Report - 66fc5c187ba75_lyla343.exe

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.10.02 14:43 Machine s1_win7_x6403
Filename 66fc5c187ba75_lyla343.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
1.6
ZERO API file : malware
VT API (file) 27 detected (AIDetectMalware, Malicious, score, Lockbit, Unsafe, confidence, 100%, Attribute, HighConfidence, high confidence, Obscure, CLASSIC, moderate, Krypt, Static AI, Suspicious PE, Detected, Smokeloader, Kryptik, Eldorado, DropperX, R535540, Obfuscated, susgen)
md5 007fa2c8c8ab1fbc6867e44db35c063e
sha256 fde9a151f01aaa4bd10355337c8146e28c0716f10a4bdd70718f007f321827fe
ssdeep 6144:yB5v9Z13FO0jL/cyv3+Is7RIw0k2aBh4MCU0m9ccVr:CVRjL/cs3fsiEh4MCjm9/
imphash 5d6eca90d87f0b951e502c326dc551af
impfuzzy 24:jkgmfKHsJNjQuWSd5UcD54oEdQBf0qC8uV1vPcc4SJt4RsgH+fcdNO5lXvHRnly/:nMv0SdadfD13cll+fc65lXtKJvc3DxqB
  Network IP location

Signature (3cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x414014 GetConsoleAliasExesA
 0x414018 InterlockedIncrement
 0x41401c CreateJobObjectW
 0x414020 InterlockedCompareExchange
 0x414024 SetVolumeMountPointW
 0x414028 GetTimeFormatA
 0x41402c _lcreat
 0x414030 LocalFlags
 0x414034 SetFileTime
 0x414038 ClearCommBreak
 0x41403c SetFileShortNameW
 0x414040 LoadLibraryW
 0x414044 CopyFileW
 0x414048 _hread
 0x41404c GetCalendarInfoA
 0x414050 GetFileAttributesW
 0x414054 VerifyVersionInfoA
 0x414058 GetModuleFileNameW
 0x41405c CreateActCtxA
 0x414060 GetEnvironmentVariableA
 0x414064 GetTempPathW
 0x414068 RaiseException
 0x41406c InterlockedExchange
 0x414070 GetStdHandle
 0x414074 GetLogicalDriveStringsA
 0x414078 GetLastError
 0x41407c GetProcAddress
 0x414080 CreateNamedPipeA
 0x414084 GetLocaleInfoA
 0x414088 EnumSystemCodePagesW
 0x41408c SetComputerNameA
 0x414090 GlobalFree
 0x414094 LoadLibraryA
 0x414098 InterlockedExchangeAdd
 0x41409c LocalAlloc
 0x4140a0 CreateHardLinkW
 0x4140a4 GetNumberFormatW
 0x4140a8 CreateEventW
 0x4140ac OpenEventA
 0x4140b0 QueryDosDeviceW
 0x4140b4 FoldStringA
 0x4140b8 SetEnvironmentVariableA
 0x4140bc GlobalWire
 0x4140c0 GetCurrentDirectoryA
 0x4140c4 EnumDateFormatsW
 0x4140c8 GetShortPathNameW
 0x4140cc SetCalendarInfoA
 0x4140d0 SetProcessShutdownParameters
 0x4140d4 GetDiskFreeSpaceExA
 0x4140d8 GetVersionExA
 0x4140dc ReadConsoleInputW
 0x4140e0 DebugBreak
 0x4140e4 SetFileAttributesW
 0x4140e8 LCMapStringW
 0x4140ec CommConfigDialogW
 0x4140f0 TlsGetValue
 0x4140f4 SetFilePointer
 0x4140f8 EnumCalendarInfoA
 0x4140fc GetComputerNameA
 0x414100 GetStringTypeW
 0x414104 IsValidLocale
 0x414108 EnumSystemLocalesA
 0x41410c InterlockedDecrement
 0x414110 EncodePointer
 0x414114 DecodePointer
 0x414118 Sleep
 0x41411c InitializeCriticalSection
 0x414120 DeleteCriticalSection
 0x414124 EnterCriticalSection
 0x414128 LeaveCriticalSection
 0x41412c HeapFree
 0x414130 HeapReAlloc
 0x414134 GetCommandLineW
 0x414138 HeapSetInformation
 0x41413c GetStartupInfoW
 0x414140 RtlUnwind
 0x414144 HeapAlloc
 0x414148 WideCharToMultiByte
 0x41414c MultiByteToWideChar
 0x414150 GetCPInfo
 0x414154 IsProcessorFeaturePresent
 0x414158 HeapCreate
 0x41415c HeapSize
 0x414160 GetModuleHandleW
 0x414164 ExitProcess
 0x414168 SetUnhandledExceptionFilter
 0x41416c WriteFile
 0x414170 FreeEnvironmentStringsW
 0x414174 GetEnvironmentStringsW
 0x414178 SetHandleCount
 0x41417c InitializeCriticalSectionAndSpinCount
 0x414180 GetFileType
 0x414184 TlsAlloc
 0x414188 TlsSetValue
 0x41418c TlsFree
 0x414190 SetLastError
 0x414194 GetCurrentThreadId
 0x414198 QueryPerformanceCounter
 0x41419c GetTickCount
 0x4141a0 GetCurrentProcessId
 0x4141a4 GetSystemTimeAsFileTime
 0x4141a8 GetLocaleInfoW
 0x4141ac TerminateProcess
 0x4141b0 GetCurrentProcess
 0x4141b4 UnhandledExceptionFilter
 0x4141b8 IsDebuggerPresent
 0x4141bc GetACP
 0x4141c0 GetOEMCP
 0x4141c4 IsValidCodePage
 0x4141c8 GetUserDefaultLCID
GDI32.dll
 0x414000 GetBkMode
 0x414004 CreateDCW
 0x414008 GetCharWidth32A
 0x41400c GetCharWidthI
ole32.dll
 0x4141d8 CoUnmarshalHresult
MSIMG32.dll
 0x4141d0 AlphaBlend

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure