Report - crypted.exe

Generic Malware Malicious Library UPX ScreenShot AntiDebug AntiVM PE File PE32 OS Processor Check
ScreenShot
Created 2024.11.11 09:42 Machine s1_win7_x6401
Filename crypted.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
7
Behavior Score
7.4
ZERO API
VT API (file) 43 detected (AIDetectMalware, Sodinokibi, Malicious, score, GenericKD, Unsafe, confidence, 100%, Attribute, HighConfidence, high confidence, GenKryptik, HDQC, Xpaj, Stelpak, CLOUD, Lumma, Static AI, Malicious PE, Detected, GrayWare, Wacapew, HeurC, KVMH008, Malware@#2468x9xuyh07c, Sabsik, ABTrojan, AVEH, R678257, Krypt, RansomGen)
md5 e1d09be68de1be491cdb2870bfc90854
sha256 6b2c384e64992914ec049762e153d4592c7dc2511b8cc079843c4d8195210c23
ssdeep 24576:W6hD7LpDPaCoflmQMOsaED7biogA/kItUbLA8ouzEgKl8QDj7:jTp7oLlx+7bc2kI+bLPEDl3Dj7
imphash edcf314155b6a0d1898757c320d085ee
impfuzzy 24:Pw+2WDoejtWOovbOGMUD1uBvgJWDpZWylnjBLPOXlEu9PJUsYjh:PwDQoKx361GhZxJjBbO1+sE
  Network IP location

Signature (14cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Code injection by writing an executable or DLL to the memory of another process
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Command line console output was observed
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (15cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x4e05b0 AddClipboardFormatListener
KERNEL32.dll
 0x4e05b8 CloseHandle
 0x4e05bc CompareStringW
 0x4e05c0 CreateEventW
 0x4e05c4 CreateFileW
 0x4e05c8 DecodePointer
 0x4e05cc DeleteCriticalSection
 0x4e05d0 EncodePointer
 0x4e05d4 EnterCriticalSection
 0x4e05d8 EnumSystemLocalesW
 0x4e05dc ExitProcess
 0x4e05e0 FindClose
 0x4e05e4 FindFirstFileExW
 0x4e05e8 FindNextFileW
 0x4e05ec FlushFileBuffers
 0x4e05f0 FreeEnvironmentStringsW
 0x4e05f4 FreeLibrary
 0x4e05f8 GetACP
 0x4e05fc GetCPInfo
 0x4e0600 GetCommandLineA
 0x4e0604 GetCommandLineW
 0x4e0608 GetConsoleMode
 0x4e060c GetConsoleOutputCP
 0x4e0610 GetCurrentProcess
 0x4e0614 GetCurrentProcessId
 0x4e0618 GetCurrentThreadId
 0x4e061c GetEnvironmentStringsW
 0x4e0620 GetFileSizeEx
 0x4e0624 GetFileType
 0x4e0628 GetLastError
 0x4e062c GetLocaleInfoW
 0x4e0630 GetModuleFileNameW
 0x4e0634 GetModuleHandleExW
 0x4e0638 GetModuleHandleW
 0x4e063c GetOEMCP
 0x4e0640 GetProcAddress
 0x4e0644 GetProcessHeap
 0x4e0648 GetStartupInfoW
 0x4e064c GetStdHandle
 0x4e0650 GetStringTypeW
 0x4e0654 GetSystemTimeAsFileTime
 0x4e0658 GetUserDefaultLCID
 0x4e065c HeapAlloc
 0x4e0660 HeapFree
 0x4e0664 HeapReAlloc
 0x4e0668 HeapSize
 0x4e066c InitializeCriticalSectionAndSpinCount
 0x4e0670 InitializeCriticalSectionEx
 0x4e0674 InitializeSListHead
 0x4e0678 IsDebuggerPresent
 0x4e067c IsProcessorFeaturePresent
 0x4e0680 IsValidCodePage
 0x4e0684 IsValidLocale
 0x4e0688 LCMapStringEx
 0x4e068c LCMapStringW
 0x4e0690 LeaveCriticalSection
 0x4e0694 LoadLibraryExW
 0x4e0698 MultiByteToWideChar
 0x4e069c QueryPerformanceCounter
 0x4e06a0 RaiseException
 0x4e06a4 ReadConsoleW
 0x4e06a8 ReadFile
 0x4e06ac ResetEvent
 0x4e06b0 RtlUnwind
 0x4e06b4 SetEndOfFile
 0x4e06b8 SetEnvironmentVariableW
 0x4e06bc SetEvent
 0x4e06c0 SetFilePointerEx
 0x4e06c4 SetLastError
 0x4e06c8 SetStdHandle
 0x4e06cc SetUnhandledExceptionFilter
 0x4e06d0 TerminateProcess
 0x4e06d4 TlsAlloc
 0x4e06d8 TlsFree
 0x4e06dc TlsGetValue
 0x4e06e0 TlsSetValue
 0x4e06e4 UnhandledExceptionFilter
 0x4e06e8 WaitForSingleObjectEx
 0x4e06ec WideCharToMultiByte
 0x4e06f0 WriteConsoleW
 0x4e06f4 WriteFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure