Report - unk.exe

Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2023.11.14 06:13 Machine s1_win7_x6401
Filename unk.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
1.0
ZERO API file : clean
VT API (file)
md5 ca42b110a0926f8aa00abd2500d520cb
sha256 3db31868fb120145ea8358bd7c845c4d8d852e331c5597737ef5b838a2ba5493
ssdeep 3072:TjK7aZ9vY2ah04DeyjLi5XrprYP+SmPw66IiHC:TjKeZnaa4SyjWV1r8+PE5HC
imphash 2a23fc43adb75eb52daff624fc121b31
impfuzzy 24:p5oaor7D1zQKPzBMI1/muKavt/2CrOD1Eu93ZrD/SeUUG9OTw08JKinjT:PA1LbN/dKavtVaD19wObif
  Network IP location

Signature (4cnts)

Level Description
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x140006220 ConvertSidToStringSidW
 0x140006228 ConvertStringSecurityDescriptorToSecurityDescriptorW
 0x140006230 GetTokenInformation
 0x140006238 OpenProcessToken
 0x140006240 RegCloseKey
 0x140006248 RegOpenKeyExW
 0x140006250 RegQueryValueExW
 0x140006258 RegSetValueExW
 0x140006260 SystemFunction036
SHELL32.dll
 0x140006270 CommandLineToArgvW
KERNEL32.dll
 0x140006280 CloseHandle
 0x140006288 CreateDirectoryW
 0x140006290 CreateFileW
 0x140006298 CreateProcessW
 0x1400062a0 DosDateTimeToFileTime
 0x1400062a8 DuplicateHandle
 0x1400062b0 EnumResourceNamesW
 0x1400062b8 ExitProcess
 0x1400062c0 ExpandEnvironmentStringsW
 0x1400062c8 FindResourceW
 0x1400062d0 FlushFileBuffers
 0x1400062d8 FreeLibrary
 0x1400062e0 GetCommandLineW
 0x1400062e8 GetCurrentProcess
 0x1400062f0 GetCurrentProcessId
 0x1400062f8 GetCurrentThreadId
 0x140006300 GetEnvironmentVariableW
 0x140006308 GetExitCodeProcess
 0x140006310 GetFileAttributesW
 0x140006318 GetFileInformationByHandleEx
 0x140006320 GetLastError
 0x140006328 GetModuleFileNameW
 0x140006330 GetModuleHandleW
 0x140006338 GetProcAddress
 0x140006340 GetProcessHeap
 0x140006348 GetSystemInfo
 0x140006350 GetSystemTimeAsFileTime
 0x140006358 GetTempPathW
 0x140006360 GetVolumeInformationW
 0x140006368 GetVolumePathNameW
 0x140006370 HeapAlloc
 0x140006378 HeapFree
 0x140006380 IsProcessorFeaturePresent
 0x140006388 LoadLibraryExA
 0x140006390 LoadLibraryExW
 0x140006398 LoadResource
 0x1400063a0 LocalAlloc
 0x1400063a8 LocalFileTimeToFileTime
 0x1400063b0 LocalFree
 0x1400063b8 LockResource
 0x1400063c0 MultiByteToWideChar
 0x1400063c8 QueryPerformanceCounter
 0x1400063d0 RaiseException
 0x1400063d8 ReadFile
 0x1400063e0 RtlCaptureContext
 0x1400063e8 RtlLookupFunctionEntry
 0x1400063f0 RtlVirtualUnwind
 0x1400063f8 SetFileInformationByHandle
 0x140006400 SetFilePointer
 0x140006408 SetLastError
 0x140006410 SetProcessWorkingSetSize
 0x140006418 SetUnhandledExceptionFilter
 0x140006420 SizeofResource
 0x140006428 Sleep
 0x140006430 TerminateProcess
 0x140006438 UnhandledExceptionFilter
 0x140006440 VirtualProtect
 0x140006448 VirtualQuery
 0x140006450 WaitForSingleObject
 0x140006458 WideCharToMultiByte
 0x140006460 WriteFile
 0x140006468 lstrcmpiW
 0x140006470 lstrlenW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure