Report - LDvar.exe

Malicious Library VMProtect UPX PE File ftp PE32
ScreenShot
Created 2024.10.24 10:06 Machine s1_win7_x6401
Filename LDvar.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
4.4
ZERO API file : clean
VT API (file) 37 detected (AIDetectMalware, Malicious, score, Strictor, Unsafe, Save, confidence, Attribute, HighConfidence, high confidence, FlyStudio, RiskTool, Convagent, Real Protect, Generic ML PUA, Static AI, Malicious PE, Detected, ISVQ@5mbonp, Wacapew, Eldorado, Krypt, susgen, GenKryptik, DLII)
md5 2d7b09cd5f12fb6a3fc07e269a639051
sha256 ccc9f3d84c2251de94f54d03c62257b21ec7eeef29c16931fae4e06ef367c3fe
ssdeep 196608:uRUxISBSxiw0pACjs/V7Uu8qGZRErzqCBa/8bJ225iStHg3:uuhBZyVP8PZREr7azIFt2
imphash 2cbb343f31943476e7ffd3952e3d673c
impfuzzy 24:USWv3OhEz5qZfHEQ02ovQaQtXJHc9NDI5Q8:USWv3/zgWH2ovQnXpcM5Q8
  Network IP location

Signature (8cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info ftp_command ftp command binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
154.44.26.68 US COGENT-174 154.44.26.68 clean

Suricata ids

PE API

IAT(Import Address Table) Library

iphlpapi.dll
 0xfd4000 GetAdaptersInfo
WINMM.dll
 0xfd4008 waveOutUnprepareHeader
WS2_32.dll
 0xfd4010 inet_ntoa
MSVFW32.dll
 0xfd4018 DrawDibDraw
AVIFIL32.dll
 0xfd4020 AVIStreamInfoA
RASAPI32.dll
 0xfd4028 RasGetConnectStatusA
KERNEL32.dll
 0xfd4030 GetVersion
 0xfd4034 GetVersionExA
USER32.dll
 0xfd403c GetSysColorBrush
GDI32.dll
 0xfd4044 GetPolyFillMode
WINSPOOL.DRV
 0xfd404c ClosePrinter
comdlg32.dll
 0xfd4054 GetFileTitleA
ADVAPI32.dll
 0xfd405c RegCreateKeyExA
SHELL32.dll
 0xfd4064 ShellExecuteA
ole32.dll
 0xfd406c CLSIDFromProgID
OLEAUT32.dll
 0xfd4074 VariantClear
COMCTL32.dll
 0xfd407c ImageList_Destroy
WININET.dll
 0xfd4084 HttpQueryInfoA
WTSAPI32.dll
 0xfd408c WTSSendMessageW
KERNEL32.dll
 0xfd4094 VirtualQuery
USER32.dll
 0xfd409c GetUserObjectInformationW
KERNEL32.dll
 0xfd40a4 LocalAlloc
 0xfd40a8 LocalFree
 0xfd40ac GetModuleFileNameW
 0xfd40b0 GetProcessAffinityMask
 0xfd40b4 SetProcessAffinityMask
 0xfd40b8 SetThreadAffinityMask
 0xfd40bc Sleep
 0xfd40c0 ExitProcess
 0xfd40c4 FreeLibrary
 0xfd40c8 LoadLibraryA
 0xfd40cc GetModuleHandleA
 0xfd40d0 GetProcAddress
USER32.dll
 0xfd40d8 GetProcessWindowStation
 0xfd40dc GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure