Report - interactivePS-ruy-lopez.exe

Generic Malware Malicious Library Malicious Packer UPX AntiDebug AntiVM PE File PE64 OS Processor Check
ScreenShot
Created 2024.10.27 11:48 Machine s1_win7_x6403
Filename interactivePS-ruy-lopez.exe
Type PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
AI Score
3
Behavior Score
3.0
ZERO API
VT API (file) 42 detected (AIDetectMalware, Dacic, Malicious, score, Vq2c, confidence, Attribute, HighConfidence, moderate confidence, MalwareX, Kryptik, hzKgty1bItV, AGEN, Generic Reputation PUA, Static AI, Suspicious PE, Detected, Wacapew, ABTrojan, AVEP, CobaltStrike, Artemis, Outbreak, Chgt, R002H09JQ24, Dwnw)
md5 e68e0c467ecfbb9f0c6e5c8359f81b09
sha256 ec6c410d323de0552b1cda52bbbbecdb504985994291a387b06525afa26807be
ssdeep 6144:xHuGnkJ7WtBOxxaNIfm8vlnPJJJ655ZZo:gGnmhxaNIfm8v
imphash e16254f44ddd98c690f5ad4d0a981e4a
impfuzzy 24:8fiFlDq+kLEfBlMblR95XG6qKZ86d1TomvlxXUqCvZy:8fiG+k4zslTJG6qA86d1T1vcqC4
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 42 AntiVirus engines on VirusTotal as malicious
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory

Rules (15cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14004e24c DeleteCriticalSection
 0x14004e254 EnterCriticalSection
 0x14004e25c FreeLibrary
 0x14004e264 GetLastError
 0x14004e26c GetModuleHandleA
 0x14004e274 GetProcAddress
 0x14004e27c GetStartupInfoA
 0x14004e284 InitializeCriticalSection
 0x14004e28c IsDBCSLeadByteEx
 0x14004e294 LeaveCriticalSection
 0x14004e29c LoadLibraryA
 0x14004e2a4 MultiByteToWideChar
 0x14004e2ac SetUnhandledExceptionFilter
 0x14004e2b4 Sleep
 0x14004e2bc TlsGetValue
 0x14004e2c4 VirtualAlloc
 0x14004e2cc VirtualFree
 0x14004e2d4 VirtualProtect
 0x14004e2dc VirtualQuery
 0x14004e2e4 WideCharToMultiByte
msvcrt.dll
 0x14004e2f4 __C_specific_handler
 0x14004e2fc ___lc_codepage_func
 0x14004e304 ___mb_cur_max_func
 0x14004e30c __getmainargs
 0x14004e314 __initenv
 0x14004e31c __iob_func
 0x14004e324 __lconv_init
 0x14004e32c __set_app_type
 0x14004e334 __setusermatherr
 0x14004e33c _acmdln
 0x14004e344 _amsg_exit
 0x14004e34c _cexit
 0x14004e354 _commode
 0x14004e35c _errno
 0x14004e364 _fileno
 0x14004e36c _fmode
 0x14004e374 _initterm
 0x14004e37c _lock
 0x14004e384 _onexit
 0x14004e38c _setjmp
 0x14004e394 _setmode
 0x14004e39c _unlock
 0x14004e3a4 abort
 0x14004e3ac calloc
 0x14004e3b4 exit
 0x14004e3bc fflush
 0x14004e3c4 fprintf
 0x14004e3cc fputc
 0x14004e3d4 free
 0x14004e3dc fwrite
 0x14004e3e4 localeconv
 0x14004e3ec longjmp
 0x14004e3f4 malloc
 0x14004e3fc memchr
 0x14004e404 memcpy
 0x14004e40c memset
 0x14004e414 signal
 0x14004e41c strcmp
 0x14004e424 strerror
 0x14004e42c strlen
 0x14004e434 strncmp
 0x14004e43c strstr
 0x14004e444 vfprintf
 0x14004e44c wcslen

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure