Report - random.exe

Generic Malware Malicious Library Malicious Packer UPX PE File PE32
ScreenShot
Created 2025.01.02 10:45 Machine s1_win7_x6403
Filename random.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
1.6
ZERO API
VT API (file) 53 detected (Common, Stealc, Malicious, score, Trojanpws, Coins, GenericKD, Unsafe, Vwhh, confidence, 100%, Genus, Attribute, HighConfidence, high confidence, Kryptik, HYFM, PWSX, Stealerc, TrojanPSW, IZjq09GRa0D, svtos, Static AI, Suspicious PE, Detected, Malware@#23hef2iw1rn4s, Fragtor, ABTrojan, GLBR, Artemis, Gencirc, susgen)
md5 2893a3033daf4b014031297ff29d157d
sha256 c41b3aeb361912b6e938ace351253dbd79d39ec3a8a8cfabf7e3b498ea1aac39
ssdeep 24576:xjYAY3dLBTYhZtsh9M9Z/MnXfCQNfV6HeyhrIuU/zxvuo3A8azMy8R:xYDNTYhZtW9QZUnXqitAEva8azw
imphash 7babef036a7882c8634af1cfc2da68d8
impfuzzy 96:rYQtt6EyAqnxRbWxpcXHgTubxtfPORup4I9yXiX1SNJGCG7qtj8:rztt6EyAIwSSHWySFHCGmtj8
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 53 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ntdll.dll
 0x5374a0 NtGetContextThread
 0x5374a4 NtOpenThread
 0x5374a8 NtSetContextThread
advapi32.dll
 0x5374b0 GetTokenInformation
 0x5374b4 OpenProcessToken
 0x5374b8 SystemFunction036
crypt.dll
 0x5374c0 BCryptGenRandom
kernel32.dll
 0x5374c8 AddVectoredExceptionHandler
 0x5374cc CancelIo
 0x5374d0 CloseHandle
 0x5374d4 CompareStringOrdinal
 0x5374d8 CopyFileExW
 0x5374dc CreateDirectoryW
 0x5374e0 CreateEventW
 0x5374e4 CreateFileMappingA
 0x5374e8 CreateFileW
 0x5374ec CreateHardLinkW
 0x5374f0 CreateMutexA
 0x5374f4 CreateNamedPipeW
 0x5374f8 CreateProcessW
 0x5374fc CreateSymbolicLinkW
 0x537500 CreateThread
 0x537504 CreateTimerQueue
 0x537508 CreateToolhelp32Snapshot
 0x53750c CreateWaitableTimerExW
 0x537510 DebugActiveProcess
 0x537514 DeleteFileW
 0x537518 DeleteProcThreadAttributeList
 0x53751c DeleteTimerQueue
 0x537520 DeviceIoControl
 0x537524 DuplicateHandle
 0x537528 ExitProcess
 0x53752c FindClose
 0x537530 FindFirstFileW
 0x537534 FindNextFileW
 0x537538 FlushFileBuffers
 0x53753c FormatMessageW
 0x537540 FreeEnvironmentStringsW
 0x537544 GetCommandLineW
 0x537548 GetConsoleMode
 0x53754c GetCurrentDirectoryW
 0x537550 GetCurrentProcess
 0x537554 GetCurrentProcessId
 0x537558 GetCurrentThread
 0x53755c GetEnvironmentStringsW
 0x537560 GetEnvironmentVariableW
 0x537564 GetExitCodeProcess
 0x537568 GetFileAttributesW
 0x53756c GetFileInformationByHandle
 0x537570 GetFileInformationByHandleEx
 0x537574 GetFileType
 0x537578 GetFinalPathNameByHandleW
 0x53757c GetFullPathNameW
 0x537580 GetLastError
 0x537584 GetModuleFileNameW
 0x537588 GetModuleHandleA
 0x53758c GetModuleHandleExW
 0x537590 GetModuleHandleW
 0x537594 GetOverlappedResult
 0x537598 GetProcAddress
 0x53759c GetProcessHeap
 0x5375a0 GetProcessId
 0x5375a4 GetStartupInfoA
 0x5375a8 GetStdHandle
 0x5375ac GetSystemDirectoryW
 0x5375b0 GetSystemInfo
 0x5375b4 GetSystemTimePreciseAsFileTime
 0x5375b8 GetTempPathW
 0x5375bc GetWindowsDirectoryW
 0x5375c0 HeapAlloc
 0x5375c4 HeapFree
 0x5375c8 HeapReAlloc
 0x5375cc InitOnceBeginInitialize
 0x5375d0 InitOnceComplete
 0x5375d4 InitializeProcThreadAttributeList
 0x5375d8 LoadLibraryA
 0x5375dc MapViewOfFile
 0x5375e0 Module32FirstW
 0x5375e4 Module32NextW
 0x5375e8 MoveFileExW
 0x5375ec MultiByteToWideChar
 0x5375f0 Process32FirstW
 0x5375f4 Process32NextW
 0x5375f8 QueryPerformanceCounter
 0x5375fc QueryPerformanceFrequency
 0x537600 ReadConsoleW
 0x537604 ReadFile
 0x537608 ReadFileEx
 0x53760c ReleaseMutex
 0x537610 RemoveDirectoryW
 0x537614 RtlCaptureContext
 0x537618 SetCurrentDirectoryW
 0x53761c SetEnvironmentVariableW
 0x537620 SetEvent
 0x537624 SetFileAttributesW
 0x537628 SetFileInformationByHandle
 0x53762c SetFilePointerEx
 0x537630 SetFileTime
 0x537634 SetHandleInformation
 0x537638 SetLastError
 0x53763c SetThreadStackGuarantee
 0x537640 SetUnhandledExceptionFilter
 0x537644 SetWaitableTimer
 0x537648 Sleep
 0x53764c SleepEx
 0x537650 SwitchToThread
 0x537654 TerminateProcess
 0x537658 TlsAlloc
 0x53765c TlsFree
 0x537660 TlsGetValue
 0x537664 TlsSetValue
 0x537668 UnmapViewOfFile
 0x53766c UpdateProcThreadAttribute
 0x537670 VirtualAlloc
 0x537674 VirtualProtect
 0x537678 WaitForMultipleObjects
 0x53767c WaitForSingleObject
 0x537680 WaitForSingleObjectEx
 0x537684 WideCharToMultiByte
 0x537688 WriteConsoleW
 0x53768c WriteFileEx
 0x537690 lstrlenW
ntdll.dll
 0x537698 NtClose
 0x53769c NtCreateFile
 0x5376a0 NtQueryInformationProcess
 0x5376a4 NtQuerySystemInformation
 0x5376a8 NtReadFile
 0x5376ac NtWriteFile
 0x5376b0 RtlNtStatusToDosError
userenv.dll
 0x5376b8 GetUserProfileDirectoryW
ws2_32.dll
 0x5376c0 WSACleanup
 0x5376c4 WSADuplicateSocketW
 0x5376c8 WSAGetLastError
 0x5376cc WSARecv
 0x5376d0 WSASend
 0x5376d4 WSASocketW
 0x5376d8 WSAStartup
 0x5376dc accept
 0x5376e0 ind
 0x5376e4 closesocket
 0x5376e8 connect
 0x5376ec freeaddrinfo
 0x5376f0 getaddrinfo
 0x5376f4 getpeername
 0x5376f8 getsockname
 0x5376fc getsockopt
 0x537700 ioctlsocket
 0x537704 listen
 0x537708 recv
 0x53770c recvfrom
 0x537710 select
 0x537714 send
 0x537718 sendto
 0x53771c setsockopt
 0x537720 shutdown
api-ms-win-core-synch-l1-2-0.dll
 0x537728 WaitOnAddress
 0x53772c WakeByAddressAll
 0x537730 WakeByAddressSingle
cryptprimitives.dll
 0x537738 ProcessPrng
KERNEL32.dll
 0x537740 CreateEventA
 0x537744 CreateSemaphoreA
 0x537748 DeleteCriticalSection
 0x53774c EnterCriticalSection
 0x537750 GetCurrentThreadId
 0x537754 GetHandleInformation
 0x537758 GetProcessAffinityMask
 0x53775c GetSystemTimeAsFileTime
 0x537760 GetThreadContext
 0x537764 GetThreadPriority
 0x537768 GetTickCount
 0x53776c InitializeCriticalSection
 0x537770 IsDebuggerPresent
 0x537774 LeaveCriticalSection
 0x537778 OpenProcess
 0x53777c OutputDebugStringA
 0x537780 RaiseException
 0x537784 ReleaseSemaphore
 0x537788 RemoveVectoredExceptionHandler
 0x53778c ResetEvent
 0x537790 ResumeThread
 0x537794 SetProcessAffinityMask
 0x537798 SetThreadContext
 0x53779c SetThreadPriority
 0x5377a0 SuspendThread
 0x5377a4 TryEnterCriticalSection
 0x5377a8 VirtualQuery
msvcrt.dll
 0x5377b0 __getmainargs
 0x5377b4 __initenv
 0x5377b8 __p__acmdln
 0x5377bc __p__commode
 0x5377c0 __p__fmode
 0x5377c4 __set_app_type
 0x5377c8 __setusermatherr
 0x5377cc _amsg_exit
 0x5377d0 _beginthreadex
 0x5377d4 _cexit
 0x5377d8 _commode
 0x5377dc _endthreadex
 0x5377e0 _errno
 0x5377e4 _fmode
 0x5377e8 _fpreset
 0x5377ec _initterm
 0x5377f0 _iob
 0x5377f4 _onexit
 0x5377f8 _setjmp3
 0x5377fc _strdup
 0x537800 _ultoa
 0x537804 abort
 0x537808 calloc
 0x53780c exit
 0x537810 fprintf
 0x537814 free
 0x537818 fwrite
 0x53781c longjmp
 0x537820 malloc
 0x537824 memcmp
 0x537828 memcpy
 0x53782c memmove
 0x537830 memset
 0x537834 printf
 0x537838 realloc
 0x53783c signal
 0x537840 strlen
 0x537844 strncmp
 0x537848 vfprintf

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure