Report - 15.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2025.01.27 17:09 Machine s1_win7_x6403
Filename 15.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
2.6
ZERO API file : malware
VT API (file) 46 detected (AIDetectMalware, Babar, Malicious, score, Unsafe, Jaik, confidence, 100%, Windows, TwistedTinsel, AHCE, BDDR, Agentb, Undefined, 9u6a2PLrbiL, smydy, Detected, GrayWare, Wacapew, Wacatac, R689899, Artemis, BScope, R002H09AQ25, Gencirc, lfR1OZ8, susgen, B9nj)
md5 25399cb8cb5a702bc38b0ccbe13ff100
sha256 c0d4f2482f61d716a74356f0a913cd325217690601a32570190b527ff27e6521
ssdeep 24576:EX/DC7Vpa1T/ou8nHz7aGkh3TL81p5qITyB:EX/ua17o3zI3TLQyB
imphash c67ef5a5a21b6fceb58b3ff6fde243b5
impfuzzy 24:tsZ6LjMIteS1QkGhlJnc+pl3eDo/AEOovbOIOuFZAl4ZHu93vdTxFwD1w2XA:OeteS1QkG5c+ppw3RuFZMdkrA
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x44c018 CreateThread
 0x44c01c GetVersionExA
 0x44c020 VirtualAlloc
 0x44c024 GetModuleFileNameA
 0x44c028 ExitProcess
 0x44c02c Process32FirstW
 0x44c030 Process32NextW
 0x44c034 WriteConsoleW
 0x44c038 CreateFileW
 0x44c03c ReadConsoleW
 0x44c040 GetCurrentProcess
 0x44c044 CloseHandle
 0x44c048 ReadFile
 0x44c04c GetFileSize
 0x44c050 CreateToolhelp32Snapshot
 0x44c054 CreateFileA
 0x44c058 SetFilePointerEx
 0x44c05c GetFileSizeEx
 0x44c060 GetConsoleMode
 0x44c064 UnhandledExceptionFilter
 0x44c068 SetUnhandledExceptionFilter
 0x44c06c TerminateProcess
 0x44c070 IsProcessorFeaturePresent
 0x44c074 QueryPerformanceCounter
 0x44c078 GetCurrentProcessId
 0x44c07c GetCurrentThreadId
 0x44c080 GetSystemTimeAsFileTime
 0x44c084 InitializeSListHead
 0x44c088 IsDebuggerPresent
 0x44c08c GetStartupInfoW
 0x44c090 GetModuleHandleW
 0x44c094 InterlockedPushEntrySList
 0x44c098 InterlockedFlushSList
 0x44c09c RaiseException
 0x44c0a0 RtlUnwind
 0x44c0a4 GetLastError
 0x44c0a8 SetLastError
 0x44c0ac EnterCriticalSection
 0x44c0b0 LeaveCriticalSection
 0x44c0b4 DeleteCriticalSection
 0x44c0b8 InitializeCriticalSectionAndSpinCount
 0x44c0bc TlsAlloc
 0x44c0c0 TlsGetValue
 0x44c0c4 TlsSetValue
 0x44c0c8 TlsFree
 0x44c0cc FreeLibrary
 0x44c0d0 GetProcAddress
 0x44c0d4 LoadLibraryExW
 0x44c0d8 EncodePointer
 0x44c0dc GetStdHandle
 0x44c0e0 WriteFile
 0x44c0e4 GetModuleFileNameW
 0x44c0e8 GetModuleHandleExW
 0x44c0ec GetCommandLineA
 0x44c0f0 GetCommandLineW
 0x44c0f4 HeapFree
 0x44c0f8 HeapAlloc
 0x44c0fc GetCurrentThread
 0x44c100 GetDateFormatW
 0x44c104 GetTimeFormatW
 0x44c108 CompareStringW
 0x44c10c LCMapStringW
 0x44c110 GetLocaleInfoW
 0x44c114 IsValidLocale
 0x44c118 GetUserDefaultLCID
 0x44c11c EnumSystemLocalesW
 0x44c120 MultiByteToWideChar
 0x44c124 GetFileAttributesExW
 0x44c128 OutputDebugStringW
 0x44c12c FindClose
 0x44c130 FindFirstFileExW
 0x44c134 FindNextFileW
 0x44c138 IsValidCodePage
 0x44c13c GetACP
 0x44c140 GetOEMCP
 0x44c144 GetCPInfo
 0x44c148 WideCharToMultiByte
 0x44c14c GetEnvironmentStringsW
 0x44c150 FreeEnvironmentStringsW
 0x44c154 SetEnvironmentVariableW
 0x44c158 SetStdHandle
 0x44c15c GetFileType
 0x44c160 GetStringTypeW
 0x44c164 GetProcessHeap
 0x44c168 SetConsoleCtrlHandler
 0x44c16c HeapSize
 0x44c170 HeapReAlloc
 0x44c174 FlushFileBuffers
 0x44c178 GetConsoleOutputCP
 0x44c17c DecodePointer
USER32.dll
 0x44c190 MessageBoxA
ADVAPI32.dll
 0x44c000 RegQueryValueExA
 0x44c004 RegOpenKeyExA
 0x44c008 RegCloseKey
 0x44c00c InitializeAcl
 0x44c010 SetSecurityInfo
SHELL32.dll
 0x44c184 ShellExecuteExA
 0x44c188 None

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure