Report - word.exe

UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.07.11 13:37 Machine s1_win7_x6401
Filename word.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
9
Behavior Score
3.4
ZERO API file : malware
VT API (file) 6 detected (AIDetectMalware, malicious, high confidence)
md5 c228866013dfbaa6b00afc77f1409d8c
sha256 632f29ffde11458d77e6988a9bb38dece7e5818d752abd9c09823319e4869d08
ssdeep 3072:co+FL/RCBJjTvbMcct40NgHX8oiuTF+ifqXmL0JmCwQusodEnpgbLxVE:uFL/R0JPbMUUgHXdF+37wQusoKpgblVE
imphash b1874c9a3c2f9ea9fff951a67f099e1c
impfuzzy 24:bcK1FDjJ+0mBMjIYgMyWNwyWPWi+YDMLSySPQDrBbAocAD4Tg9bzAOvAKZhihAJf:4K1TiBcNg+YwLSVQDrBKE1f4ZA
  Network IP location

Signature (6cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
notice File has been identified by 6 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
156.238.234.187 US XHOSTSERVER 156.238.234.187 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1400034a8 CloseHandle
 0x1400034b0 CreateThread
 0x1400034b8 FreeLibrary
 0x1400034c0 GetCurrentProcess
 0x1400034c8 GetCurrentProcessId
 0x1400034d0 GetCurrentThreadId
 0x1400034d8 GetModuleHandleW
 0x1400034e0 GetProcAddress
 0x1400034e8 GetStartupInfoW
 0x1400034f0 GetSystemTimeAsFileTime
 0x1400034f8 InitializeSListHead
 0x140003500 IsDebuggerPresent
 0x140003508 IsProcessorFeaturePresent
 0x140003510 LoadLibraryA
 0x140003518 QueryPerformanceCounter
 0x140003520 RtlCaptureContext
 0x140003528 RtlLookupFunctionEntry
 0x140003530 RtlVirtualUnwind
 0x140003538 SetUnhandledExceptionFilter
 0x140003540 TerminateProcess
 0x140003548 UnhandledExceptionFilter
 0x140003550 VirtualProtect
 0x140003558 WaitForSingleObject
VCRUNTIME140.dll
 0x140003568 __C_specific_handler
 0x140003570 __current_exception
 0x140003578 __current_exception_context
 0x140003580 memcpy
 0x140003588 memset
api-ms-win-crt-stdio-l1-1-0.dll
 0x140003598 __acrt_iob_func
 0x1400035a0 __p__commode
 0x1400035a8 __stdio_common_vfprintf
 0x1400035b0 _set_fmode
api-ms-win-crt-heap-l1-1-0.dll
 0x1400035c0 _set_new_mode
 0x1400035c8 free
 0x1400035d0 malloc
api-ms-win-crt-math-l1-1-0.dll
 0x1400035e0 __setusermatherr
api-ms-win-crt-runtime-l1-1-0.dll
 0x1400035f0 _c_exit
 0x1400035f8 _cexit
 0x140003600 _configure_narrow_argv
 0x140003608 _crt_atexit
 0x140003610 _exit
 0x140003618 _get_narrow_winmain_command_line
 0x140003620 _initialize_narrow_environment
 0x140003628 _initialize_onexit_table
 0x140003630 _initterm
 0x140003638 _initterm_e
 0x140003640 _register_onexit_function
 0x140003648 _register_thread_local_exe_atexit_callback
 0x140003650 _seh_filter_exe
 0x140003658 _set_app_type
 0x140003660 exit
 0x140003668 terminate
api-ms-win-crt-locale-l1-1-0.dll
 0x140003678 _configthreadlocale

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure