Report - NewApp.exe

UPX PE File PE64
ScreenShot
Created 2024.12.31 13:31 Machine s1_win7_x6403
Filename NewApp.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score Not founds Behavior Score
2.4
ZERO API
VT API (file) 40 detected (AIDetectMalware, Malicious, score, Artemis, GenericKD, Unsafe, Vumi, confidence, Attribute, HighConfidence, high confidence, a variant of Generik, FOJBYDI, TrojanX, xbuzse, Reflo, 4KEnqrPNWbT, Nekark, isecy, Siggen30, Static AI, Suspicious PE, Detected, Caynamer, ABRisk, YMWR, susgen, PossibleThreat)
md5 5d1255087c4512f2121410a008218430
sha256 c9d6ebdff127c1486e402b5f4fbcdc5fac953cdd390890a5066464261b1eef34
ssdeep 98304:9Lpx43K6PrRnUzI/8/hwuXkbJs274MMckVCd4PhtjJNKML2pq6AzuFuuwy:97uK6PtSjJRyeVm4Phtj7xLyWW
imphash 866dd80efc8771cadfdcea834977b0bb
impfuzzy 24:FMGf5XGf6ZgJkoDqnvZJfQfjBcVma20DW:FzJGfwgkoqnLfQfNcVh+
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
rentry.org FR OVH SAS 164.132.58.105
xmr-eu1.nanopool.org NL Online S.a.s. 51.15.58.224
pastebin.com US CLOUDFLARENET 104.20.3.235

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x1405ad000 __C_specific_handler
 0x1405ad008 __getmainargs
 0x1405ad010 __initenv
 0x1405ad018 __iob_func
 0x1405ad020 __set_app_type
 0x1405ad028 __setusermatherr
 0x1405ad030 _amsg_exit
 0x1405ad038 _cexit
 0x1405ad040 _commode
 0x1405ad048 _fmode
 0x1405ad050 _initterm
 0x1405ad058 _onexit
 0x1405ad060 _wcsicmp
 0x1405ad068 _wcsnicmp
 0x1405ad070 abort
 0x1405ad078 calloc
 0x1405ad080 exit
 0x1405ad088 fprintf
 0x1405ad090 free
 0x1405ad098 fwrite
 0x1405ad0a0 malloc
 0x1405ad0a8 memcpy
 0x1405ad0b0 memset
 0x1405ad0b8 signal
 0x1405ad0c0 strcat
 0x1405ad0c8 strcpy
 0x1405ad0d0 strlen
 0x1405ad0d8 strncmp
 0x1405ad0e0 strstr
 0x1405ad0e8 vfprintf
 0x1405ad0f0 wcscat
 0x1405ad0f8 wcscpy
 0x1405ad100 wcslen
 0x1405ad108 wcsncmp
 0x1405ad110 wcsstr
KERNEL32.dll
 0x1405ad120 DeleteCriticalSection
 0x1405ad128 EnterCriticalSection
 0x1405ad130 GetLastError
 0x1405ad138 InitializeCriticalSection
 0x1405ad140 LeaveCriticalSection
 0x1405ad148 SetUnhandledExceptionFilter
 0x1405ad150 Sleep
 0x1405ad158 TlsGetValue
 0x1405ad160 VirtualProtect
 0x1405ad168 VirtualQuery
KERNEL32.dll
 0x1405ad178 HeapAlloc
 0x1405ad180 HeapFree
 0x1405ad188 ExitProcess
 0x1405ad190 GetModuleHandleA
 0x1405ad198 LoadLibraryA
 0x1405ad1a0 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure