ScreenShot
Created | 2024.08.17 22:25 | Machine | s1_win7_x6403 |
Filename | rorukal.exe | ||
Type | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 48 detected (Common, Strab, Malicious, score, GenericKD, Unsafe, V5z8, Attribute, HighConfidence, Artemis, DropperX, Androm, CLOUD, rrulj, Inject5, moderate, GenKD, Detected, ai score=81, Znyonm, Chgt, R023H0CHF24, Gencirc, susgen, confidence) | ||
md5 | 77ecafee1b0ba32bd4e3b90b6d92a81f | ||
sha256 | 14d8c36fbab22c95764169e90e4985f90a171b201bb206bd6ea8883b492083e3 | ||
ssdeep | 49152:ZfZDFDHgbjZ766knm3Y3ykj+B8lleKkqI5l+/pDktLE1wGZdcjnGnbPfnzR:npHgbJcmI3t08l3NKM/Sk9rcjnGnb3n | ||
imphash | 0189345388451634260fa99de205c9c8 | ||
impfuzzy | 6:omRgdBJAEoZ/OEGDzyRjJtYb+LzGCRXQVGKjn:omRgVABZG/DzaJtfffC0Kjn |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
danger | File has been identified by 48 AntiVirus engines on VirusTotal as malicious |
notice | Repeatedly searches for a not-found process |
notice | Searches running processes potentially to identify processes for sandbox evasion |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks if process is being debugged by a debugger |
info | One or more processes crashed |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
Rules (2cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | IsPE64 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
ADVAPI32.dll
0xb59630 RegCloseKey
KERNEL32.DLL
0xb59640 LoadLibraryA
0xb59648 ExitProcess
0xb59650 GetProcAddress
0xb59658 VirtualProtect
msvcrt.dll
0xb59668 atoi
SHELL32.dll
0xb59678 ShellExecuteA
urlmon.dll
0xb59688 URLOpenBlockingStreamA
USER32.dll
0xb59698 GetCursorPos
EAT(Export Address Table) is none
ADVAPI32.dll
0xb59630 RegCloseKey
KERNEL32.DLL
0xb59640 LoadLibraryA
0xb59648 ExitProcess
0xb59650 GetProcAddress
0xb59658 VirtualProtect
msvcrt.dll
0xb59668 atoi
SHELL32.dll
0xb59678 ShellExecuteA
urlmon.dll
0xb59688 URLOpenBlockingStreamA
USER32.dll
0xb59698 GetCursorPos
EAT(Export Address Table) is none