Report - MAGNIFICENT_MAILBOX.exe

Malicious Packer UPX PE File PE64
ScreenShot
Created 2025.02.19 11:38 Machine s1_win7_x6401
Filename MAGNIFICENT_MAILBOX.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
3.2
ZERO API
VT API (file)
md5 a1d8035b93923215c7d7cbc17e735deb
sha256 5a37021cd9626f6b48a8cf31c79d350946a5ac9dd94b96f51e121b991b5353dc
ssdeep 98304:L3SxOjhGAjzbKwCdgVNIBh3dzU5DqcLbDudEo9GWc5V/by:DSSX2+VNIBphU5mcLvo9GW6xy
imphash f0ea7b7844bbc5bfa9bb32efdcea957c
impfuzzy 24:UbVjh9wO+VuT2oLtXOr6kwmDruMztxdEr6tP:GwO+VAXOmGx0oP
  Network IP location

Signature (5cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
193.3.23.122 Unknown 193.3.23.122

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x1299040 WriteFile
 0x1299048 WriteConsoleW
 0x1299050 WaitForMultipleObjects
 0x1299058 WaitForSingleObject
 0x1299060 VirtualQuery
 0x1299068 VirtualFree
 0x1299070 VirtualAlloc
 0x1299078 TlsAlloc
 0x1299080 SwitchToThread
 0x1299088 SuspendThread
 0x1299090 SetWaitableTimer
 0x1299098 SetUnhandledExceptionFilter
 0x12990a0 SetProcessPriorityBoost
 0x12990a8 SetEvent
 0x12990b0 SetErrorMode
 0x12990b8 SetConsoleCtrlHandler
 0x12990c0 ResumeThread
 0x12990c8 PostQueuedCompletionStatus
 0x12990d0 LoadLibraryA
 0x12990d8 LoadLibraryW
 0x12990e0 SetThreadContext
 0x12990e8 GetThreadContext
 0x12990f0 GetSystemInfo
 0x12990f8 GetSystemDirectoryA
 0x1299100 GetStdHandle
 0x1299108 GetQueuedCompletionStatusEx
 0x1299110 GetProcessAffinityMask
 0x1299118 GetProcAddress
 0x1299120 GetEnvironmentStringsW
 0x1299128 GetConsoleMode
 0x1299130 FreeEnvironmentStringsW
 0x1299138 ExitProcess
 0x1299140 DuplicateHandle
 0x1299148 CreateWaitableTimerExW
 0x1299150 CreateThread
 0x1299158 CreateIoCompletionPort
 0x1299160 CreateFileA
 0x1299168 CreateEventA
 0x1299170 CloseHandle
 0x1299178 AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure