Report - vcc.exe

Malicious Library UPX PE File PE32 MZP Format
ScreenShot
Created 2025.03.11 10:52 Machine s1_win7_x6403
Filename vcc.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
8.4
ZERO API file : clean
VT API (file) 39 detected (AIDetectMalware, ModiLoader, Malicious, score, Ghanarava, Unsafe, confidence, 100%, Attribute, HighConfidence, high confidence, DropperX, CLASSIC, Static AI, Suspicious PE, Detected, GrayWare, Wacapew, Wacatac, DBatLoader, Eldorado, Leonem, Artemis, Igent, b31GyE, susgen)
md5 882396942bded48550ad6cddeb511480
sha256 ad50c64c49f0ea386631f5c53a2ee7bd952e5168f5234704f9cb4f9be32f5944
ssdeep 24576:r1xwO3PFZ7+z8scoC88rvZuDtLdG7N5obiBFvyHY4CI7ROBz:r1xRF1leAHMiBm7gz
imphash fa88aeb18b6ae01af137c0092b74e7a2
impfuzzy 96:oO4nYU3Me0M4buu21xSUvK9eVroWGXE7EXepbU8JS10+YgDwPOQCD:o13MDbuu0xSUvK9kro1XE7EQG1QpPOQk
  Network IP location

Signature (18cnts)

Level Description
danger Executed a process and injected code into it
danger File has been identified by 39 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Deletes executed files from disk
watch Manipulates memory of a non-child process indicative of process injection
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer

