Report - we.exe

PE File PE32
ScreenShot
Created 2024.11.11 10:08 Machine s1_win7_x6401
Filename we.exe
Type PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
5
Behavior Score
1.4
ZERO API
VT API (file) 57 detected (AIDetectMalware, Hacktool, Earthworm, Malicious, score, Artemis, GenericKD, Unsafe, grayware, confidence, high confidence, NetHacker, Tool, NetTool, SocksSevice, icjkwq, Presenoker, YzY0OiS9Hx9Suwxm, tivyv, Generic Reputation PUA, Detected, Earthlusca, Patcher, Malware@#3nay66mlwbcz5, Ymacco, Eldorado, R303865, GenericRXAA, CVE-2020-0601, BScope, GdSda, Gencirc, susgen, Proxytool)
md5 d7c40c24060c5d6f38e8dc41e7490778
sha256 a76eaabc4e8ba5d6b3747825a9fbc286d44d3981ac521119902d64ae2fdcc4b7
ssdeep 768:mp+68GRK6/p+Iv26bC3NuCThUkGMi9kxiYhnRbsL:1KKYpLVbC9uCCJehn6
imphash 14bf2a0b2c46c28de7035254c941b6ea
impfuzzy 24:tkfCllDIcVKuX5QFJlDopqLJZufVnu5YRw:CfCEcVBXqFJlD6qKtnu/
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 57 AntiVirus engines on VirusTotal as malicious
info Command line console output was observed

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40f13c CreateThread
 0x40f140 DeleteCriticalSection
 0x40f144 EnterCriticalSection
 0x40f148 ExitProcess
 0x40f14c GetLastError
 0x40f150 GetModuleHandleA
 0x40f154 GetProcAddress
 0x40f158 InitializeCriticalSection
 0x40f15c LeaveCriticalSection
 0x40f160 SetUnhandledExceptionFilter
 0x40f164 Sleep
 0x40f168 TlsGetValue
 0x40f16c VirtualProtect
 0x40f170 VirtualQuery
msvcrt.dll
 0x40f178 __getmainargs
 0x40f17c __p__environ
 0x40f180 __p__fmode
 0x40f184 __set_app_type
 0x40f188 _cexit
 0x40f18c _iob
 0x40f190 _onexit
 0x40f194 _setmode
 0x40f198 abort
 0x40f19c atexit
 0x40f1a0 atoi
 0x40f1a4 calloc
 0x40f1a8 fprintf
 0x40f1ac free
 0x40f1b0 fwrite
 0x40f1b4 getenv
 0x40f1b8 malloc
 0x40f1bc memcpy
 0x40f1c0 memset
 0x40f1c4 perror
 0x40f1c8 printf
 0x40f1cc putchar
 0x40f1d0 puts
 0x40f1d4 signal
 0x40f1d8 strcmp
 0x40f1dc strcpy
 0x40f1e0 strncpy
 0x40f1e4 vfprintf
WSOCK32.DLL
 0x40f1ec WSAStartup
 0x40f1f0 __WSAFDIsSet
 0x40f1f4 accept
 0x40f1f8 ind
 0x40f1fc closesocket
 0x40f200 connect
 0x40f204 gethostbyname
 0x40f208 htons
 0x40f20c inet_ntoa
 0x40f210 listen
 0x40f214 recv
 0x40f218 select
 0x40f21c send
 0x40f220 socket

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure