Report - zjq.exe

MinGW GCC PE File PE64
ScreenShot
Created 2023.12.15 08:32 Machine s1_win7_x6401
Filename zjq.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
4
Behavior Score
0.0
ZERO API file : malware
VT API (file)
md5 7426f45e80013988c47df9618e9e147c
sha256 68ba83d55b2b3f1e4e6ca38fe1c8bbf95d3e0a6c8804484643d33af2c135f902
ssdeep 1536:MAB2SK+dmfdmT6soyimaPXRYgGeWkSdL3lRnAUvMFMQiNjRs09QTm96XQZ:hB27MK1Y+SdL3lRnoqR79QpAZ
imphash 9c83b566c4df06e0307cfadb697cf291
impfuzzy 24:8fg1JmncJ8a0meOX0MC95XGDZ8k1K1oDqNuZn:8fg1ccJLebzJGV8k1uoqk
  Network IP location

Signature (0cnts)

Level Description

Rules (3cnts)

Level Name Description Collection
warning MinGW Used MinGW (Win GCC) binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40821c DeleteCriticalSection
 0x408224 EnterCriticalSection
 0x40822c GetCurrentProcess
 0x408234 GetCurrentProcessId
 0x40823c GetCurrentThreadId
 0x408244 GetLastError
 0x40824c GetStartupInfoA
 0x408254 GetSystemTimeAsFileTime
 0x40825c GetTickCount
 0x408264 InitializeCriticalSection
 0x40826c LeaveCriticalSection
 0x408274 QueryPerformanceCounter
 0x40827c RtlAddFunctionTable
 0x408284 RtlCaptureContext
 0x40828c RtlLookupFunctionEntry
 0x408294 RtlVirtualUnwind
 0x40829c SetUnhandledExceptionFilter
 0x4082a4 Sleep
 0x4082ac TerminateProcess
 0x4082b4 TlsGetValue
 0x4082bc UnhandledExceptionFilter
 0x4082c4 VirtualAlloc
 0x4082cc VirtualFree
 0x4082d4 VirtualProtect
 0x4082dc VirtualQuery
msvcrt.dll
 0x4082ec __C_specific_handler
 0x4082f4 __dllonexit
 0x4082fc __getmainargs
 0x408304 __initenv
 0x40830c __iob_func
 0x408314 __lconv_init
 0x40831c __set_app_type
 0x408324 __setusermatherr
 0x40832c _acmdln
 0x408334 _amsg_exit
 0x40833c _cexit
 0x408344 _fmode
 0x40834c _initterm
 0x408354 _lock
 0x40835c _onexit
 0x408364 _unlock
 0x40836c abort
 0x408374 calloc
 0x40837c exit
 0x408384 fclose
 0x40838c fgets
 0x408394 fopen
 0x40839c fprintf
 0x4083a4 free
 0x4083ac fwrite
 0x4083b4 malloc
 0x4083bc memcpy
 0x4083c4 puts
 0x4083cc signal
 0x4083d4 sscanf
 0x4083dc strlen
 0x4083e4 strncmp
 0x4083ec vfprintf

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure