Report - espsemhvci.exe

Malicious Library VMProtect PE File PE64
ScreenShot
Created 2024.10.26 17:39 Machine s1_win7_x6403
Filename espsemhvci.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score Not founds Behavior Score
2.0
ZERO API file : clean
VT API (file) 38 detected (AIDetectMalware, VMProtect, Malicious, score, Unsafe, GenericKD, Save, confidence, Attribute, HighConfidence, high confidence, L suspicious, MalwareX, Real Protect, VMProtBad, Static AI, Suspicious PE, Detected, Wacapew, GNGF58, Artemis)
md5 63e75bcd85dc3b33ab22eccb2aaa41fb
sha256 e16756104c0865ae99de300b332169d2b8665c0cb381dc5316e8286b10d7a8cf
ssdeep 393216:HKL7n4U5LaaTw2fre7Iaw67KVRXYjJGfIfCz:HKPN5L22frqIaw6KRXYdGea
imphash 59d8d7a346844d574a8af1d5364ae167
impfuzzy 24:/ILWJsyTDID1zz+4tMM0eg6oOO5yWN7bPJRu5FnaQtXJHc9NDI5Q8:/oWJsyQp3TGRNHPJRAnXpcM5Q8
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

crypt.dll
 0x141438000 BCryptFinishHash
d3dx11_43.dll
 0x141438010 D3DX11CreateShaderResourceViewFromMemory
d3d11.dll
 0x141438020 D3D11CreateDeviceAndSwapChain
D3DCOMPILER_43.dll
 0x141438030 D3DCompile
KERNEL32.dll
 0x141438040 GetProcAddress
USER32.dll
 0x141438050 ScreenToClient
ADVAPI32.dll
 0x141438060 OpenProcessToken
SHELL32.dll
 0x141438070 ShellExecuteA
MSVCP140.dll
 0x141438080 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
dwmapi.dll
 0x141438090 DwmExtendFrameIntoClientArea
WINHTTP.dll
 0x1414380a0 WinHttpOpen
CRYPT32.dll
 0x1414380b0 CertFreeCertificateChain
IMM32.dll
 0x1414380c0 ImmReleaseContext
Normaliz.dll
 0x1414380d0 IdnToAscii
WLDAP32.dll
 0x1414380e0 None
WS2_32.dll
 0x1414380f0 listen
RPCRT4.dll
 0x141438100 UuidToStringA
PSAPI.DLL
 0x141438110 GetModuleInformation
USERENV.dll
 0x141438120 UnloadUserProfile
VCRUNTIME140_1.dll
 0x141438130 __CxxFrameHandler4
VCRUNTIME140.dll
 0x141438140 __current_exception
api-ms-win-crt-runtime-l1-1-0.dll
 0x141438150 exit
api-ms-win-crt-stdio-l1-1-0.dll
 0x141438160 fclose
api-ms-win-crt-heap-l1-1-0.dll
 0x141438170 _set_new_mode
api-ms-win-crt-math-l1-1-0.dll
 0x141438180 atanf
api-ms-win-crt-string-l1-1-0.dll
 0x141438190 isupper
api-ms-win-crt-time-l1-1-0.dll
 0x1414381a0 _localtime64_s
api-ms-win-crt-convert-l1-1-0.dll
 0x1414381b0 strtod
api-ms-win-crt-utility-l1-1-0.dll
 0x1414381c0 rand
api-ms-win-crt-filesystem-l1-1-0.dll
 0x1414381d0 _fstat64
api-ms-win-crt-locale-l1-1-0.dll
 0x1414381e0 _configthreadlocale
WTSAPI32.dll
 0x1414381f0 WTSSendMessageW
KERNEL32.dll
 0x141438200 GetSystemTimeAsFileTime
USER32.dll
 0x141438210 GetUserObjectInformationW
KERNEL32.dll
 0x141438220 LocalAlloc
 0x141438228 LocalFree
 0x141438230 GetModuleFileNameW
 0x141438238 GetProcessAffinityMask
 0x141438240 SetProcessAffinityMask
 0x141438248 SetThreadAffinityMask
 0x141438250 Sleep
 0x141438258 ExitProcess
 0x141438260 FreeLibrary
 0x141438268 LoadLibraryA
 0x141438270 GetModuleHandleA
 0x141438278 GetProcAddress
USER32.dll
 0x141438288 GetProcessWindowStation
 0x141438290 GetUserObjectInformationW

EAT(Export Address Table) Library



Similarity measure (PE file only) - Checking for service failure