Report - mysq1.exe

Malicious Library Malicious Packer UPX PE File PE64
ScreenShot
Created 2024.10.22 09:58 Machine s1_win7_x6403
Filename mysq1.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
2
Behavior Score
1.4
ZERO API file : clean
VT API (file) 11 detected (AIDetectMalware, Server, Proxy, Lotok, Detected, MALICIOUS, Outbreak, PossibleThreat, ProxyTool)
md5 fa2efb3b704384a5fe40b382738657c1
sha256 2457a3241ec13c77b4132d6c5923e63b51a4d05a96dc0ae249c92a43ed9c7c04
ssdeep 49152:xwQXmaTqC3awgEdhUTQvHr4uuGxM/QBzv3MF9:7PFBHcuujQBzv8b
imphash 4f2f006e2ecf7172ad368f8289dc96c1
impfuzzy 24:ibVjh9wO+VuT7boVaXOr6kwmDgUPMztxdEr6tP:AwO+VUjXOmokx0oP
  Network IP location

Signature (4cnts)

Level Description
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x5df1c0 WriteFile
 0x5df1c8 WriteConsoleW
 0x5df1d0 WerSetFlags
 0x5df1d8 WerGetFlags
 0x5df1e0 WaitForMultipleObjects
 0x5df1e8 WaitForSingleObject
 0x5df1f0 VirtualQuery
 0x5df1f8 VirtualFree
 0x5df200 VirtualAlloc
 0x5df208 TlsAlloc
 0x5df210 SwitchToThread
 0x5df218 SuspendThread
 0x5df220 SetWaitableTimer
 0x5df228 SetUnhandledExceptionFilter
 0x5df230 SetProcessPriorityBoost
 0x5df238 SetEvent
 0x5df240 SetErrorMode
 0x5df248 SetConsoleCtrlHandler
 0x5df250 ResumeThread
 0x5df258 RaiseFailFastException
 0x5df260 PostQueuedCompletionStatus
 0x5df268 LoadLibraryW
 0x5df270 LoadLibraryExW
 0x5df278 SetThreadContext
 0x5df280 GetThreadContext
 0x5df288 GetSystemInfo
 0x5df290 GetSystemDirectoryA
 0x5df298 GetStdHandle
 0x5df2a0 GetQueuedCompletionStatusEx
 0x5df2a8 GetProcessAffinityMask
 0x5df2b0 GetProcAddress
 0x5df2b8 GetErrorMode
 0x5df2c0 GetEnvironmentStringsW
 0x5df2c8 GetCurrentThreadId
 0x5df2d0 GetConsoleMode
 0x5df2d8 FreeEnvironmentStringsW
 0x5df2e0 ExitProcess
 0x5df2e8 DuplicateHandle
 0x5df2f0 CreateWaitableTimerExW
 0x5df2f8 CreateThread
 0x5df300 CreateIoCompletionPort
 0x5df308 CreateFileA
 0x5df310 CreateEventA
 0x5df318 CloseHandle
 0x5df320 AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure