Report - afkjo.txt.exe

Malicious Library UPX Malicious Packer PE File PE32 OS Processor Check
ScreenShot
Created 2023.10.02 08:41 Machine s1_win7_x6402
Filename afkjo.txt.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
1.4
ZERO API file : clean
VT API (file)
md5 fface24ac296a898cca3f46bc0abcd58
sha256 bc60a7b54f05b982ef5d088047903f67a4bf52f5ffe834b7268c316ea44df962
ssdeep 192:ALKf4my3ssAnktY67AN3BwQbqVx9XP5EvvL27yrwIi6yFz1gYuswZlskR:+/18s1tvHAqVDP5Evvq7UwInyJ19wc2
imphash 74112afb67d4cb152ebd8ee76f449460
impfuzzy 12:Wj7WsjkAGfDvZGd3zaLPXJ1XJBwDcNaXA4wxrjic7r4G:WjTkfDRljLjwoNaw4wxsG
  Network IP location

Signature (5cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
info Checks amount of memory in system
info One or more processes crashed
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x402000 WaitForSingleObject
 0x402004 CreateFileW
 0x402008 GetSystemDirectoryW
 0x40200c lstrcatW
 0x402010 LockResource
 0x402014 CloseHandle
 0x402018 LoadLibraryW
 0x40201c GetTempPathW
 0x402020 FindResourceW
 0x402024 GetWindowsDirectoryW
 0x402028 GetProcAddress
 0x40202c ExitProcess
 0x402030 TerminateProcess
 0x402034 GetCurrentProcess
 0x402038 IsProcessorFeaturePresent
 0x40203c GetModuleFileNameW
 0x402040 WriteFile
 0x402044 LoadResource
 0x402048 SizeofResource
 0x40204c SetUnhandledExceptionFilter
 0x402050 UnhandledExceptionFilter
USER32.dll
 0x402068 MessageBoxW
SHELL32.dll
 0x402058 None
 0x40205c SHCreateItemFromParsingName
 0x402060 ShellExecuteExW
ole32.dll
 0x402070 CoCreateInstance
 0x402074 CoUninitialize
 0x402078 CoInitialize
 0x40207c CoGetObject

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure