Report - cryptedBB.exe

UPX Malicious Library PE File PE32 OS Processor Check
ScreenShot
Created 2023.09.14 07:42 Machine s1_win7_x6403
Filename cryptedBB.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.0
ZERO API file : clean
VT API (file) 44 detected (AIDetectMalware, Injuke, GGQQ, Artemis, Kryptik, V5fo, malicious, confidence, 100%, GenusT, DRHP, Eldorado, Attribute, HighConfidence, high confidence, GenKryptik, GNTL, score, Exploitx, PWSX, Xmhl, Siggen21, Amadey, Detected, BScope, TrojanPSW, RedLine, ai score=80, unsafe, Genetic, Generic@AI, RDML, SkXjGqf3FF+CnL4vxLquoQ, susgen, ZexaF, CyW@a8vbECfi)
md5 3dd01710d9d6f58e5588ad656f0441a1
sha256 1c15a59b56b5298f4b02671994f7d19a28dca5e4dbe176204385ee95ddae174b
ssdeep 12288:jJ8kkfMfnuis006jmG9OmURt9RnYjc8PicANzf9:jWkkfGnbsvmURt2cWSf9
imphash 29c8b785823d6c11cf3aae5ebbb5f0e6
impfuzzy 24:QzEYBu5zbZETKAWJjFHcpVWZQDsl9dtW3u9EbJh9WG9OovbO3kFZMv5GMA+EZS:+ER5JOWDHcpVe/ptW7DJo30FZGP
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
notice Terminates another process
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x42b188 GetForegroundWindow
 0x42b18c CreatePopupMenu
 0x42b190 FlashWindowEx
ole32.dll
 0x42b198 CoGetApartmentType
 0x42b19c CoGetObjectContext
KERNEL32.dll
 0x42b000 CreateFileW
 0x42b004 HeapSize
 0x42b008 ReadConsoleW
 0x42b00c SetStdHandle
 0x42b010 GetProcessHeap
 0x42b014 GetLastError
 0x42b018 RaiseException
 0x42b01c GetCurrentThreadId
 0x42b020 IsProcessorFeaturePresent
 0x42b024 FreeLibraryWhenCallbackReturns
 0x42b028 CreateThreadpoolWork
 0x42b02c SubmitThreadpoolWork
 0x42b030 CloseThreadpoolWork
 0x42b034 GetModuleHandleExW
 0x42b038 MultiByteToWideChar
 0x42b03c InitializeConditionVariable
 0x42b040 WakeConditionVariable
 0x42b044 WakeAllConditionVariable
 0x42b048 SleepConditionVariableSRW
 0x42b04c InitOnceComplete
 0x42b050 InitOnceBeginInitialize
 0x42b054 GetStringTypeW
 0x42b058 InitializeSRWLock
 0x42b05c ReleaseSRWLockExclusive
 0x42b060 AcquireSRWLockExclusive
 0x42b064 TryAcquireSRWLockExclusive
 0x42b068 WideCharToMultiByte
 0x42b06c CloseHandle
 0x42b070 WaitForSingleObjectEx
 0x42b074 GetExitCodeThread
 0x42b078 QueryPerformanceCounter
 0x42b07c EnterCriticalSection
 0x42b080 LeaveCriticalSection
 0x42b084 InitializeCriticalSectionEx
 0x42b088 DeleteCriticalSection
 0x42b08c EncodePointer
 0x42b090 DecodePointer
 0x42b094 LCMapStringEx
 0x42b098 GetSystemTimeAsFileTime
 0x42b09c GetModuleHandleW
 0x42b0a0 GetProcAddress
 0x42b0a4 WriteConsoleW
 0x42b0a8 GetCPInfo
 0x42b0ac InitializeCriticalSectionAndSpinCount
 0x42b0b0 SetEvent
 0x42b0b4 ResetEvent
 0x42b0b8 CreateEventW
 0x42b0bc UnhandledExceptionFilter
 0x42b0c0 SetUnhandledExceptionFilter
 0x42b0c4 GetCurrentProcess
 0x42b0c8 TerminateProcess
 0x42b0cc IsDebuggerPresent
 0x42b0d0 GetStartupInfoW
 0x42b0d4 GetCurrentProcessId
 0x42b0d8 InitializeSListHead
 0x42b0dc SetEnvironmentVariableW
 0x42b0e0 RtlUnwind
 0x42b0e4 SetLastError
 0x42b0e8 TlsAlloc
 0x42b0ec TlsGetValue
 0x42b0f0 TlsSetValue
 0x42b0f4 TlsFree
 0x42b0f8 FreeLibrary
 0x42b0fc LoadLibraryExW
 0x42b100 CreateThread
 0x42b104 ExitThread
 0x42b108 FreeLibraryAndExitThread
 0x42b10c ExitProcess
 0x42b110 GetModuleFileNameW
 0x42b114 GetStdHandle
 0x42b118 WriteFile
 0x42b11c GetCommandLineA
 0x42b120 GetCommandLineW
 0x42b124 HeapAlloc
 0x42b128 HeapFree
 0x42b12c CompareStringW
 0x42b130 LCMapStringW
 0x42b134 GetLocaleInfoW
 0x42b138 IsValidLocale
 0x42b13c GetUserDefaultLCID
 0x42b140 EnumSystemLocalesW
 0x42b144 GetFileType
 0x42b148 GetFileSizeEx
 0x42b14c SetFilePointerEx
 0x42b150 FlushFileBuffers
 0x42b154 GetConsoleOutputCP
 0x42b158 GetConsoleMode
 0x42b15c ReadFile
 0x42b160 HeapReAlloc
 0x42b164 FindClose
 0x42b168 FindFirstFileExW
 0x42b16c FindNextFileW
 0x42b170 IsValidCodePage
 0x42b174 GetACP
 0x42b178 GetOEMCP
 0x42b17c GetEnvironmentStringsW
 0x42b180 FreeEnvironmentStringsW

EAT(Export Address Table) Library

0x405420 _jbxjgbguyw3@4


Similarity measure (PE file only) - Checking for service failure