+MOgIZSD1Y9ILzsb0U+tUuQ
imphash fc274ceb5aa20e8c9a5eb18d1be9c77c
impfuzzy 24:1fPJx+kTdF0tWJd1jIlMblRf5XG6qXZ5JkomvlA/GbtcqcFZJF:1fPL+kT6kSslJJG6qJvk1vm/GbuqcdF
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 31 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pool.hashvault.pro AU FireNet Pty Ltd 125.253.92.50 mailcious
125.253.92.50 AU FireNet Pty Ltd 125.253.92.50 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1409f12a4 CloseHandle
 0x1409f12ac CreateSemaphoreW
 0x1409f12b4 DeleteCriticalSection
 0x1409f12bc EnterCriticalSection
 0x1409f12c4 GetCurrentThreadId
 0x1409f12cc GetLastError
 0x1409f12d4 GetStartupInfoA
 0x1409f12dc InitializeCriticalSection
 0x1409f12e4 IsDBCSLeadByteEx
 0x1409f12ec LeaveCriticalSection
 0x1409f12f4 MultiByteToWideChar
 0x1409f12fc RaiseException
 0x1409f1304 ReleaseSemaphore
 0x1409f130c RtlCaptureContext
 0x1409f1314 RtlLookupFunctionEntry
 0x1409f131c RtlUnwindEx
 0x1409f1324 RtlVirtualUnwind
 0x1409f132c SetLastError
 0x1409f1334 SetUnhandledExceptionFilter
 0x1409f133c Sleep
 0x1409f1344 TlsAlloc
 0x1409f134c TlsFree
 0x1409f1354 TlsGetValue
 0x1409f135c TlsSetValue
 0x1409f1364 VirtualProtect
 0x1409f136c VirtualQuery
 0x1409f1374 WaitForSingleObject
 0x1409f137c WideCharToMultiByte
msvcrt.dll
 0x1409f138c __C_specific_handler
 0x1409f1394 ___lc_codepage_func
 0x1409f139c ___mb_cur_max_func
 0x1409f13a4 __getmainargs
 0x1409f13ac __initenv
 0x1409f13b4 __iob_func
 0x1409f13bc __set_app_type
 0x1409f13c4 __setusermatherr
 0x1409f13cc _acmdln
 0x1409f13d4 _amsg_exit
 0x1409f13dc _cexit
 0x1409f13e4 _commode
 0x1409f13ec _errno
 0x1409f13f4 _fmode
 0x1409f13fc _initterm
 0x1409f1404 _onexit
 0x1409f140c _time64
 0x1409f1414 _wcsicmp
 0x1409f141c _wcsnicmp
 0x1409f1424 abort
 0x1409f142c calloc
 0x1409f1434 exit
 0x1409f143c fprintf
 0x1409f1444 fputc
 0x1409f144c fputs
 0x1409f1454 fputwc
 0x1409f145c free
 0x1409f1464 fwprintf
 0x1409f146c fwrite
 0x1409f1474 localeconv
 0x1409f147c malloc
 0x1409f1484 memcpy
 0x1409f148c memset
 0x1409f1494 realloc
 0x1409f149c rand
 0x1409f14a4 signal
 0x1409f14ac srand
 0x1409f14b4 strcmp
 0x1409f14bc strerror
 0x1409f14c4 strlen
 0x1409f14cc strncmp
 0x1409f14d4 vfprintf
 0x1409f14dc wcscat
 0x1409f14e4 wcscpy
 0x1409f14ec wcslen
 0x1409f14f4 wcsncmp
 0x1409f14fc wcsstr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure