Report - vsrfdgej.exe

Generic Malware Malicious Packer UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.08.14 13:39 Machine s1_win7_x6401
Filename vsrfdgej.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
6
Behavior Score
2.2
ZERO API file : clean
VT API (file) 42 detected (AIDetectMalware, malicious, high confidence, score, Artemis, DeepScan, Loader, Marte, Vaux, TrojanX, Sheller, CLOUD, AGEN, R002C0XEF24, ai score=89, Wacapew, Gencirc, Static AI, Suspicious PE, susgen, PossibleThreat, confidence, Labqct)
md5 319cc8df286242b248cf442ca4e87220
sha256 5461ed9bfe7bb882cef5d0375ad962c4004b4fb84102451adc99f6029f1ecec0
ssdeep 6144:BLlDKP3ZEdD1qtUJ1K+u6PiHDkSQCKO5fDp1O7mnkgBkA/EyG8XjMsXA:LKBEPgUJHkHDkSHP0mkgBkABTMN
imphash 2f7f7af2eab30b7eb6756d354f206577
impfuzzy 48:w7MCWyXW9OftriW1ZiRj9AN3nBDHP+sjVQSLMC:w7MCWyXWAftriWLiRj9ANxDmsj7
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 42 AntiVirus engines on VirusTotal as malicious
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Command line console output was observed

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x14001e138 InitializeSListHead
 0x14001e140 GetCurrentThreadId
 0x14001e148 IsDebuggerPresent
 0x14001e150 GetCurrentProcess
 0x14001e158 GetEnvironmentVariableW
 0x14001e160 GetCurrentDirectoryW
 0x14001e168 SetLastError
 0x14001e170 GetStdHandle
 0x14001e178 GetCurrentProcessId
 0x14001e180 RtlLookupFunctionEntry
 0x14001e188 RtlVirtualUnwind
 0x14001e190 TryAcquireSRWLockExclusive
 0x14001e198 HeapFree
 0x14001e1a0 RtlCaptureContext
 0x14001e1a8 HeapReAlloc
 0x14001e1b0 AcquireSRWLockExclusive
 0x14001e1b8 ReleaseSRWLockShared
 0x14001e1c0 ReleaseMutex
 0x14001e1c8 GetModuleHandleA
 0x14001e1d0 GetProcessHeap
 0x14001e1d8 HeapAlloc
 0x14001e1e0 WaitForSingleObject
 0x14001e1e8 GetConsoleMode
 0x14001e1f0 SetThreadStackGuarantee
 0x14001e1f8 GetModuleHandleW
 0x14001e200 FormatMessageW
 0x14001e208 MultiByteToWideChar
 0x14001e210 WriteConsoleW
 0x14001e218 AddVectoredExceptionHandler
 0x14001e220 WaitForSingleObjectEx
 0x14001e228 CreateMutexA
 0x14001e230 ReleaseSRWLockExclusive
 0x14001e238 UnhandledExceptionFilter
 0x14001e240 SetUnhandledExceptionFilter
 0x14001e248 CloseHandle
 0x14001e250 QueryPerformanceCounter
 0x14001e258 GetSystemTimeAsFileTime
 0x14001e260 GetLastError
 0x14001e268 GetCurrentThread
 0x14001e270 VirtualProtect
 0x14001e278 VirtualAlloc
 0x14001e280 GetProcAddress
 0x14001e288 LoadLibraryA
 0x14001e290 GetConsoleWindow
 0x14001e298 AcquireSRWLockShared
 0x14001e2a0 IsProcessorFeaturePresent
user32.dll
 0x14001e2c8 ShowWindow
ntdll.dll
 0x14001e2b0 RtlNtStatusToDosError
 0x14001e2b8 NtWriteFile
VCRUNTIME140.dll
 0x14001e000 __CxxFrameHandler3
 0x14001e008 __current_exception_context
 0x14001e010 memcmp
 0x14001e018 _CxxThrowException
 0x14001e020 memmove
 0x14001e028 memcpy
 0x14001e030 __C_specific_handler
 0x14001e038 __current_exception
 0x14001e040 memset
api-ms-win-crt-math-l1-1-0.dll
 0x14001e078 __setusermatherr
api-ms-win-crt-runtime-l1-1-0.dll
 0x14001e088 _initterm
 0x14001e090 _initterm_e
 0x14001e098 _initialize_narrow_environment
 0x14001e0a0 _exit
 0x14001e0a8 _set_app_type
 0x14001e0b0 __p___argc
 0x14001e0b8 __p___argv
 0x14001e0c0 _cexit
 0x14001e0c8 _c_exit
 0x14001e0d0 _register_thread_local_exe_atexit_callback
 0x14001e0d8 _configure_narrow_argv
 0x14001e0e0 _get_initial_narrow_environment
 0x14001e0e8 _seh_filter_exe
 0x14001e0f0 exit
 0x14001e0f8 _initialize_onexit_table
 0x14001e100 _register_onexit_function
 0x14001e108 _crt_atexit
 0x14001e110 terminate
api-ms-win-crt-stdio-l1-1-0.dll
 0x14001e120 _set_fmode
 0x14001e128 __p__commode
api-ms-win-crt-locale-l1-1-0.dll
 0x14001e068 _configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll
 0x14001e050 free
 0x14001e058 _set_new_mode

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure