Report - univ.exe

Malicious Library Admin Tool (Sysinternals etc ...) UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.09.19 10:09 Machine s1_win7_x6403
Filename univ.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
3.2
ZERO API file : malware
VT API (file) 59 detected (AIDetectMalware, StopCrypt, Malicious, score, Stop, GenericKD, Unsafe, Kryptik, Vzt4, confidence, 100%, Attribute, HighConfidence, high confidence, HXVG, BotX, Pwsx, Tepfer, Stealerc, 62qlktkfLgH, AceCrypter, jjadj, DownLoader47, HPGANDCRAB, SMONT2, Real Protect, high, Krypt, Static AI, Malicious PE, Detected, Convagent, Malware@#1m3gagiro55h9, MREZZ9, Eldorado, R658943, Artemis, BScope, Tofsee, Gencirc, susgen)
md5 85737d1c7426259423c84f96719e82ea
sha256 5aba703ae3636bbd23110d80621643e39f4b924a664f85bd6542f9f10c6b983b
ssdeep 6144:SfH1EM1595tnpAFQoUQzxh/vtuknuIiF/Q:mHh1595VpAWkT1uCuF/
imphash 85dac74763b3c77327ffae5e53f25749
impfuzzy 48:Mcp1mKZdidWPQyG1R6mb6yq2HK9GcPkA8:LmyoWoyGT6mbxq2HQGcPS
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
watch Looks for the Windows Idle Time to determine the uptime
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (6cnts)

Level Name Description Collection
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x431000 GetComputerNameA
 0x431004 FillConsoleOutputCharacterA
 0x431008 SearchPathW
 0x43100c GetConsoleAliasesLengthW
 0x431010 CopyFileExW
 0x431014 GetNumaProcessorNode
 0x431018 DebugActiveProcessStop
 0x43101c GetDefaultCommConfigW
 0x431020 CallNamedPipeA
 0x431024 WriteConsoleOutputW
 0x431028 HeapAlloc
 0x43102c InterlockedDecrement
 0x431030 GlobalSize
 0x431034 GetEnvironmentStringsW
 0x431038 CreateDirectoryW
 0x43103c GetSystemDefaultLCID
 0x431040 GetModuleHandleW
 0x431044 GetCommandLineA
 0x431048 GetSystemTimes
 0x43104c GlobalAlloc
 0x431050 LoadLibraryW
 0x431054 GetConsoleAliasExesLengthW
 0x431058 SetConsoleMode
 0x43105c GetFileAttributesW
 0x431060 GetBinaryTypeW
 0x431064 GetStartupInfoW
 0x431068 SetConsoleTitleA
 0x43106c GetShortPathNameA
 0x431070 InterlockedExchange
 0x431074 GetLastError
 0x431078 GetProcAddress
 0x43107c CopyFileA
 0x431080 SetStdHandle
 0x431084 EnterCriticalSection
 0x431088 BuildCommDCBW
 0x43108c GetNumaHighestNodeNumber
 0x431090 OpenWaitableTimerA
 0x431094 LoadLibraryA
 0x431098 UnhandledExceptionFilter
 0x43109c WritePrivateProfileStringA
 0x4310a0 QueryDosDeviceW
 0x4310a4 VirtualLock
 0x4310a8 FindAtomA
 0x4310ac FoldStringA
 0x4310b0 GetModuleFileNameA
 0x4310b4 FreeEnvironmentStringsW
 0x4310b8 SetCalendarInfoA
 0x4310bc WriteConsoleW
 0x4310c0 CloseHandle
 0x4310c4 MultiByteToWideChar
 0x4310c8 EncodePointer
 0x4310cc DecodePointer
 0x4310d0 ExitProcess
 0x4310d4 GetCommandLineW
 0x4310d8 HeapSetInformation
 0x4310dc TerminateProcess
 0x4310e0 GetCurrentProcess
 0x4310e4 SetUnhandledExceptionFilter
 0x4310e8 IsDebuggerPresent
 0x4310ec GetCPInfo
 0x4310f0 InterlockedIncrement
 0x4310f4 GetACP
 0x4310f8 GetOEMCP
 0x4310fc IsValidCodePage
 0x431100 TlsAlloc
 0x431104 TlsGetValue
 0x431108 TlsSetValue
 0x43110c TlsFree
 0x431110 SetLastError
 0x431114 GetCurrentThreadId
 0x431118 LeaveCriticalSection
 0x43111c SetHandleCount
 0x431120 GetStdHandle
 0x431124 InitializeCriticalSectionAndSpinCount
 0x431128 GetFileType
 0x43112c DeleteCriticalSection
 0x431130 Sleep
 0x431134 HeapSize
 0x431138 WriteFile
 0x43113c GetModuleFileNameW
 0x431140 HeapCreate
 0x431144 QueryPerformanceCounter
 0x431148 GetTickCount
 0x43114c GetCurrentProcessId
 0x431150 GetSystemTimeAsFileTime
 0x431154 WideCharToMultiByte
 0x431158 LCMapStringW
 0x43115c GetStringTypeW
 0x431160 HeapFree
 0x431164 RtlUnwind
 0x431168 ReadFile
 0x43116c HeapReAlloc
 0x431170 IsProcessorFeaturePresent
 0x431174 GetConsoleCP
 0x431178 GetConsoleMode
 0x43117c FlushFileBuffers
 0x431180 SetFilePointer
 0x431184 CreateFileW
USER32.dll
 0x43118c GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure