Report - orderconfirmation.exe

Antivirus UPX PE File PE64
ScreenShot
Created 2024.09.27 13:46 Machine s1_win7_x6401
Filename orderconfirmation.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
7
Behavior Score
0.8
ZERO API file : malware
VT API (file) 19 detected (AIDetectMalware, Mint, Phil, Save, malicious, confidence, 100%, high confidence, SideWinder, high, score, Static AI, Malicious PE, Wacatac)
md5 8e57b6466934631a1960ad8950b3b6e4
sha256 ee124586c4e83ba44c2a787bd37740b6420f9caca0c70c31ca93e39926b719e9
ssdeep 3072:t22XExz86sFr15s2LcPYZylbBsdSLMIctx+:FAz8nFrzsYcvGjjt4
imphash 26e71f07eaa293d880bea95f4166d2c6
impfuzzy 48:v7oME9Sm5eFR+2b4jxQHQXiX1PnvklTJGAYJ8R1k1vcqT5L:vcMEgmaRHb4jxQHQXiX1PvwTJGt6R1mB
  Network IP location

Signature (2cnts)

Level Description
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch Antivirus Contains references to security software binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x140019414 GetUserNameA
KERNEL32.dll
 0x140019424 AddAtomA
 0x14001942c AddVectoredExceptionHandler
 0x140019434 CloseHandle
 0x14001943c CreateEventA
 0x140019444 CreateMutexA
 0x14001944c CreateProcessA
 0x140019454 CreateSemaphoreA
 0x14001945c DeleteAtom
 0x140019464 DeleteCriticalSection
 0x14001946c DuplicateHandle
 0x140019474 EnterCriticalSection
 0x14001947c FindAtomA
 0x140019484 FormatMessageA
 0x14001948c GetAtomNameA
 0x140019494 GetCurrentProcess
 0x14001949c GetCurrentProcessId
 0x1400194a4 GetCurrentThread
 0x1400194ac GetCurrentThreadId
 0x1400194b4 GetFileAttributesA
 0x1400194bc GetHandleInformation
 0x1400194c4 GetLastError
 0x1400194cc GetProcAddress
 0x1400194d4 GetProcessAffinityMask
 0x1400194dc GetStartupInfoA
 0x1400194e4 GetSystemTimeAsFileTime
 0x1400194ec GetThreadContext
 0x1400194f4 GetThreadPriority
 0x1400194fc GetTickCount
 0x140019504 InitializeCriticalSection
 0x14001950c IsDBCSLeadByteEx
 0x140019514 IsDebuggerPresent
 0x14001951c LeaveCriticalSection
 0x140019524 LoadLibraryA
 0x14001952c LocalFree
 0x140019534 MultiByteToWideChar
 0x14001953c OpenProcess
 0x140019544 OutputDebugStringA
 0x14001954c QueryPerformanceCounter
 0x140019554 QueryPerformanceFrequency
 0x14001955c RaiseException
 0x140019564 ReleaseMutex
 0x14001956c ReleaseSemaphore
 0x140019574 RemoveVectoredExceptionHandler
 0x14001957c ResetEvent
 0x140019584 ResumeThread
 0x14001958c SetEvent
 0x140019594 SetLastError
 0x14001959c SetProcessAffinityMask
 0x1400195a4 SetThreadContext
 0x1400195ac SetThreadPriority
 0x1400195b4 SetUnhandledExceptionFilter
 0x1400195bc Sleep
 0x1400195c4 SuspendThread
 0x1400195cc TlsAlloc
 0x1400195d4 TlsGetValue
 0x1400195dc TlsSetValue
 0x1400195e4 TryEnterCriticalSection
 0x1400195ec VirtualAlloc
 0x1400195f4 VirtualProtect
 0x1400195fc VirtualQuery
 0x140019604 WaitForMultipleObjects
 0x14001960c WaitForSingleObject
 0x140019614 WideCharToMultiByte
 0x14001961c __C_specific_handler
msvcrt.dll
 0x14001962c ___lc_codepage_func
 0x140019634 ___mb_cur_max_func
 0x14001963c __getmainargs
 0x140019644 __initenv
 0x14001964c __iob_func
 0x140019654 __lconv_init
 0x14001965c __set_app_type
 0x140019664 __setusermatherr
 0x14001966c _acmdln
 0x140019674 _amsg_exit
 0x14001967c _beginthreadex
 0x140019684 _cexit
 0x14001968c _commode
 0x140019694 _endthreadex
 0x14001969c _errno
 0x1400196a4 _fmode
 0x1400196ac _initterm
 0x1400196b4 _lock
 0x1400196bc _memccpy
 0x1400196c4 _onexit
 0x1400196cc _setjmp
 0x1400196d4 _strdup
 0x1400196dc _time64
 0x1400196e4 _ultoa
 0x1400196ec _unlock
 0x1400196f4 abort
 0x1400196fc calloc
 0x140019704 exit
 0x14001970c fprintf
 0x140019714 fputc
 0x14001971c free
 0x140019724 fwrite
 0x14001972c localeconv
 0x140019734 longjmp
 0x14001973c malloc
 0x140019744 memcpy
 0x14001974c memmove
 0x140019754 memset
 0x14001975c printf
 0x140019764 rand
 0x14001976c realloc
 0x140019774 signal
 0x14001977c srand
 0x140019784 strerror
 0x14001978c strlen
 0x140019794 strncmp
 0x14001979c vfprintf
 0x1400197a4 wcslen
SHELL32.dll
 0x1400197b4 ShellExecuteA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure