Report - current.exe

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.04.01 07:56 Machine s1_win7_x6401
Filename current.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
1.0
ZERO API file : malware
VT API (file)
md5 ba76ca8c8922219555a894663329c3e5
sha256 e1330b5e8d14691a985bf45fdc726ce7277ee98128791244290e9b5f79200818
ssdeep 6144:9Bu3yjLainfTBWyDAxYhBZsQ1qexRbxNsfblidAarZfhfhWJ:LKyHainfTIyDAABCsqkbxNsfBiWarZfq
imphash b2c192dde66d798d732cf15b9e7a6998
impfuzzy 24:arlCkrkSnkcTgVakVH1VV4WWvCD+4EYbKPv9njRZLOtZt5QcrliJ3I+HRyv0T4Q9:arlFDD1v6tZtWcrcC0cg/xkSeVo
  Network IP location

Signature (3cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x411000 GetSystemDefaultLangID
 0x411004 DebugActiveProcess
 0x411008 GetDateFormatW
 0x41100c CreateFileA
 0x411010 GetConsoleAliasesLengthW
 0x411014 GetNumaProcessorNode
 0x411018 HeapAlloc
 0x41101c InterlockedIncrement
 0x411020 HeapFree
 0x411024 CreateHardLinkA
 0x411028 ConnectNamedPipe
 0x41102c GetModuleHandleW
 0x411030 ReadConsoleOutputA
 0x411034 GlobalAlloc
 0x411038 GlobalFindAtomA
 0x41103c LoadLibraryW
 0x411040 GetLocaleInfoW
 0x411044 GetConsoleAliasExesLengthW
 0x411048 GetFileAttributesA
 0x41104c lstrcpynW
 0x411050 GetAtomNameW
 0x411054 LocalHandle
 0x411058 GetModuleFileNameW
 0x41105c FindNextVolumeMountPointW
 0x411060 SetConsoleTitleA
 0x411064 WritePrivateProfileStringW
 0x411068 GetThreadLocale
 0x41106c GetProcAddress
 0x411070 SetComputerNameA
 0x411074 SetCalendarInfoW
 0x411078 SetConsoleDisplayMode
 0x41107c WaitForMultipleObjects
 0x411080 SetSystemTime
 0x411084 SetConsoleTitleW
 0x411088 HeapSetInformation
 0x41108c VirtualProtect
 0x411090 GetCurrentDirectoryA
 0x411094 DeleteCriticalSection
 0x411098 FindAtomW
 0x41109c CreateFileW
 0x4110a0 ReadFile
 0x4110a4 FlushFileBuffers
 0x4110a8 EncodePointer
 0x4110ac DecodePointer
 0x4110b0 ExitProcess
 0x4110b4 GetCommandLineW
 0x4110b8 GetStartupInfoW
 0x4110bc RaiseException
 0x4110c0 TerminateProcess
 0x4110c4 GetCurrentProcess
 0x4110c8 UnhandledExceptionFilter
 0x4110cc SetUnhandledExceptionFilter
 0x4110d0 IsDebuggerPresent
 0x4110d4 GetLastError
 0x4110d8 IsProcessorFeaturePresent
 0x4110dc WriteFile
 0x4110e0 GetStdHandle
 0x4110e4 HeapCreate
 0x4110e8 EnterCriticalSection
 0x4110ec LeaveCriticalSection
 0x4110f0 Sleep
 0x4110f4 HeapSize
 0x4110f8 InitializeCriticalSectionAndSpinCount
 0x4110fc TlsAlloc
 0x411100 TlsGetValue
 0x411104 TlsSetValue
 0x411108 TlsFree
 0x41110c SetLastError
 0x411110 GetCurrentThreadId
 0x411114 InterlockedDecrement
 0x411118 FreeEnvironmentStringsW
 0x41111c GetEnvironmentStringsW
 0x411120 SetHandleCount
 0x411124 GetFileType
 0x411128 QueryPerformanceCounter
 0x41112c GetTickCount
 0x411130 GetCurrentProcessId
 0x411134 GetSystemTimeAsFileTime
 0x411138 SetFilePointer
 0x41113c WideCharToMultiByte
 0x411140 GetConsoleCP
 0x411144 GetConsoleMode
 0x411148 GetCPInfo
 0x41114c GetACP
 0x411150 GetOEMCP
 0x411154 IsValidCodePage
 0x411158 RtlUnwind
 0x41115c MultiByteToWideChar
 0x411160 HeapReAlloc
 0x411164 SetStdHandle
 0x411168 WriteConsoleW
 0x41116c LCMapStringW
 0x411170 GetStringTypeW
 0x411174 CloseHandle
USER32.dll
 0x41117c GetMonitorInfoW
 0x411180 LoadIconA
 0x411184 CopyRect
WINHTTP.dll
 0x41118c WinHttpCloseHandle
 0x411190 WinHttpAddRequestHeaders

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure