Report - temp.exe

Malicious Library UPX PE File PE64
ScreenShot
Created 2024.09.30 10:03 Machine s1_win7_x6401
Filename temp.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
5
Behavior Score
3.0
ZERO API file : malware
VT API (file) 45 detected (AIDetectMalware, Malicious, score, Vd6m, confidence, Attribute, HighConfidence, high confidence, MalwareX, CLOUD, MeterpreterSC, xmayo, COBEACON, YXEI2Z, Detected, CobaltStrike, Meterpreter, Rozena, YL5W41, Artemis, Chgt, Sgil)
md5 e5852100b1ecba5fce3684062e08ec7f
sha256 66a52de66fee86d212ada38411fedd95b4eba6a3975f7a2ce5f8535ecfefacfb
ssdeep 1536:80UVLhHOnhCk96KN/ysvrS1MSNefO8DtVN:8DBC7hNasrS1MSNeftDt
imphash 6ddb56a17b85852e3b74b88dc840b184
impfuzzy 24:8fjcDq+kLyJd5BlMblRf5XG6qKZVdd1TomvlxcqcCZEwL:8fn+k0JslJJG6qAVdd1T1vkqc/A
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
watch Manipulates memory of a non-child process indicative of process injection
watch Potential code injection by writing to the memory of another process
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
info One or more processes crashed

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
sertificationgameconnect.xyz BG Natskovi & Sie Ltd. 91.92.244.222 clean
91.92.244.222 BG Natskovi & Sie Ltd. 91.92.244.222 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140012258 DeleteCriticalSection
 0x140012260 EnterCriticalSection
 0x140012268 GetLastError
 0x140012270 GetProcAddress
 0x140012278 GetStartupInfoA
 0x140012280 InitializeCriticalSection
 0x140012288 IsDBCSLeadByteEx
 0x140012290 LeaveCriticalSection
 0x140012298 LoadLibraryA
 0x1400122a0 MultiByteToWideChar
 0x1400122a8 SetLastError
 0x1400122b0 SetUnhandledExceptionFilter
 0x1400122b8 Sleep
 0x1400122c0 TlsAlloc
 0x1400122c8 TlsGetValue
 0x1400122d0 TlsSetValue
 0x1400122d8 VirtualAlloc
 0x1400122e0 VirtualFree
 0x1400122e8 VirtualProtect
 0x1400122f0 VirtualQuery
 0x1400122f8 WideCharToMultiByte
msvcrt.dll
 0x140012308 __C_specific_handler
 0x140012310 ___lc_codepage_func
 0x140012318 ___mb_cur_max_func
 0x140012320 __getmainargs
 0x140012328 __initenv
 0x140012330 __iob_func
 0x140012338 __set_app_type
 0x140012340 __setusermatherr
 0x140012348 _acmdln
 0x140012350 _amsg_exit
 0x140012358 _cexit
 0x140012360 _commode
 0x140012368 _errno
 0x140012370 _fileno
 0x140012378 _fmode
 0x140012380 _initterm
 0x140012388 _ismbblead
 0x140012390 _lock
 0x140012398 _onexit
 0x1400123a0 _setmode
 0x1400123a8 _unlock
 0x1400123b0 abort
 0x1400123b8 calloc
 0x1400123c0 exit
 0x1400123c8 fflush
 0x1400123d0 fprintf
 0x1400123d8 fputc
 0x1400123e0 free
 0x1400123e8 fwrite
 0x1400123f0 localeconv
 0x1400123f8 malloc
 0x140012400 memcpy
 0x140012408 memset
 0x140012410 realloc
 0x140012418 signal
 0x140012420 strerror
 0x140012428 strlen
 0x140012430 strncmp
 0x140012438 vfprintf
 0x140012440 wcslen
USER32.dll
 0x140012450 MessageBoxA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure