Report - 2.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.07.20 20:15 Machine s1_win7_x6403
Filename 2.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.0
ZERO API file : malware
VT API (file) 31 detected (AIDetectMalware, Malicious, score, Unsafe, Save, Attribute, HighConfidence, high confidence, Convagent, ZexaF, py0@auXIMWpG, Real Protect, high, Krypt, Danabot, Detected, STOP, RedLine, R658443, Obfuscated, Static AI, Malicious PE, susgen, Kryptik, HFSR, confidence, 100%)
md5 cd385c52e6ad2dd6a304839159534b7e
sha256 b1680f17257af3c77a220fcf29ade51d0f02e9b429f687cc2d8a66f5a07e272b
ssdeep 3072:X0tRmAsRYfI174Ofi0Q2SAMvDVNronnE+kQBwbCvhb9zWbqs5uxVCW:ERlfIXvQ2IDrktzB1Jb0qWkC
imphash cb30965266fdf6eae519dd45f888fcf1
impfuzzy 48:n5f731rdT+fcWqG1VtfiU0cuZeaAQTmK/v:nR7FJT+fcbG1VtfitcWia
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 31 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x427000 IsBadHugeReadPtr
 0x427004 SetEndOfFile
 0x427008 LocalCompact
 0x42700c CreateHardLinkA
 0x427010 GetModuleHandleW
 0x427014 GetCurrentThread
 0x427018 GetProcessHeap
 0x42701c EnumResourceTypesA
 0x427020 GetConsoleCP
 0x427024 GlobalAlloc
 0x427028 LoadLibraryW
 0x42702c IsProcessInJob
 0x427030 AssignProcessToJobObject
 0x427034 GetSystemDirectoryA
 0x427038 GetLastError
 0x42703c SetLastError
 0x427040 GetProcAddress
 0x427044 VerLanguageNameA
 0x427048 FindClose
 0x42704c LoadLibraryA
 0x427050 SetConsoleCtrlHandler
 0x427054 AddAtomW
 0x427058 CreateEventW
 0x42705c HeapWalk
 0x427060 GlobalHandle
 0x427064 SetEnvironmentVariableA
 0x427068 GetModuleFileNameA
 0x42706c GetOEMCP
 0x427070 GlobalUnWire
 0x427074 EnumResourceNamesA
 0x427078 PeekConsoleInputA
 0x42707c GetDiskFreeSpaceExW
 0x427080 CreateFileW
 0x427084 SetStdHandle
 0x427088 WriteConsoleW
 0x42708c SetFilePointer
 0x427090 HeapReAlloc
 0x427094 IsValidLocale
 0x427098 EnumSystemLocalesA
 0x42709c WideCharToMultiByte
 0x4270a0 InterlockedIncrement
 0x4270a4 InterlockedDecrement
 0x4270a8 InterlockedCompareExchange
 0x4270ac InterlockedExchange
 0x4270b0 MultiByteToWideChar
 0x4270b4 GetStringTypeW
 0x4270b8 EncodePointer
 0x4270bc DecodePointer
 0x4270c0 Sleep
 0x4270c4 InitializeCriticalSection
 0x4270c8 DeleteCriticalSection
 0x4270cc EnterCriticalSection
 0x4270d0 LeaveCriticalSection
 0x4270d4 HeapFree
 0x4270d8 GetCommandLineW
 0x4270dc HeapSetInformation
 0x4270e0 GetStartupInfoW
 0x4270e4 GetCPInfo
 0x4270e8 RaiseException
 0x4270ec RtlUnwind
 0x4270f0 HeapAlloc
 0x4270f4 LCMapStringW
 0x4270f8 IsProcessorFeaturePresent
 0x4270fc GetACP
 0x427100 IsValidCodePage
 0x427104 TlsAlloc
 0x427108 TlsGetValue
 0x42710c TlsSetValue
 0x427110 TlsFree
 0x427114 GetCurrentThreadId
 0x427118 HeapCreate
 0x42711c ReadFile
 0x427120 UnhandledExceptionFilter
 0x427124 SetUnhandledExceptionFilter
 0x427128 IsDebuggerPresent
 0x42712c TerminateProcess
 0x427130 GetCurrentProcess
 0x427134 WriteFile
 0x427138 GetConsoleMode
 0x42713c FlushFileBuffers
 0x427140 InitializeCriticalSectionAndSpinCount
 0x427144 ExitProcess
 0x427148 GetStdHandle
 0x42714c GetModuleFileNameW
 0x427150 FreeEnvironmentStringsW
 0x427154 GetEnvironmentStringsW
 0x427158 SetHandleCount
 0x42715c GetFileType
 0x427160 QueryPerformanceCounter
 0x427164 GetTickCount
 0x427168 GetCurrentProcessId
 0x42716c GetSystemTimeAsFileTime
 0x427170 GetLocaleInfoW
 0x427174 HeapSize
 0x427178 GetUserDefaultLCID
 0x42717c GetLocaleInfoA
 0x427180 CloseHandle
USER32.dll
 0x427188 GetMessageExtraInfo
 0x42718c CharUpperBuffA
 0x427190 DrawStateW
 0x427194 SetMenu
 0x427198 SetCaretPos
 0x42719c GetCaretBlinkTime
 0x4271a0 SetClipboardViewer

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure