Report - gpp.exe

Generic Malware Malicious Library Malicious Packer UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.07.11 13:20 Machine s1_win7_x6401
Filename gpp.exe
Type PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
3
Behavior Score
2.0
ZERO API file : clean
VT API (file) 7 detected (GenCBL, MalCert@XH, CERT, Wpuv81KQjMU8glX2WU0hLg, Detected)
md5 783540957edcf666dd295ac4835f51e8
sha256 5c9c3fc82ecfa61b949e3cb0ffeb9bce9507420bc756d32a3a5994892e41f852
ssdeep 24576:FhwS5mpr+SFCcn8M5R7kmDSkLF50KLR66dDaMzC22UXk5PkC6eZnxYD1a+lTOD:07kmDbosze58CVxYD1a+lY
imphash 9cbefe68f395e67356e2a5d8d1b285c0
impfuzzy 24:UbVjhNwO+VuT2oLtXOr6kwmDruMztxdEr6tP:KwO+VAXOmGx0oP
  Network IP location

Signature (5cnts)

Level Description
watch Attempts to identify installed AV products by installation directory
watch Detects the presence of Wine emulator
notice File has been identified by 7 AntiVirus engines on VirusTotal as malicious
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x578140 WriteFile
 0x578144 WriteConsoleW
 0x578148 WaitForMultipleObjects
 0x57814c WaitForSingleObject
 0x578150 VirtualQuery
 0x578154 VirtualFree
 0x578158 VirtualAlloc
 0x57815c SwitchToThread
 0x578160 SuspendThread
 0x578164 SetWaitableTimer
 0x578168 SetUnhandledExceptionFilter
 0x57816c SetProcessPriorityBoost
 0x578170 SetEvent
 0x578174 SetErrorMode
 0x578178 SetConsoleCtrlHandler
 0x57817c ResumeThread
 0x578180 PostQueuedCompletionStatus
 0x578184 LoadLibraryA
 0x578188 LoadLibraryW
 0x57818c SetThreadContext
 0x578190 GetThreadContext
 0x578194 GetSystemInfo
 0x578198 GetSystemDirectoryA
 0x57819c GetStdHandle
 0x5781a0 GetQueuedCompletionStatusEx
 0x5781a4 GetProcessAffinityMask
 0x5781a8 GetProcAddress
 0x5781ac GetEnvironmentStringsW
 0x5781b0 GetConsoleMode
 0x5781b4 FreeEnvironmentStringsW
 0x5781b8 ExitProcess
 0x5781bc DuplicateHandle
 0x5781c0 CreateWaitableTimerExW
 0x5781c4 CreateThread
 0x5781c8 CreateIoCompletionPort
 0x5781cc CreateFileA
 0x5781d0 CreateEventA
 0x5781d4 CloseHandle
 0x5781d8 AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure