Report - SP_activator_11.exe

Winnti Family Malicious Library VMProtect UPX PE64 PE File MZP Format OS Processor Check
ScreenShot
Created 2024.04.10 22:26 Machine s1_win7_x6401
Filename SP_activator_11.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score Not founds Behavior Score
1.4
ZERO API file : clean
VT API (file) 2 detected (AIDetectMalware, susgen)
md5 37bc139d30272f8ca5516adccb5e2300
sha256 da4a0673bf79583fcf55539e7a4ef94e16215c7c8b32a50c30ebc8d412048489
ssdeep 786432:d3k0ifwwDu3glyrF3R6FLexvARIKi6ZgyBe4XMcL4:d3k07igrqFexFKrZgCFXt4
imphash bc526b1ad02acaf5d1cab0404b8af6a5
impfuzzy 24:oWw1q6DInb4LZwsgMT0Vz8cD958QtXJHc9NDI5Q8:oWCqvnhMTyR5ZXpcM5Q8
  Network IP location

Signature (4cnts)

Level Description
notice File has been identified by 2 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (8cnts)

Level Name Description Collection
danger Winnti_Family Winnti_Family binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x4600000 SysFreeString
advapi32.dll
 0x4600010 RegQueryValueExW
user32.dll
 0x4600020 CharNextW
kernel32.dll
 0x4600030 GetVersion
kernel32.dll
 0x4600040 GetProcAddress
user32.dll
 0x4600050 SetClassLongPtrW
gdi32.dll
 0x4600060 UnrealizeObject
version.dll
 0x4600070 VerQueryValueW
kernel32.dll
 0x4600080 GetVersionExW
 0x4600088 GetVersion
advapi32.dll
 0x4600098 RegUnLoadKeyW
kernel32.dll
 0x46000a8 Sleep
netapi32.dll
 0x46000b8 NetApiBufferFree
oleaut32.dll
 0x46000c8 SafeArrayPtrOfIndex
oleaut32.dll
 0x46000d8 GetErrorInfo
ole32.dll
 0x46000e8 OleUninitialize
comctl32.dll
 0x46000f8 InitializeFlatSB
user32.dll
 0x4600108 EnumDisplayMonitors
msvcrt.dll
 0x4600118 isxdigit
shell32.dll
 0x4600128 ShellExecuteW
shell32.dll
 0x4600138 SHGetFolderPathW
winspool.drv
 0x4600148 OpenPrinterW
winspool.drv
 0x4600158 GetDefaultPrinterW
advapi32.dll
 0x4600168 CryptGenRandom
WTSAPI32.dll
 0x4600178 WTSSendMessageW
kernel32.dll
 0x4600188 FlsSetValue
user32.dll
 0x4600198 GetProcessWindowStation
kernel32.dll
 0x46001a8 LocalAlloc
 0x46001b0 LocalFree
 0x46001b8 GetModuleFileNameW
 0x46001c0 GetProcessAffinityMask
 0x46001c8 SetProcessAffinityMask
 0x46001d0 SetThreadAffinityMask
 0x46001d8 Sleep
 0x46001e0 ExitProcess
 0x46001e8 FreeLibrary
 0x46001f0 LoadLibraryA
 0x46001f8 GetModuleHandleA
 0x4600200 GetProcAddress
user32.dll
 0x4600210 GetProcessWindowStation
 0x4600218 GetUserObjectInformationW

EAT(Export Address Table) Library

0x492bb0 TMethodImplementationIntercept
0x41a290 __dbk_fcall_wrapper
0x8af288 dbkFCallWrapperAddr


Similarity measure (PE file only) - Checking for service failure