Report - esphvcionbronkz.exe

Malicious Library VMProtect PE File PE64
ScreenShot
Created 2024.10.21 17:14 Machine s1_win7_x6403
Filename esphvcionbronkz.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score Not founds Behavior Score
1.8
ZERO API file : malware
VT API (file) 21 detected (AIDetectMalware, Malicious, score, Unsafe, Save, confidence, Attribute, HighConfidence, high confidence, VMProtect, L suspicious, AGEN, Real Protect, VMProtBad, Static AI, Malicious PE, Detected, Puwaders)
md5 2852f7c19b7367e02b916508c9e8d215
sha256 074339868ce26a85a0d2166d9d6a37547736774b8b7d007c56620d15f25598c0
ssdeep 393216:6839UkRvK/S/gR3U+LhTCORr8VKwCiX6sf2t:6+YR3UgF8v52
imphash 03f8fdb61d1ee75e4c09d1f972e966b4
impfuzzy 24:/ILWJsyTDID1zz+4tMMwg6oOO5yWN7bPJRu5FnaQtXJHc9NDI5Q8:/oWJsyQp3T/RNHPJRAnXpcM5Q8
  Network IP location

Signature (4cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

crypt.dll
 0x1415ef000 BCryptFinishHash
d3dx11_43.dll
 0x1415ef010 D3DX11CreateShaderResourceViewFromMemory
d3d11.dll
 0x1415ef020 D3D11CreateDeviceAndSwapChain
D3DCOMPILER_43.dll
 0x1415ef030 D3DCompile
KERNEL32.dll
 0x1415ef040 GetProcAddress
USER32.dll
 0x1415ef050 ScreenToClient
ADVAPI32.dll
 0x1415ef060 OpenProcessToken
SHELL32.dll
 0x1415ef070 ShellExecuteA
MSVCP140.dll
 0x1415ef080 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
dwmapi.dll
 0x1415ef090 DwmExtendFrameIntoClientArea
WINHTTP.dll
 0x1415ef0a0 WinHttpOpen
CRYPT32.dll
 0x1415ef0b0 CertFreeCertificateChain
IMM32.dll
 0x1415ef0c0 ImmGetContext
Normaliz.dll
 0x1415ef0d0 IdnToAscii
WLDAP32.dll
 0x1415ef0e0 None
WS2_32.dll
 0x1415ef0f0 listen
RPCRT4.dll
 0x1415ef100 UuidToStringA
PSAPI.DLL
 0x1415ef110 GetModuleInformation
USERENV.dll
 0x1415ef120 UnloadUserProfile
VCRUNTIME140_1.dll
 0x1415ef130 __CxxFrameHandler4
VCRUNTIME140.dll
 0x1415ef140 __current_exception
api-ms-win-crt-runtime-l1-1-0.dll
 0x1415ef150 exit
api-ms-win-crt-stdio-l1-1-0.dll
 0x1415ef160 fclose
api-ms-win-crt-heap-l1-1-0.dll
 0x1415ef170 _set_new_mode
api-ms-win-crt-math-l1-1-0.dll
 0x1415ef180 atanf
api-ms-win-crt-string-l1-1-0.dll
 0x1415ef190 isupper
api-ms-win-crt-time-l1-1-0.dll
 0x1415ef1a0 _localtime64_s
api-ms-win-crt-convert-l1-1-0.dll
 0x1415ef1b0 strtod
api-ms-win-crt-utility-l1-1-0.dll
 0x1415ef1c0 rand
api-ms-win-crt-filesystem-l1-1-0.dll
 0x1415ef1d0 _fstat64
api-ms-win-crt-locale-l1-1-0.dll
 0x1415ef1e0 _configthreadlocale
WTSAPI32.dll
 0x1415ef1f0 WTSSendMessageW
KERNEL32.dll
 0x1415ef200 GetSystemTimeAsFileTime
USER32.dll
 0x1415ef210 GetUserObjectInformationW
KERNEL32.dll
 0x1415ef220 LocalAlloc
 0x1415ef228 LocalFree
 0x1415ef230 GetModuleFileNameW
 0x1415ef238 GetProcessAffinityMask
 0x1415ef240 SetProcessAffinityMask
 0x1415ef248 SetThreadAffinityMask
 0x1415ef250 Sleep
 0x1415ef258 ExitProcess
 0x1415ef260 FreeLibrary
 0x1415ef268 LoadLibraryA
 0x1415ef270 GetModuleHandleA
 0x1415ef278 GetProcAddress
USER32.dll
 0x1415ef288 GetProcessWindowStation
 0x1415ef290 GetUserObjectInformationW

EAT(Export Address Table) Library



Similarity measure (PE file only) - Checking for service failure