Report - wywy8.exe

UPX PE File PE32
ScreenShot
Created 2024.09.17 13:22 Machine s1_win7_x6403
Filename wywy8.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
1.2
ZERO API file : clean
VT API (file) 58 detected (AIDetectMalware, Lumma, Mint, Zard, Trojanpws, Unsafe, Lummastealer, Ve1q, malicious, confidence, Attribute, HighConfidence, high confidence, score, TrojanPSW, ccmw, LummaC, Q5zRBUU65iV, XPACK, YXEIIZ, Real Protect, high, Detected, Malware@#3k0rb8nd9zeeu, CCJO, 188JZSF, ABTrojan, LVWO, R663058, Artemis, BScope, Genetic, Gencirc, KV64RdZEr)
md5 54d0f9cd7751a2dfa84f1faf3a901a1c
sha256 316d1754ce6a5722988344f0540adf58d0b8270d241c94b02df03a66b5bcda05
ssdeep 6144:MhQYcHKNira9oRdHFBn+weUKoEg/UnK2evakyl2GXUgYYdf:XKNirCtpgpzD
imphash 9fd5b8944ce9c3acaedc650793d4996e
impfuzzy 24:jYq17mAlZ4Ftk/TwxzT23MUklYqvEQ4ED:jYq17mAlZ4Ftk/w48AQD
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 58 AntiVirus engines on VirusTotal as malicious

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x443594 CopyFileW
 0x443598 ExitProcess
 0x44359c GetCurrentProcess
 0x4435a0 GetCurrentProcessId
 0x4435a4 GetCurrentThreadId
 0x4435a8 GetLogicalDrives
 0x4435ac GetSystemDirectoryW
 0x4435b0 GlobalLock
 0x4435b4 GlobalUnlock
USER32.dll
 0x4435bc CloseClipboard
 0x4435c0 GetClipboardData
 0x4435c4 GetDC
 0x4435c8 GetSystemMetrics
 0x4435cc GetWindowInfo
 0x4435d0 GetWindowLongW
 0x4435d4 OpenClipboard
 0x4435d8 ReleaseDC
ole32.dll
 0x4435e0 CoCreateInstance
 0x4435e4 CoInitializeEx
 0x4435e8 CoInitializeSecurity
 0x4435ec CoSetProxyBlanket
 0x4435f0 CoUninitialize
GDI32.dll
 0x4435f8 BitBlt
 0x4435fc CreateCompatibleBitmap
 0x443600 CreateCompatibleDC
 0x443604 DeleteDC
 0x443608 DeleteObject
 0x44360c GetCurrentObject
 0x443610 GetDIBits
 0x443614 GetObjectW
 0x443618 SelectObject
 0x44361c StretchBlt
OLEAUT32.dll
 0x443624 SysAllocString
 0x443628 SysFreeString
 0x44362c SysStringLen
 0x443630 VariantClear
 0x443634 VariantInit

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure