Report - iy94.exe

UPX PE File PE32
ScreenShot
Created 2024.09.17 13:57 Machine s1_win7_x6401
Filename iy94.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
1.2
ZERO API file : malware
VT API (file) 58 detected (AIDetectMalware, LummaStealer, Malicious, score, Unsafe, Mint, Zard, V1zg, confidence, Attribute, HighConfidence, high confidence, PWSX, Lumma, TrojanPSW, ccmw, LummaC, Q5zRBUU65iV, XPACK, YXEIAZ, Real Protect, high, Detected, HrupT, Wacatac, CCJO, LYPQ0, ABTrojan, IGRF, R663058, Artemis, BScope, Genetic, Gencirc, 3X8ohNHNM9I, susgen)
md5 d5c6aafff07c61d8102e3998e2fb081e
sha256 6c95a7944bcdf65faa0a1cfb24c7996a084259e0e84feeec73d6926d37a5517e
ssdeep 6144:4L7elAxGF7oyQWzEHT/vCRhvnraJ7OrTVmN39g4pd+:YelAx8kyQWzwjqXneJqrTVmNK4i
imphash 9fd5b8944ce9c3acaedc650793d4996e
impfuzzy 24:jYq17mAlZ4Ftk/TwxzT23MUklYqvEQ4ED:jYq17mAlZ4Ftk/w48AQD
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 58 AntiVirus engines on VirusTotal as malicious

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x43b54c CopyFileW
 0x43b550 ExitProcess
 0x43b554 GetCurrentProcess
 0x43b558 GetCurrentProcessId
 0x43b55c GetCurrentThreadId
 0x43b560 GetLogicalDrives
 0x43b564 GetSystemDirectoryW
 0x43b568 GlobalLock
 0x43b56c GlobalUnlock
USER32.dll
 0x43b574 CloseClipboard
 0x43b578 GetClipboardData
 0x43b57c GetDC
 0x43b580 GetSystemMetrics
 0x43b584 GetWindowInfo
 0x43b588 GetWindowLongW
 0x43b58c OpenClipboard
 0x43b590 ReleaseDC
ole32.dll
 0x43b598 CoCreateInstance
 0x43b59c CoInitializeEx
 0x43b5a0 CoInitializeSecurity
 0x43b5a4 CoSetProxyBlanket
 0x43b5a8 CoUninitialize
GDI32.dll
 0x43b5b0 BitBlt
 0x43b5b4 CreateCompatibleBitmap
 0x43b5b8 CreateCompatibleDC
 0x43b5bc DeleteDC
 0x43b5c0 DeleteObject
 0x43b5c4 GetCurrentObject
 0x43b5c8 GetDIBits
 0x43b5cc GetObjectW
 0x43b5d0 SelectObject
 0x43b5d4 StretchBlt
OLEAUT32.dll
 0x43b5dc SysAllocString
 0x43b5e0 SysFreeString
 0x43b5e4 SysStringLen
 0x43b5e8 VariantClear
 0x43b5ec VariantInit

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure