ScreenShot
Created | 2024.10.26 17:28 | Machine | s1_win7_x6403 |
Filename | esphvci.exe | ||
Type | PE32+ executable (console) x86-64, for MS Windows | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 45 detected (AIDetectMalware, Malicious, score, GenericKD, Unsafe, Save, confidence, Attribute, HighConfidence, high confidence, VMProtect, L suspicious, MalwareX, AGEN, Real Protect, VMProtBad, Static AI, Malicious PE, Detected, GrayWare, Wacapew, 4C2MD7, R673869) | ||
md5 | d4c7b1c538c273dc77600e2fa3c6534f | ||
sha256 | 87982ce3693e5df58c7c38982a517764a6aeddc6f94dc7d49bd8313f8c017c6c | ||
ssdeep | 393216:/MpmOuO8V8jZqoLgT1rJD2i6kTAhNNW4O09:/qf98VeZPgT18i6AqWN0 | ||
imphash | 03f8fdb61d1ee75e4c09d1f972e966b4 | ||
impfuzzy | 24:/ILWJsyTDID1zz+4tMMwg6oOO5yWN7bPJRu5FnaQtXJHc9NDI5Q8:/oWJsyQp3T/RNHPJRAnXpcM5Q8 |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
danger | File has been identified by 45 AntiVirus engines on VirusTotal as malicious |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is likely packed with VMProtect |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | VMProtect_Zero | VMProtect packed file | binaries (upload) |
info | IsPE64 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
crypt.dll
0x140db4000 BCryptFinishHash
d3dx11_43.dll
0x140db4010 D3DX11CreateShaderResourceViewFromMemory
d3d11.dll
0x140db4020 D3D11CreateDeviceAndSwapChain
D3DCOMPILER_43.dll
0x140db4030 D3DCompile
KERNEL32.dll
0x140db4040 GetProcAddress
USER32.dll
0x140db4050 ScreenToClient
ADVAPI32.dll
0x140db4060 OpenProcessToken
SHELL32.dll
0x140db4070 ShellExecuteA
MSVCP140.dll
0x140db4080 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
dwmapi.dll
0x140db4090 DwmExtendFrameIntoClientArea
WINHTTP.dll
0x140db40a0 WinHttpOpen
CRYPT32.dll
0x140db40b0 CertFreeCertificateChain
IMM32.dll
0x140db40c0 ImmGetContext
Normaliz.dll
0x140db40d0 IdnToAscii
WLDAP32.dll
0x140db40e0 None
WS2_32.dll
0x140db40f0 listen
RPCRT4.dll
0x140db4100 UuidToStringA
PSAPI.DLL
0x140db4110 GetModuleInformation
USERENV.dll
0x140db4120 UnloadUserProfile
VCRUNTIME140_1.dll
0x140db4130 __CxxFrameHandler4
VCRUNTIME140.dll
0x140db4140 __current_exception
api-ms-win-crt-runtime-l1-1-0.dll
0x140db4150 exit
api-ms-win-crt-stdio-l1-1-0.dll
0x140db4160 fclose
api-ms-win-crt-heap-l1-1-0.dll
0x140db4170 _set_new_mode
api-ms-win-crt-math-l1-1-0.dll
0x140db4180 atanf
api-ms-win-crt-string-l1-1-0.dll
0x140db4190 isupper
api-ms-win-crt-time-l1-1-0.dll
0x140db41a0 _localtime64_s
api-ms-win-crt-convert-l1-1-0.dll
0x140db41b0 strtod
api-ms-win-crt-utility-l1-1-0.dll
0x140db41c0 rand
api-ms-win-crt-filesystem-l1-1-0.dll
0x140db41d0 _fstat64
api-ms-win-crt-locale-l1-1-0.dll
