Report - gem2.exe

Generic Malware PE File PE64
ScreenShot
Created 2025.01.12 15:14 Machine s1_win7_x6403
Filename gem2.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
9
Behavior Score
1.8
ZERO API
VT API (file) 56 detected (AIDetectMalware, Reflo, Malicious, score, CoinMiner, S31892093, Kryptik, Unsafe, Mint, Zard, V55t, confidence, Windows, Threat, Zusy, BankBot, kuspky, puXfYWFTsfG, AGEN, Krypt, Static AI, Suspicious PE, Detected, GenKryptik, Malware@#2aikcmy8k7e64, Eldorado, FWEM, OScope, Miner, GdSda, susgen, GQCB)
md5 990a3f3b1273510f210fb9b541da219f
sha256 35a8d03f86ae6f92424d6424fe0805d338eccedff177b400182102685299022c
ssdeep 49152:lYul8CapE2jLY0vFhbkQbIptv1xZ4ayOIYDIGC3FYKjPgz+WWrS2sWioLyVQGMNx:lYLCGYYbkQbytvVeOIerC1zPgSWW/pio
imphash de41d4e0545d977de6ca665131bb479a
impfuzzy 12:FMHHGf5XGXKiEG6eGJyJk6lTpJq/iZJAgRJRJJoARZqRVPXJHqc:FMGf5XGf6ZgJkoDq6ZJ9fjBcV9
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 56 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pool.supportxmr.com Unknown 141.94.96.144
141.94.96.195 Unknown 141.94.96.195

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x14000cb10 __C_specific_handler
 0x14000cb18 __getmainargs
 0x14000cb20 __initenv
 0x14000cb28 __iob_func
 0x14000cb30 __set_app_type
 0x14000cb38 __setusermatherr
 0x14000cb40 _amsg_exit
 0x14000cb48 _cexit
 0x14000cb50 _commode
 0x14000cb58 _fmode
 0x14000cb60 _initterm
 0x14000cb68 _onexit
 0x14000cb70 _wcsicmp
 0x14000cb78 _wcsnicmp
 0x14000cb80 abort
 0x14000cb88 calloc
 0x14000cb90 exit
 0x14000cb98 fprintf
 0x14000cba0 free
 0x14000cba8 fwrite
 0x14000cbb0 malloc
 0x14000cbb8 memcpy
 0x14000cbc0 memset
 0x14000cbc8 signal
 0x14000cbd0 strlen
 0x14000cbd8 strncmp
 0x14000cbe0 vfprintf
 0x14000cbe8 wcscat
 0x14000cbf0 wcscpy
 0x14000cbf8 wcslen
 0x14000cc00 wcsncmp
KERNEL32.dll
 0x14000cc10 DeleteCriticalSection
 0x14000cc18 EnterCriticalSection
 0x14000cc20 GetLastError
 0x14000cc28 InitializeCriticalSection
 0x14000cc30 LeaveCriticalSection
 0x14000cc38 SetUnhandledExceptionFilter
 0x14000cc40 Sleep
 0x14000cc48 TlsGetValue
 0x14000cc50 VirtualProtect
 0x14000cc58 VirtualQuery

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure