Report - menta.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.04.18 07:12 Machine s1_win7_x6403
Filename menta.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
1.6
ZERO API file : clean
VT API (file) 33 detected (AIDetectMalware, Malicious, score, Lockbit, unsafe, Save, confidence, 100%, Attribute, HighConfidence, high confidence, FileRepMalware, RisePro, SmokeLoader, CLASSIC, high, Krypt, Danabot, Detected, Convagent, STOP, Caynamer, R645266, ZexaF, 6q0@auqYLYjG, Obfuscated, Kryptik, HWMW)
md5 2953500b81ed3cbe64f7a016b3bb6c61
sha256 be69fd07cd8c77aebbc0016dd3bf9094e4597f6161e50cb9a746f7c68cc5ecec
ssdeep 12288:+1wnWGyxVSmGlbnEYudfU1GttvEX49nh/9YYIvUwWuV+6/79KO8hFrek7xCOfllq:+3qtjEYGf+GttMcnkdhr7/Srek7v9wr
imphash 0fcd65e7119513450cc779be2a5d516f
impfuzzy 24:OZ9TgVEmX/KGQm9hG8gwMpwc+dpOovXG9tVJBlTDuLoYv1nZeMrcA7mDJ:OZWXf/f3c+WOG9thoLT1AA7SJ
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41a008 FindFirstChangeNotificationW
 0x41a00c GetNumaProcessorNode
 0x41a010 GetLocaleInfoA
 0x41a014 GetUserDefaultLCID
 0x41a018 CreateHardLinkA
 0x41a01c GetNumberFormatA
 0x41a020 GlobalFindAtomA
 0x41a024 LoadLibraryW
 0x41a028 ReadConsoleInputA
 0x41a02c WriteConsoleW
 0x41a030 GetModuleFileNameW
 0x41a034 GetCompressedFileSizeA
 0x41a038 SetThreadLocale
 0x41a03c GetStdHandle
 0x41a040 GetLastError
 0x41a044 VirtualAlloc
 0x41a048 CreateTimerQueueTimer
 0x41a04c FindVolumeClose
 0x41a050 LocalAlloc
 0x41a054 GetExitCodeThread
 0x41a058 AddAtomW
 0x41a05c RemoveDirectoryW
 0x41a060 SetCommMask
 0x41a064 GetOEMCP
 0x41a068 VirtualProtect
 0x41a06c SetCalendarInfoA
 0x41a070 GetWindowsDirectoryW
 0x41a074 GetCurrentProcessId
 0x41a078 AddConsoleAliasA
 0x41a07c WriteProcessMemory
 0x41a080 SetFileAttributesW
 0x41a084 GetVolumeInformationW
 0x41a088 CreateThread
 0x41a08c CreateFileW
 0x41a090 CopyFileA
 0x41a094 DebugActiveProcess
 0x41a098 OutputDebugStringW
 0x41a09c FlushFileBuffers
 0x41a0a0 SetStdHandle
 0x41a0a4 GetConsoleMode
 0x41a0a8 WideCharToMultiByte
 0x41a0ac MultiByteToWideChar
 0x41a0b0 GetStringTypeW
 0x41a0b4 EncodePointer
 0x41a0b8 DecodePointer
 0x41a0bc EnterCriticalSection
 0x41a0c0 LeaveCriticalSection
 0x41a0c4 DeleteCriticalSection
 0x41a0c8 HeapFree
 0x41a0cc GetCommandLineA
 0x41a0d0 GetCPInfo
 0x41a0d4 RaiseException
 0x41a0d8 RtlUnwind
 0x41a0dc HeapAlloc
 0x41a0e0 IsProcessorFeaturePresent
 0x41a0e4 UnhandledExceptionFilter
 0x41a0e8 SetUnhandledExceptionFilter
 0x41a0ec SetLastError
 0x41a0f0 InitializeCriticalSectionAndSpinCount
 0x41a0f4 Sleep
 0x41a0f8 GetCurrentProcess
 0x41a0fc TerminateProcess
 0x41a100 TlsAlloc
 0x41a104 TlsGetValue
 0x41a108 TlsSetValue
 0x41a10c TlsFree
 0x41a110 GetStartupInfoW
 0x41a114 GetModuleHandleW
 0x41a118 GetProcAddress
 0x41a11c LCMapStringW
 0x41a120 GetLocaleInfoW
 0x41a124 IsValidLocale
 0x41a128 EnumSystemLocalesW
 0x41a12c IsValidCodePage
 0x41a130 GetACP
 0x41a134 GetCurrentThreadId
 0x41a138 IsDebuggerPresent
 0x41a13c GetProcessHeap
 0x41a140 ExitProcess
 0x41a144 GetModuleHandleExW
 0x41a148 HeapSize
 0x41a14c GetFileType
 0x41a150 CloseHandle
 0x41a154 GetModuleFileNameA
 0x41a158 WriteFile
 0x41a15c QueryPerformanceCounter
 0x41a160 GetSystemTimeAsFileTime
 0x41a164 GetEnvironmentStringsW
 0x41a168 FreeEnvironmentStringsW
 0x41a16c HeapReAlloc
 0x41a170 LoadLibraryExW
 0x41a174 ReadFile
 0x41a178 SetFilePointerEx
 0x41a17c GetConsoleCP
USER32.dll
 0x41a184 GetMenuItemID
GDI32.dll
 0x41a000 GetCharacterPlacementW
ole32.dll
 0x41a194 CoMarshalHresult
WINHTTP.dll
 0x41a18c WinHttpReadData

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure