Report - TextMarks.exe

Gen1 Malicious Library Malicious Packer UPX MSOffice File PE64 PE File DllRegisterServer dll wget OS Processor Check
ScreenShot
Created 2024.03.29 07:58 Machine s1_win7_x6401
Filename TextMarks.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
0.8
ZERO API file : mailcious
VT API (file) 27 detected (malicious, high confidence, Artemis, unsafe, Attribute, HighConfidence, a variant of WinGo, qwisfb, vsbxc, Outbreak, Detected, Casdet, Eldorado, Chgt, R002H0DCS24)
md5 ff35671d54d612772b0c22c141a3056e
sha256 2f625ea35f82332c639049c4a849f39cd2b74acb013880d156a2f647497c2512
ssdeep 98304:Y1ykcjtwknB+uZuNRJ4GOnkYcxVCHixHIf2Lwp27IWDpWVnPfMIHpV6FECFErKrz:7RnB+uQ4lip97onPfMIHHvCFHWrL
imphash 5337a536d7037104682f1805fcc9fefb
impfuzzy 96:kFnOJexMCyS5pmvxHS42xQ2H3XiXF2X1PgApTJGQ666myqTVdebMpFg3m6RaUDfT:kFnOgryS52/e3SoFotQ6NmTVk+g3m6Rf
  Network IP location

Signature (1cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious

Rules (10cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info IsPE64 (no description) binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info wget_command wget command binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure