ScreenShot
Created | 2024.08.04 13:41 | Machine | s1_win7_x6401 |
Filename | JX2goame.exe | ||
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 42 detected (AIDetectMalware, Malicious, score, Kudj, GenericKDZ, Unsafe, Vlsv, Attribute, HighConfidence, high confidence, EnigmaProtector, M suspicious, Artemis, FileRepMalware, Misc, Enigma, Detected, ai score=81, HeurC, KVMH015, se39933, Wacatac, ZexaF, @R3@auuLBIpP, Tiggre, Probably Heur, ExeHeaderL, Static AI, Suspicious PE, susgen) | ||
md5 | 288f1d023c0446d190a28e5f1899667c | ||
sha256 | 0cccce4d35835aacf4606fc95ffd41e1aaf89f7821135df2b65236b2bc131a53 | ||
ssdeep | 196608:pNeGPdFHpX40uqQuk0H5d9cU4+NhcolRUvNLFRD:pAGVFhJQuk0HZR4XF5RD | ||
imphash | 5e5ac8ab7be27ac2d1c548e5589378b6 | ||
impfuzzy | 6:nERGDvZ/OiBJAEcXQwDLzRgSdn8BbMqtYbdm:EcDvZGqA9AwDXRgKQcm |
Network IP location
Signature (9cnts)
Level | Description |
---|---|
danger | File has been identified by 42 AntiVirus engines on VirusTotal as malicious |
watch | Checks for the presence of known devices from debuggers and forensic tools |
watch | Checks for the presence of known windows from debuggers and forensic tools |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Foreign language identified in PE resource |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | EnigmaProtector_IN | EnigmaProtector | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
kernel32.dll
0xfc60cc GetModuleHandleA
0xfc60d0 GetProcAddress
0xfc60d4 ExitProcess
0xfc60d8 LoadLibraryA
user32.dll
0xfc60e0 MessageBoxA
advapi32.dll
0xfc60e8 RegCloseKey
oleaut32.dll
0xfc60f0 SysFreeString
gdi32.dll
0xfc60f8 CreateFontA
shell32.dll
0xfc6100 ShellExecuteA
version.dll
0xfc6108 GetFileVersionInfoA
EAT(Export Address Table) Library
kernel32.dll
0xfc60cc GetModuleHandleA
0xfc60d0 GetProcAddress
0xfc60d4 ExitProcess
0xfc60d8 LoadLibraryA
user32.dll
0xfc60e0 MessageBoxA
advapi32.dll
0xfc60e8 RegCloseKey
oleaut32.dll
0xfc60f0 SysFreeString
gdi32.dll
0xfc60f8 CreateFontA
shell32.dll
0xfc6100 ShellExecuteA
version.dll
0xfc6108 GetFileVersionInfoA
EAT(Export Address Table) Library