ScreenShot
Created | 2024.08.19 15:29 | Machine | s1_win7_x6403 |
Filename | wzoptini.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 43 detected (AIDetectMalware, malicious, moderate confidence, score, TrojanAitInject, GenericKD, Unsafe, V13b, Crypt5, Artemis, Real Protect, high, Autoit, Selfdel, Detected, ai score=87, Dorifel, Wacapew, Bladabindi, Chgt, R002H09ET24, GenAsa, NHzzuRkQa3Y, PossibleThreat, confidence) | ||
md5 | e4eff021485fd9e7050c2beebc30a376 | ||
sha256 | d7738fb96a64acb01229d064154c0c56cd89fa0a90ec3988e96d35f41a7d6d69 | ||
ssdeep | 6144:1MJt6tTmWjp1P4xm0ovCs2Rh68815xYasf5eIltnaToecFHzpPoPWDMY:46tyWjX4LovCsYi5xYZheILnhXFTpqMB | ||
imphash | 11ea841ebb83b186805cc0d8a1a3d4a1 | ||
impfuzzy | 12:VA/DzqYOZkKDHLB78r4B3ExjLAkcOaiTQQnd3mxCHDsR:V0DBaPHLB7PxExjLAkcOV2kjsR |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
danger | File has been identified by 43 AntiVirus engines on VirusTotal as malicious |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is compressed using UPX |
info | Checks if process is being debugged by a debugger |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.DLL
0x4e4810 LoadLibraryA
0x4e4814 GetProcAddress
0x4e4818 VirtualProtect
0x4e481c VirtualAlloc
0x4e4820 VirtualFree
0x4e4824 ExitProcess
ADVAPI32.dll
0x4e482c GetAce
COMCTL32.dll
0x4e4834 ImageList_Remove
COMDLG32.dll
0x4e483c GetOpenFileNameW
GDI32.dll
0x4e4844 LineTo
IPHLPAPI.DLL
0x4e484c IcmpSendEcho
MPR.dll
0x4e4854 WNetUseConnectionW
ole32.dll
0x4e485c CoGetObject
OLEAUT32.dll
0x4e4864 VariantInit
PSAPI.DLL
0x4e486c GetProcessMemoryInfo
SHELL32.dll
0x4e4874 DragFinish
USER32.dll
0x4e487c GetDC
USERENV.dll
0x4e4884 LoadUserProfileW
UxTheme.dll
0x4e488c IsThemeActive
VERSION.dll
0x4e4894 VerQueryValueW
WININET.dll
0x4e489c FtpOpenFileW
WINMM.dll
0x4e48a4 timeGetTime
WSOCK32.dll
0x4e48ac setsockopt
EAT(Export Address Table) is none
KERNEL32.DLL
0x4e4810 LoadLibraryA
0x4e4814 GetProcAddress
0x4e4818 VirtualProtect
0x4e481c VirtualAlloc
0x4e4820 VirtualFree
0x4e4824 ExitProcess
ADVAPI32.dll
0x4e482c GetAce
COMCTL32.dll
0x4e4834 ImageList_Remove
COMDLG32.dll
0x4e483c GetOpenFileNameW
GDI32.dll
0x4e4844 LineTo
IPHLPAPI.DLL
0x4e484c IcmpSendEcho
MPR.dll
0x4e4854 WNetUseConnectionW
ole32.dll
0x4e485c CoGetObject
OLEAUT32.dll
0x4e4864 VariantInit
PSAPI.DLL
0x4e486c GetProcessMemoryInfo
SHELL32.dll
0x4e4874 DragFinish
USER32.dll
0x4e487c GetDC
USERENV.dll
0x4e4884 LoadUserProfileW
UxTheme.dll
0x4e488c IsThemeActive
VERSION.dll
0x4e4894 VerQueryValueW
WININET.dll
0x4e489c FtpOpenFileW
WINMM.dll
0x4e48a4 timeGetTime
WSOCK32.dll
0x4e48ac setsockopt
EAT(Export Address Table) is none