Report - YLW.exe

Generic Malware Malicious Library Malicious Packer UPX PE File PE64 OS Processor Check
ScreenShot
Created 2025.02.03 10:00 Machine s1_win7_x6403
Filename YLW.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
1.2
ZERO API
VT API (file) 54 detected (AIDetectMalware, Malicious, score, Ghanarava, Barys, Unsafe, Save, confidence, 100%, Attribute, HighConfidence, high confidence, SpywareX, TrojanPSW, jyhgbp, 7grKvsOYqUS, AGEN, Static AI, Suspicious PE, Detected, LucaStealer, Eldorado, R550345, Artemis, Chgt, Gencirc, +R+JClbkPWY, susgen, Lumma)
md5 300f993df799e263d6d1316cbf643450
sha256 c6d628c4f366dfd4bf3a79c3d71c014927c2c876fcfc7f23398da18dd6653f00
ssdeep 49152:x9o/96ps/rVviNeksFYYz57fxwGGVH0SQ+TURvL5q7WM+YjP1vhDDiHnjYQ1wlD8:/o/FiUYc5oM5q6UoV1dzatI
imphash a53eab4cfcf5a565bb2e6568e8506281
impfuzzy 96:S7zyTxK9Wc6SNX3nn4ZazaH5fcg+PjQWOHp+DFHT9Wv9sNgS50sgG6T:SiaWOHn4ZazakQWyKFHxWFCGsgG6T
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 54 AntiVirus engines on VirusTotal as malicious

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x1402a42d8 GetFileInformationByHandle
 0x1402a42e0 GetModuleHandleA
 0x1402a42e8 GetCurrentThread
 0x1402a42f0 GetStdHandle
 0x1402a42f8 GetConsoleMode
 0x1402a4300 WaitForSingleObject
 0x1402a4308 WriteConsoleW
 0x1402a4310 WaitForSingleObjectEx
 0x1402a4318 CreateMutexA
 0x1402a4320 ReleaseMutex
 0x1402a4328 GetEnvironmentVariableW
 0x1402a4330 RtlLookupFunctionEntry
 0x1402a4338 GetModuleHandleW
 0x1402a4340 FormatMessageW
 0x1402a4348 GetTempPathW
 0x1402a4350 GetModuleFileNameW
 0x1402a4358 CreateFileW
 0x1402a4360 GetFileInformationByHandleEx
 0x1402a4368 GlobalAlloc
 0x1402a4370 SetFilePointerEx
 0x1402a4378 MultiByteToWideChar
 0x1402a4380 CreateDirectoryW
 0x1402a4388 FindFirstFileW
 0x1402a4390 FindClose
 0x1402a4398 WideCharToMultiByte
 0x1402a43a0 GlobalSize
 0x1402a43a8 GlobalLock
 0x1402a43b0 ReleaseSRWLockExclusive
 0x1402a43b8 GetEnvironmentStringsW
 0x1402a43c0 FreeEnvironmentStringsW
 0x1402a43c8 CompareStringOrdinal
 0x1402a43d0 GetSystemDirectoryW
 0x1402a43d8 GetWindowsDirectoryW
 0x1402a43e0 CreateProcessW
 0x1402a43e8 GetFileAttributesW
 0x1402a43f0 DuplicateHandle
 0x1402a43f8 GetCurrentProcessId
 0x1402a4400 CreateNamedPipeW
 0x1402a4408 CreateThread
 0x1402a4410 ReadFileEx
 0x1402a4418 SleepEx
 0x1402a4420 WriteFileEx
 0x1402a4428 SetFileCompletionNotificationModes
 0x1402a4430 ExitProcess
 0x1402a4438 QueryPerformanceCounter
 0x1402a4440 QueryPerformanceFrequency
 0x1402a4448 GetSystemTimeAsFileTime
 0x1402a4450 GetCurrentDirectoryW
 0x1402a4458 RtlCaptureContext
 0x1402a4460 AcquireSRWLockShared
 0x1402a4468 ReleaseSRWLockShared
 0x1402a4470 CopyFileExW
 0x1402a4478 SleepConditionVariableSRW
 0x1402a4480 SetHandleInformation
 0x1402a4488 WakeConditionVariable
 0x1402a4490 PostQueuedCompletionStatus
 0x1402a4498 CreateIoCompletionPort
 0x1402a44a0 TryAcquireSRWLockExclusive
 0x1402a44a8 GetFinalPathNameByHandleW
 0x1402a44b0 SetLastError
 0x1402a44b8 GetQueuedCompletionStatusEx
 0x1402a44c0 UnhandledExceptionFilter
 0x1402a44c8 SwitchToThread
 0x1402a44d0 SetUnhandledExceptionFilter
 0x1402a44d8 GlobalUnlock
 0x1402a44e0 GlobalFree
 0x1402a44e8 GetProcessHeap
 0x1402a44f0 HeapAlloc
 0x1402a44f8 SetThreadStackGuarantee
 0x1402a4500 FileTimeToSystemTime
 0x1402a4508 SystemTimeToTzSpecificLocalTime
 0x1402a4510 SystemTimeToFileTime
 0x1402a4518 GetTimeZoneInformation
 0x1402a4520 RtlVirtualUnwind
 0x1402a4528 FlushFileBuffers
 0x1402a4530 GetTickCount
 0x1402a4538 MapViewOfFile
 0x1402a4540 CreateFileMappingW
 0x1402a4548 FormatMessageA
 0x1402a4550 GetSystemTime
 0x1402a4558 FreeLibrary
 0x1402a4560 GetFileSize
 0x1402a4568 LockFileEx
 0x1402a4570 LocalFree
 0x1402a4578 UnlockFile
 0x1402a4580 HeapDestroy
 0x1402a4588 HeapCompact
 0x1402a4590 LoadLibraryW
 0x1402a4598 DeleteFileW
 0x1402a45a0 DeleteFileA
 0x1402a45a8 CreateFileA
 0x1402a45b0 FlushViewOfFile
 0x1402a45b8 OutputDebugStringW
 0x1402a45c0 GetFileAttributesExW
 0x1402a45c8 GetFileAttributesA
 0x1402a45d0 GetDiskFreeSpaceA
 0x1402a45d8 GetTempPathA
 0x1402a45e0 HeapSize
 0x1402a45e8 HeapValidate
 0x1402a45f0 UnmapViewOfFile
 0x1402a45f8 CreateMutexW
 0x1402a4600 UnlockFileEx
 0x1402a4608 SetEndOfFile
 0x1402a4610 GetFullPathNameA
 0x1402a4618 SetFilePointer
 0x1402a4620 LockFile
 0x1402a4628 OutputDebugStringA
 0x1402a4630 GetDiskFreeSpaceW
 0x1402a4638 WriteFile
 0x1402a4640 HeapCreate
 0x1402a4648 ReadFile
 0x1402a4650 AreFileApisANSI
 0x1402a4658 InitializeCriticalSection
 0x1402a4660 EnterCriticalSection
 0x1402a4668 LeaveCriticalSection
 0x1402a4670 TryEnterCriticalSection
 0x1402a4678 DeleteCriticalSection
 0x1402a4680 GetCurrentThreadId
 0x1402a4688 AddVectoredExceptionHandler
 0x1402a4690 GetCurrentProcess
 0x1402a4698 GetProcAddress
 0x1402a46a0 LoadLibraryA
 0x1402a46a8 WakeAllConditionVariable
 0x1402a46b0 HeapReAlloc
 0x1402a46b8 GetSystemInfo
 0x1402a46c0 GetLastError
 0x1402a46c8 Sleep
 0x1402a46d0 FindNextFileW
 0x1402a46d8 TerminateProcess
 0x1402a46e0 CloseHandle
 0x1402a46e8 AcquireSRWLockExclusive
 0x1402a46f0 IsProcessorFeaturePresent
 0x1402a46f8 InitializeSListHead
 0x1402a4700 IsDebuggerPresent
 0x1402a4708 GetFullPathNameW
 0x1402a4710 HeapFree
oleaut32.dll
 0x1402a4770 SafeArrayDestroy
 0x1402a4778 SafeArrayAccessData
 0x1402a4780 SafeArrayGetUBound
 0x1402a4788 SafeArrayGetLBound
 0x1402a4790 VariantClear
 0x1402a4798 SysFreeString
 0x1402a47a0 SafeArrayUnaccessData
 0x1402a47a8 SysAllocStringLen
ws2_32.dll
 0x1402a4858 ioctlsocket
 0x1402a4860 WSASocketW
 0x1402a4868 ind
 0x1402a4870 listen
 0x1402a4878 WSASend
 0x1402a4880 accept
 0x1402a4888 setsockopt
 0x1402a4890 connect
 0x1402a4898 getaddrinfo
 0x1402a48a0 getsockopt
 0x1402a48a8 WSAIoctl
 0x1402a48b0 freeaddrinfo
 0x1402a48b8 WSAStartup
 0x1402a48c0 WSACleanup
 0x1402a48c8 getsockname
 0x1402a48d0 WSAGetLastError
 0x1402a48d8 getpeername
 0x1402a48e0 recv
 0x1402a48e8 closesocket
 0x1402a48f0 send
 0x1402a48f8 shutdown
 0x1402a4900 socket
crypt32.dll
 0x1402a4210 CryptUnprotectData
 0x1402a4218 CertDuplicateCertificateContext
 0x1402a4220 CertGetCertificateChain
 0x1402a4228 CertVerifyCertificateChainPolicy
 0x1402a4230 CertFreeCertificateChain
 0x1402a4238 CertOpenStore
 0x1402a4240 CertFreeCertificateContext
 0x1402a4248 CertDuplicateCertificateChain
