Report - 66ade58a5e39e_tgertert.exe

Themida Packer Anti_VM PE File PE32 Lnk Format GIF Format
ScreenShot
Created 2024.08.05 15:46 Machine s1_win7_x6401
Filename 66ade58a5e39e_tgertert.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
10.6
ZERO API file : malware
VT API (file) 55 detected (AIDetectMalware, Convagent, trYj, malicious, high confidence, score, Midie, Unsafe, Save, Attribute, HighConfidence, GenKryptik, GZFB, Artemis, CrypterX, RisePro, TrojanPSW, ccnc, AFNt4kYfQzN, robdi, MulDrop28, PRIVATELOADER, YXEHCZ, high, Generic Reputation PUA, Krypt, Detected, ai score=87, HeurC, KVMH008, ABTrojan, EJTF, R659884, ZexaF, 3V0@ae4II8hi, RnkBend, Gencirc, Static AI, Malicious PE, susgen, confidence, 100%)
md5 f9e341ea64be4ee1007755cd909aaa8c
sha256 8a415b9465a573bf7fdfeb18fc3abe3c5ab53536dfe9d144fe768f180d077cce
ssdeep 98304:OSk8RkSxK7Ftb7hT3t0rKpk9OPgcatu6WQUAg5cBgpML:OeRLxWFtb7hT3irKp+/b06sXepL
imphash a9fcfb15a5aa9fa0f3b761a2696ae772
impfuzzy 3:sUx2AEaoMTiEJSbW6LlrwKWbsSOT1n:nE7giEMbXwNbsSOT1n
  Network IP location

Signature (23cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
watch Checks for the presence of known windows from debuggers and forensic tools
watch Checks the version of Bios
watch Communicates with host for which no DNS query was performed
watch Detects Virtual Machines through their custom firmware
watch Detects VirtualBox through the presence of a registry key
watch Detects VMWare through the in instruction feature
watch Installs itself for autorun at Windows startup
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks whether any human activity is being performed by constantly checking whether the foreground window changed
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Expresses interest in specific running processes
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
warning themida_packer themida packer binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE32 (no description) binaries (upload)
info lnk_file_format Microsoft Windows Shortcut File Format binaries (download)
info Lnk_Format_Zero LNK Format binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
77.105.164.24 RU Dynamic Network Technologies Ltd 77.105.164.24 clean
125.253.92.50 AU FireNet Pty Ltd 125.253.92.50 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x4f40f8 GetModuleHandleA
ADVAPI32.dll
 0x4f4100 GetUserNameA
SHELL32.dll
 0x4f4108 ShellExecuteA
ole32.dll
 0x4f4110 CoCreateInstance
WS2_32.dll
 0x4f4118 send

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure