Report - judit1.exe

Gen1 Generic Malware Malicious Library UPX Malicious Packer Antivirus Anti_VM PE File PE64 DLL OS Processor Check ftp wget
ScreenShot
Created 2024.07.25 09:00 Machine s1_win7_x6403
Filename judit1.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
3.0
ZERO API file : malware
VT API (file) 37 detected (AIDetectMalware, tsAU, malicious, high confidence, score, Unsafe, Save, Attribute, HighConfidence, a variant of Python, Nuitka, AGen, AB suspicious, Artemis, ibzty, Alien, AMADEY, YXEGXZ, Python, Detected, Sabsik, Antis, 74XCHJ, Unkl, Static AI, Malicious PE, confidence, 100%)
md5 c8cf26425a6ce325035e6da8dfb16c4e
sha256 9f7be9bf913d8378f094b3f6416db9aa4c80c380000202f7cfaddadb6efc41b4
ssdeep 196608:SnvxO+j9q6y7PuZANMCgvUF+j6yrO5H+KB4kj6vgC51U7BlUdinrDRQF6f1:WvxPBly7Pumdgv9RrOF+LkGvgMGBa4n7
imphash a15389e7a3e3d8aabef3d1422091a217
impfuzzy 48:p8XOst9nR3nZ+kNPlslEJGp6qJ8k3k1vkqqssXh:eXdth9nZrNPlYEJGph6k3mkqqs2
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
watch Drops a binary and executes it
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system

Rules (17cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
info ftp_command ftp command binaries (download)
info IsDLL (no description) binaries (download)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info wget_command wget command binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140035368 CloseHandle
 0x140035370 CopyFileW
 0x140035378 CreateDirectoryW
 0x140035380 CreateFileMappingW
 0x140035388 CreateFileW
 0x140035390 CreateProcessW
 0x140035398 DeleteCriticalSection
 0x1400353a0 DeleteFileW
 0x1400353a8 EnterCriticalSection
 0x1400353b0 FindResourceA
 0x1400353b8 FormatMessageA
 0x1400353c0 FreeLibrary
 0x1400353c8 GenerateConsoleCtrlEvent
 0x1400353d0 GetCommandLineW
 0x1400353d8 GetCurrentProcessId
 0x1400353e0 GetEnvironmentVariableW
 0x1400353e8 GetExitCodeProcess
 0x1400353f0 GetFileAttributesW
 0x1400353f8 GetFileSize
 0x140035400 GetLastError
 0x140035408 GetModuleFileNameW
 0x140035410 GetModuleHandleA
 0x140035418 GetProcAddress
 0x140035420 GetProcessId
 0x140035428 GetStartupInfoW
 0x140035430 GetStdHandle
 0x140035438 GetSystemTimeAsFileTime
 0x140035440 GetTempPathW
 0x140035448 InitializeCriticalSection
 0x140035450 IsDBCSLeadByteEx
 0x140035458 LeaveCriticalSection
 0x140035460 LoadLibraryA
 0x140035468 LoadResource
 0x140035470 LockResource
 0x140035478 MapViewOfFile
 0x140035480 MultiByteToWideChar
 0x140035488 ReadFile
 0x140035490 SetConsoleCtrlHandler
 0x140035498 SetEnvironmentVariableW
 0x1400354a0 SetUnhandledExceptionFilter
 0x1400354a8 SizeofResource
 0x1400354b0 Sleep
 0x1400354b8 TerminateProcess
 0x1400354c0 TlsGetValue
 0x1400354c8 UnmapViewOfFile
 0x1400354d0 VirtualProtect
 0x1400354d8 VirtualQuery
 0x1400354e0 WaitForSingleObject
 0x1400354e8 WideCharToMultiByte
 0x1400354f0 WriteFile
msvcrt.dll
 0x140035500 __C_specific_handler
 0x140035508 ___lc_codepage_func
 0x140035510 ___mb_cur_max_func
 0x140035518 __iob_func
 0x140035520 __set_app_type
 0x140035528 __setusermatherr
 0x140035530 __wargv
 0x140035538 __wgetmainargs
 0x140035540 __winitenv
 0x140035548 _amsg_exit
 0x140035550 _cexit
 0x140035558 _commode
 0x140035560 _errno
 0x140035568 _fmode
 0x140035570 _initterm
 0x140035578 _lock
 0x140035580 _onexit
 0x140035588 _unlock
 0x140035590 _wcmdln
 0x140035598 _wcsdup
 0x1400355a0 _wcsicmp
 0x1400355a8 _wrename
 0x1400355b0 abort
 0x1400355b8 calloc
 0x1400355c0 exit
 0x1400355c8 fprintf
 0x1400355d0 fputc
 0x1400355d8 free
 0x1400355e0 fwrite
 0x1400355e8 localeconv
 0x1400355f0 malloc
 0x1400355f8 mbstowcs
 0x140035600 memcpy
 0x140035608 memmove
 0x140035610 memset
 0x140035618 puts
 0x140035620 signal
 0x140035628 strerror
 0x140035630 strlen
 0x140035638 strncmp
 0x140035640 vfprintf
 0x140035648 wcscmp
 0x140035650 wcslen
 0x140035658 wcsncmp
SHELL32.dll
 0x140035668 SHFileOperationW
 0x140035670 SHGetFolderPathW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure