Report - crypted333.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.05.17 15:36 Machine s1_win7_x6401
Filename crypted333.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
8
Behavior Score
2.2
ZERO API file : mailcious
VT API (file) 54 detected (AIDetectMalware, Malicious, score, Lazy, unsafe, Save, Attribute, HighConfidence, high confidence, Kryptik, HXAL, Artemis, TrojanX, ShellCodeRunner, CLASSIC, skgtp, HPGen, high, Krypt, Detected, ai score=82, LummaStealer, Eldorado, R648432, ZexaF, DqW@ayYCGnk, BScope, TrojanPSW, Reline, Azlw, Static AI, Malicious PE, susgen)
md5 e967f019b01357086d92181e6ee28e0b
sha256 c69c17f4c6b2206437e7954c02424b80605d40e98c0adcad6839e170c94b1c82
ssdeep 6144:0wn4ycCdxutF+xTjgkY3WFsX5yoAo4vQufdItcfZ1OqMwyBxg4/WSEN3tB/P98wX:0g4yc4xKrmFskRokMc2pF7g4LEJ9f1l
imphash 81b834f6f9db0b945bd836f537996a1f
impfuzzy 24:HnQJKjv+DO8jTcpVWZlK+9teEGhlJBl393PLOovbO3kFZMv1GMAkEZHu9F:HnJ0cpVe79teEGnpN630FZGP
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 54 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

GDI32.dll
 0x420008 GetClipBox
USER32.dll
 0x42016c PostQuitMessage
ADVAPI32.dll
 0x420000 CryptDecrypt
KERNEL32.dll
 0x420010 HeapSize
 0x420014 CreateFileW
 0x420018 VirtualAlloc
 0x42001c WaitForSingleObject
 0x420020 GetModuleHandleA
 0x420024 FreeConsole
 0x420028 CreateThread
 0x42002c GetProcAddress
 0x420030 MultiByteToWideChar
 0x420034 GetStringTypeW
 0x420038 WideCharToMultiByte
 0x42003c GetCurrentThreadId
 0x420040 CloseHandle
 0x420044 WaitForSingleObjectEx
 0x420048 GetExitCodeThread
 0x42004c EnterCriticalSection
 0x420050 LeaveCriticalSection
 0x420054 InitializeCriticalSectionEx
 0x420058 DeleteCriticalSection
 0x42005c EncodePointer
 0x420060 DecodePointer
 0x420064 LCMapStringEx
 0x420068 ReleaseSRWLockExclusive
 0x42006c WakeAllConditionVariable
 0x420070 QueryPerformanceCounter
 0x420074 GetSystemTimeAsFileTime
 0x420078 GetModuleHandleW
 0x42007c GetCPInfo
 0x420080 IsProcessorFeaturePresent
 0x420084 UnhandledExceptionFilter
 0x420088 SetUnhandledExceptionFilter
 0x42008c GetCurrentProcess
 0x420090 TerminateProcess
 0x420094 GetCurrentProcessId
 0x420098 InitializeSListHead
 0x42009c IsDebuggerPresent
 0x4200a0 GetStartupInfoW
 0x4200a4 GetProcessHeap
 0x4200a8 RaiseException
 0x4200ac RtlUnwind
 0x4200b0 GetLastError
 0x4200b4 SetLastError
 0x4200b8 InitializeCriticalSectionAndSpinCount
 0x4200bc TlsAlloc
 0x4200c0 TlsGetValue
 0x4200c4 TlsSetValue
 0x4200c8 TlsFree
 0x4200cc FreeLibrary
 0x4200d0 LoadLibraryExW
 0x4200d4 ExitThread
 0x4200d8 FreeLibraryAndExitThread
 0x4200dc GetModuleHandleExW
 0x4200e0 GetStdHandle
 0x4200e4 WriteFile
 0x4200e8 GetModuleFileNameW
 0x4200ec ExitProcess
 0x4200f0 GetCommandLineA
 0x4200f4 GetCommandLineW
 0x4200f8 HeapAlloc
 0x4200fc HeapFree
 0x420100 CompareStringW
 0x420104 LCMapStringW
 0x420108 GetLocaleInfoW
 0x42010c IsValidLocale
 0x420110 GetUserDefaultLCID
 0x420114 EnumSystemLocalesW
 0x420118 GetFileType
 0x42011c FlushFileBuffers
 0x420120 GetConsoleOutputCP
 0x420124 GetConsoleMode
 0x420128 ReadFile
 0x42012c GetFileSizeEx
 0x420130 SetFilePointerEx
 0x420134 ReadConsoleW
 0x420138 HeapReAlloc
 0x42013c FindClose
 0x420140 FindFirstFileExW
 0x420144 FindNextFileW
 0x420148 IsValidCodePage
 0x42014c GetACP
 0x420150 GetOEMCP
 0x420154 GetEnvironmentStringsW
 0x420158 FreeEnvironmentStringsW
 0x42015c SetEnvironmentVariableW
 0x420160 SetStdHandle
 0x420164 WriteConsoleW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure