Report - ww.exe

Malicious Library UPX PE32 PE File OS Processor Check
ScreenShot
Created 2023.12.22 08:11 Machine s1_win7_x6403
Filename ww.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.2
ZERO API file : clean
VT API (file) 32 detected (AIDetectMalware, malicious, high confidence, score, Stop, Lockbit, unsafe, Save, Attribute, HighConfidence, Artemis, high, Krypt, Detected, Wacatac, Kryptik, Eldorado, ZexaF, Eq0@aWeE, BScope, Convagent, SmokeLoader, CLASSIC, Static AI, Malicious PE, susgen, confidence, 100%)
md5 ca582fafbbb257ccf1bf91dac47fcf4f
sha256 b0c34116121eb910abfa1b9a462b70bab59faa0800c779496fbb528f0b183b7c
ssdeep 12288:pBuHCw8yfWsk3UrPP5ZSY7GQqc38JOaFir:+CsuzU35yW3paFir
imphash 7ac24a9e85698f19a8d2637811e8f9f4
impfuzzy 24:r10LPU+4CXdTlJcDc4j+lvTpQxvaAH2+fcjtoGbaNHuOZyv4uRT4mlNkF:1CXddu8+fcjtoGOPu46cmrkF
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x462008 EnumCalendarInfoA
 0x46200c GlobalAddAtomA
 0x462010 InterlockedIncrement
 0x462014 OpenJobObjectA
 0x462018 GetCurrentProcess
 0x46201c GetModuleHandleW
 0x462020 GetCommConfig
 0x462024 GetProcessHeap
 0x462028 GetWindowsDirectoryA
 0x46202c SizeofResource
 0x462030 EnumResourceLanguagesA
 0x462034 CreateFileW
 0x462038 GetOverlappedResult
 0x46203c ExitThread
 0x462040 GetVolumePathNameA
 0x462044 FlushFileBuffers
 0x462048 InterlockedExchange
 0x46204c GetLastError
 0x462050 SetLastError
 0x462054 GetProcAddress
 0x462058 VirtualAlloc
 0x46205c GetComputerNameA
 0x462060 LoadLibraryA
 0x462064 OpenMutexA
 0x462068 LocalAlloc
 0x46206c CreateHardLinkW
 0x462070 FindFirstVolumeMountPointW
 0x462074 BeginUpdateResourceA
 0x462078 GlobalFindAtomW
 0x46207c VirtualProtect
 0x462080 _lopen
 0x462084 GetVersionExA
 0x462088 FindAtomW
 0x46208c GetFileInformationByHandle
 0x462090 OpenFileMappingA
 0x462094 TlsFree
 0x462098 LCMapStringW
 0x46209c lstrcpyA
 0x4620a0 BackupWrite
 0x4620a4 GetFullPathNameW
 0x4620a8 InterlockedDecrement
 0x4620ac Sleep
 0x4620b0 InitializeCriticalSection
 0x4620b4 DeleteCriticalSection
 0x4620b8 EnterCriticalSection
 0x4620bc LeaveCriticalSection
 0x4620c0 UnhandledExceptionFilter
 0x4620c4 SetUnhandledExceptionFilter
 0x4620c8 GetStartupInfoW
 0x4620cc RaiseException
 0x4620d0 RtlUnwind
 0x4620d4 HeapFree
 0x4620d8 ExitProcess
 0x4620dc WriteFile
 0x4620e0 GetStdHandle
 0x4620e4 GetModuleFileNameA
 0x4620e8 TerminateProcess
 0x4620ec IsDebuggerPresent
 0x4620f0 HeapAlloc
 0x4620f4 GetModuleFileNameW
 0x4620f8 FreeEnvironmentStringsW
 0x4620fc GetEnvironmentStringsW
 0x462100 GetCommandLineW
 0x462104 SetHandleCount
 0x462108 GetFileType
 0x46210c GetStartupInfoA
 0x462110 TlsGetValue
 0x462114 TlsAlloc
 0x462118 TlsSetValue
 0x46211c GetCurrentThreadId
 0x462120 HeapCreate
 0x462124 VirtualFree
 0x462128 QueryPerformanceCounter
 0x46212c GetTickCount
 0x462130 GetCurrentProcessId
 0x462134 GetSystemTimeAsFileTime
 0x462138 HeapSize
 0x46213c HeapReAlloc
 0x462140 GetCPInfo
 0x462144 GetACP
 0x462148 GetOEMCP
 0x46214c IsValidCodePage
 0x462150 GetLocaleInfoA
 0x462154 GetStringTypeA
 0x462158 MultiByteToWideChar
 0x46215c GetStringTypeW
 0x462160 InitializeCriticalSectionAndSpinCount
 0x462164 GetModuleHandleA
 0x462168 LCMapStringA
 0x46216c WideCharToMultiByte
USER32.dll
 0x462174 SetClipboardViewer
GDI32.dll
 0x462000 GetDeviceGammaRamp

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure