ScreenShot
Created | 2023.10.20 07:32 | Machine | s1_win7_x6403 |
Filename | yes.exe | ||
Type | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | |||
md5 | 355e758c66e73f61dbaaeb7174f74de0 | ||
sha256 | 12bac7c5ff97dec030964d932091a946ce36cbfdae47030f387838da9d6e08db | ||
ssdeep | 98304:o1s/4jpy2gmxkKe53H1UczNjj/Gm6XQahEb3OsPTyPw7O6c/7cB15XXX0UXE:EpyYw1U29jWLYOsPTAw7Of/7cpXtE | ||
imphash | 9aebf3da4677af9275c461261e5abde3 | ||
impfuzzy | 3:swBJAEPw1MO/OywS9KTXzhAXwEQaxRGUq:dBJAEoZ/OEGDzyRs |
Network IP location
Signature (2cnts)
Level | Description |
---|---|
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is compressed using UPX |
Rules (2cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | IsPE64 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.DLL
0x1405453c8 LoadLibraryA
0x1405453d0 ExitProcess
0x1405453d8 GetProcAddress
0x1405453e0 VirtualProtect
msvcrt.dll
0x1405453f0 exit
EAT(Export Address Table) is none
KERNEL32.DLL
0x1405453c8 LoadLibraryA
0x1405453d0 ExitProcess
0x1405453d8 GetProcAddress
0x1405453e0 VirtualProtect
msvcrt.dll
0x1405453f0 exit
EAT(Export Address Table) is none