Report - umOKKIbUBdaJ.exe

Generic Malware Malicious Library Malicious Packer UPX PE File PE64 DllRegisterServer dll OS Processor Check
ScreenShot
Created 2024.06.26 10:11 Machine s1_win7_x6403
Filename umOKKIbUBdaJ.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
1
Behavior Score
1.4
ZERO API file : mailcious
VT API (file) 45 detected (AIDetectMalware, malicious, high confidence, score, Ransomblackbyte, Artemis, Vr3p, GenericKD, Attribute, HighConfidence, a variant of WinGo, qwitvv, Genric, CLASSIC, AGEN, PRIVATELOADER, YXEFYZ, WinGo, Detected, ai score=84, Caynamer, Sabsik, Casdet, H15ZQ7, MxResIcn, confidence, 100%)
md5 608321f2d1044c6c22eeb66205e53650
sha256 efa8c6ecd88a7c400ff0b28ec7e5d2052943546f4c41dc41c3702dc73e9d0756
ssdeep 49152:YzmL+zbXEoqq1OQmf/csUgUk0WgwH20j9e7Esrp4AjE5EjwMh49cA0fAVXr15Tdy:YmLEbMIqPH20RvEW3TY
imphash 5929190c8765f5bc37b052ab5c6c53e7
impfuzzy 48:qJrKxMCy9cmwKeFR+2u42xQ2HpdXiX1PJOmSnlTJGfYJ861k1vcqTjz:qJexMCyamCRHu42xQ2HPXiX1PgblTJGh
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1405e947c AddAtomA
 0x1405e9484 AddVectoredExceptionHandler
 0x1405e948c CloseHandle
 0x1405e9494 CreateEventA
 0x1405e949c CreateFileA
 0x1405e94a4 CreateIoCompletionPort
 0x1405e94ac CreateMutexA
 0x1405e94b4 CreateSemaphoreA
 0x1405e94bc CreateThread
 0x1405e94c4 CreateWaitableTimerExW
 0x1405e94cc DeleteAtom
 0x1405e94d4 DeleteCriticalSection
 0x1405e94dc DuplicateHandle
 0x1405e94e4 EnterCriticalSection
 0x1405e94ec ExitProcess
 0x1405e94f4 FindAtomA
 0x1405e94fc FormatMessageA
 0x1405e9504 FreeEnvironmentStringsW
 0x1405e950c GetAtomNameA
 0x1405e9514 GetConsoleMode
 0x1405e951c GetCurrentProcess
 0x1405e9524 GetCurrentProcessId
 0x1405e952c GetCurrentThread
 0x1405e9534 GetCurrentThreadId
 0x1405e953c GetEnvironmentStringsW
 0x1405e9544 GetErrorMode
 0x1405e954c GetHandleInformation
 0x1405e9554 GetLastError
 0x1405e955c GetProcAddress
 0x1405e9564 GetProcessAffinityMask
 0x1405e956c GetQueuedCompletionStatusEx
 0x1405e9574 GetStartupInfoA
 0x1405e957c GetStdHandle
 0x1405e9584 GetSystemDirectoryA
 0x1405e958c GetSystemInfo
 0x1405e9594 GetSystemTimeAsFileTime
 0x1405e959c GetThreadContext
 0x1405e95a4 GetThreadPriority
 0x1405e95ac GetTickCount
 0x1405e95b4 InitializeCriticalSection
 0x1405e95bc IsDBCSLeadByteEx
 0x1405e95c4 IsDebuggerPresent
 0x1405e95cc LeaveCriticalSection
 0x1405e95d4 LoadLibraryExW
 0x1405e95dc LoadLibraryW
 0x1405e95e4 LocalFree
 0x1405e95ec MultiByteToWideChar
 0x1405e95f4 OpenProcess
 0x1405e95fc OutputDebugStringA
 0x1405e9604 PostQueuedCompletionStatus
 0x1405e960c QueryPerformanceCounter
 0x1405e9614 QueryPerformanceFrequency
 0x1405e961c RaiseException
 0x1405e9624 RaiseFailFastException
 0x1405e962c ReleaseMutex
 0x1405e9634 ReleaseSemaphore
 0x1405e963c RemoveVectoredExceptionHandler
 0x1405e9644 ResetEvent
 0x1405e964c ResumeThread
 0x1405e9654 SetConsoleCtrlHandler
 0x1405e965c SetErrorMode
 0x1405e9664 SetEvent
 0x1405e966c SetLastError
 0x1405e9674 SetProcessAffinityMask
 0x1405e967c SetProcessPriorityBoost
 0x1405e9684 SetThreadContext
 0x1405e968c SetThreadPriority
 0x1405e9694 SetUnhandledExceptionFilter
 0x1405e969c SetWaitableTimer
 0x1405e96a4 Sleep
 0x1405e96ac SuspendThread
 0x1405e96b4 SwitchToThread
 0x1405e96bc TlsAlloc
 0x1405e96c4 TlsGetValue
 0x1405e96cc TlsSetValue
 0x1405e96d4 TryEnterCriticalSection
 0x1405e96dc VirtualAlloc
 0x1405e96e4 VirtualFree
 0x1405e96ec VirtualProtect
 0x1405e96f4 VirtualQuery
 0x1405e96fc WaitForMultipleObjects
 0x1405e9704 WaitForSingleObject
 0x1405e970c WerGetFlags
 0x1405e9714 WerSetFlags
 0x1405e971c WideCharToMultiByte
 0x1405e9724 WriteConsoleW
 0x1405e972c WriteFile
 0x1405e9734 __C_specific_handler
msvcrt.dll
 0x1405e9744 ___lc_codepage_func
 0x1405e974c ___mb_cur_max_func
 0x1405e9754 __getmainargs
 0x1405e975c __initenv
 0x1405e9764 __iob_func
 0x1405e976c __lconv_init
 0x1405e9774 __set_app_type
 0x1405e977c __setusermatherr
 0x1405e9784 _acmdln
 0x1405e978c _amsg_exit
 0x1405e9794 _beginthread
 0x1405e979c _beginthreadex
 0x1405e97a4 _cexit
 0x1405e97ac _commode
 0x1405e97b4 _endthreadex
 0x1405e97bc _errno
 0x1405e97c4 _fmode
 0x1405e97cc _initterm
 0x1405e97d4 _lock
 0x1405e97dc _memccpy
 0x1405e97e4 _onexit
 0x1405e97ec _setjmp
 0x1405e97f4 _strdup
 0x1405e97fc _ultoa
 0x1405e9804 _unlock
 0x1405e980c abort
 0x1405e9814 calloc
 0x1405e981c exit
 0x1405e9824 fprintf
 0x1405e982c fputc
 0x1405e9834 free
 0x1405e983c fwrite
 0x1405e9844 localeconv
 0x1405e984c longjmp
 0x1405e9854 malloc
 0x1405e985c memcpy
 0x1405e9864 memmove
 0x1405e986c memset
 0x1405e9874 printf
 0x1405e987c realloc
 0x1405e9884 signal
 0x1405e988c strerror
 0x1405e9894 strlen
 0x1405e989c strncmp
 0x1405e98a4 vfprintf
 0x1405e98ac wcslen

EAT(Export Address Table) Library

0x1405e6b90 _cgo_dummy_export


Similarity measure (PE file only) - Checking for service failure