Report - www.exe

UPX PE File PE32
ScreenShot
Created 2024.08.08 14:11 Machine s1_win7_x6401
Filename www.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
5.2
ZERO API file : malware
VT API (file) 43 detected (AIDetectMalware, NetBox, malicious, high confidence, Generic PUP, Unsafe, Server, Attribute, HighConfidence, A potentially unsafe, FileRepMalware, Misc, ULPM, emlbmm, ServerWeb, USEHB25, NetBox Server, Static AI, Malicious PE, Detected, ai score=99, GrayWare, Presenoker, Malware@#3cxrzc5o0wjy2, Netboxserver, Eldorado, BScope, VBKrypt, Gencirc, GenAsa, k2DNPK8CHeE, susgen, confidence, 100%)
md5 7cab3f98a04b09bc2673f84bbccd6a63
sha256 82996de795581caac08a09bf1cb0efb6864fd459350abe437098144b8efdb671
ssdeep 12288:JJFZqYMOaQ0q9nV/zsnK23KHVI6nodVdyMLiqyVcxwtVxgpMiuzOT61:fFZqhOBnVyK23C6OoYMLiVcKtVx4Miu1
imphash f800ac67f4f1bcfe8c9c4579de16b1a1
impfuzzy 3:swBJAEPwS9KTXzhAXw1MO/EX9CfmMMSxqOhHL/Vs6owkgA5oeCHcmJ2tGn:dBJAEHGDvZ/Ew/MLOVbyrwPmmJAG
  Network IP location

Signature (12cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
watch A process attempted to delay the analysis task.
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Performs some HTTP requests
notice Searches running processes potentially to identify processes for sandbox evasion
notice Starts servers listening
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x596870 LoadLibraryA
 0x596874 GetProcAddress
 0x596878 ExitProcess
ADVAPI32.dll
 0x596880 RegEnumKeyA
comdlg32.dll
 0x596888 GetFileTitleA
GDI32.dll
 0x596890 Escape
ole32.dll
 0x596898 CoCreateGuid
OLEAUT32.dll
 0x5968a0 SysStringByteLen
USER32.dll
 0x5968a8 GetDC

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure