Report - 66b274e0e1b95_shapr3D.exe

Generic Malware Malicious Library Malicious Packer UPX DllRegisterServer dll PE File PE64 OS Processor Check
ScreenShot
Created 2024.08.08 14:42 Machine s1_win7_x6401
Filename 66b274e0e1b95_shapr3D.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
1.4
ZERO API file : mailcious
VT API (file) 42 detected (AIDetectMalware, Injuke, malicious, high confidence, score, V22i, Attribute, HighConfidence, a variant of WinGo, Artemis, oezw, AGEN, PRIVATELOADER, YXEHFZ, WinGo, Detected, ai score=83, Sabsik, OMQHIY, ABTrojan, YCJP, SmartDriverUpdater, Gencirc)
md5 a80b3beac20e2a5d805c51c36ba14a53
sha256 fc678f0540da23c49928f774b88856d297ae5732f48e154279a78da2ff4af566
ssdeep 98304:JZa9tkJCVhrpvIVymuxZtNUbh/oEBc/pWltsqF:7a7DvIVy9tGblBBbF
imphash 5929190c8765f5bc37b052ab5c6c53e7
impfuzzy 48:qJrKxMCy9cmwKeFR+2u42xQ2HpdXiX1PJOmSnlTJGfYJ861k1vcqTjz:qJexMCyamCRHu42xQ2HPXiX1PgblTJGh
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 42 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140ef647c AddAtomA
 0x140ef6484 AddVectoredExceptionHandler
 0x140ef648c CloseHandle
 0x140ef6494 CreateEventA
 0x140ef649c CreateFileA
 0x140ef64a4 CreateIoCompletionPort
 0x140ef64ac CreateMutexA
 0x140ef64b4 CreateSemaphoreA
 0x140ef64bc CreateThread
 0x140ef64c4 CreateWaitableTimerExW
 0x140ef64cc DeleteAtom
 0x140ef64d4 DeleteCriticalSection
 0x140ef64dc DuplicateHandle
 0x140ef64e4 EnterCriticalSection
 0x140ef64ec ExitProcess
 0x140ef64f4 FindAtomA
 0x140ef64fc FormatMessageA
 0x140ef6504 FreeEnvironmentStringsW
 0x140ef650c GetAtomNameA
 0x140ef6514 GetConsoleMode
 0x140ef651c GetCurrentProcess
 0x140ef6524 GetCurrentProcessId
 0x140ef652c GetCurrentThread
 0x140ef6534 GetCurrentThreadId
 0x140ef653c GetEnvironmentStringsW
 0x140ef6544 GetErrorMode
 0x140ef654c GetHandleInformation
 0x140ef6554 GetLastError
 0x140ef655c GetProcAddress
 0x140ef6564 GetProcessAffinityMask
 0x140ef656c GetQueuedCompletionStatusEx
 0x140ef6574 GetStartupInfoA
 0x140ef657c GetStdHandle
 0x140ef6584 GetSystemDirectoryA
 0x140ef658c GetSystemInfo
 0x140ef6594 GetSystemTimeAsFileTime
 0x140ef659c GetThreadContext
 0x140ef65a4 GetThreadPriority
 0x140ef65ac GetTickCount
 0x140ef65b4 InitializeCriticalSection
 0x140ef65bc IsDBCSLeadByteEx
 0x140ef65c4 IsDebuggerPresent
 0x140ef65cc LeaveCriticalSection
 0x140ef65d4 LoadLibraryExW
 0x140ef65dc LoadLibraryW
 0x140ef65e4 LocalFree
 0x140ef65ec MultiByteToWideChar
 0x140ef65f4 OpenProcess
 0x140ef65fc OutputDebugStringA
 0x140ef6604 PostQueuedCompletionStatus
 0x140ef660c QueryPerformanceCounter
 0x140ef6614 QueryPerformanceFrequency
 0x140ef661c RaiseException
 0x140ef6624 RaiseFailFastException
 0x140ef662c ReleaseMutex
 0x140ef6634 ReleaseSemaphore
 0x140ef663c RemoveVectoredExceptionHandler
 0x140ef6644 ResetEvent
 0x140ef664c ResumeThread
 0x140ef6654 SetConsoleCtrlHandler
 0x140ef665c SetErrorMode
 0x140ef6664 SetEvent
 0x140ef666c SetLastError
 0x140ef6674 SetProcessAffinityMask
 0x140ef667c SetProcessPriorityBoost
 0x140ef6684 SetThreadContext
 0x140ef668c SetThreadPriority
 0x140ef6694 SetUnhandledExceptionFilter
 0x140ef669c SetWaitableTimer
 0x140ef66a4 Sleep
 0x140ef66ac SuspendThread
 0x140ef66b4 SwitchToThread
 0x140ef66bc TlsAlloc
 0x140ef66c4 TlsGetValue
 0x140ef66cc TlsSetValue
 0x140ef66d4 TryEnterCriticalSection
 0x140ef66dc VirtualAlloc
 0x140ef66e4 VirtualFree
 0x140ef66ec VirtualProtect
 0x140ef66f4 VirtualQuery
 0x140ef66fc WaitForMultipleObjects
 0x140ef6704 WaitForSingleObject
 0x140ef670c WerGetFlags
 0x140ef6714 WerSetFlags
 0x140ef671c WideCharToMultiByte
 0x140ef6724 WriteConsoleW
 0x140ef672c WriteFile
 0x140ef6734 __C_specific_handler
msvcrt.dll
 0x140ef6744 ___lc_codepage_func
 0x140ef674c ___mb_cur_max_func
 0x140ef6754 __getmainargs
 0x140ef675c __initenv
 0x140ef6764 __iob_func
 0x140ef676c __lconv_init
 0x140ef6774 __set_app_type
 0x140ef677c __setusermatherr
 0x140ef6784 _acmdln
 0x140ef678c _amsg_exit
 0x140ef6794 _beginthread
 0x140ef679c _beginthreadex
 0x140ef67a4 _cexit
 0x140ef67ac _commode
 0x140ef67b4 _endthreadex
 0x140ef67bc _errno
 0x140ef67c4 _fmode
 0x140ef67cc _initterm
 0x140ef67d4 _lock
 0x140ef67dc _memccpy
 0x140ef67e4 _onexit
 0x140ef67ec _setjmp
 0x140ef67f4 _strdup
 0x140ef67fc _ultoa
 0x140ef6804 _unlock
 0x140ef680c abort
 0x140ef6814 calloc
 0x140ef681c exit
 0x140ef6824 fprintf
 0x140ef682c fputc
 0x140ef6834 free
 0x140ef683c fwrite
 0x140ef6844 localeconv
 0x140ef684c longjmp
 0x140ef6854 malloc
 0x140ef685c memcpy
 0x140ef6864 memmove
 0x140ef686c memset
 0x140ef6874 printf
 0x140ef687c realloc
 0x140ef6884 signal
 0x140ef688c strerror
 0x140ef6894 strlen
 0x140ef689c strncmp
 0x140ef68a4 vfprintf
 0x140ef68ac wcslen

EAT(Export Address Table) Library

0x140ef39f0 _cgo_dummy_export


Similarity measure (PE file only) - Checking for service failure