ScreenShot
Created | 2024.08.19 15:10 | Machine | s1_win7_x6403 |
Filename | AddMemreduct.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 35 detected (AIDetectMalware, malicious, moderate confidence, score, Unsafe, GenericKD, Save, AUTOIT, AGEN, R002C0DGJ24, high, Obfuscated, epis, ai score=83, SGeneric, Casdet, ZexaF, JmGfaqlawnfi, PossibleThreat, confidence) | ||
md5 | f013565b3f9e18d9ac83432b4f0c08f9 | ||
sha256 | a2da67b2c6bdded8424c239e2ddc36a5da7f556e967a25b5c3ec0db4473ae31e | ||
ssdeep | 12288:MFLN7pJxDibQF4ulRCX11Ab1i0n9aMd50jm6s6OgIUkBJoKISZxNex:gN7p/DjF7CHIkodP6OVjpZjex | ||
imphash | 21371b611d91188d602926b15db6bd48 | ||
impfuzzy | 12:VA/DzqYOZkKDP78r4BOgLAkcOaiTQQnd3mxCHH:V0DBaPP7PXLAkcOV2kn |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
danger | File has been identified by 35 AntiVirus engines on VirusTotal as malicious |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is compressed using UPX |
info | Checks if process is being debugged by a debugger |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.DLL
0x54a8cc LoadLibraryA
0x54a8d0 GetProcAddress
0x54a8d4 VirtualProtect
0x54a8d8 VirtualAlloc
0x54a8dc VirtualFree
0x54a8e0 ExitProcess
ADVAPI32.dll
0x54a8e8 GetAce
COMCTL32.dll
0x54a8f0 ImageList_Remove
COMDLG32.dll
0x54a8f8 GetSaveFileNameW
GDI32.dll
0x54a900 LineTo
IPHLPAPI.DLL
0x54a908 IcmpSendEcho
MPR.dll
0x54a910 WNetGetConnectionW
ole32.dll
0x54a918 CoGetObject
OLEAUT32.dll
0x54a920 OleLoadPicture
PSAPI.DLL
0x54a928 GetProcessMemoryInfo
SHELL32.dll
0x54a930 DragFinish
USER32.dll
0x54a938 GetDC
USERENV.dll
0x54a940 LoadUserProfileW
UxTheme.dll
0x54a948 IsThemeActive
VERSION.dll
0x54a950 VerQueryValueW
WININET.dll
0x54a958 FtpOpenFileW
WINMM.dll
0x54a960 timeGetTime
WSOCK32.dll
0x54a968 connect
EAT(Export Address Table) is none
KERNEL32.DLL
0x54a8cc LoadLibraryA
0x54a8d0 GetProcAddress
0x54a8d4 VirtualProtect
0x54a8d8 VirtualAlloc
0x54a8dc VirtualFree
0x54a8e0 ExitProcess
ADVAPI32.dll
0x54a8e8 GetAce
COMCTL32.dll
0x54a8f0 ImageList_Remove
COMDLG32.dll
0x54a8f8 GetSaveFileNameW
GDI32.dll
0x54a900 LineTo
IPHLPAPI.DLL
0x54a908 IcmpSendEcho
MPR.dll
0x54a910 WNetGetConnectionW
ole32.dll
0x54a918 CoGetObject
OLEAUT32.dll
0x54a920 OleLoadPicture
PSAPI.DLL
0x54a928 GetProcessMemoryInfo
SHELL32.dll
0x54a930 DragFinish
USER32.dll
0x54a938 GetDC
USERENV.dll
0x54a940 LoadUserProfileW
UxTheme.dll
0x54a948 IsThemeActive
VERSION.dll
0x54a950 VerQueryValueW
WININET.dll
0x54a958 FtpOpenFileW
WINMM.dll
0x54a960 timeGetTime
WSOCK32.dll
0x54a968 connect
EAT(Export Address Table) is none