0x140db41e0 _configthreadlocale
WTSAPI32.dll
0x140db41f0 WTSSendMessageW
KERNEL32.dll
0x140db4200 GetSystemTimeAsFileTime
USER32.dll
0x140db4210 GetUserObjectInformationW
KERNEL32.dll
0x140db4220 LocalAlloc
0x140db4228 LocalFree
0x140db4230 GetModuleFileNameW
0x140db4238 GetProcessAffinityMask
0x140db4240 SetProcessAffinityMask
0x140db4248 SetThreadAffinityMask
0x140db4250 Sleep
0x140db4258 ExitProcess
0x140db4260 FreeLibrary
0x140db4268 LoadLibraryA
0x140db4270 GetModuleHandleA
0x140db4278 GetProcAddress
USER32.dll
0x140db4288 GetProcessWindowStation
0x140db4290 GetUserObjectInformationW
EAT(Export Address Table) Library
crypt.dll
0x140db4000 BCryptFinishHash
d3dx11_43.dll
0x140db4010 D3DX11CreateShaderResourceViewFromMemory
d3d11.dll
0x140db4020 D3D11CreateDeviceAndSwapChain
D3DCOMPILER_43.dll
0x140db4030 D3DCompile
KERNEL32.dll
0x140db4040 GetProcAddress
USER32.dll
0x140db4050 ScreenToClient
ADVAPI32.dll
0x140db4060 OpenProcessToken
SHELL32.dll
0x140db4070 ShellExecuteA
MSVCP140.dll
0x140db4080 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
dwmapi.dll
0x140db4090 DwmExtendFrameIntoClientArea
WINHTTP.dll
0x140db40a0 WinHttpOpen
CRYPT32.dll
0x140db40b0 CertFreeCertificateChain
IMM32.dll
0x140db40c0 ImmGetContext
Normaliz.dll
0x140db40d0 IdnToAscii
WLDAP32.dll
0x140db40e0 None
WS2_32.dll
0x140db40f0 listen
RPCRT4.dll
0x140db4100 UuidToStringA
PSAPI.DLL
0x140db4110 GetModuleInformation
USERENV.dll
0x140db4120 UnloadUserProfile
VCRUNTIME140_1.dll
0x140db4130 __CxxFrameHandler4
VCRUNTIME140.dll
0x140db4140 __current_exception
api-ms-win-crt-runtime-l1-1-0.dll
0x140db4150 exit
api-ms-win-crt-stdio-l1-1-0.dll
0x140db4160 fclose
api-ms-win-crt-heap-l1-1-0.dll
0x140db4170 _set_new_mode
api-ms-win-crt-math-l1-1-0.dll
0x140db4180 atanf
api-ms-win-crt-string-l1-1-0.dll
0x140db4190 isupper
api-ms-win-crt-time-l1-1-0.dll
0x140db41a0 _localtime64_s
api-ms-win-crt-convert-l1-1-0.dll
0x140db41b0 strtod
api-ms-win-crt-utility-l1-1-0.dll
0x140db41c0 rand
api-ms-win-crt-filesystem-l1-1-0.dll
0x140db41d0 _fstat64
api-ms-win-crt-locale-l1-1-0.dll
0x140db41e0 _configthreadlocale
WTSAPI32.dll
0x140db41f0 WTSSendMessageW
KERNEL32.dll
0x140db4200 GetSystemTimeAsFileTime
USER32.dll
0x140db4210 GetUserObjectInformationW
KERNEL32.dll
0x140db4220 LocalAlloc
0x140db4228 LocalFree
0x140db4230 GetModuleFileNameW
0x140db4238 GetProcessAffinityMask
0x140db4240 SetProcessAffinityMask
0x140db4248 SetThreadAffinityMask
0x140db4250 Sleep
0x140db4258 ExitProcess
0x140db4260 FreeLibrary
0x140db4268 LoadLibraryA
0x140db4270 GetModuleHandleA
0x140db4278 GetProcAddress
USER32.dll
0x140db4288 GetProcessWindowStation
0x140db4290 GetUserObjectInformationW
EAT(Export Address Table) Library