Report - trafico.exe

Malicious Library PE File PE32
ScreenShot
Created 2023.10.04 10:25 Machine s1_win7_x6403
Filename trafico.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
7
Behavior Score
1.4
ZERO API file : malware
VT API (file) 24 detected (AIDetectMalware, malicious, high confidence, Save, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, score, ccmw, high, Sabsik, Detected, unsafe, Probably Heur, ExeHeaderL, Generic@AI, RDML, mndro9wo+vI0vlD0lC4FEg, Static AI, Malicious PE)
md5 99b3984c3d9b1c505bb6d2624d4a350f
sha256 746ca4cb2903e1e57f230a74f09ce845acee787ccc629974939bb4c97f2278c6
ssdeep 6144:lSozk1KQkXHfCz35J82OO5YNG8FA6pn7jFb5kNko6/ldpRxJg9pPIwohvaTO4:lDk8j2OO5YT6ifFb5kS+W4
imphash f707ada0aac189999ec6eb4a5a71dfbc
impfuzzy 24:CNDorjjY3TgAhOovnKQFQ8RyvDh/J3ISlRT4Rffjl2wSqA:PEK3DjhcRffjMwSB
  Network IP location

Signature (3cnts)

Level Description
warning File has been identified by 24 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40b008 Sleep
 0x40b00c CreateThread
 0x40b010 lstrlenW
 0x40b014 VirtualProtect
 0x40b018 GetProcAddress
 0x40b01c LoadLibraryA
 0x40b020 VirtualAlloc
 0x40b024 LockResource
 0x40b028 WaitForSingleObject
 0x40b02c SizeofResource
 0x40b030 FindResourceW
 0x40b034 GetModuleHandleW
 0x40b038 GetLastError
 0x40b03c CreateMutexA
 0x40b040 GetModuleHandleA
 0x40b044 GlobalFindAtomA
 0x40b048 FreeConsole
 0x40b04c LoadResource
 0x40b050 CreateHardLinkA
 0x40b054 GetCommandLineA
 0x40b058 SetUnhandledExceptionFilter
 0x40b05c ExitProcess
 0x40b060 WriteFile
 0x40b064 GetStdHandle
 0x40b068 GetModuleFileNameA
 0x40b06c FreeEnvironmentStringsA
 0x40b070 GetEnvironmentStrings
 0x40b074 FreeEnvironmentStringsW
 0x40b078 WideCharToMultiByte
 0x40b07c GetEnvironmentStringsW
 0x40b080 SetHandleCount
 0x40b084 GetFileType
 0x40b088 GetStartupInfoA
 0x40b08c DeleteCriticalSection
 0x40b090 TlsGetValue
 0x40b094 TlsAlloc
 0x40b098 TlsSetValue
 0x40b09c TlsFree
 0x40b0a0 InterlockedIncrement
 0x40b0a4 SetLastError
 0x40b0a8 GetCurrentThreadId
 0x40b0ac InterlockedDecrement
 0x40b0b0 HeapCreate
 0x40b0b4 VirtualFree
 0x40b0b8 HeapFree
 0x40b0bc QueryPerformanceCounter
 0x40b0c0 GetTickCount
 0x40b0c4 GetCurrentProcessId
 0x40b0c8 GetSystemTimeAsFileTime
 0x40b0cc LeaveCriticalSection
 0x40b0d0 EnterCriticalSection
 0x40b0d4 TerminateProcess
 0x40b0d8 GetCurrentProcess
 0x40b0dc UnhandledExceptionFilter
 0x40b0e0 IsDebuggerPresent
 0x40b0e4 InitializeCriticalSectionAndSpinCount
 0x40b0e8 GetCPInfo
 0x40b0ec GetACP
 0x40b0f0 GetOEMCP
 0x40b0f4 IsValidCodePage
 0x40b0f8 HeapAlloc
 0x40b0fc HeapReAlloc
 0x40b100 RtlUnwind
 0x40b104 HeapSize
 0x40b108 GetLocaleInfoA
 0x40b10c LCMapStringA
 0x40b110 MultiByteToWideChar
 0x40b114 LCMapStringW
 0x40b118 GetStringTypeA
 0x40b11c GetStringTypeW
ADVAPI32.dll
 0x40b000 RegDeleteKeyA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure