Report - program.exe

Malicious Library Malicious Packer UPX PE File PE64
ScreenShot
Created 2024.10.21 14:12 Machine s1_win7_x6403
Filename program.exe
Type PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
2.2
ZERO API file : mailcious
VT API (file) 49 detected (AIDetectMalware, Hacktool, Chisel, Malicious, score, Suspiciouspws, Bulz, Unsafe, Vdj1, confidence, 100%, moderate confidence, a variant of WinGo, SharpChisel, AGEN, Tool, Detected, Eldorado, R368091, Artemis, WinGo, Nzfl, Igent, bUTRIA, susgen)
md5 7d2eb1b2a364d686f6d4f17cdf626810
sha256 034f883e7dad9b363bdaf1db5d5802da7296196a10dc9e29fd1027b769443ee8
ssdeep 196608:CqoFg26BXh0UOjCpu/07qcwru7fr/tapj:KF/+w/CwrQ
imphash 93a138801d9601e4c36e6274c8b9d111
impfuzzy 24:UbVjhNwO+VuTnvYzoLtXOr6kwmDruMztir6UP:KwO+VIc+XOmG8nP
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 49 AntiVirus engines on VirusTotal as malicious
watch Detects the presence of Wine emulator
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0xbe3020 WriteFile
 0xbe3028 WriteConsoleW
 0xbe3030 WaitForMultipleObjects
 0xbe3038 WaitForSingleObject
 0xbe3040 VirtualQuery
 0xbe3048 VirtualFree
 0xbe3050 VirtualAlloc
 0xbe3058 SwitchToThread
 0xbe3060 SuspendThread
 0xbe3068 SetWaitableTimer
 0xbe3070 SetUnhandledExceptionFilter
 0xbe3078 SetProcessPriorityBoost
 0xbe3080 SetEvent
 0xbe3088 SetErrorMode
 0xbe3090 SetConsoleCtrlHandler
 0xbe3098 ResumeThread
 0xbe30a0 QueryFullProcessImageNameA
 0xbe30a8 ProcessIdToSessionId
 0xbe30b0 PostQueuedCompletionStatus
 0xbe30b8 OpenProcess
 0xbe30c0 LoadLibraryA
 0xbe30c8 LoadLibraryW
 0xbe30d0 SetThreadContext
 0xbe30d8 GetThreadContext
 0xbe30e0 GetSystemInfo
 0xbe30e8 GetSystemDirectoryA
 0xbe30f0 GetStdHandle
 0xbe30f8 GetQueuedCompletionStatusEx
 0xbe3100 GetProcessAffinityMask
 0xbe3108 GetProcAddress
 0xbe3110 GetEnvironmentStringsW
 0xbe3118 GetConsoleMode
 0xbe3120 FreeEnvironmentStringsW
 0xbe3128 ExitProcess
 0xbe3130 DuplicateHandle
 0xbe3138 CreateThread
 0xbe3140 CreateIoCompletionPort
 0xbe3148 CreateEventA
 0xbe3150 CloseHandle
 0xbe3158 AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure