Report - jrj6.exe

UPX PE File PE32
ScreenShot
Created 2024.09.20 10:29 Machine s1_win7_x6403
Filename jrj6.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
1.2
ZERO API file : malware
VT API (file) 57 detected (AIDetectMalware, LummaStealer, Malicious, score, Unsafe, Mint, Zard, Vlrl, confidence, Genus, Attribute, HighConfidence, high confidence, PWSX, Lumma, TrojanPSW, ccmw, tZshjg37vOV, XPACK, YXEIPZ, Real Protect, high, EncPk, Detected, Malware@#1kw459545lzrw, ABTrojan, VNFA, R663058, Artemis, BScope, Genetic, Gencirc, 52bPq3ObotA, susgen)
md5 1b24fed84d73ccf3575d306b504ebda7
sha256 913be632895fcac1ee8b00e9da64957664f1808fe25d97ef6f83baacc064bdeb
ssdeep 6144:6g60Y60ugd0vFImABIj3UAEV5ZYl1R2RQAcGsUU:T15gqvVkEYYl139GsUU
imphash 603d928b42c1cb14e42962c75cfe8165
impfuzzy 12:jw5TZtJFTleZA/tHqH3Q4oAt7QNt2mwxrPTkTDLO1UkpzmzdwdV3EQg3ED:jC17llZ4Ftk/TwxzT23MUklYqvEQ4ED
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 57 AntiVirus engines on VirusTotal as malicious

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x43c52c CopyFileW
 0x43c530 GetCurrentProcess
 0x43c534 GetCurrentProcessId
 0x43c538 GetCurrentThreadId
 0x43c53c GetLogicalDrives
 0x43c540 GetSystemDirectoryW
 0x43c544 GlobalLock
 0x43c548 GlobalUnlock
 0x43c54c TerminateProcess
USER32.dll
 0x43c554 CloseClipboard
 0x43c558 GetClipboardData
 0x43c55c GetDC
 0x43c560 GetSystemMetrics
 0x43c564 GetWindowInfo
 0x43c568 GetWindowLongW
 0x43c56c OpenClipboard
 0x43c570 ReleaseDC
ole32.dll
 0x43c578 CoCreateInstance
 0x43c57c CoInitializeEx
 0x43c580 CoInitializeSecurity
 0x43c584 CoSetProxyBlanket
 0x43c588 CoUninitialize
GDI32.dll
 0x43c590 BitBlt
 0x43c594 CreateCompatibleBitmap
 0x43c598 CreateCompatibleDC
 0x43c59c DeleteDC
 0x43c5a0 DeleteObject
 0x43c5a4 GetCurrentObject
 0x43c5a8 GetDIBits
 0x43c5ac GetObjectW
 0x43c5b0 SelectObject
 0x43c5b4 StretchBlt
OLEAUT32.dll
 0x43c5bc SysAllocString
 0x43c5c0 SysFreeString
 0x43c5c4 SysStringLen
 0x43c5c8 VariantClear
 0x43c5cc VariantInit

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure