Report - tbbhts.exe

UPX PE32 PE File
ScreenShot
Created 2023.12.11 19:23 Machine s1_win7_x6403
Filename tbbhts.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
3.0
ZERO API file : malware
VT API (file) 53 detected (AIDetectMalware, FlyStudio, GenericKD, NSPack, Save, malicious, confidence, 100%, None, Attribute, HighConfidence, high confidence, high, score, Static AI, Malicious PE, ai score=87, Hupigon, Detected, Eldorado, Znyonm, se22135, NSPM, ~gen@20n73t, R626697, ZexaF, tmKdaSXoJilb, BScope, Emotet, unsafe, Chgt, Probably Heur, ExeHeaderP, R002H0CL723, CLOUD, GenAsa, TQopmUoUkJU, susgen, IRCBot)
md5 e1095986637973f78a0a8f38f18b4190
sha256 0d0f108017bef0df57db065e7316acc7bcba737f8f40c3bd5fabdd840ab0c68e
ssdeep 6144:dMWXmnOQ0cC+S2tg6f+3P4y5I0ePKp6Qa4ZqIRB7IrEIPvxqj:dMgEkz+3O6fMP4a7QK3FRBcrEIPpqj
imphash 199aaa145bc54dbb0d29927d816ce83d
impfuzzy 6:dBJAEHGDzyRlbRmVOZ/QHA+zGB1M5ZQE9iXmJJcJOqRgKLbFLMKJAmeXw6wJuVMT:VA/DzqYOZEAwMEMX+mOqRg8+mxHDA/8
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 53 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x4d40e8 LoadLibraryA
 0x4d40ec GetProcAddress
 0x4d40f0 VirtualProtect
 0x4d40f4 VirtualAlloc
 0x4d40f8 VirtualFree
 0x4d40fc ExitProcess
USER32.DLL
 0x4d4104 OpenClipboard
GDI32.DLL
 0x4d410c ExcludeClipRect
WINMM.DLL
 0x4d4114 midiStreamRestart
WINSPOOL.DRV
 0x4d411c ClosePrinter
ADVAPI32.DLL
 0x4d4124 RegCloseKey
SHELL32.DLL
 0x4d412c ShellExecuteA
OLE32.DLL
 0x4d4134 OleInitialize
OLEAUT32.DLL
 0x4d413c UnRegisterTypeLib
COMCTL32.DLL
 0x4d4144 ImageList_Destroy
WS2_32.DLL
 0x4d414c ioctlsocket
COMDLG32.DLL
 0x4d4154 GetSaveFileNameA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure