Report - random.exe

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.07.28 10:40 Machine s1_win7_x6403
Filename random.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.0
ZERO API file : malware
VT API (file) 38 detected (AIDetectMalware, Convagent, malicious, high confidence, score, Lockbit, Unsafe, Save, Attribute, HighConfidence, Artemis, PWSX, Stealerc, SmokeLoader, CLASSIC, Real Protect, moderate, Static AI, Malicious PE, Detected, Stealc, Wacatac, ZexaF, py0@a4MOmsmG, Obfuscated, susgen, GenKryptik, EWCW, confidence, 100%)
md5 7e43d787c0813212855c05d5cc4b1752
sha256 5eb4e0358569874385f1f29eeb4f296ce648be45cc6ea62328e8a9594571859f
ssdeep 3072:nCtkbYJ4Zzd+mtDjzFTVA/hdlCo0VMTUd47hxcCjTc31Lt6t4OYO8:CGYJKomtDXqhdsMjT6t6tuO
imphash f7b7ec9e4ef13450da9b01e527b930fc
impfuzzy 24:lQu9zDjkrXDN9fn3mqICNTKr1sDyOXtUUncQIlyv9MhkHE/J3IjS3MlggAQhcK6c:uXfnOr1kXtzcHK9erMSExAQaK6T+Y6B
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x423010 LocalCompact
 0x423014 EnumCalendarInfoW
 0x423018 SetEnvironmentVariableW
 0x42301c GetTickCount
 0x423020 CreateNamedPipeW
 0x423024 GetConsoleAliasesA
 0x423028 EnumResourceTypesA
 0x42302c GetConsoleCP
 0x423030 GlobalAlloc
 0x423034 SetFileShortNameW
 0x423038 LoadLibraryW
 0x42303c IsProcessInJob
 0x423040 FatalAppExitW
 0x423044 AssignProcessToJobObject
 0x423048 IsBadCodePtr
 0x42304c GetModuleFileNameW
 0x423050 GetSystemDirectoryA
 0x423054 ReplaceFileA
 0x423058 GlobalUnlock
 0x42305c CreateJobObjectA
 0x423060 GetLastError
 0x423064 WriteConsoleInputW
 0x423068 VerLanguageNameW
 0x42306c LoadLibraryA
 0x423070 SetConsoleCtrlHandler
 0x423074 AddAtomW
 0x423078 HeapWalk
 0x42307c GetOEMCP
 0x423080 EnumDateFormatsA
 0x423084 GetModuleHandleA
 0x423088 GetProcessShutdownParameters
 0x42308c EnumResourceNamesA
 0x423090 GetFileTime
 0x423094 PeekConsoleInputA
 0x423098 GetDiskFreeSpaceExA
 0x42309c LCMapStringW
 0x4230a0 CreateFileW
 0x4230a4 HeapSize
 0x4230a8 FlushFileBuffers
 0x4230ac FindVolumeClose
 0x4230b0 HeapCompact
 0x4230b4 GetProcAddress
 0x4230b8 CreateFileA
 0x4230bc GetStringTypeW
 0x4230c0 WriteConsoleW
 0x4230c4 HeapReAlloc
 0x4230c8 GetCommandLineW
 0x4230cc HeapSetInformation
 0x4230d0 GetStartupInfoW
 0x4230d4 DecodePointer
 0x4230d8 UnhandledExceptionFilter
 0x4230dc SetUnhandledExceptionFilter
 0x4230e0 IsDebuggerPresent
 0x4230e4 EncodePointer
 0x4230e8 TerminateProcess
 0x4230ec GetCurrentProcess
 0x4230f0 HeapAlloc
 0x4230f4 HeapFree
 0x4230f8 EnterCriticalSection
 0x4230fc LeaveCriticalSection
 0x423100 SetHandleCount
 0x423104 GetStdHandle
 0x423108 InitializeCriticalSectionAndSpinCount
 0x42310c GetFileType
 0x423110 DeleteCriticalSection
 0x423114 MultiByteToWideChar
 0x423118 ReadFile
 0x42311c GetModuleHandleW
 0x423120 ExitProcess
 0x423124 SetFilePointer
 0x423128 HeapCreate
 0x42312c WriteFile
 0x423130 FreeEnvironmentStringsW
 0x423134 GetEnvironmentStringsW
 0x423138 TlsAlloc
 0x42313c TlsGetValue
 0x423140 TlsSetValue
 0x423144 TlsFree
 0x423148 InterlockedIncrement
 0x42314c SetLastError
 0x423150 GetCurrentThreadId
 0x423154 InterlockedDecrement
 0x423158 QueryPerformanceCounter
 0x42315c GetCurrentProcessId
 0x423160 GetSystemTimeAsFileTime
 0x423164 WideCharToMultiByte
 0x423168 GetConsoleMode
 0x42316c GetCPInfo
 0x423170 GetACP
 0x423174 IsValidCodePage
 0x423178 Sleep
 0x42317c RtlUnwind
 0x423180 SetStdHandle
 0x423184 IsProcessorFeaturePresent
 0x423188 CloseHandle
USER32.dll
 0x423198 CharUpperBuffA
 0x42319c GetMessageExtraInfo
 0x4231a0 SetCaretPos
 0x4231a4 GetMenu
 0x4231a8 DrawStateW
 0x4231ac GetSysColorBrush
GDI32.dll
 0x423000 GetCharWidthI
 0x423004 CreateDCA
 0x423008 GetCharABCWidthsI
WINHTTP.dll
 0x4231b4 WinHttpOpen
MSIMG32.dll
 0x423190 AlphaBlend

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure