Report - killer.exe

UPX PE File PE64
ScreenShot
Created 2024.08.05 11:14 Machine s1_win7_x6403
Filename killer.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
10
Behavior Score
5.0
ZERO API file : malware
VT API (file) 52 detected (AIDetectMalware, Convagent, malicious, moderate confidence, score, GenericKD, Unsafe, Vdv9, Attribute, HighConfidence, Real Protect, Genric, CLOUD, HLLW, Autoruner2, R011C0PGF24, Generic Reputation PUA, Ruftar, Detected, ABTrojan, SLDF, SchoolGirl, Chgt, ai score=85, CoinMiner, confidence)
md5 814b21e6d086af54d0f76290622ad1db
sha256 18e31034a87fe05d55eb89412e21cf9139f4aa5d50bf4a01679e2978deefd556
ssdeep 768:xnOmPsOqok4CfA38QOXn0FPuZstkJLRx3:xOmPsOqAC4MQOwuZs095
imphash 7045005ef4130348fa4cbfc30a6f9d04
impfuzzy 6:dBJAEHGDzyRlbRmVOZ/Glcid4mvIcM1c9WNsYbtcUFBu4sL4Bn:VA/DzqYOZOJ43cM5dBu4s0B
  Network IP location

Signature (11cnts)

Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious
watch Deletes executed files from disk
watch Drops a binary and executes it
notice A process created a hidden window
notice Creates executable files on the filesystem
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x14001a4a8 LoadLibraryA
 0x14001a4b0 GetProcAddress
 0x14001a4b8 VirtualProtect
 0x14001a4c0 VirtualAlloc
 0x14001a4c8 VirtualFree
 0x14001a4d0 ExitProcess
COMCTL32.DLL
 0x14001a4e0 InitCommonControlsEx
GDI32.DLL
 0x14001a4f0 BitBlt
msvcrt.dll
 0x14001a500 fabs
OLE32.DLL
 0x14001a510 CoInitialize
SHELL32.DLL
 0x14001a520 ShellExecuteExA
SHLWAPI.DLL
 0x14001a530 PathGetArgsA
USER32.DLL
 0x14001a540 GetDC
WINMM.DLL
 0x14001a550 timeBeginPeriod

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure