Report - klounada.exe

Malicious Library VMProtect PE File PE32
ScreenShot
Created 2024.04.10 13:44 Machine s1_win7_x6401
Filename klounada.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
2.2
ZERO API file : malware
VT API (file) 41 detected (AIDetectMalware, Malicious, score, Zusy, unsafe, Save, confidence, 100%, Attribute, HighConfidence, high confidence, VMProtect, Artemis, FileRepMalware, Misc, Generic@AI, RDML, 7qbB2Vqnem4M07cCPLbN9Q, XPACK, high, Detected, ai score=81, Znyonm, R644235, ZexaF, @BW@aqKHcs, Zmhl, Static AI, Malicious PE, susgen)
md5 616756248d85c819fd0830d660a7aaa0
sha256 1e2f5b51b09d3f0060700403f138e33cf4c085dde4fbb469c420e9fd840f04d3
ssdeep 98304:g2GmrHOupd2UnxrkWKnuIGQi0iEFZTbKEH/Zh9lkdKnZ7QOjXIEgTH:a1UxrxWuYFFhDYKnOObIEgT
imphash 89c8abd38fd3ffc06ee06d01f9b3cbbf
impfuzzy 12:oZCiwxrnfg0Q5kBZGoQtXJxZGb9AJcDfA5kLfP9m:YCiwxE0Q58QtXJHc9NDI5Q8
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 41 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x801000 ExitProcess
ole32.dll
 0x801008 CoCreateInstance
OLEAUT32.dll
 0x801010 SysAllocString
USER32.dll
 0x801018 CloseClipboard
GDI32.dll
 0x801020 BitBlt
WTSAPI32.dll
 0x801028 WTSSendMessageW
KERNEL32.dll
 0x801030 VirtualQuery
USER32.dll
 0x801038 GetProcessWindowStation
KERNEL32.dll
 0x801040 LocalAlloc
 0x801044 LocalFree
 0x801048 GetModuleFileNameW
 0x80104c GetProcessAffinityMask
 0x801050 SetProcessAffinityMask
 0x801054 SetThreadAffinityMask
 0x801058 Sleep
 0x80105c ExitProcess
 0x801060 FreeLibrary
 0x801064 LoadLibraryA
 0x801068 GetModuleHandleA
 0x80106c GetProcAddress
USER32.dll
 0x801074 GetProcessWindowStation
 0x801078 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure