Report - WinDhcp.exe

PE File PE64
ScreenShot
Created 2023.09.30 13:01 Machine s1_win7_x6403
Filename WinDhcp.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
2
Behavior Score
1.2
ZERO API file : malware
VT API (file) 21 detected (AIDetectMalware, malicious, Rozena, Eldorado, Attribute, HighConfidence, high confidence, score, EPACK, Gen2, Krypt, Wacatac, Detected, kC3zMNTE3QN, Static AI, Suspicious PE, confidence)
md5 d381d9db9cbd1b60afdfb4f05e52a775
sha256 3e488cd6f6cc7b35713c321dc58b63fa95ba9c69248008109b7bf9a543add7e9
ssdeep 98304:Qp4L/JhqnNKIjRFlrDlyzVd/dCR36YDAbJC5kZne:QeL/JhqNRrhyXCR3FAbfhe
imphash 0fdd3d21d2193b717f076a70dfaa659c
impfuzzy 12:YRJRJJoARZqRVPXJHqV0MHHGf5XGXKiEG6eGJwk6lm/GaJqniZJn:8fjBcVK0MGf5XGf6Zykom/GCqiZJn
  Network IP location

Signature (2cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14052b198 DeleteCriticalSection
 0x14052b1a0 EnterCriticalSection
 0x14052b1a8 GetLastError
 0x14052b1b0 InitializeCriticalSection
 0x14052b1b8 LeaveCriticalSection
 0x14052b1c0 SetUnhandledExceptionFilter
 0x14052b1c8 Sleep
 0x14052b1d0 TlsGetValue
 0x14052b1d8 VirtualProtect
 0x14052b1e0 VirtualQuery
msvcrt.dll
 0x14052b1f0 __C_specific_handler
 0x14052b1f8 __getmainargs
 0x14052b200 __initenv
 0x14052b208 __iob_func
 0x14052b210 __set_app_type
 0x14052b218 __setusermatherr
 0x14052b220 _amsg_exit
 0x14052b228 _cexit
 0x14052b230 _commode
 0x14052b238 _fmode
 0x14052b240 _initterm
 0x14052b248 _onexit
 0x14052b250 abort
 0x14052b258 calloc
 0x14052b260 exit
 0x14052b268 fprintf
 0x14052b270 fputs
 0x14052b278 free
 0x14052b280 malloc
 0x14052b288 memset
 0x14052b290 signal
 0x14052b298 strlen
 0x14052b2a0 strncmp
 0x14052b2a8 vfprintf
 0x14052b2b0 wcscat
 0x14052b2b8 wcscpy
 0x14052b2c0 wcslen
 0x14052b2c8 wcsncmp
 0x14052b2d0 wcsstr
 0x14052b2d8 _wcsnicmp
 0x14052b2e0 _wcsicmp

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure