Report - cpuz.exe

Emotet Gen1 Generic Malware Malicious Library Malicious Packer ASPack UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.09.24 18:55 Machine s1_win7_x6401
Filename cpuz.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
2
Behavior Score
6.0
ZERO API file : clean
VT API (file)
md5 933612be98b1de1b5fb119a6b30e84db
sha256 c94da0cc33cdaa8e70642330bfaa32ab0ec4b800f2b4cd30316dfff41ef45df2
ssdeep 49152:2HIMs0/tVdTQrAtbY++2h+sTRuT0U0pItLc8a2n7s+TTCP0VXbpX5Sl35mjAYRGo:2D/PxQh44P7hTbM
imphash b19789f80ab5573934a95f21ea4486cc
impfuzzy 192:GQ8jRFda44FSVm/cSNJh1z/2EPncRcxhkpPQ9:Gn3dNo6OJhfEPpPQ9
  Network IP location

Signature (15cnts)

Level Description
watch Created a service where a service was also not started
watch Detects Virtual Machines through their custom firmware
watch Looks for the Windows Idle Time to determine the uptime
watch Operates on local firewall's policies and settings
watch Queries information on disks
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (15cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_1_Zero Win32 Trojan Emotet binaries (upload)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
download.cpuid.com FR Online S.a.s. 195.154.81.43 clean
195.154.81.43 FR Online S.a.s. 195.154.81.43 clean

Suricata ids

PE API

IAT(Import Address Table) Library

WINMM.dll
 0x1401d4d28 timeGetTime
VERSION.dll
 0x1401d4cf0 GetFileVersionInfoA
 0x1401d4cf8 GetFileVersionInfoSizeA
 0x1401d4d00 GetFileVersionInfoSizeW
 0x1401d4d08 GetFileVersionInfoW
 0x1401d4d10 VerQueryValueW
 0x1401d4d18 VerQueryValueA
KERNEL32.dll
 0x1401d42a0 SetEndOfFile
 0x1401d42a8 SetErrorMode
 0x1401d42b0 GetStartupInfoW
 0x1401d42b8 HeapAlloc
 0x1401d42c0 RaiseException
 0x1401d42c8 RtlPcToFileHeader
 0x1401d42d0 RtlLookupFunctionEntry
 0x1401d42d8 RtlUnwindEx
 0x1401d42e0 HeapReAlloc
 0x1401d42e8 ExitProcess
 0x1401d42f0 HeapSize
 0x1401d42f8 HeapQueryInformation
 0x1401d4300 SetUnhandledExceptionFilter
 0x1401d4308 FreeEnvironmentStringsW
 0x1401d4310 GetEnvironmentStringsW
 0x1401d4318 GetCommandLineW
 0x1401d4320 SetHandleCount
 0x1401d4328 GetFileType
 0x1401d4330 GetStartupInfoA
 0x1401d4338 EncodePointer
 0x1401d4340 DecodePointer
 0x1401d4348 FlsGetValue
 0x1401d4350 FlsSetValue
 0x1401d4358 FlsFree
 0x1401d4360 FlsAlloc
 0x1401d4368 HeapSetInformation
 0x1401d4370 HeapCreate
 0x1401d4378 HeapDestroy
 0x1401d4380 GetSystemTimeAsFileTime
 0x1401d4388 TerminateProcess
 0x1401d4390 UnhandledExceptionFilter
 0x1401d4398 IsDebuggerPresent
 0x1401d43a0 RtlVirtualUnwind
 0x1401d43a8 RtlCaptureContext
 0x1401d43b0 GetConsoleCP
 0x1401d43b8 GetConsoleMode
 0x1401d43c0 GetTimeZoneInformation
 0x1401d43c8 GetCPInfo
 0x1401d43d0 GetOEMCP
 0x1401d43d8 IsValidCodePage
 0x1401d43e0 LCMapStringA
 0x1401d43e8 LCMapStringW
 0x1401d43f0 InitializeCriticalSectionAndSpinCount
 0x1401d43f8 SetStdHandle
 0x1401d4400 GetConsoleOutputCP
 0x1401d4408 GetLocaleInfoA
 0x1401d4410 GetStringTypeA
 0x1401d4418 GetStringTypeW
 0x1401d4420 FindResourceW
 0x1401d4428 LoadResource
 0x1401d4430 SizeofResource
 0x1401d4438 LockResource
 0x1401d4440 GetCurrentDirectoryW
 0x1401d4448 GetComputerNameW
 0x1401d4450 SetCurrentDirectoryW
 0x1401d4458 CreateThread
 0x1401d4460 SetEvent
 0x1401d4468 WaitForSingleObject
 0x1401d4470 GetCurrentProcess
 0x1401d4478 GetCurrentThread
 0x1401d4480 SetPriorityClass
 0x1401d4488 SetThreadPriority
 0x1401d4490 ResumeThread
 0x1401d4498 Sleep
 0x1401d44a0 GlobalFree
 0x1401d44a8 GlobalAlloc
 0x1401d44b0 GlobalReAlloc
 0x1401d44b8 GlobalSize
 0x1401d44c0 GetModuleHandleW
 0x1401d44c8 GetProcAddress
 0x1401d44d0 GetLastError
 0x1401d44d8 LoadLibraryW
 0x1401d44e0 SetLastError
 0x1401d44e8 FreeLibrary
 0x1401d44f0 CloseHandle
 0x1401d44f8 GetModuleFileNameW
 0x1401d4500 MultiByteToWideChar
 0x1401d4508 WideCharToMultiByte
 0x1401d4510 MulDiv
 0x1401d4518 GetLocalTime
 0x1401d4520 GetPriorityClass
 0x1401d4528 GetStdHandle
 0x1401d4530 ExitThread
 0x1401d4538 WriteConsoleW
 0x1401d4540 lstrcpyW
 0x1401d4548 lstrcatW
 0x1401d4550 lstrlenW
 0x1401d4558 WinExec
 0x1401d4560 GetVersionExW
 0x1401d4568 GetSystemWindowsDirectoryW
 0x1401d4570 GetFileAttributesW
 0x1401d4578 GetTempPathW
 0x1401d4580 GetSystemDirectoryA
 0x1401d4588 lstrcmpiA
 0x1401d4590 WritePrivateProfileStringW
 0x1401d4598 GlobalFlags
 0x1401d45a0 lstrlenA
 0x1401d45a8 TlsFree
 0x1401d45b0 DeleteCriticalSection
 0x1401d45b8 LocalReAlloc
 0x1401d45c0 TlsSetValue
 0x1401d45c8 GlobalHandle
 0x1401d45d0 TlsAlloc
 0x1401d45d8 TlsGetValue
 0x1401d45e0 ConvertDefaultLocale
 0x1401d45e8 EnumResourceLanguagesW
 0x1401d45f0 lstrcmpA
 0x1401d45f8 GetLocaleInfoW
 0x1401d4600 LoadLibraryExW
 0x1401d4608 CompareStringA
 0x1401d4610 GlobalAddAtomW
 0x1401d4618 GlobalFindAtomW
 0x1401d4620 GlobalDeleteAtom
 0x1401d4628 CompareStringW
 0x1401d4630 lstrcmpW
 0x1401d4638 GetCurrentThreadId
 0x1401d4640 FreeResource
 0x1401d4648 GlobalLock
 0x1401d4650 GlobalUnlock
 0x1401d4658 FormatMessageW
 0x1401d4660 GlobalMemoryStatus
 0x1401d4668 SetEnvironmentVariableA
 0x1401d4670 SetThreadAffinityMask
 0x1401d4678 ReadFile
 0x1401d4680 CancelIo
 0x1401d4688 CreateEventA
 0x1401d4690 QueryPerformanceFrequency
 0x1401d4698 QueryPerformanceCounter
 0x1401d46a0 VirtualAlloc
 0x1401d46a8 VirtualFree
 0x1401d46b0 GetTickCount
 0x1401d46b8 GetDiskFreeSpaceA
 0x1401d46c0 LocalAlloc
 0x1401d46c8 LocalFree
 0x1401d46d0 WriteConsoleA
 0x1401d46d8 SetFilePointer
 0x1401d46e0 CreateDirectoryA
 0x1401d46e8 GetTempPathA
 0x1401d46f0 GetModuleHandleA
 0x1401d46f8 FindResourceA
 0x1401d4700 GetWindowsDirectoryA
 0x1401d4708 RemoveDirectoryA
 0x1401d4710 GetComputerNameA
 0x1401d4718 OpenMutexA
 0x1401d4720 CreateMutexA
 0x1401d4728 GetVersionExA
 0x1401d4730 GetSystemInfo
 0x1401d4738 SetCurrentDirectoryA
 0x1401d4740 CreateFileA
 0x1401d4748 LoadLibraryA
 0x1401d4750 DeviceIoControl
 0x1401d4758 GetCurrentDirectoryA
 0x1401d4760 GetModuleFileNameA
 0x1401d4768 ReleaseMutex
 0x1401d4770 DeleteFileA
 0x1401d4778 GetSystemWindowsDirectoryA
 0x1401d4780 GetFileAttributesA
 0x1401d4788 GetCurrentProcessId
 0x1401d4790 GetProcessHeap
 0x1401d4798 HeapFree
 0x1401d47a0 FlushFileBuffers
 0x1401d47a8 WriteFile
 0x1401d47b0 CreateFileW
 0x1401d47b8 ReleaseSemaphore
 0x1401d47c0 CreateSemaphoreW
 0x1401d47c8 WaitForMultipleObjects
 0x1401d47d0 InitializeCriticalSection
 0x1401d47d8 LeaveCriticalSection
 0x1401d47e0 EnterCriticalSection
 0x1401d47e8 QueueUserAPC
 0x1401d47f0 WaitForSingleObjectEx
 0x1401d47f8 ResetEvent
 0x1401d4800 CreateEventW
 0x1401d4808 GetACP
USER32.dll
 0x1401d4890 LoadCursorW
 0x1401d4898 GetSysColorBrush
 0x1401d48a0 UnregisterClassW
 0x1401d48a8 DestroyMenu
 0x1401d48b0 PostQuitMessage
 0x1401d48b8 LoadIconW
 0x1401d48c0 SendDlgItemMessageA
 0x1401d48c8 WinHelpW
 0x1401d48d0 GetClassNameW
 0x1401d48d8 GetClassLongPtrW
 0x1401d48e0 GetForegroundWindow
 0x1401d48e8 GetTopWindow
 0x1401d48f0 GetWindowLongPtrW
 0x1401d48f8 SetWindowLongPtrW
 0x1401d4900 GetMessageTime
 0x1401d4908 GetMessagePos
 0x1401d4910 MapWindowPoints
 0x1401d4918 TrackPopupMenu
 0x1401d4920 SetMenu
 0x1401d4928 CreateWindowExW
 0x1401d4930 GetClassInfoExW
 0x1401d4938 GetClassInfoW
 0x1401d4940 RegisterClassW
 0x1401d4948 AdjustWindowRectEx
 0x1401d4950 SetScrollInfo
 0x1401d4958 DefWindowProcW
 0x1401d4960 CallWindowProcW
 0x1401d4968 GetMenu
 0x1401d4970 SystemParametersInfoA
 0x1401d4978 GetWindowPlacement
 0x1401d4980 SetMenuItemBitmaps
 0x1401d4988 GetMenuCheckMarkDimensions
 0x1401d4990 SetWindowsHookExW
 0x1401d4998 CallNextHookEx
 0x1401d49a0 GetMessageW
 0x1401d49a8 TranslateMessage
 0x1401d49b0 IsWindowVisible
 0x1401d49b8 GetKeyState
 0x1401d49c0 PeekMessageW
 0x1401d49c8 GetCursorPos
 0x1401d49d0 ValidateRect
 0x1401d49d8 MoveWindow
 0x1401d49e0 GetDlgCtrlID
 0x1401d49e8 SetWindowTextW
 0x1401d49f0 IsDialogMessageW
 0x1401d49f8 SetDlgItemTextW
 0x1401d4a00 SetDlgItemInt
 0x1401d4a08 SendDlgItemMessageW
 0x1401d4a10 GetDesktopWindow
 0x1401d4a18 CreateDialogIndirectParamW
 0x1401d4a20 DestroyWindow
 0x1401d4a28 IsWindow
 0x1401d4a30 GetNextDlgTabItem
 0x1401d4a38 EndDialog
 0x1401d4a40 GetWindowTextLengthW
 0x1401d4a48 GetWindowTextW
 0x1401d4a50 GetScrollPos
 0x1401d4a58 SetScrollPos
 0x1401d4a60 GetWindow
 0x1401d4a68 EndPaint
 0x1401d4a70 ScreenToClient
 0x1401d4a78 GrayStringW
 0x1401d4a80 DrawTextExW
 0x1401d4a88 DrawTextW
 0x1401d4a90 TabbedTextOutW
 0x1401d4a98 GetWindowThreadProcessId
 0x1401d4aa0 GetLastActivePopup
 0x1401d4aa8 SetPropW
 0x1401d4ab0 GetCapture
 0x1401d4ab8 GetActiveWindow
 0x1401d4ac0 SetActiveWindow
 0x1401d4ac8 SetWindowPos
 0x1401d4ad0 ShowWindow
 0x1401d4ad8 GetPropW
 0x1401d4ae0 RemovePropW
 0x1401d4ae8 GetFocus
 0x1401d4af0 SetFocus
 0x1401d4af8 GetDlgItem
 0x1401d4b00 IsWindowEnabled
 0x1401d4b08 GetMenuState
 0x1401d4b10 GetMenuItemID
 0x1401d4b18 GetMenuItemCount
 0x1401d4b20 GetSubMenu
 0x1401d4b28 UnhookWindowsHookEx
 0x1401d4b30 wsprintfA
 0x1401d4b38 ModifyMenuW
 0x1401d4b40 WindowFromPoint
 0x1401d4b48 PostMessageW
 0x1401d4b50 DispatchMessageW
 0x1401d4b58 ReleaseCapture
 0x1401d4b60 DrawEdge
 0x1401d4b68 FrameRect
 0x1401d4b70 DrawFrameControl
 0x1401d4b78 FillRect
 0x1401d4b80 CheckMenuItem
 0x1401d4b88 EnableMenuItem
 0x1401d4b90 AppendMenuW
 0x1401d4b98 ClientToScreen
 0x1401d4ba0 CreatePopupMenu
 0x1401d4ba8 CreateCursor
 0x1401d4bb0 SetCursor
 0x1401d4bb8 DestroyCursor
 0x1401d4bc0 UpdateWindow
 0x1401d4bc8 SetRect
 0x1401d4bd0 OffsetRect
 0x1401d4bd8 DrawIcon
 0x1401d4be0 GetSystemMetrics
 0x1401d4be8 IsIconic
 0x1401d4bf0 MessageBoxW
 0x1401d4bf8 wsprintfW
 0x1401d4c00 InflateRect
 0x1401d4c08 DrawFocusRect
 0x1401d4c10 GetSysColor
 0x1401d4c18 IsRectEmpty
 0x1401d4c20 CopyRect
 0x1401d4c28 GetParent
 0x1401d4c30 PtInRect
 0x1401d4c38 DestroyIcon
 0x1401d4c40 SetWindowLongW
 0x1401d4c48 GetWindowLongW
 0x1401d4c50 LoadImageW
 0x1401d4c58 ReleaseDC
 0x1401d4c60 CloseClipboard
 0x1401d4c68 SetClipboardData
 0x1401d4c70 EmptyClipboard
 0x1401d4c78 OpenClipboard
 0x1401d4c80 GetClientRect
 0x1401d4c88 GetDC
 0x1401d4c90 GetWindowDC
 0x1401d4c98 KillTimer
 0x1401d4ca0 SetTimer
 0x1401d4ca8 InvalidateRect
 0x1401d4cb0 EnableWindow
 0x1401d4cb8 GetWindowRect
 0x1401d4cc0 SetForegroundWindow
 0x1401d4cc8 LoadBitmapW
 0x1401d4cd0 SendMessageW
 0x1401d4cd8 RegisterWindowMessageW
 0x1401d4ce0 BeginPaint
GDI32.dll
 0x1401d4138 LineTo
 0x1401d4140 MoveToEx
 0x1401d4148 DeleteObject
 0x1401d4150 PtVisible
 0x1401d4158 RectVisible
 0x1401d4160 TextOutW
 0x1401d4168 ExtTextOutW
 0x1401d4170 Escape
 0x1401d4178 SetViewportOrgEx
 0x1401d4180 OffsetViewportOrgEx
 0x1401d4188 SetViewportExtEx
 0x1401d4190 ScaleViewportExtEx
 0x1401d4198 SetWindowExtEx
 0x1401d41a0 DeleteDC
 0x1401d41a8 CreatePen
 0x1401d41b0 ScaleWindowExtEx
 0x1401d41b8 GetClipBox
 0x1401d41c0 SetMapMode
 0x1401d41c8 SetTextColor
 0x1401d41d0 SetBkMode
 0x1401d41d8 SetBkColor
 0x1401d41e0 RestoreDC
 0x1401d41e8 SaveDC
 0x1401d41f0 CreateDCA
 0x1401d41f8 SelectObject
 0x1401d4200 CreateSolidBrush
 0x1401d4208 SetPixel
 0x1401d4210 GetCurrentObject
 0x1401d4218 CreateFontIndirectW
 0x1401d4220 GetPixel
 0x1401d4228 CreateBitmap
 0x1401d4230 CreateFontW
 0x1401d4238 GetTextExtentPoint32W
 0x1401d4240 GetDIBits
 0x1401d4248 RealizePalette
 0x1401d4250 SelectPalette
 0x1401d4258 GetObjectW
 0x1401d4260 GetStockObject
 0x1401d4268 CreatePalette
 0x1401d4270 GetSystemPaletteEntries
 0x1401d4278 GetDeviceCaps
 0x1401d4280 BitBlt
 0x1401d4288 CreateCompatibleBitmap
 0x1401d4290 CreateCompatibleDC
WINSPOOL.DRV
 0x1401d4d38 ClosePrinter
 0x1401d4d40 OpenPrinterW
 0x1401d4d48 DocumentPropertiesW
ADVAPI32.dll
 0x1401d4000 ImpersonateSelf
 0x1401d4008 OpenThreadToken
 0x1401d4010 AllocateAndInitializeSid
 0x1401d4018 FreeSid
 0x1401d4020 InitializeSecurityDescriptor
 0x1401d4028 GetLengthSid
 0x1401d4030 AccessCheck
 0x1401d4038 IsValidSecurityDescriptor
 0x1401d4040 SetSecurityDescriptorOwner
 0x1401d4048 RegSetValueExW
 0x1401d4050 RegCreateKeyExW
 0x1401d4058 RegOpenKeyW
 0x1401d4060 RegEnumKeyW
 0x1401d4068 RegDeleteKeyW
 0x1401d4070 RegQueryValueExW
 0x1401d4078 RegOpenKeyExA
 0x1401d4080 RegQueryInfoKeyA
 0x1401d4088 RegEnumKeyExA
 0x1401d4090 RegGetValueA
 0x1401d4098 RegQueryValueExA
 0x1401d40a0 OpenSCManagerA
 0x1401d40a8 ControlService
 0x1401d40b0 StartServiceA
 0x1401d40b8 OpenServiceA
 0x1401d40c0 DeleteService
 0x1401d40c8 CreateServiceW
 0x1401d40d0 CloseServiceHandle
 0x1401d40d8 LookupPrivilegeValueA
 0x1401d40e0 AdjustTokenPrivileges
 0x1401d40e8 OpenProcessToken
 0x1401d40f0 RegCloseKey
 0x1401d40f8 RegQueryValueW
 0x1401d4100 RegOpenKeyExW
 0x1401d4108 SetSecurityDescriptorGroup
 0x1401d4110 SetSecurityDescriptorDacl
 0x1401d4118 AddAccessAllowedAce
 0x1401d4120 InitializeAcl
 0x1401d4128 RevertToSelf
SHELL32.dll
 0x1401d4860 ShellExecuteW
SHLWAPI.dll
 0x1401d4870 PathFindExtensionW
 0x1401d4878 PathFindFileNameW
 0x1401d4880 PathRemoveFileSpecW
ole32.dll
 0x1401d4d58 CoTaskMemFree
 0x1401d4d60 CoInitializeEx
 0x1401d4d68 CoInitializeSecurity
 0x1401d4d70 CoSetProxyBlanket
 0x1401d4d78 CoInitialize
 0x1401d4d80 CoCreateInstance
 0x1401d4d88 CoUninitialize
 0x1401d4d90 StringFromGUID2
OLEAUT32.dll
 0x1401d4818 SysAllocString
 0x1401d4820 SysAllocStringByteLen
 0x1401d4828 SysStringByteLen
 0x1401d4830 SysFreeString
 0x1401d4838 VariantChangeType
 0x1401d4840 VariantClear
 0x1401d4848 VariantInit
 0x1401d4850 SysStringLen

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure