Report - gate3.exe

Generic Malware VMProtect Anti_VM PE File PE64
ScreenShot
Created 2024.07.29 13:53 Machine s1_win7_x6401
Filename gate3.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
6.2
ZERO API file : malware
VT API (file) 55 detected (AIDetectMalware, Scar, malicious, high confidence, score, Tedy, Unsafe, Kryptik, Vjtn, GenericKD, Attribute, HighConfidence, ttjc, PrivateLoader, kcnjzd, lvYFnyV57AB, XPACK, DownLoader46, R002C0DBQ24, Static AI, Suspicious PE, Detected, ai score=89, AMAA, ABTrojan, RSUP, TrojanX, Krypt, Vwhl, r1kXLU1tr68, susgen, confidence, 100%, AZZO3DGW)
md5 1cbf0540443b57f70f8f09dfb0386d94
sha256 559b465bc7a517cdac15770e26da966a6e3ffb6235ad949bc9e9a66c7dc656bb
ssdeep 49152:E8afu8EKK1U6JIdcaKhkzF7H21z2K6OwzcCHKg7Xa8ZBNe7p/mFDy9wH:E8awKK1U6JIdcar7WUKmBaKjeIUw
imphash b5fd5c5a28970cfa1aef9750a101db08
impfuzzy 6:aZRHmR1A4GVzRgKLbXwNbsOblJoZ/OiBJAEnERGDW:KAR1A4GZRgIwxvJOZGqAJcDW
  Network IP location

Signature (10cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
danger Disables Windows Security features
watch Communicates with host for which no DNS query was performed
notice Creates hidden or system file
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch VMProtect_Zero VMProtect packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
193.42.32.118 Unknown 193.42.32.118 mailcious
142.250.196.238 US GOOGLE 142.250.196.238 clean
94.142.138.131 RU Ihor Hosting LLC 94.142.138.131 mailcious
94.142.138.113 RU Ihor Hosting LLC 94.142.138.113 mailcious
208.67.104.60 Unknown 208.67.104.60 mailcious
142.250.71.225 US GOOGLE 142.250.71.225 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140401000 InitializeCriticalSectionEx
USER32.dll
 0x140401010 CharNextA
ADVAPI32.dll
 0x140401020 RegCloseKey
SHELL32.dll
 0x140401030 ShellExecuteA
ole32.dll
 0x140401040 CoCreateInstance
KERNEL32.dll
 0x140401050 HeapAlloc
 0x140401058 HeapFree
 0x140401060 ExitProcess
 0x140401068 LoadLibraryA
 0x140401070 GetModuleHandleA
 0x140401078 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure