Report - ABC.exe

Malicious Library UPX PE File PE32 DLL
ScreenShot
Created 2024.03.29 09:36 Machine s1_win7_x6401
Filename ABC.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
AI Score
7
Behavior Score
4.8
ZERO API file : malware
VT API (file) 15 detected (malicious, high confidence, score, Artemis, FileRepMalware, Casdet, Static AI, Suspicious PE, confidence)
md5 46bbacb63c2f6c440be347e99210c3a3
sha256 3b0b1b064f6b84d3b68b541f073ddca759e01adbbb9c36e7b38e6707b941539e
ssdeep 6144:olJZfHKsHfGCZ71Cn3R1E1+hf6VkTJluAMHQaMWDLdzsaX4O6zTbw6hE4F0FDgCJ:oluqauAMeWm5OKU6O4eFFpd6MvV/lzD
imphash e221f4f7d36469d53810a4b5f9fc8966
impfuzzy 48:6+RYCCQl1XO3VSv5L0W8rOAltkz+eOxHALll3XbqQEFzn7+P9KQJ45EQl/KAEowX:jyCCeZyfffH1zlKsq
  Network IP location

Signature (11cnts)

Level Description
warning Appends a new file extension or content to 215 files indicative of a ransomware file encryption process
warning Appends a new file extension or content to 215 files indicative of a ransomware file encryption process
warning Performs 215 file moves indicative of a ransomware file encryption process
watch Appends a known CryLocker ransomware file extension to files that have been encrypted
watch File has been identified by 15 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice Drops an executable to the user AppData folder
info Checks amount of memory in system
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (13cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info 1 dumpmem
info 1 memory
info 1 office
info 1 scripts
info 1 urls
info 94102 shellcode

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
&emsp


Similarity measure (PE file only) - Checking for service failure