Report - 11wY50spoofer.exe

Malicious Library Downloader VMProtect PE File PE64
ScreenShot
Created 2024.10.21 17:16 Machine s1_win7_x6403
Filename 11wY50spoofer.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
5
Behavior Score
2.2
ZERO API file : malware
VT API (file) 49 detected (AIDetectMalware, VMProtect, Malicious, score, GenericKD, Unsafe, Save, confidence, Attribute, HighConfidence, high confidence, L suspicious, MalwareX, AGEN, Real Protect, moderate, VMProtBad, Static AI, Malicious PE, Detected, GrayWare, Wacapew, Wacatac, Eldorado, Artemis, R002H0CIS24, susgen, CoinMiner, C9nj)
md5 366820e26797d49013c1d0e21beb26cb
sha256 d999ddc0a194cb124ac84861e3ecc0e746c9a13f90f6a4d003918e3bae891539
ssdeep 98304:FWnZpfpcx+qB+zA6PZTdeLd4fVdQBuegPjiOZRRliOJrJRT:EnZpfuSXPZTdKcBPew7iOJ3
imphash 18564b1cf3df285f6aada8e4727159f9
impfuzzy 24:a9Qn6E+wSS6oOOJxASgwu5FUBKaQtXJHc9NDI5Q8:8Qn6E7Smb2wzBKnXpcM5Q8
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 49 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Network_Downloader File Downloader binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14040b000 GetFileType
USER32.dll
 0x14040b010 SetWindowLongA
ADVAPI32.dll
 0x14040b020 CryptEncrypt
SHELL32.dll
 0x14040b030 ShellExecuteA
MSVCP140.dll
 0x14040b040 ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
urlmon.dll
 0x14040b050 URLDownloadToFileA
Normaliz.dll
 0x14040b060 IdnToAscii
WLDAP32.dll
 0x14040b070 None
CRYPT32.dll
 0x14040b080 CertFreeCertificateChain
WS2_32.dll
 0x14040b090 ntohl
USERENV.dll
 0x14040b0a0 UnloadUserProfile
VCRUNTIME140.dll
 0x14040b0b0 __std_exception_destroy
VCRUNTIME140_1.dll
 0x14040b0c0 __CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0.dll
 0x14040b0d0 _initterm_e
api-ms-win-crt-heap-l1-1-0.dll
 0x14040b0e0 calloc
api-ms-win-crt-utility-l1-1-0.dll
 0x14040b0f0 rand
api-ms-win-crt-stdio-l1-1-0.dll
 0x14040b100 feof
api-ms-win-crt-convert-l1-1-0.dll
 0x14040b110 strtoul
api-ms-win-crt-locale-l1-1-0.dll
 0x14040b120 _configthreadlocale
api-ms-win-crt-time-l1-1-0.dll
 0x14040b130 _time64
api-ms-win-crt-string-l1-1-0.dll
 0x14040b140 strncmp
api-ms-win-crt-filesystem-l1-1-0.dll
 0x14040b150 _unlink
api-ms-win-crt-math-l1-1-0.dll
 0x14040b160 __setusermatherr
WTSAPI32.dll
 0x14040b170 WTSSendMessageW
KERNEL32.dll
 0x14040b180 GetSystemTimeAsFileTime
USER32.dll
 0x14040b190 GetUserObjectInformationW
KERNEL32.dll
 0x14040b1a0 LocalAlloc
 0x14040b1a8 LocalFree
 0x14040b1b0 GetModuleFileNameW
 0x14040b1b8 GetProcessAffinityMask
 0x14040b1c0 SetProcessAffinityMask
 0x14040b1c8 SetThreadAffinityMask
 0x14040b1d0 Sleep
 0x14040b1d8 ExitProcess
 0x14040b1e0 FreeLibrary
 0x14040b1e8 LoadLibraryA
 0x14040b1f0 GetModuleHandleA
 0x14040b1f8 GetProcAddress
USER32.dll
 0x14040b208 GetProcessWindowStation
 0x14040b210 GetUserObjectInformationW

EAT(Export Address Table) Library



Similarity measure (PE file only) - Checking for service failure