 0x1402a4250 CertAddCertificateContextToStore
 0x1402a4258 CertEnumCertificatesInStore
 0x1402a4260 CertCloseStore
 0x1402a4268 CertDuplicateStore
advapi32.dll
 0x1402a4050 AllocateAndInitializeSid
 0x1402a4058 FreeSid
 0x1402a4060 CheckTokenMembership
 0x1402a4068 SystemFunction036
 0x1402a4070 RegQueryValueExW
 0x1402a4078 RegOpenKeyExW
 0x1402a4080 RegCloseKey
crypt.dll
 0x1402a4200 BCryptGenRandom
user32.dll
 0x1402a4810 EnumDisplaySettingsExW
 0x1402a4818 SetClipboardData
 0x1402a4820 EmptyClipboard
 0x1402a4828 CloseClipboard
 0x1402a4830 GetClipboardData
 0x1402a4838 OpenClipboard
 0x1402a4840 GetMonitorInfoW
 0x1402a4848 EnumDisplayMonitors
ntdll.dll
 0x1402a4720 NtCreateFile
 0x1402a4728 NtCancelIoFileEx
 0x1402a4730 NtDeviceIoControlFile
 0x1402a4738 RtlNtStatusToDosError
secur32.dll
 0x1402a47b8 InitializeSecurityContextW
 0x1402a47c0 QueryContextAttributesW
 0x1402a47c8 FreeContextBuffer
 0x1402a47d0 DeleteSecurityContext
 0x1402a47d8 EncryptMessage
 0x1402a47e0 AcceptSecurityContext
 0x1402a47e8 FreeCredentialsHandle
 0x1402a47f0 AcquireCredentialsHandleA
 0x1402a47f8 ApplyControlToken
 0x1402a4800 DecryptMessage
gdi32.dll
 0x1402a4278 GetDeviceCaps
 0x1402a4280 DeleteDC
 0x1402a4288 DeleteObject
 0x1402a4290 CreateCompatibleDC
 0x1402a4298 CreateCompatibleBitmap
 0x1402a42a0 SelectObject
 0x1402a42a8 SetStretchBltMode
 0x1402a42b0 StretchBlt
 0x1402a42b8 GetDIBits
 0x1402a42c0 GetObjectW
 0x1402a42c8 CreateDCW
ole32.dll
 0x1402a4748 CoSetProxyBlanket
 0x1402a4750 CoCreateInstance
 0x1402a4758 CoInitializeSecurity
 0x1402a4760 CoInitializeEx
VCRUNTIME140.dll
 0x1402a4000 strrchr
 0x1402a4008 memmove
 0x1402a4010 memset
 0x1402a4018 memcpy
 0x1402a4020 memcmp
 0x1402a4028 __C_specific_handler
 0x1402a4030 __current_exception
 0x1402a4038 __current_exception_context
 0x1402a4040 __CxxFrameHandler3
api-ms-win-crt-string-l1-1-0.dll
 0x1402a41b0 strcmp
 0x1402a41b8 strcspn
 0x1402a41c0 strlen
 0x1402a41c8 strncmp
api-ms-win-crt-utility-l1-1-0.dll
 0x1402a41e8 qsort
 0x1402a41f0 _rotl64
api-ms-win-crt-heap-l1-1-0.dll
 0x1402a4090 realloc
 0x1402a4098 _set_new_mode
 0x1402a40a0 free
 0x1402a40a8 _msize
 0x1402a40b0 malloc
api-ms-win-crt-time-l1-1-0.dll
 0x1402a41d8 _localtime64_s
api-ms-win-crt-math-l1-1-0.dll
 0x1402a40d0 _dclass
 0x1402a40d8 log
 0x1402a40e0 __setusermatherr
api-ms-win-crt-runtime-l1-1-0.dll
 0x1402a40f0 _endthreadex
 0x1402a40f8 __p___argv
 0x1402a4100 _beginthreadex
 0x1402a4108 _seh_filter_exe
 0x1402a4110 _initterm
 0x1402a4118 _cexit
 0x1402a4120 _c_exit
 0x1402a4128 _exit
 0x1402a4130 _register_thread_local_exe_atexit_callback
 0x1402a4138 _configure_narrow_argv
 0x1402a4140 _initialize_narrow_environment
 0x1402a4148 _get_initial_narrow_environment
 0x1402a4150 _initialize_onexit_table
 0x1402a4158 _set_app_type
 0x1402a4160 terminate
 0x1402a4168 exit
 0x1402a4170 _crt_atexit
 0x1402a4178 __p___argc
 0x1402a4180 _register_onexit_function
 0x1402a4188 _initterm_e
api-ms-win-crt-stdio-l1-1-0.dll
 0x1402a4198 __p__commode
 0x1402a41a0 _set_fmode
api-ms-win-crt-locale-l1-1-0.dll
 0x1402a40c0 _configthreadlocale

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure