Report - 1.exe

Generic Malware Malicious Library VMProtect UPX Malicious Packer PE File PE32 DLL OS Processor Check DllRegisterServer dll
ScreenShot
Created 2024.08.06 09:37 Machine s1_win7_x6401
Filename 1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
5.6
ZERO API file : malware
VT API (file) 28 detected (AIDetectMalware, malicious, high confidence, score, Sality, Unsafe, Save, Attribute, HighConfidence, FileRepMalware, Misc, Real Protect, moderate, VMProtBad, Static AI, Suspicious PE, Detected, VMProtect, Malgent, ZexaF, @BW@aSK4SKdj, susgen, confidence)
md5 c94b912d6522020372342c328fab4bc9
sha256 486398f4ad2893c6fa6f17c00c35c7240ead7812c6ca2d282de6f5738f686055
ssdeep 196608:u2GfcMp7LWAWBnQ4SgbnHtYc0GdjuB7DMWcMq:alWAWBfSOHz0G4uWL
imphash ff774b7f77cb7f48854b8436dceff24b
impfuzzy 24:viAo2Xr7xEZVxcAfr+xlyGQ58QtXJHc9NDI5Q8:viWCZV6AjtGQ5ZXpcM5Q8
  Network IP location

Signature (13cnts)

Level Description
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
watch Attempts to modify browser security settings
watch Installs an hook procedure to monitor for mouse events
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Foreign language identified in PE resource
notice One or more potentially interesting buffers were extracted
notice Resolves a suspicious Top Level Domain (TLD)
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info Checks amount of memory in system
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (14cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
shs.oppein.top Unknown clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x10ab000 GetVersionExW
USER32.dll
 0x10ab008 LockWindowUpdate
GDI32.dll
 0x10ab010 ExtSelectClipRgn
MSIMG32.dll
 0x10ab018 TransparentBlt
COMDLG32.dll
 0x10ab020 GetFileTitleW
WINSPOOL.DRV
 0x10ab028 ClosePrinter
ADVAPI32.dll
 0x10ab030 RegEnumValueW
SHELL32.dll
 0x10ab038 SHFileOperationW
COMCTL32.dll
 0x10ab040 _TrackMouseEvent
SHLWAPI.dll
 0x10ab048 PathFindExtensionW
ole32.dll
 0x10ab050 CoFreeUnusedLibraries
OLEAUT32.dll
 0x10ab058 VariantCopy
oledlg.dll
 0x10ab060 OleUIBusyW
urlmon.dll
 0x10ab068 UrlMkSetSessionOption
gdiplus.dll
 0x10ab070 GdipSetInterpolationMode
WININET.dll
 0x10ab078 InternetGetCookieExW
UxTheme.dll
 0x10ab080 CloseThemeData
WS2_32.dll
 0x10ab088 WSAGetLastError
OLEACC.dll
 0x10ab090 LresultFromObject
IMM32.dll
 0x10ab098 ImmReleaseContext
WINMM.dll
 0x10ab0a0 mciSendStringW
WTSAPI32.dll
 0x10ab0a8 WTSSendMessageW
KERNEL32.dll
 0x10ab0b0 VirtualQuery
USER32.dll
 0x10ab0b8 GetProcessWindowStation
KERNEL32.dll
 0x10ab0c0 LocalAlloc
 0x10ab0c4 LocalFree
 0x10ab0c8 GetModuleFileNameW
 0x10ab0cc GetProcessAffinityMask
 0x10ab0d0 SetProcessAffinityMask
 0x10ab0d4 SetThreadAffinityMask
 0x10ab0d8 Sleep
 0x10ab0dc ExitProcess
 0x10ab0e0 FreeLibrary
 0x10ab0e4 LoadLibraryA
 0x10ab0e8 GetModuleHandleA
 0x10ab0ec GetProcAddress
USER32.dll
 0x10ab0f4 GetProcessWindowStation
 0x10ab0f8 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure