Report - EU.file.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.07.07 19:26 Machine s1_win7_x6401
Filename EU.file.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.2
ZERO API file : malware
VT API (file) 63 detected (AIDetectMalware, StopCrypt, malicious, high confidence, score, Lockbit, Midie, Unsafe, Save, Ransomware, Tepfer, Attribute, HighConfidence, Kryptik, HXBC, Artemis, RansomX, Chapak, SmokeLoader, CLASSIC, AceCrypter, gtsog, Packed2, R03BC0DEG24, Real Protect, high, Krypt, Danabot, Windigo, Detected, ai score=80, STOP, 1V2RK4Q, Eldorado, R648426, ZexaF, uq0@aaj9VTjG, Azorult, GdSda, Obfuscated, Static AI, Malicious PE, susgen, GenCBL, confidence, 100%, AMF2XJC)
md5 84d89662f4329f2fa4a36cfd32974eef
sha256 00ca90e01fedb9c290e30a733e1dd9a7642f57bbdde830c7a5be114f731e3382
ssdeep 6144:McZkS1WEzlC8hQjGRpvt5AMyHfZvvz5Xiw5Z8cyxEBw/hff:LeSoE5dCCRpvohRXzli4Z8hX5
imphash db835db0253e5ddc4c3195187d427607
impfuzzy 24:UDYkDUBY5UTgVgosdGJcDKquNsp4XysolYrOovIGNVcRMov91tRl0ISBZupuL:FY5cdDuJaYaTGHcj91tRGIS5L
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 63 AntiVirus engines on VirusTotal as malicious
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x412008 IsBadStringPtrW
 0x41200c LoadLibraryExW
 0x412010 GetConsoleAliasA
 0x412014 InterlockedDecrement
 0x412018 CreateHardLinkA
 0x41201c LockFile
 0x412020 GetTickCount
 0x412024 ReadConsoleW
 0x412028 EnumTimeFormatsW
 0x41202c TzSpecificLocalTimeToSystemTime
 0x412030 GetVolumeInformationA
 0x412034 GlobalFindAtomA
 0x412038 LoadLibraryW
 0x41203c ReadConsoleInputA
 0x412040 WriteConsoleW
 0x412044 GetSystemDirectoryA
 0x412048 SetComputerNameExW
 0x41204c GetTempPathW
 0x412050 InterlockedExchange
 0x412054 SetFilePointer
 0x412058 SetLastError
 0x41205c GetProcAddress
 0x412060 BackupWrite
 0x412064 BuildCommDCBW
 0x412068 LoadModule
 0x41206c OpenMutexA
 0x412070 LocalAlloc
 0x412074 GetNumberFormatW
 0x412078 AddAtomW
 0x41207c CreateEventW
 0x412080 RemoveDirectoryW
 0x412084 VirtualProtect
 0x412088 PurgeComm
 0x41208c GetWindowsDirectoryW
 0x412090 CloseHandle
 0x412094 CreateFileW
 0x412098 GetLastError
 0x41209c GetComputerNameA
 0x4120a0 IsProcessorFeaturePresent
 0x4120a4 EncodePointer
 0x4120a8 DecodePointer
 0x4120ac ReadFile
 0x4120b0 ExitProcess
 0x4120b4 GetModuleHandleExW
 0x4120b8 AreFileApisANSI
 0x4120bc MultiByteToWideChar
 0x4120c0 WideCharToMultiByte
 0x4120c4 GetCommandLineA
 0x4120c8 RaiseException
 0x4120cc RtlUnwind
 0x4120d0 IsDebuggerPresent
 0x4120d4 HeapFree
 0x4120d8 HeapAlloc
 0x4120dc HeapSize
 0x4120e0 EnterCriticalSection
 0x4120e4 LeaveCriticalSection
 0x4120e8 SetFilePointerEx
 0x4120ec GetConsoleMode
 0x4120f0 GetStdHandle
 0x4120f4 GetFileType
 0x4120f8 DeleteCriticalSection
 0x4120fc GetStartupInfoW
 0x412100 UnhandledExceptionFilter
 0x412104 SetUnhandledExceptionFilter
 0x412108 InitializeCriticalSectionAndSpinCount
 0x41210c Sleep
 0x412110 GetCurrentProcess
 0x412114 TerminateProcess
 0x412118 TlsAlloc
 0x41211c TlsGetValue
 0x412120 TlsSetValue
 0x412124 TlsFree
 0x412128 GetModuleHandleW
 0x41212c WriteFile
 0x412130 GetModuleFileNameW
 0x412134 IsValidCodePage
 0x412138 GetACP
 0x41213c GetOEMCP
 0x412140 GetCPInfo
 0x412144 GetCurrentThreadId
 0x412148 GetProcessHeap
 0x41214c GetModuleFileNameA
 0x412150 QueryPerformanceCounter
 0x412154 GetCurrentProcessId
 0x412158 GetSystemTimeAsFileTime
 0x41215c GetEnvironmentStringsW
 0x412160 FreeEnvironmentStringsW
 0x412164 HeapReAlloc
 0x412168 LCMapStringW
 0x41216c SetStdHandle
 0x412170 GetConsoleCP
 0x412174 FlushFileBuffers
 0x412178 OutputDebugStringW
 0x41217c GetStringTypeW
 0x412180 SetEndOfFile
USER32.dll
 0x412188 SetCaretPos
GDI32.dll
 0x412000 GetCharABCWidthsI

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure