Report - norm.exe

Themida PE File PE32
ScreenShot
Created 2024.11.01 18:10 Machine s1_win7_x6401
Filename norm.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
9.6
ZERO API file : clean
VT API (file) 20 detected (AIDetectMalware, Malicious, score, Unsafe, confidence, Attribute, HighConfidence, high confidence, GenCBL, ccnc, high, Detected, Themida, STOP, Wacatac, BScope, Tiggre, susgen)
md5 7cfe878555b8cc04fc52385219b423d7
sha256 51c35cc8bfc37189048a0454992f30143289dcace11c5fc108db47e91f467bd0
ssdeep 49152:pd0WyZt1UbFSOHUM04jhsaDfZt6TJ5nD3hdkMgE+jCtWszgEBCs9IYFDl:aZt8FjUF4jhBZtmhjjf8gRPJ
imphash 9dfe5757453ac4b6ed82bf0cf7ab0266
impfuzzy 3:sUx2AEaoM9CROXKLbW7uRWEJz+LMLgJSMXRLNRiYxQ9XWq3C0:nE7zRgKLbGeOGMSY6n9fd
  Network IP location

Signature (19cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
watch Attempts to identify installed AV products by installation directory
watch Checks for the presence of known windows from debuggers and forensic tools
watch Checks the version of Bios
watch Communicates with host for which no DNS query was performed
watch Detects Virtual Machines through their custom firmware
watch Detects VirtualBox through the presence of a registry key
watch Detects VMWare through the in instruction feature
watch Installs itself for autorun at Windows startup
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Expresses interest in specific running processes
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (6cnts)

Level Name Description Collection
warning themida_packer themida packer binaries (download)
warning themida_packer themida packer binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.215.113.43 Unknown 185.215.113.43 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x49a12c GetModuleHandleA
ADVAPI32.dll
 0x49a134 RegCloseKey
SHELL32.dll
 0x49a13c SHGetFolderPathA
ole32.dll
 0x49a144 CoUninitialize
WININET.dll
 0x49a14c HttpOpenRequestA
WS2_32.dll
 0x49a154 closesocket

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure