Report - deluxe_crypted.exe

UPX Malicious Library PE File PE32 OS Processor Check
ScreenShot
Created 2023.09.15 17:32 Machine s1_win7_x6403
Filename deluxe_crypted.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
5
Behavior Score
6.8
ZERO API file : malware
VT API (file) 27 detected (AIDetectMalware, Artemis, Attribute, HighConfidence, malicious, high confidence, GenKryptik, GNWJ, score, DropperX, AMADEY, YXDIOZ, Static AI, Suspicious PE, Sabsik, RedLine, Detected, ZexaF, zuY@ambPkIfi, BScope, Matanbuchus, unsafe, susgen, confidence, 100%)
md5 5200fbe07521eb001f145afb95d40283
sha256 00c3f29f9a8aec0774256501c562275e2d866f0130a2b8a58d74003c6c77e812
ssdeep 6144:UetmIGPB69DOH/e6fwQEPszYvzY0drRedAO74PkEIe44/5FuibaK8R72fwNqIEEA:UefJYfe6fwQrVBpxeBFDbOogJi5
imphash efed4091e3b9498715ec3123c7762889
impfuzzy 24:Nc8jTcpVWZjeD2t7EGhlJBl39WuPLOovbO3kFZMv1GMAkEZHu9c:m0cpVejrt7EGnpn630FZGa
  Network IP location

Signature (17cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Executes one or more WMI queries
watch Harvests credentials from local FTP client softwares
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Executes one or more WMI queries which can be used to identify virtual machines
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.215.113.25 Unknown 185.215.113.25 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ole32.dll
 0x429148 OleGetIconOfClass
 0x42914c CreateBindCtx
KERNEL32.dll
 0x429000 GetCurrentProcess
 0x429004 CreateFileW
 0x429008 HeapSize
 0x42900c FreeConsole
 0x429010 MultiByteToWideChar
 0x429014 GetStringTypeW
 0x429018 WideCharToMultiByte
 0x42901c GetCurrentThreadId
 0x429020 CloseHandle
 0x429024 WaitForSingleObjectEx
 0x429028 GetExitCodeThread
 0x42902c EnterCriticalSection
 0x429030 LeaveCriticalSection
 0x429034 InitializeCriticalSectionEx
 0x429038 DeleteCriticalSection
 0x42903c EncodePointer
 0x429040 DecodePointer
 0x429044 LCMapStringEx
 0x429048 QueryPerformanceCounter
 0x42904c GetSystemTimeAsFileTime
 0x429050 GetModuleHandleW
 0x429054 GetProcAddress
 0x429058 GetCPInfo
 0x42905c IsProcessorFeaturePresent
 0x429060 UnhandledExceptionFilter
 0x429064 SetUnhandledExceptionFilter
 0x429068 WriteConsoleW
 0x42906c TerminateProcess
 0x429070 GetCurrentProcessId
 0x429074 InitializeSListHead
 0x429078 IsDebuggerPresent
 0x42907c GetStartupInfoW
 0x429080 GetProcessHeap
 0x429084 RaiseException
 0x429088 RtlUnwind
 0x42908c GetLastError
 0x429090 SetLastError
 0x429094 InitializeCriticalSectionAndSpinCount
 0x429098 TlsAlloc
 0x42909c TlsGetValue
 0x4290a0 TlsSetValue
 0x4290a4 TlsFree
 0x4290a8 FreeLibrary
 0x4290ac LoadLibraryExW
 0x4290b0 CreateThread
 0x4290b4 ExitThread
 0x4290b8 FreeLibraryAndExitThread
 0x4290bc GetModuleHandleExW
 0x4290c0 GetStdHandle
 0x4290c4 WriteFile
 0x4290c8 GetModuleFileNameW
 0x4290cc ExitProcess
 0x4290d0 GetCommandLineA
 0x4290d4 GetCommandLineW
 0x4290d8 HeapAlloc
 0x4290dc HeapFree
 0x4290e0 CompareStringW
 0x4290e4 LCMapStringW
 0x4290e8 GetLocaleInfoW
 0x4290ec IsValidLocale
 0x4290f0 GetUserDefaultLCID
 0x4290f4 EnumSystemLocalesW
 0x4290f8 GetFileType
 0x4290fc FlushFileBuffers
 0x429100 GetConsoleOutputCP
 0x429104 GetConsoleMode
 0x429108 ReadFile
 0x42910c GetFileSizeEx
 0x429110 SetFilePointerEx
 0x429114 ReadConsoleW
 0x429118 HeapReAlloc
 0x42911c FindClose
 0x429120 FindFirstFileExW
 0x429124 FindNextFileW
 0x429128 IsValidCodePage
 0x42912c GetACP
 0x429130 GetOEMCP
 0x429134 GetEnvironmentStringsW
 0x429138 FreeEnvironmentStringsW
 0x42913c SetEnvironmentVariableW
 0x429140 SetStdHandle

EAT(Export Address Table) Library

0x407030 _Killoujua@4
0x407050 _uivbuyz@4
0x407040 _uygZUIYguyAUI@4


Similarity measure (PE file only) - Checking for service failure