Report - 10.exe

Malicious Packer PE File PE64
ScreenShot
Created 2025.03.08 12:03 Machine s1_win7_x6401
Filename 10.exe
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
AI Score
7
Behavior Score
4.0
ZERO API file : clean
VT API (file) 55 detected (Common, Malicious, score, Ghanarava, Infected, Jalapeno, Unsafe, Save, confidence, high confidence, TrojanX, Msilheracles, ihpob, R002C0RBQ25, Static AI, Malicious PE, Detected, Wacatac, ABTrojan, BGRC, Artemis, Chgt, Gencirc, KillProcess, susgen, B9nj)
md5 8f1f692c2e839e6f821e42057f8b1c01
sha256 8f3c4a66f4c66b34d7d79fbcccb03b81d0139a279789981c16de5e66e6678cb5
ssdeep 192:HUfh9usWOe1PygQC/iL1p8Fbmp9/ijG/DYHy5oL+:ohMOe1KgL/cAFap96IWyaL+
imphash
impfuzzy 3::
  Network IP location

Signature (10cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed

Rules (3cnts)

Level Name Description Collection
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) is none

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure