Report - deepweb.exe

Generic Malware Malicious Library Malicious Packer UPX DllRegisterServer dll PE File PE64 OS Processor Check
ScreenShot
Created 2024.07.22 17:50 Machine s1_win7_x6403
Filename deepweb.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
1.0
ZERO API file : clean
VT API (file) 30 detected (AIDetectMalware, malicious, high confidence, score, Artemis, Unsafe, Vof1, Attribute, HighConfidence, a variant of WinGo, qwiuhm, CLASSIC, mmdfk, AMADEY, YXEGQZ, Generic Reputation PUA, WinGo, Detected, Wacatac, Eldorado, Gencirc)
md5 478d0787cddfa1a31e3480d1612c91b7
sha256 962bf6bb4e3d1ba6c2da00cc015467e49638db72614c63a779b9c37e0372cd36
ssdeep 98304:FpAKSfEy27N/dhKZF5NGjJvfMgJrtktFE5uUNkVrUAEix3JBylaMSFP6g:zSEy27NWZF3avfMxFE5uUErU5wFF
imphash c595f1660e1a3c84f4d9b0761d23cd7a
impfuzzy 96:wJexMCyamCRHu42xQ2H3XiX1PgblTJGQ661mcqTjz:wgrymLe3SFomQ6+STjz
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14155c494 AddAtomA
 0x14155c49c AddVectoredContinueHandler
 0x14155c4a4 AddVectoredExceptionHandler
 0x14155c4ac CloseHandle
 0x14155c4b4 CreateEventA
 0x14155c4bc CreateFileA
 0x14155c4c4 CreateIoCompletionPort
 0x14155c4cc CreateMutexA
 0x14155c4d4 CreateSemaphoreA
 0x14155c4dc CreateThread
 0x14155c4e4 CreateWaitableTimerExW
 0x14155c4ec DeleteAtom
 0x14155c4f4 DeleteCriticalSection
 0x14155c4fc DuplicateHandle
 0x14155c504 EnterCriticalSection
 0x14155c50c ExitProcess
 0x14155c514 FindAtomA
 0x14155c51c FormatMessageA
 0x14155c524 FreeEnvironmentStringsW
 0x14155c52c GetAtomNameA
 0x14155c534 GetConsoleMode
 0x14155c53c GetCurrentProcess
 0x14155c544 GetCurrentProcessId
 0x14155c54c GetCurrentThread
 0x14155c554 GetCurrentThreadId
 0x14155c55c GetEnvironmentStringsW
 0x14155c564 GetErrorMode
 0x14155c56c GetHandleInformation
 0x14155c574 GetLastError
 0x14155c57c GetProcAddress
 0x14155c584 GetProcessAffinityMask
 0x14155c58c GetQueuedCompletionStatusEx
 0x14155c594 GetStartupInfoA
 0x14155c59c GetStdHandle
 0x14155c5a4 GetSystemDirectoryA
 0x14155c5ac GetSystemInfo
 0x14155c5b4 GetSystemTimeAsFileTime
 0x14155c5bc GetThreadContext
 0x14155c5c4 GetThreadPriority
 0x14155c5cc GetTickCount
 0x14155c5d4 InitializeCriticalSection
 0x14155c5dc IsDBCSLeadByteEx
 0x14155c5e4 IsDebuggerPresent
 0x14155c5ec LeaveCriticalSection
 0x14155c5f4 LoadLibraryExW
 0x14155c5fc LoadLibraryW
 0x14155c604 LocalFree
 0x14155c60c MultiByteToWideChar
 0x14155c614 OpenProcess
 0x14155c61c OutputDebugStringA
 0x14155c624 PostQueuedCompletionStatus
 0x14155c62c QueryPerformanceCounter
 0x14155c634 QueryPerformanceFrequency
 0x14155c63c RaiseException
 0x14155c644 RaiseFailFastException
 0x14155c64c ReleaseMutex
 0x14155c654 ReleaseSemaphore
 0x14155c65c RemoveVectoredExceptionHandler
 0x14155c664 ResetEvent
 0x14155c66c ResumeThread
 0x14155c674 RtlLookupFunctionEntry
 0x14155c67c RtlVirtualUnwind
 0x14155c684 SetConsoleCtrlHandler
 0x14155c68c SetErrorMode
 0x14155c694 SetEvent
 0x14155c69c SetLastError
 0x14155c6a4 SetProcessAffinityMask
 0x14155c6ac SetProcessPriorityBoost
 0x14155c6b4 SetThreadContext
 0x14155c6bc SetThreadPriority
 0x14155c6c4 SetUnhandledExceptionFilter
 0x14155c6cc SetWaitableTimer
 0x14155c6d4 Sleep
 0x14155c6dc SuspendThread
 0x14155c6e4 SwitchToThread
 0x14155c6ec TlsAlloc
 0x14155c6f4 TlsGetValue
 0x14155c6fc TlsSetValue
 0x14155c704 TryEnterCriticalSection
 0x14155c70c VirtualAlloc
 0x14155c714 VirtualFree
 0x14155c71c VirtualProtect
 0x14155c724 VirtualQuery
 0x14155c72c WaitForMultipleObjects
 0x14155c734 WaitForSingleObject
 0x14155c73c WerGetFlags
 0x14155c744 WerSetFlags
 0x14155c74c WideCharToMultiByte
 0x14155c754 WriteConsoleW
 0x14155c75c WriteFile
 0x14155c764 __C_specific_handler
msvcrt.dll
 0x14155c774 ___lc_codepage_func
 0x14155c77c ___mb_cur_max_func
 0x14155c784 __getmainargs
 0x14155c78c __initenv
 0x14155c794 __iob_func
 0x14155c79c __lconv_init
 0x14155c7a4 __set_app_type
 0x14155c7ac __setusermatherr
 0x14155c7b4 _acmdln
 0x14155c7bc _amsg_exit
 0x14155c7c4 _beginthread
 0x14155c7cc _beginthreadex
 0x14155c7d4 _cexit
 0x14155c7dc _commode
 0x14155c7e4 _endthreadex
 0x14155c7ec _errno
 0x14155c7f4 _fmode
 0x14155c7fc _initterm
 0x14155c804 _lock
 0x14155c80c _memccpy
 0x14155c814 _onexit
 0x14155c81c _setjmp
 0x14155c824 _strdup
 0x14155c82c _ultoa
 0x14155c834 _unlock
 0x14155c83c abort
 0x14155c844 calloc
 0x14155c84c exit
 0x14155c854 fprintf
 0x14155c85c fputc
 0x14155c864 free
 0x14155c86c fwrite
 0x14155c874 localeconv
 0x14155c87c longjmp
 0x14155c884 malloc
 0x14155c88c memcpy
 0x14155c894 memmove
 0x14155c89c memset
 0x14155c8a4 printf
 0x14155c8ac realloc
 0x14155c8b4 signal
 0x14155c8bc strerror
 0x14155c8c4 strlen
 0x14155c8cc strncmp
 0x14155c8d4 vfprintf
 0x14155c8dc wcslen

EAT(Export Address Table) Library

0x1415597f0 _cgo_dummy_export


Similarity measure (PE file only) - Checking for service failure