Report - build.exe

Gen1 Generic Malware Malicious Library Malicious Packer UPX Antivirus Anti_VM PE File PE64 DLL OS Processor Check ftp wget
ScreenShot
Created 2024.01.11 07:37 Machine s1_win7_x6401
Filename build.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
3.2
ZERO API file : clean
VT API (file) 40 detected (AIDetectMalware, Nuitka, Tedy, Artemis, AGen, Attribute, HighConfidence, malicious, high confidence, a variant of Python, U suspicious, Gencirc, Python, Detected, ABRisk, GBSM, GrayWare, Wacapew, Znyonm, Sabsik, score, R626445, unsafe, R002H07AA24, CLOUD, Static AI, Malicious PE, confidence)
md5 1d5084678b97f142dc7c3ea12304cbb6
sha256 60f351b0db70f792c111229211107802f70ca8e9ce8d6cf8c8d4cb397981d965
ssdeep 196608:9sqcMiSLkjE70vlAVkQY+MLJulgX4weHwDauwcbHZOZhD:KBMiSLkg7mGVkN+MLAgoweHEaK1W
imphash a7b0793ae6dd3f16ef244d19e4de0c24
impfuzzy 48:p8XOst9nR35M+k3PlslEJGp6qJ8k3k1vkqqssXh:eXdth95Mr3PlYEJGph6k3mkqqs2
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious
watch Drops a binary and executes it
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system

Rules (16cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
info ftp_command ftp command binaries (download)
info IsDLL (no description) binaries (download)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info wget_command wget command binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140033358 CloseHandle
 0x140033360 CopyFileW
 0x140033368 CreateDirectoryW
 0x140033370 CreateFileMappingW
 0x140033378 CreateFileW
 0x140033380 CreateProcessW
 0x140033388 DeleteCriticalSection
 0x140033390 DeleteFileW
 0x140033398 EnterCriticalSection
 0x1400333a0 FindResourceA
 0x1400333a8 FormatMessageA
 0x1400333b0 FreeLibrary
 0x1400333b8 GenerateConsoleCtrlEvent
 0x1400333c0 GetCommandLineW
 0x1400333c8 GetCurrentProcessId
 0x1400333d0 GetExitCodeProcess
 0x1400333d8 GetFileAttributesW
 0x1400333e0 GetFileSize
 0x1400333e8 GetLastError
 0x1400333f0 GetModuleFileNameW
 0x1400333f8 GetModuleHandleA
 0x140033400 GetProcAddress
 0x140033408 GetProcessId
 0x140033410 GetStartupInfoW
 0x140033418 GetSystemTimeAsFileTime
 0x140033420 GetTempPathW
 0x140033428 InitializeCriticalSection
 0x140033430 IsDBCSLeadByteEx
 0x140033438 LeaveCriticalSection
 0x140033440 LoadLibraryA
 0x140033448 LoadResource
 0x140033450 LockResource
 0x140033458 MapViewOfFile
 0x140033460 MultiByteToWideChar
 0x140033468 ReadFile
 0x140033470 SetConsoleCtrlHandler
 0x140033478 SetEnvironmentVariableA
 0x140033480 SetUnhandledExceptionFilter
 0x140033488 SizeofResource
 0x140033490 Sleep
 0x140033498 TerminateProcess
 0x1400334a0 TlsGetValue
 0x1400334a8 UnmapViewOfFile
 0x1400334b0 VirtualProtect
 0x1400334b8 VirtualQuery
 0x1400334c0 WaitForSingleObject
 0x1400334c8 WideCharToMultiByte
 0x1400334d0 WriteFile
msvcrt.dll
 0x1400334e0 __C_specific_handler
 0x1400334e8 ___lc_codepage_func
 0x1400334f0 ___mb_cur_max_func
 0x1400334f8 __iob_func
 0x140033500 __set_app_type
 0x140033508 __setusermatherr
 0x140033510 __wargv
 0x140033518 __wgetmainargs
 0x140033520 __winitenv
 0x140033528 _amsg_exit
 0x140033530 _cexit
 0x140033538 _commode
 0x140033540 _errno
 0x140033548 _fmode
 0x140033550 _initterm
 0x140033558 _lock
 0x140033560 _onexit
 0x140033568 _unlock
 0x140033570 _wcmdln
 0x140033578 _wcsdup
 0x140033580 _wcsicmp
 0x140033588 _wrename
 0x140033590 abort
 0x140033598 calloc
 0x1400335a0 exit
 0x1400335a8 fprintf
 0x1400335b0 fputc
 0x1400335b8 free
 0x1400335c0 fwrite
 0x1400335c8 localeconv
 0x1400335d0 malloc
 0x1400335d8 mbstowcs
 0x1400335e0 memcpy
 0x1400335e8 memmove
 0x1400335f0 memset
 0x1400335f8 puts
 0x140033600 signal
 0x140033608 strerror
 0x140033610 strlen
 0x140033618 strncmp
 0x140033620 vfprintf
 0x140033628 wcscmp
 0x140033630 wcslen
 0x140033638 wcsncmp
SHELL32.dll
 0x140033648 SHFileOperationW
 0x140033650 SHGetFolderPathW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure