Report - fck.exe

Generic Malware Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.09.22 18:16 Machine s1_win7_x6403
Filename fck.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
8
Behavior Score
0.4
ZERO API file : malware
VT API (file) 5 detected (AIDetectMalware, Malicious, Sonbokli)
md5 d8a0d9575d0188e8d0420c1d70d04cb2
sha256 fa554a42c09bc8105b96f4175c7769f6cc2c8dbc72a175ed6217e6a664a7c330
ssdeep 3072:jCaAgC2HK8CBOTrijMPelZRpp9cinLbzJhi+Fm1oB8t2L:jAgBKbITILbRzeiLDiPC
imphash 2c1340bab731211eab9f443d03ccafb1
impfuzzy 24:TwcpV/bOClpgqtrlEJ3coXD6vZ1XZVJtNFGjMQhFGXv2e:8cpVyUg8rScvZ19tWhFGh
  Network IP location

Signature (1cnts)

Level Description
notice File has been identified by 5 AntiVirus engines on VirusTotal as malicious

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14001e000 GetSystemDirectoryW
 0x14001e008 WideCharToMultiByte
 0x14001e010 MultiByteToWideChar
 0x14001e018 GetStringTypeW
 0x14001e020 EncodePointer
 0x14001e028 DecodePointer
 0x14001e030 EnterCriticalSection
 0x14001e038 LeaveCriticalSection
 0x14001e040 InitializeCriticalSectionEx
 0x14001e048 DeleteCriticalSection
 0x14001e050 Sleep
 0x14001e058 GetLocaleInfoEx
 0x14001e060 GetCommandLineW
 0x14001e068 GetLastError
 0x14001e070 HeapFree
 0x14001e078 GetCPInfo
 0x14001e080 RtlPcToFileHeader
 0x14001e088 RaiseException
 0x14001e090 RtlLookupFunctionEntry
 0x14001e098 RtlUnwindEx
 0x14001e0a0 HeapAlloc
 0x14001e0a8 InitializeCriticalSectionAndSpinCount
 0x14001e0b0 IsProcessorFeaturePresent
 0x14001e0b8 SetLastError
 0x14001e0c0 GetCurrentThreadId
 0x14001e0c8 ExitProcess
 0x14001e0d0 GetModuleHandleExW
 0x14001e0d8 GetProcAddress
 0x14001e0e0 GetStdHandle
 0x14001e0e8 WriteFile
 0x14001e0f0 GetModuleFileNameW
 0x14001e0f8 GetProcessHeap
 0x14001e100 GetFileType
 0x14001e108 InitOnceExecuteOnce
 0x14001e110 GetStartupInfoW
 0x14001e118 QueryPerformanceCounter
 0x14001e120 GetSystemTimeAsFileTime
 0x14001e128 GetTickCount64
 0x14001e130 GetEnvironmentStringsW
 0x14001e138 FreeEnvironmentStringsW
 0x14001e140 RtlCaptureContext
 0x14001e148 RtlVirtualUnwind
 0x14001e150 UnhandledExceptionFilter
 0x14001e158 SetUnhandledExceptionFilter
 0x14001e160 FlsAlloc
 0x14001e168 FlsGetValue
 0x14001e170 FlsSetValue
 0x14001e178 FlsFree
 0x14001e180 GetCurrentProcess
 0x14001e188 TerminateProcess
 0x14001e190 GetModuleHandleW
 0x14001e198 IsDebuggerPresent
 0x14001e1a0 ReadFile
 0x14001e1a8 SetFilePointerEx
 0x14001e1b0 FlushFileBuffers
 0x14001e1b8 GetConsoleCP
 0x14001e1c0 GetConsoleMode
 0x14001e1c8 HeapSize
 0x14001e1d0 CloseHandle
 0x14001e1d8 IsValidCodePage
 0x14001e1e0 GetACP
 0x14001e1e8 GetOEMCP
 0x14001e1f0 SetFilePointer
 0x14001e1f8 GetUserDefaultLocaleName
 0x14001e200 LCMapStringEx
 0x14001e208 IsValidLocaleName
 0x14001e210 EnumSystemLocalesEx
 0x14001e218 HeapReAlloc
 0x14001e220 LoadLibraryExW
 0x14001e228 OutputDebugStringW
 0x14001e230 LoadLibraryW
 0x14001e238 ReadConsoleW
 0x14001e240 SetStdHandle
 0x14001e248 WriteConsoleW
 0x14001e250 CreateFileW
 0x14001e258 SetEndOfFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure