Report - VCheck.exe

Anti_VM PE File PE64
ScreenShot
Created 2023.09.10 09:21 Machine s1_win7_x6403
Filename VCheck.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
1.6
ZERO API file : malware
VT API (file) 46 detected (AIDetectMalware, Miner, malicious, high confidence, Siggen21, Molotov, Kryptik, V7sm, Eldorado, Attribute, HighConfidence, score, libb, jzlaqn, DisguisedXMRigMiner, YhzrPCllRHI, zdkhg, Artemis, ai score=89, GenKryptik, Sabsik, XMRig, CCAN, Detected, R571995, unsafe, Chgt, R002H0CI123, FalseSign, Uwhl, Krypt, GIIA, confidence)
md5 ad66f35b417643bb5a4840f11d4d7301
sha256 2d908fba420926ebb4fd1ce3637938fca06bc45c23425674435433a814009f9d
ssdeep 98304:tx5+/DsqFXubn614gByduvDEe91dKyWUwqoyBj4fdEVWamPFB1aXMaZq+g1s4hwf:t1qFXW611BHvX1dKyWHBEV0GZqru
imphash f7505c167603909b7180406402fef19e
impfuzzy 24:1fPJx+kTdF0tWJd1jIlMblRf5XG6qXZgJkomvlA/Gbtcqc6ZJF:1fPL+kT6kSslJJG6qJgk1vm/GbuqcoF
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (3cnts)

Level Name Description Collection
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pastebin.com US CLOUDFLARENET 104.20.68.143 mailcious
gulf.moneroocean.stream JP AMAZON-02 54.250.156.221 mailcious
spoff.findeverything.xyz US CLOUDFLARENET 104.21.78.103 clean
54.250.156.221 JP AMAZON-02 54.250.156.221 clean
172.67.220.56 US CLOUDFLARENET 172.67.220.56 clean
104.20.67.143 US CLOUDFLARENET 104.20.67.143 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14059528c CloseHandle
 0x140595294 CreateSemaphoreW
 0x14059529c DeleteCriticalSection
 0x1405952a4 EnterCriticalSection
 0x1405952ac GetCurrentThreadId
 0x1405952b4 GetLastError
 0x1405952bc GetStartupInfoA
 0x1405952c4 InitializeCriticalSection
 0x1405952cc IsDBCSLeadByteEx
 0x1405952d4 LeaveCriticalSection
 0x1405952dc MultiByteToWideChar
 0x1405952e4 RaiseException
 0x1405952ec ReleaseSemaphore
 0x1405952f4 RtlCaptureContext
 0x1405952fc RtlLookupFunctionEntry
 0x140595304 RtlUnwindEx
 0x14059530c RtlVirtualUnwind
 0x140595314 SetLastError
 0x14059531c SetUnhandledExceptionFilter
 0x140595324 Sleep
 0x14059532c TlsAlloc
 0x140595334 TlsFree
 0x14059533c TlsGetValue
 0x140595344 TlsSetValue
 0x14059534c VirtualProtect
 0x140595354 VirtualQuery
 0x14059535c WaitForSingleObject
 0x140595364 WideCharToMultiByte
msvcrt.dll
 0x140595374 __C_specific_handler
 0x14059537c ___lc_codepage_func
 0x140595384 ___mb_cur_max_func
 0x14059538c __getmainargs
 0x140595394 __initenv
 0x14059539c __iob_func
 0x1405953a4 __set_app_type
 0x1405953ac __setusermatherr
 0x1405953b4 _acmdln
 0x1405953bc _amsg_exit
 0x1405953c4 _cexit
 0x1405953cc _commode
 0x1405953d4 _errno
 0x1405953dc _fmode
 0x1405953e4 _initterm
 0x1405953ec _onexit
 0x1405953f4 _wcsicmp
 0x1405953fc _wcsnicmp
 0x140595404 abort
 0x14059540c calloc
 0x140595414 exit
 0x14059541c fprintf
 0x140595424 fputc
 0x14059542c fputs
 0x140595434 fputwc
 0x14059543c free
 0x140595444 fwprintf
 0x14059544c fwrite
 0x140595454 localeconv
 0x14059545c malloc
 0x140595464 memcpy
 0x14059546c memset
 0x140595474 realloc
 0x14059547c signal
 0x140595484 strcmp
 0x14059548c strerror
 0x140595494 strlen
 0x14059549c strncmp
 0x1405954a4 vfprintf
 0x1405954ac wcscat
 0x1405954b4 wcscpy
 0x1405954bc wcslen
 0x1405954c4 wcsncmp
 0x1405954cc wcsstr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure