Report - invoice.exe

Malicious Library UPX AntiDebug AntiVM PE File PE32 OS Processor Check
ScreenShot
Created 2024.06.19 14:20 Machine s1_win7_x6401
Filename invoice.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
4.8
ZERO API file : clean
VT API (file) 24 detected (AIDetectMalware, malicious, high confidence, score, Unsafe, kcakpf, Generic@AI, RDML, rHXKkKuGL6dt4T681JXXLA, Real Protect, high, Detected, Wacatac, ZexaF, nq3@aerCP3e, Gencirc, Static AI, Suspicious PE, MxResIcn, confidence)
md5 dfc21ed56aafad102fd6b985a15f8423
sha256 81ff684b35cd19013c8a0ff8a4b01ea2932e11debba1be2cd058539742d0491a
ssdeep 3072:lkAn8TlyyzWmbQoOzKyLR6n4BCHwjqWRwZnqsCwYLA:l18hyCCKyLRZZRw5qtLA
imphash c4b8b0aba9f9c876ca624bdbda64d516
impfuzzy 24:YjXIY1WZSPOT+OovMRv4QrD+gv8ENEbwdn:u48OTJr0xbKn
  Network IP location

Signature (11cnts)

Level Description
warning File has been identified by 24 AntiVirus engines on VirusTotal as malicious
watch Creates an Alternate Data Stream (ADS)
watch Creates known Upatre files
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Yara rule detected in process memory
info Checks amount of memory in system
info One or more processes crashed
info The executable uses a known packer

Rules (14cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40f000 CloseHandle
 0x40f004 WaitForSingleObject
 0x40f008 Sleep
 0x40f00c CreateDirectoryA
 0x40f010 GetTempPathA
 0x40f014 GetModuleFileNameA
 0x40f018 GetVolumeInformationA
 0x40f01c GetTickCount
 0x40f020 LCMapStringA
 0x40f024 SetEndOfFile
 0x40f028 LoadLibraryA
 0x40f02c GetOEMCP
 0x40f030 GetACP
 0x40f034 GetCPInfo
 0x40f038 GetLastError
 0x40f03c DeleteFileA
 0x40f040 ExitProcess
 0x40f044 TerminateProcess
 0x40f048 GetCurrentProcess
 0x40f04c GetModuleHandleA
 0x40f050 GetStartupInfoA
 0x40f054 GetCommandLineA
 0x40f058 GetVersion
 0x40f05c SetHandleCount
 0x40f060 GetStdHandle
 0x40f064 GetFileType
 0x40f068 ReadFile
 0x40f06c SetFilePointer
 0x40f070 HeapFree
 0x40f074 WriteFile
 0x40f078 GetProcAddress
 0x40f07c UnhandledExceptionFilter
 0x40f080 FreeEnvironmentStringsA
 0x40f084 FreeEnvironmentStringsW
 0x40f088 WideCharToMultiByte
 0x40f08c GetEnvironmentStrings
 0x40f090 GetEnvironmentStringsW
 0x40f094 HeapDestroy
 0x40f098 HeapCreate
 0x40f09c VirtualFree
 0x40f0a0 RtlUnwind
 0x40f0a4 HeapAlloc
 0x40f0a8 SetStdHandle
 0x40f0ac VirtualAlloc
 0x40f0b0 HeapReAlloc
 0x40f0b4 FlushFileBuffers
 0x40f0b8 CreateFileA
 0x40f0bc MultiByteToWideChar
 0x40f0c0 GetStringTypeA
 0x40f0c4 GetStringTypeW
 0x40f0c8 LCMapStringW
USER32.dll
 0x40f0d8 MessageBoxA
SHELL32.dll
 0x40f0d0 ShellExecuteExA
WINMM.dll
 0x40f0e0 timeGetTime

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure