Report - main.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2025.02.18 18:29 Machine s1_win7_x6401
Filename main.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
2.6
ZERO API file : malware
VT API (file) 36 detected (Malicious, score, Artemis, GenericKD, Unsafe, confidence, Kryptik, Genus, HYTD, ShellCodeRunner, CLASSIC, lllso, Detected, GrayWare, Wacapew, Malware@#2m645ivd7rppd, LummaStealer, Njgl, susgen, PossibleThreat, Chgt)
md5 c1ab7781370290e0f7d8ea98705e8c84
sha256 17bc5b41b35d894b37224e5daa66e2c7326e10a8309e299af122c6602afc953e
ssdeep 98304:fLpbNHeg4DbSYB5rkUQD4xxmIQV0ymRNmQP:fLpbN+g4n/kUQ4/QVoiQP
imphash adfb5165841ec7e1fff9b4b9d3b4ceb0
impfuzzy 48:s6sxio1r1/Xo9m5ZCqZY5Menmt3Vzlc+pIqQ3SY+owZDzf/gAke5rC7DMESpfJeG:s6sxio1xVE5MJt3Rlc+pXZibM
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.143.228.176 DE Digital Energy Technologies Ltd. 185.143.228.176 mailcious
104.21.73.114 US CLOUDFLARENET 104.21.73.114 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x855000 QueryUsersOnEncryptedFile
 0x855004 QueryRecoveryAgentsOnEncryptedFile
 0x855008 QueryServiceConfigW
 0x85500c QueryServiceConfig2W
 0x855010 QueryServiceLockStatusW
 0x855014 QueryServiceStatus
 0x855018 QueryServiceStatusEx
 0x85501c QueryTraceW
 0x855020 QueryAllTracesW
KERNEL32.dll
 0x85509c FindClose
 0x8550a0 FindFirstFileExW
 0x8550a4 FindNextFileW
 0x8550a8 FlushFileBuffers
 0x8550ac GetFullPathNameW
 0x8550b0 QueryDosDeviceW
 0x8550b4 ReadFile
 0x8550b8 SetEndOfFile
 0x8550bc SetFileAttributesW
 0x8550c0 WriteFile
 0x8550c4 RaiseException
 0x8550c8 GetLastError
 0x8550cc SetErrorMode
 0x8550d0 QueryPerformanceCounter
 0x8550d4 QueryPerformanceFrequency
 0x8550d8 GetProcessHeap
 0x8550dc SetCriticalSectionSpinCount
 0x8550e0 SetEvent
 0x8550e4 Sleep
 0x8550e8 QueryDepthSList
 0x8550ec QueueUserAPC
 0x8550f0 GetCurrentProcess
 0x8550f4 GetCurrentProcessId
 0x8550f8 GetCurrentThreadId
 0x8550fc SetComputerNameExW
 0x855100 SetComputerNameW
 0x855104 VirtualProtect
 0x855108 QueueUserWorkItem
 0x85510c CreateTimerQueue
 0x855110 SetEventWhenCallbackReturns
 0x855114 WaitForThreadpoolWorkCallbacks
 0x855118 WaitForThreadpoolTimerCallbacks
 0x85511c WaitForThreadpoolWaitCallbacks
 0x855120 WaitForThreadpoolIoCallbacks
 0x855124 QueryInformationJobObject
 0x855128 GetModuleFileNameW
 0x85512c GetModuleHandleA
 0x855130 GetModuleHandleW
 0x855134 QueryThreadCycleTime
 0x855138 QueryProcessCycleTime
 0x85513c QueryIdleProcessorCycleTime
 0x855140 QueryFullProcessImageNameW
 0x855144 SetDllDirectoryW
 0x855148 CreateFileW
 0x85514c SetDefaultCommConfigW
 0x855150 SetDynamicTimeZoneInformation
 0x855154 SetConsoleMode
 0x855158 ReadConsoleInputW
 0x85515c ReadConsoleW
 0x855160 SetConsoleCtrlHandler
 0x855164 SetConsoleActiveScreenBuffer
 0x855168 SetConsoleCP
 0x85516c SetConsoleOutputCP
 0x855170 SetConsoleCursorInfo
 0x855174 SetConsoleCursorPosition
 0x855178 ReadConsoleOutputCharacterW
 0x85517c ReadConsoleOutputAttribute
 0x855180 ReadConsoleOutputW
 0x855184 SetCurrentConsoleFontEx
 0x855188 SetConsoleHistoryInfo
 0x85518c K32QueryWorkingSet
 0x855190 K32QueryWorkingSetEx
 0x855194 DecodePointer
 0x855198 GetConsoleMode
 0x85519c GetConsoleOutputCP
 0x8551a0 SetFilePointerEx
 0x8551a4 GetFileSizeEx
 0x8551a8 HeapQueryInformation
 0x8551ac HeapSize
 0x8551b0 HeapReAlloc
 0x8551b4 LCMapStringW
 0x8551b8 CompareStringW
 0x8551bc GetTimeFormatW
 0x8551c0 GetDateFormatW
 0x8551c4 GetTempPathW
 0x8551c8 EnumSystemLocalesW
 0x8551cc CloseHandle
 0x8551d0 GetUserDefaultLCID
 0x8551d4 IsValidLocale
 0x8551d8 GetLocaleInfoW
 0x8551dc GetStringTypeW
 0x8551e0 SetStdHandle
 0x8551e4 FreeEnvironmentStringsW
 0x8551e8 GetEnvironmentStringsW
 0x8551ec GetCommandLineA
 0x8551f0 GetCPInfo
 0x8551f4 GetOEMCP
 0x8551f8 GetACP
 0x8551fc IsValidCodePage
 0x855200 GetCurrentThread
 0x855204 WriteConsoleW
 0x855208 OutputDebugStringW
 0x85520c GetFileType
 0x855210 GetSystemInfo
 0x855214 HeapValidate
 0x855218 ExitProcess
 0x85521c SetCurrentDirectoryW
 0x855220 ExpandEnvironmentStringsW
 0x855224 SetEnvironmentVariableW
 0x855228 GetEnvironmentVariableW
 0x85522c GetCommandLineW
 0x855230 GetStdHandle
 0x855234 CopyFileW
 0x855238 GetModuleHandleExW
 0x85523c EncodePointer
 0x855240 UnhandledExceptionFilter
 0x855244 SetUnhandledExceptionFilter
 0x855248 TerminateProcess
 0x85524c IsProcessorFeaturePresent
 0x855250 GetSystemTimeAsFileTime
 0x855254 InitializeSListHead
 0x855258 IsDebuggerPresent
 0x85525c GetStartupInfoW
 0x855260 MultiByteToWideChar
 0x855264 WideCharToMultiByte
 0x855268 HeapAlloc
 0x85526c HeapFree
 0x855270 VirtualQuery
 0x855274 FreeLibrary
 0x855278 GetProcAddress
 0x85527c InterlockedPushEntrySList
 0x855280 InterlockedFlushSList
 0x855284 LoadLibraryExW
 0x855288 RtlUnwind
 0x85528c SetLastError
 0x855290 EnterCriticalSection
 0x855294 LeaveCriticalSection
 0x855298 DeleteCriticalSection
 0x85529c InitializeCriticalSectionAndSpinCount
 0x8552a0 TlsAlloc
 0x8552a4 TlsGetValue
 0x8552a8 TlsSetValue
 0x8552ac TlsFree
USER32.dll
 0x855344 AppendMenuW
 0x855348 wsprintfW
 0x85534c LoadIconW
 0x855350 LoadCursorW
 0x855354 SetWindowLongW
 0x855358 FillRect
 0x85535c ClientToScreen
 0x855360 GetCursorPos
 0x855364 SetCursor
 0x855368 SetCursorPos
 0x85536c MessageBoxW
 0x855370 SetWindowTextW
 0x855374 GetUpdateRect
 0x855378 ReleaseDC
 0x85537c DrawTextW
 0x855380 SetMenuItemInfoW
 0x855384 TrackPopupMenu
 0x855388 GetActiveWindow
 0x85538c DestroyMenu
 0x855390 CreatePopupMenu
 0x855394 CharUpperW
 0x855398 SendDlgItemMessageW
 0x85539c IsDlgButtonChecked
 0x8553a0 CheckDlgButton
 0x8553a4 GetDlgItemTextW
 0x8553a8 SetDlgItemTextW
 0x8553ac SetDlgItemInt
 0x8553b0 GetDlgItem
 0x8553b4 IsWindow
 0x8553b8 RegisterClassW
 0x8553bc SetDoubleClickTime
 0x8553c0 SendMessageW
GDI32.dll
 0x855054 SetEnhMetaFileBits
 0x855058 SetDIBitsToDevice
 0x85505c SetDIBits
 0x855060 SetDCPenColor
 0x855064 SetDCBrushColor
 0x855068 SetDIBColorTable
WINSPOOL.DRV
 0x855408 None

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure