Report - mtQ.exe

Malicious Packer PE File PE64
ScreenShot
Created 2025.02.21 16:34 Machine s1_win7_x6403
Filename mtQ.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score Not founds Behavior Score
1.8
ZERO API file : malware
VT API (file) 43 detected (AIDetectMalware, GenericKDQ, Malicious, score, Artemis, Unsafe, Save, confidence, 100%, GenericQ, Attribute, HighConfidence, high confidence, VMProtect, X suspicious, xbvhtu, Real Protect, moderate, Static AI, Malicious PE, Detected, GrayWare, Wacapew, ABTrojan, ZMUQ, R002H09B725, Gencirc)
md5 6e6f46cefb577d77d7772a1c51de6da2
sha256 913f0bf910c03920654804d3e618f4839977e990535da6e8d1a06411f7dcfa1a
ssdeep 393216:FCwBeFMRU0Jf0mvLR8rSUInq1tppq+kekVaZOekxy3rhhvvVuNjCIKBfh:FF3fpTR8WnYtpE+kekVshnVuch
imphash 3d78cabfedc8fd56608aeb994c22f8b6
impfuzzy 12:G3E+3MXPBHqT4ME2UI/A2Q4W2WDQLLMaiuHb5duD1FFTOZGqAJcDW:C3WpMJ05hDWM7C5du5FpadNDW
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (3cnts)

Level Name Description Collection
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

Normaliz.dll
 0x140f31000 IdnToAscii
CRYPT32.dll
 0x140f31010 CryptQueryObject
WLDAP32.dll
 0x140f31020 None
WS2_32.dll
 0x140f31030 WSAResetEvent
KERNEL32.dll
 0x140f31040 AcquireSRWLockExclusive
USER32.dll
 0x140f31050 GetClipboardData
GDI32.dll
 0x140f31060 CreateRoundRectRgn
ADVAPI32.dll
 0x140f31070 CryptDestroyKey
SHELL32.dll
 0x140f31080 ShellExecuteA
ntdll.dll
 0x140f31090 NtSuspendThread
MSVCP140.dll
 0x140f310a0 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
IMM32.dll
 0x140f310b0 ImmGetContext
WININET.dll
 0x140f310c0 InternetOpenA
d3d9.dll
 0x140f310d0 Direct3DCreate9
VCRUNTIME140_1.dll
 0x140f310e0 __CxxFrameHandler4
VCRUNTIME140.dll
 0x140f310f0 __std_terminate
api-ms-win-crt-stdio-l1-1-0.dll
 0x140f31100 __acrt_iob_func
api-ms-win-crt-string-l1-1-0.dll
 0x140f31110 strncpy
api-ms-win-crt-utility-l1-1-0.dll
 0x140f31120 rand
api-ms-win-crt-heap-l1-1-0.dll
 0x140f31130 _set_new_mode
api-ms-win-crt-convert-l1-1-0.dll
 0x140f31140 atoi
api-ms-win-crt-runtime-l1-1-0.dll
 0x140f31150 _errno
api-ms-win-crt-filesystem-l1-1-0.dll
 0x140f31160 _access
api-ms-win-crt-time-l1-1-0.dll
 0x140f31170 _gmtime64
api-ms-win-crt-math-l1-1-0.dll
 0x140f31180 ceilf
api-ms-win-crt-locale-l1-1-0.dll
 0x140f31190 _configthreadlocale
KERNEL32.dll
 0x140f311a0 GetSystemTimeAsFileTime
KERNEL32.dll
 0x140f311b0 HeapAlloc
 0x140f311b8 HeapFree
 0x140f311c0 ExitProcess
 0x140f311c8 LoadLibraryA
 0x140f311d0 GetModuleHandleA
 0x140f311d8 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure