Report - appx.jpg.exe

Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check
ScreenShot
Created 2023.11.11 16:37 Machine s1_win7_x6402
Filename appx.jpg.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
0.4
ZERO API file : mailcious
VT API (file)
md5 2b4ce8a4efe44bca4f79f8ca5a9588d8
sha256 e579629f0fb73632032fe80e7f156eb7826093f6f1d07695b4d40b8833c265c1
ssdeep 24576:zjFPcsRZviJwTSRzdfgSLbirY1cO3EwNTVnS/k2:KJwmpfgONTGk2
imphash 41dd104e06c4aa32835a136e502b8530
impfuzzy 96:aT8eWxQoH1jBnmZpvXXZTjxNPR1yX1PJ0Q:aT8eWhVjQVpyF+Q
  Network IP location

Signature (2cnts)

Level Description
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

wininterop.dll
 0x4b2460 GetInstallDetailsPayload
 0x4b2464 SignalInitializeCrashReporting
ADVAPI32.dll
 0x4b246c EventRegister
 0x4b2470 EventUnregister
 0x4b2474 EventWrite
 0x4b2478 RegCloseKey
 0x4b247c RegGetValueW
 0x4b2480 RegOpenKeyExW
 0x4b2484 RegQueryValueExW
 0x4b2488 SystemFunction036
WINMM.dll
 0x4b2490 timeGetTime
KERNEL32.dll
 0x4b2498 AcquireSRWLockExclusive
 0x4b249c CloseHandle
 0x4b24a0 CompareStringW
 0x4b24a4 CreateEventW
 0x4b24a8 CreateFileMappingW
 0x4b24ac CreateFileW
 0x4b24b0 CreateThread
 0x4b24b4 DecodePointer
 0x4b24b8 DeleteCriticalSection
 0x4b24bc EncodePointer
 0x4b24c0 EnterCriticalSection
 0x4b24c4 EnumSystemLocalesW
 0x4b24c8 ExitProcess
 0x4b24cc ExitThread
 0x4b24d0 ExpandEnvironmentStringsW
 0x4b24d4 FindClose
 0x4b24d8 FindFirstFileExW
 0x4b24dc FindNextFileW
 0x4b24e0 FlsAlloc
 0x4b24e4 FlsSetValue
 0x4b24e8 FlushFileBuffers
 0x4b24ec FormatMessageA
 0x4b24f0 FreeEnvironmentStringsW
 0x4b24f4 FreeLibrary
 0x4b24f8 FreeLibraryAndExitThread
 0x4b24fc GetACP
 0x4b2500 GetCPInfo
 0x4b2504 GetCommandLineA
 0x4b2508 GetCommandLineW
 0x4b250c GetComputerNameExW
 0x4b2510 GetConsoleMode
 0x4b2514 GetConsoleOutputCP
 0x4b2518 GetCurrentDirectoryW
 0x4b251c GetCurrentProcess
 0x4b2520 GetCurrentProcessId
 0x4b2524 GetCurrentThread
 0x4b2528 GetCurrentThreadId
 0x4b252c GetDateFormatW
 0x4b2530 GetDriveTypeW
 0x4b2534 GetEnvironmentStringsW
 0x4b2538 GetEnvironmentVariableW
 0x4b253c GetFileAttributesW
 0x4b2540 GetFileSizeEx
 0x4b2544 GetFileType
 0x4b2548 GetFullPathNameW
 0x4b254c GetLastError
 0x4b2550 GetLocalTime
 0x4b2554 GetLocaleInfoW
 0x4b2558 GetLogicalProcessorInformation
 0x4b255c GetModuleFileNameW
 0x4b2560 GetModuleHandleA
 0x4b2564 GetModuleHandleExW
 0x4b2568 GetModuleHandleW
 0x4b256c GetNativeSystemInfo
 0x4b2570 GetOEMCP
 0x4b2574 GetProcAddress
 0x4b2578 GetProcessHeap
 0x4b257c GetProductInfo
 0x4b2580 GetStartupInfoW
 0x4b2584 GetStdHandle
 0x4b2588 GetStringTypeW
 0x4b258c GetSystemDirectoryW
 0x4b2590 GetSystemInfo
 0x4b2594 GetSystemTimeAsFileTime
 0x4b2598 GetTempPathW
 0x4b259c GetThreadId
 0x4b25a0 GetThreadPriority
 0x4b25a4 GetTickCount
 0x4b25a8 GetTimeFormatW
 0x4b25ac GetTimeZoneInformation
 0x4b25b0 GetUserDefaultLCID
 0x4b25b4 GetVersionExW
 0x4b25b8 GetWindowsDirectoryW
 0x4b25bc InitOnceExecuteOnce
 0x4b25c0 InitializeCriticalSectionAndSpinCount
 0x4b25c4 InitializeSListHead
 0x4b25c8 IsDebuggerPresent
 0x4b25cc IsProcessorFeaturePresent
 0x4b25d0 IsValidCodePage
 0x4b25d4 IsValidLocale
 0x4b25d8 IsWow64Process
 0x4b25dc LCMapStringW
 0x4b25e0 LeaveCriticalSection
 0x4b25e4 LoadLibraryExA
 0x4b25e8 LoadLibraryExW
 0x4b25ec LoadLibraryW
 0x4b25f0 LocalFree
 0x4b25f4 MapViewOfFile
 0x4b25f8 MultiByteToWideChar
 0x4b25fc OutputDebugStringA
 0x4b2600 QueryPerformanceCounter
 0x4b2604 QueryPerformanceFrequency
 0x4b2608 QueryThreadCycleTime
 0x4b260c RaiseException
 0x4b2610 ReadConsoleW
 0x4b2614 ReadFile
 0x4b2618 ReleaseSRWLockExclusive
 0x4b261c ResetEvent
 0x4b2620 RtlCaptureStackBackTrace
 0x4b2624 RtlUnwind
 0x4b2628 SetCurrentDirectoryW
 0x4b262c SetEnvironmentVariableW
 0x4b2630 SetEvent
 0x4b2634 SetFilePointerEx
 0x4b2638 SetLastError
 0x4b263c SetProcessShutdownParameters
 0x4b2640 SetStdHandle
 0x4b2644 SetThreadPriority
 0x4b2648 SetUnhandledExceptionFilter
 0x4b264c Sleep
 0x4b2650 SleepConditionVariableSRW
 0x4b2654 TerminateProcess
 0x4b2658 TlsAlloc
 0x4b265c TlsFree
 0x4b2660 TlsGetValue
 0x4b2664 TlsSetValue
 0x4b2668 TryAcquireSRWLockExclusive
 0x4b266c UnhandledExceptionFilter
 0x4b2670 UnmapViewOfFile
 0x4b2674 VirtualAlloc
 0x4b2678 VirtualFree
 0x4b267c VirtualProtect
 0x4b2680 VirtualQuery
 0x4b2684 WaitForSingleObject
 0x4b2688 WaitForSingleObjectEx
 0x4b268c WakeAllConditionVariable
 0x4b2690 WakeConditionVariable
 0x4b2694 WideCharToMultiByte
 0x4b2698 WriteConsoleW
 0x4b269c WriteFile
SHELL32.dll
 0x4b26a4 CommandLineToArgvW
 0x4b26a8 SHGetFolderPathW
 0x4b26ac SHGetKnownFolderPath
ole32.dll
 0x4b26b4 CoCreateInstance
 0x4b26b8 CoTaskMemFree
OLEAUT32.dll
 0x4b26c0 SysAllocString
 0x4b26c4 SysAllocStringLen
 0x4b26c8 SysFreeString
 0x4b26cc VariantClear

EAT(Export Address Table) Library

0x45c560 GetHandleVerifier


Similarity measure (PE file only) - Checking for service failure