Report - brg.exe

Malicious Library VMProtect UPX PE32 PE File
ScreenShot
Created 2023.12.22 08:13 Machine s1_win7_x6401
Filename brg.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
3.4
ZERO API file : clean
VT API (file) 21 detected (AIDetectMalware, malicious, high confidence, score, unsafe, Attribute, HighConfidence, VMProtect, BB suspicious, FileRepMalware, Generic@AI, RDML, oIf8traIkPa1q7F6UtNdxg, Generic ML PUA, Wacapew, ZexaF, @R1@ayrMj1dj, susgen, confidence)
md5 dff334fa8d2c701dba4139875f14c9ff
sha256 8fdeb093bec0bc7dc01ef7f0aa61476deaaddbf42a8da2d711e21693fc3ecbd6
ssdeep 98304:XmQNg/7b+DOWjg5/3xxVAjls6CIcvA/ArCvxU3qthfzJ6FKLN+VzaN44KNPn83Cp:Xev+FkYJCjvWAKmIfzeKL8aNGNPn83Cp
imphash a2b52377798765a91e307d887f9408b3
impfuzzy 12:1sXm3EQb4ZGoQtXJxZGb9AJcDfA5kLfP9bOZGqAJcDW:1smEQaQtXJHc9NDI5QVadNDW
  Network IP location

Signature (8cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
94.103.94.153 NL Hosting technology LTD 94.103.94.153 clean
121.254.136.18 KR LG DACOM Corporation 121.254.136.18 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x8d4000 HeapCreate
USER32.dll
 0x8d4008 DestroyCursor
GDI32.dll
 0x8d4010 SetBkMode
ole32.dll
 0x8d4018 OleUninitialize
OLEAUT32.dll
 0x8d4020 VariantClear
MSVCRT.dll
 0x8d4028 _initterm
VERSION.dll
 0x8d4030 GetFileVersionInfoW
KERNEL32.dll
 0x8d4038 LocalAlloc
 0x8d403c LocalFree
 0x8d4040 GetModuleFileNameW
 0x8d4044 GetProcessAffinityMask
 0x8d4048 SetProcessAffinityMask
 0x8d404c SetThreadAffinityMask
 0x8d4050 Sleep
 0x8d4054 ExitProcess
 0x8d4058 FreeLibrary
 0x8d405c LoadLibraryA
 0x8d4060 GetModuleHandleA
 0x8d4064 GetProcAddress
USER32.dll
 0x8d406c GetProcessWindowStation
 0x8d4070 GetUserObjectInformationW
KERNEL32.dll
 0x8d4078 HeapAlloc
 0x8d407c HeapFree
 0x8d4080 ExitProcess
 0x8d4084 LoadLibraryA
 0x8d4088 GetModuleHandleA
 0x8d408c GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure