Report - dos.exe

Generic Malware Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.10.21 13:46 Machine s1_win7_x6403
Filename dos.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
1.2
ZERO API file : malware
VT API (file) 40 detected (Sonbokli, GenericKD, Unsafe, Vmpl, malicious, confidence, Attribute, HighConfidence, high confidence, MalwareX, CLOUD, Detected, Wacatac, R667674, Artemis, Chgt, R011H09IL24, Msmw, susgen, PossibleThreat, PALLAS, Software, B9nj)
md5 a2163bf270762a1deec37145f2ef5267
sha256 e0d09374471bb956744258603669a06473cc5920b6096928ac345c640d089403
ssdeep 6144:nUMYwNIRcCdh4vVgCAoyLInAkAdQX+wWNDBUhigzp00NR6MohqUia8Qv1ke8We:nUlDsyqyEA16rdZjnT0j58We
imphash 56cb00a5fa58cf34ccf8b9263abc87f8
impfuzzy 24:FM214c3yrfx441JVDc1sc0R8a0UXyA4enj9MG95XGDZ6JlkoDq1L60ZCbR1tAjFT:nL+ff19cQhXF4exRJGV6JlkoqB6ehOhk
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x40a37c RegCloseKey
 0x40a384 RegOpenKeyExA
 0x40a38c RegQueryValueExA
CRYPT32.dll
 0x40a39c CryptBinaryToStringA
KERNEL32.dll
 0x40a3ac CloseHandle
 0x40a3b4 CopyFileA
 0x40a3bc CreateProcessA
 0x40a3c4 CreateThread
 0x40a3cc CreateToolhelp32Snapshot
 0x40a3d4 DeleteCriticalSection
 0x40a3dc EnterCriticalSection
 0x40a3e4 GetComputerNameA
 0x40a3ec GetCurrentProcess
 0x40a3f4 GetCurrentProcessId
 0x40a3fc GetCurrentThreadId
 0x40a404 GetLastError
 0x40a40c GetModuleFileNameA
 0x40a414 GetModuleHandleW
 0x40a41c GetProcAddress
 0x40a424 GetStartupInfoA
 0x40a42c GetSystemInfo
 0x40a434 GetSystemTimeAsFileTime
 0x40a43c GetTempPathA
 0x40a444 GetTickCount
 0x40a44c GlobalMemoryStatusEx
 0x40a454 InitializeCriticalSection
 0x40a45c LeaveCriticalSection
 0x40a464 Process32First
 0x40a46c Process32Next
 0x40a474 QueryPerformanceCounter
 0x40a47c RtlAddFunctionTable
 0x40a484 RtlCaptureContext
 0x40a48c RtlLookupFunctionEntry
 0x40a494 RtlVirtualUnwind
 0x40a49c SetThreadExecutionState
 0x40a4a4 SetUnhandledExceptionFilter
 0x40a4ac Sleep
 0x40a4b4 TerminateProcess
 0x40a4bc TlsGetValue
 0x40a4c4 UnhandledExceptionFilter
 0x40a4cc VirtualProtect
 0x40a4d4 VirtualQuery
 0x40a4dc WaitForSingleObject
msvcrt.dll
 0x40a4ec __C_specific_handler
 0x40a4f4 __getmainargs
 0x40a4fc __initenv
 0x40a504 __iob_func
 0x40a50c __lconv_init
 0x40a514 __set_app_type
 0x40a51c __setusermatherr
 0x40a524 _acmdln
 0x40a52c _amsg_exit
 0x40a534 _cexit
 0x40a53c _fmode
 0x40a544 _initterm
 0x40a54c _onexit
 0x40a554 _stricmp
 0x40a55c _vsnprintf
 0x40a564 abort
 0x40a56c atoi
 0x40a574 calloc
 0x40a57c exit
 0x40a584 fprintf
 0x40a58c free
 0x40a594 fwrite
 0x40a59c malloc
 0x40a5a4 memcpy
 0x40a5ac memset
 0x40a5b4 printf
 0x40a5bc puts
 0x40a5c4 signal
 0x40a5cc sprintf
 0x40a5d4 strlen
 0x40a5dc strncmp
 0x40a5e4 strncpy
 0x40a5ec strstr
 0x40a5f4 swprintf_s
 0x40a5fc vfprintf
 0x40a604 wprintf
SHLWAPI.dll
 0x40a614 PathAppendA
WINHTTP.dll
 0x40a624 WinHttpCloseHandle
 0x40a62c WinHttpConnect
 0x40a634 WinHttpOpen
 0x40a63c WinHttpOpenRequest
 0x40a644 WinHttpQueryDataAvailable
 0x40a64c WinHttpReadData
 0x40a654 WinHttpReceiveResponse
 0x40a65c WinHttpSendRequest

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure