Report - sonic.exe

Generic Malware Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2025.03.04 09:30 Machine s1_win7_x6403
Filename sonic.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
0.8
ZERO API file : malware
VT API (file) 11 detected (malicious, confidence, FileRepMalware, Misc, LESS, bWQ1OiJG5Ndx46fzil, Kx6F+UwI, Wacapew, Artemis, susgen)
md5 3cc32d37dc6b03cad9a786752dddc434
sha256 c746bf479c4b8e6ae6ad45b19511f9155f46ec2038b12cf13c401600b01c71c3
ssdeep 1536:Ik7+PA2drzHLucoFjfFw3HeA/9SDjGRw3rK+9hZQHphzvI+nsW5jqed59dlLtdB4:DiVWiHeg6jhrK+8htbqkxJtdno
imphash 5b7ae057f6e2555ce5822c51e4307f8f
impfuzzy 24:S402tMS17mlJnc+pl3eDo/CuyoBDSOovbO9Ziv8GGMR:ntMS17kc+ppmuyo3AB
  Network IP location

Signature (2cnts)

Level Description
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x14000f240 MessageBoxA
KERNEL32.dll
 0x14000f000 FindClose
 0x14000f008 WriteConsoleW
 0x14000f010 RtlCaptureContext
 0x14000f018 RtlLookupFunctionEntry
 0x14000f020 RtlVirtualUnwind
 0x14000f028 UnhandledExceptionFilter
 0x14000f030 SetUnhandledExceptionFilter
 0x14000f038 GetCurrentProcess
 0x14000f040 TerminateProcess
 0x14000f048 IsProcessorFeaturePresent
 0x14000f050 QueryPerformanceCounter
 0x14000f058 GetCurrentProcessId
 0x14000f060 GetCurrentThreadId
 0x14000f068 GetSystemTimeAsFileTime
 0x14000f070 InitializeSListHead
 0x14000f078 IsDebuggerPresent
 0x14000f080 GetStartupInfoW
 0x14000f088 GetModuleHandleW
 0x14000f090 RtlUnwindEx
 0x14000f098 GetLastError
 0x14000f0a0 SetLastError
 0x14000f0a8 EnterCriticalSection
 0x14000f0b0 LeaveCriticalSection
 0x14000f0b8 DeleteCriticalSection
 0x14000f0c0 InitializeCriticalSectionAndSpinCount
 0x14000f0c8 TlsAlloc
 0x14000f0d0 TlsGetValue
 0x14000f0d8 TlsSetValue
 0x14000f0e0 TlsFree
 0x14000f0e8 FreeLibrary
 0x14000f0f0 GetProcAddress
 0x14000f0f8 LoadLibraryExW
 0x14000f100 EncodePointer
 0x14000f108 RaiseException
 0x14000f110 RtlPcToFileHeader
 0x14000f118 GetStdHandle
 0x14000f120 WriteFile
 0x14000f128 GetModuleFileNameW
 0x14000f130 ExitProcess
 0x14000f138 GetModuleHandleExW
 0x14000f140 HeapAlloc
 0x14000f148 HeapFree
 0x14000f150 FindFirstFileExW
 0x14000f158 FindNextFileW
 0x14000f160 IsValidCodePage
 0x14000f168 GetACP
 0x14000f170 GetOEMCP
 0x14000f178 GetCPInfo
 0x14000f180 GetCommandLineA
 0x14000f188 GetCommandLineW
 0x14000f190 MultiByteToWideChar
 0x14000f198 WideCharToMultiByte
 0x14000f1a0 GetEnvironmentStringsW
 0x14000f1a8 FreeEnvironmentStringsW
 0x14000f1b0 SetStdHandle
 0x14000f1b8 GetFileType
 0x14000f1c0 GetStringTypeW
 0x14000f1c8 FlsAlloc
 0x14000f1d0 FlsGetValue
 0x14000f1d8 FlsSetValue
 0x14000f1e0 FlsFree
 0x14000f1e8 LCMapStringW
 0x14000f1f0 GetProcessHeap
 0x14000f1f8 HeapSize
 0x14000f200 HeapReAlloc
 0x14000f208 FlushFileBuffers
 0x14000f210 GetConsoleOutputCP
 0x14000f218 GetConsoleMode
 0x14000f220 SetFilePointerEx
 0x14000f228 CreateFileW
 0x14000f230 CloseHandle

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure