Report - univ.exe

Malicious Library UPX PE32 PE File OS Processor Check
ScreenShot
Created 2024.02.04 16:56 Machine s1_win7_x6401
Filename univ.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
2.8
ZERO API file : malware
VT API (file) 34 detected (AIDetectMalware, malicious, high confidence, score, Stop, Lockbit, unsafe, Save, Hacktool, Attribute, HighConfidence, Artemis, CrypterX, Generic@AI, RDML, 0HkOcwrKHYT77KviueBRWQ, high, Krypt, Detected, Phonzy, Glupteba, R633410, ZexaF, xC0@aO9wDubi, BScope, Tofsee, Obfuscated, Static AI, Malicious PE, susgen, confidence, 100%)
md5 e63c6dcaebb548eb22c15e57686a011a
sha256 a9c83e72f004dcd4ba9e8b1a0b14dc9aa1379fdbf3d9adff3cb956881ab4c413
ssdeep 6144:s0JonqSBYU26Bl9RNpucewgRXJ4y1uRBd4L2tfSd44WrJq1kDc:s7pBYU26BlDDgRXSXtl4WrkeY
imphash bf14849f4ab78a7abfe404cb860b648b
impfuzzy 48:L1X+jQ4FU1/VIqtzZcqK98DS5KdxBZEBLf:RcUVVJtzZcqQ8DS5GxrEV
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 34 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
212.224.86.223 DE First Colo GmbH 212.224.86.223 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x44000c MoveFileExA
 0x440010 FindResourceW
 0x440014 HeapAlloc
 0x440018 InterlockedIncrement
 0x44001c OpenJobObjectA
 0x440020 SetDefaultCommConfigW
 0x440024 CreateDirectoryW
 0x440028 GetTickCount
 0x44002c GetProcessHeap
 0x440030 GetConsoleAliasesLengthA
 0x440034 TzSpecificLocalTimeToSystemTime
 0x440038 GetSystemTimes
 0x44003c WideCharToMultiByte
 0x440040 GetVolumeInformationA
 0x440044 LoadLibraryW
 0x440048 CompareStringW
 0x44004c GetStartupInfoW
 0x440050 WritePrivateProfileStringW
 0x440054 GetLocaleInfoA
 0x440058 GetConsoleAliasesW
 0x44005c GlobalUnfix
 0x440060 SetCurrentDirectoryA
 0x440064 GetLastError
 0x440068 GetProcAddress
 0x44006c CreateNamedPipeA
 0x440070 ResetEvent
 0x440074 OpenWaitableTimerA
 0x440078 GetAtomNameA
 0x44007c LoadLibraryA
 0x440080 LocalAlloc
 0x440084 SetProcessWorkingSetSize
 0x440088 FreeEnvironmentStringsW
 0x44008c GetCurrentDirectoryA
 0x440090 EndUpdateResourceA
 0x440094 FileTimeToLocalFileTime
 0x440098 IsValidLocale
 0x44009c EnumSystemLocalesA
 0x4400a0 GetModuleHandleExA
 0x4400a4 FlushFileBuffers
 0x4400a8 EnumDateFormatsExW
 0x4400ac HeapFree
 0x4400b0 EncodePointer
 0x4400b4 DecodePointer
 0x4400b8 GetCommandLineW
 0x4400bc HeapSetInformation
 0x4400c0 TerminateProcess
 0x4400c4 GetCurrentProcess
 0x4400c8 UnhandledExceptionFilter
 0x4400cc SetUnhandledExceptionFilter
 0x4400d0 IsDebuggerPresent
 0x4400d4 HeapCreate
 0x4400d8 HeapDestroy
 0x4400dc Sleep
 0x4400e0 HeapSize
 0x4400e4 GetModuleHandleW
 0x4400e8 ExitProcess
 0x4400ec EnterCriticalSection
 0x4400f0 LeaveCriticalSection
 0x4400f4 CloseHandle
 0x4400f8 WriteFile
 0x4400fc GetStdHandle
 0x440100 GetModuleFileNameW
 0x440104 GetEnvironmentStringsW
 0x440108 SetHandleCount
 0x44010c InitializeCriticalSectionAndSpinCount
 0x440110 GetFileType
 0x440114 DeleteCriticalSection
 0x440118 TlsAlloc
 0x44011c TlsGetValue
 0x440120 TlsSetValue
 0x440124 TlsFree
 0x440128 SetLastError
 0x44012c GetCurrentThreadId
 0x440130 InterlockedDecrement
 0x440134 GetCurrentThread
 0x440138 QueryPerformanceCounter
 0x44013c GetCurrentProcessId
 0x440140 GetSystemTimeAsFileTime
 0x440144 HeapReAlloc
 0x440148 FatalAppExitA
 0x44014c SetConsoleCtrlHandler
 0x440150 FreeLibrary
 0x440154 InterlockedExchange
 0x440158 GetLocaleInfoW
 0x44015c RtlUnwind
 0x440160 GetCPInfo
 0x440164 GetACP
 0x440168 GetOEMCP
 0x44016c IsValidCodePage
 0x440170 SetStdHandle
 0x440174 GetConsoleCP
 0x440178 GetConsoleMode
 0x44017c LCMapStringW
 0x440180 MultiByteToWideChar
 0x440184 GetStringTypeW
 0x440188 SetFilePointer
 0x44018c IsProcessorFeaturePresent
 0x440190 WriteConsoleW
 0x440194 CreateFileW
 0x440198 GetUserDefaultLCID
 0x44019c RaiseException
USER32.dll
 0x4401a4 DestroyIcon
ADVAPI32.dll
 0x440000 ReadEventLogA
 0x440004 GetServiceKeyNameA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure