Report - EpPDrE.exe

Generic Malware Malicious Library UPX Malicious Packer Anti_VM PE File PE64 OS Processor Check
ScreenShot
Created 2023.10.06 07:54 Machine s1_win7_x6403
Filename EpPDrE.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
1
Behavior Score
0.2
ZERO API file : mailcious
VT API (file)
md5 85d3d194ec107f5b92a7d9e6a9d06ef0
sha256 be1120f9457a73543597e27c1eb132ce0f833d0ca62fe67adfe6674bf48e04e4
ssdeep 49152:+OIhiwisGrb/TfvO90d7HjmAFd4A64nsfJ3EL9aIwSD3QI1YkMpSo9Vu2CNRCebj:7dsU9rjCFZ2EH9gl
imphash 85cddd6092e65c1a58dd1e6e9ab9fc63
impfuzzy 48:qJrKxMCy9cmVKeFR+2F42xQHpdXiX1PJOmSplTJGfYJ861k1vcqTjz:qJexMCyamXRHF42xQHPXiX1Pgb7TJGQA
  Network IP location

Signature (1cnts)

Level Description
info One or more processes crashed

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14073a45c AddAtomA
 0x14073a464 AddVectoredExceptionHandler
 0x14073a46c CloseHandle
 0x14073a474 CreateEventA
 0x14073a47c CreateFileA
 0x14073a484 CreateIoCompletionPort
 0x14073a48c CreateMutexA
 0x14073a494 CreateSemaphoreA
 0x14073a49c CreateThread
 0x14073a4a4 CreateWaitableTimerExW
 0x14073a4ac DeleteAtom
 0x14073a4b4 DeleteCriticalSection
 0x14073a4bc DuplicateHandle
 0x14073a4c4 EnterCriticalSection
 0x14073a4cc ExitProcess
 0x14073a4d4 FindAtomA
 0x14073a4dc FormatMessageA
 0x14073a4e4 FreeEnvironmentStringsW
 0x14073a4ec GetAtomNameA
 0x14073a4f4 GetConsoleMode
 0x14073a4fc GetCurrentProcess
 0x14073a504 GetCurrentProcessId
 0x14073a50c GetCurrentThread
 0x14073a514 GetCurrentThreadId
 0x14073a51c GetEnvironmentStringsW
 0x14073a524 GetHandleInformation
 0x14073a52c GetLastError
 0x14073a534 GetProcAddress
 0x14073a53c GetProcessAffinityMask
 0x14073a544 GetQueuedCompletionStatusEx
 0x14073a54c GetStartupInfoA
 0x14073a554 GetStdHandle
 0x14073a55c GetSystemDirectoryA
 0x14073a564 GetSystemInfo
 0x14073a56c GetSystemTimeAsFileTime
 0x14073a574 GetThreadContext
 0x14073a57c GetThreadPriority
 0x14073a584 GetTickCount
 0x14073a58c InitializeCriticalSection
 0x14073a594 IsDBCSLeadByteEx
 0x14073a59c IsDebuggerPresent
 0x14073a5a4 LeaveCriticalSection
 0x14073a5ac LoadLibraryA
 0x14073a5b4 LoadLibraryW
 0x14073a5bc LocalFree
 0x14073a5c4 MultiByteToWideChar
 0x14073a5cc OpenProcess
 0x14073a5d4 OutputDebugStringA
 0x14073a5dc PostQueuedCompletionStatus
 0x14073a5e4 QueryPerformanceCounter
 0x14073a5ec QueryPerformanceFrequency
 0x14073a5f4 RaiseException
 0x14073a5fc ReleaseMutex
 0x14073a604 ReleaseSemaphore
 0x14073a60c RemoveVectoredExceptionHandler
 0x14073a614 ResetEvent
 0x14073a61c ResumeThread
 0x14073a624 SetConsoleCtrlHandler
 0x14073a62c SetErrorMode
 0x14073a634 SetEvent
 0x14073a63c SetLastError
 0x14073a644 SetProcessAffinityMask
 0x14073a64c SetProcessPriorityBoost
 0x14073a654 SetThreadContext
 0x14073a65c SetThreadPriority
 0x14073a664 SetUnhandledExceptionFilter
 0x14073a66c SetWaitableTimer
 0x14073a674 Sleep
 0x14073a67c SuspendThread
 0x14073a684 SwitchToThread
 0x14073a68c TlsAlloc
 0x14073a694 TlsGetValue
 0x14073a69c TlsSetValue
 0x14073a6a4 TryEnterCriticalSection
 0x14073a6ac VirtualAlloc
 0x14073a6b4 VirtualFree
 0x14073a6bc VirtualProtect
 0x14073a6c4 VirtualQuery
 0x14073a6cc WaitForMultipleObjects
 0x14073a6d4 WaitForSingleObject
 0x14073a6dc WideCharToMultiByte
 0x14073a6e4 WriteConsoleW
 0x14073a6ec WriteFile
 0x14073a6f4 __C_specific_handler
msvcrt.dll
 0x14073a704 ___lc_codepage_func
 0x14073a70c ___mb_cur_max_func
 0x14073a714 __getmainargs
 0x14073a71c __initenv
 0x14073a724 __iob_func
 0x14073a72c __lconv_init
 0x14073a734 __set_app_type
 0x14073a73c __setusermatherr
 0x14073a744 _acmdln
 0x14073a74c _amsg_exit
 0x14073a754 _beginthread
 0x14073a75c _beginthreadex
 0x14073a764 _cexit
 0x14073a76c _commode
 0x14073a774 _endthreadex
 0x14073a77c _errno
 0x14073a784 _fmode
 0x14073a78c _initterm
 0x14073a794 _lock
 0x14073a79c _memccpy
 0x14073a7a4 _onexit
 0x14073a7ac _setjmp
 0x14073a7b4 _strdup
 0x14073a7bc _ultoa
 0x14073a7c4 _unlock
 0x14073a7cc abort
 0x14073a7d4 calloc
 0x14073a7dc exit
 0x14073a7e4 fprintf
 0x14073a7ec fputc
 0x14073a7f4 free
 0x14073a7fc fwrite
 0x14073a804 localeconv
 0x14073a80c longjmp
 0x14073a814 malloc
 0x14073a81c memcpy
 0x14073a824 memmove
 0x14073a82c memset
 0x14073a834 printf
 0x14073a83c realloc
 0x14073a844 signal
 0x14073a84c strerror
 0x14073a854 strlen
 0x14073a85c strncmp
 0x14073a864 vfprintf
 0x14073a86c wcslen

EAT(Export Address Table) Library

0x1407378a0 _cgo_dummy_export


Similarity measure (PE file only) - Checking for service failure