Rules (9cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (download)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x537730 SysFreeString
 0x537734 SysReAllocStringLen
 0x537738 SysAllocStringLen
advapi32.dll
 0x537740 RegQueryValueExA
 0x537744 RegOpenKeyExA
 0x537748 RegCloseKey
user32.dll
 0x537750 GetKeyboardType
 0x537754 DestroyWindow
 0x537758 LoadStringA
 0x53775c MessageBoxA
 0x537760 CharNextA
kernel32.dll
 0x537768 GetACP
 0x53776c Sleep
 0x537770 VirtualFree
 0x537774 VirtualAlloc
 0x537778 GetCurrentThreadId
 0x53777c InterlockedDecrement
 0x537780 InterlockedIncrement
 0x537784 VirtualQuery
 0x537788 WideCharToMultiByte
 0x53778c MultiByteToWideChar
 0x537790 lstrlenA
 0x537794 lstrcpynA
 0x537798 LoadLibraryExA
 0x53779c GetThreadLocale
 0x5377a0 GetStartupInfoA
 0x5377a4 GetProcAddress
 0x5377a8 GetModuleHandleA
 0x5377ac GetModuleFileNameA
 0x5377b0 GetLocaleInfoA
 0x5377b4 GetCommandLineA
 0x5377b8 FreeLibrary
 0x5377bc FindFirstFileA
 0x5377c0 FindClose
 0x5377c4 ExitProcess
 0x5377c8 CompareStringA
 0x5377cc WriteFile
 0x5377d0 UnhandledExceptionFilter
 0x5377d4 RtlUnwind
 0x5377d8 RaiseException
 0x5377dc GetStdHandle
kernel32.dll
 0x5377e4 TlsSetValue
 0x5377e8 TlsGetValue
 0x5377ec LocalAlloc
 0x5377f0 GetModuleHandleA
user32.dll
 0x5377f8 CreateWindowExA
 0x5377fc WindowFromPoint
 0x537800 WaitMessage
 0x537804 UpdateWindow
 0x537808 UnregisterClassA
 0x53780c UnhookWindowsHookEx
 0x537810 TranslateMessage
 0x537814 TranslateMDISysAccel
 0x537818 TrackPopupMenu
 0x53781c SystemParametersInfoA
 0x537820 ShowWindow
 0x537824 ShowScrollBar
 0x537828 ShowOwnedPopups
 0x53782c SetWindowsHookExA
 0x537830 SetWindowPos
 0x537834 SetWindowPlacement
 0x537838 SetWindowLongW
 0x53783c SetWindowLongA
 0x537840 SetTimer
 0x537844 SetScrollRange
 0x537848 SetScrollPos
 0x53784c SetScrollInfo
 0x537850 SetRect
 0x537854 SetPropA
 0x537858 SetParent
 0x53785c SetMenuItemInfoA
 0x537860 SetMenu
 0x537864 SetForegroundWindow
 0x537868 SetFocus
 0x53786c SetCursor
 0x537870 SetClassLongA
 0x537874 SetCapture
 0x537878 SetActiveWindow
 0x53787c SendMessageW
 0x537880 SendMessageA
 0x537884 ScrollWindow
 0x537888 ScreenToClient
 0x53788c RemovePropA
 0x537890 RemoveMenu
 0x537894 ReleaseDC
 0x537898 ReleaseCapture
 0x53789c RegisterWindowMessageA
 0x5378a0 RegisterClipboardFormatA
 0x5378a4 RegisterClassA
 0x5378a8 RedrawWindow
 0x5378ac PtInRect
 0x5378b0 PostQuitMessage
 0x5378b4 PostMessageA
 0x5378b8 PeekMessageW
 0x5378bc PeekMessageA
 0x5378c0 OffsetRect
 0x5378c4 OemToCharA
 0x5378c8 MessageBoxA
 0x5378cc MapWindowPoints
 0x5378d0 MapVirtualKeyA
 0x5378d4 LoadStringA
 0x5378d8 LoadKeyboardLayoutA
 0x5378dc LoadIconA
 0x5378e0 LoadCursorA
 0x5378e4 LoadBitmapA
 0x5378e8 KillTimer
 0x5378ec IsZoomed
 0x5378f0 IsWindowVisible
 0x5378f4 IsWindowUnicode
 0x5378f8 IsWindowEnabled
 0x5378fc IsWindow
 0x537900 IsRectEmpty
 0x537904 IsMenu
 0x537908 IsIconic
 0x53790c IsDialogMessageW
 0x537910 IsDialogMessageA
 0x537914 IsChild
 0x537918 InvalidateRect
 0x53791c IntersectRect
 0x537920 InsertMenuItemA
 0x537924 InsertMenuA
 0x537928 InflateRect
 0x53792c GetWindowThreadProcessId
 0x537930 GetWindowTextA
 0x537934 GetWindowRect
 0x537938 GetWindowPlacement
 0x53793c GetWindowLongW
 0x537940 GetWindowLongA
 0x537944 GetWindowDC
 0x537948 GetTopWindow
 0x53794c GetSystemMetrics
 0x537950 GetSystemMenu
 0x537954 GetSysColorBrush
 0x537958 GetSysColor
 0x53795c GetSubMenu
 0x537960 GetScrollRange
 0x537964 GetScrollPos
 0x537968 GetScrollInfo
 0x53796c GetPropA
 0x537970 GetParent
 0x537974 GetWindow
 0x537978 GetMessagePos
 0x53797c GetMenuStringA
 0x537980 GetMenuState
 0x537984 GetMenuItemInfoA
 0x537988 GetMenuItemID
 0x53798c GetMenuItemCount
 0x537990 GetMenu
 0x537994 GetLastActivePopup
 0x537998 GetKeyboardState
 0x53799c GetKeyboardLayoutNameA
 0x5379a0 GetKeyboardLayoutList
 0x5379a4 GetKeyboardLayout
 0x5379a8 GetKeyState
 0x5379ac GetKeyNameTextA
 0x5379b0 GetIconInfo
 0x5379b4 GetForegroundWindow
 0x5379b8 GetFocus
 0x5379bc GetDesktopWindow
 0x5379c0 GetDCEx
 0x5379c4 GetDC
 0x5379c8 GetCursorPos
 0x5379cc GetCursor
 0x5379d0 GetClientRect
 0x5379d4 GetClassLongA
 0x5379d8 GetClassInfoA
 0x5379dc GetCapture
 0x5379e0 GetActiveWindow
 0x5379e4 FrameRect
 0x5379e8 FindWindowA
 0x5379ec FillRect
 0x5379f0 EqualRect
 0x5379f4 EnumWindows
 0x5379f8 EnumThreadWindows
 0x5379fc EnumChildWindows
 0x537a00 EndPaint
 0x537a04 EnableWindow
 0x537a08 EnableScrollBar
 0x537a0c EnableMenuItem
 0x537a10 DrawTextA
 0x537a14 DrawMenuBar
 0x537a18 DrawIconEx
 0x537a1c DrawIcon
 0x537a20 DrawFrameControl
 0x537a24 DrawEdge
 0x537a28 DispatchMessageW
 0x537a2c DispatchMessageA
 0x537a30 DestroyWindow
 0x537a34 DestroyMenu
 0x537a38 DestroyIcon
 0x537a3c DestroyCursor
 0x537a40 DeleteMenu
 0x537a44 DefWindowProcA
 0x537a48 DefMDIChildProcA
 0x537a4c DefFrameProcA
 0x537a50 CreatePopupMenu
 0x537a54 CreateMenu
 0x537a58 CreateIcon
 0x537a5c ClientToScreen
 0x537a60 CheckMenuItem
 0x537a64 CallWindowProcA
 0x537a68 CallNextHookEx
 0x537a6c BeginPaint
 0x537a70 CharNextA
 0x537a74 CharLowerA
 0x537a78 CharToOemA
 0x537a7c AdjustWindowRectEx
 0x537a80 ActivateKeyboardLayout
msimg32.dll
 0x537a88 AlphaBlend
gdi32.dll
 0x537a90 UnrealizeObject
 0x537a94 StretchBlt
 0x537a98 SetWindowOrgEx
 0x537a9c SetViewportOrgEx
 0x537aa0 SetTextColor
 0x537aa4 SetStretchBltMode
 0x537aa8 SetROP2
 0x537aac SetPixel
 0x537ab0 SetDIBColorTable
 0x537ab4 SetBrushOrgEx
 0x537ab8 SetBkMode
 0x537abc SetBkColor
 0x537ac0 SelectPalette
 0x537ac4 SelectObject
 0x537ac8 SaveDC
 0x537acc RestoreDC
 0x537ad0 RectVisible
 0x537ad4 RealizePalette
 0x537ad8 PatBlt
 0x537adc MoveToEx
 0x537ae0 MaskBlt
 0x537ae4 LineTo
 0x537ae8 IntersectClipRect
 0x537aec GetWindowOrgEx
 0x537af0 GetTextMetricsA
 0x537af4 GetTextExtentPoint32A
 0x537af8 GetSystemPaletteEntries
 0x537afc GetStockObject
 0x537b00 GetRgnBox
 0x537b04 GetPixel
 0x537b08 GetPaletteEntries
 0x537b0c GetObjectA
 0x537b10 GetDeviceCaps
 0x537b14 GetDIBits
 0x537b18 GetDIBColorTable
 0x537b1c GetDCOrgEx
 0x537b20 GetCurrentPositionEx
 0x537b24 GetClipBox
 0x537b28 GetBrushOrgEx
 0x537b2c GetBitmapBits
 0x537b30 GdiFlush
 0x537b34 ExcludeClipRect
 0x537b38 DeleteObject
 0x537b3c DeleteDC
 0x537b40 CreateSolidBrush
 0x537b44 CreatePenIndirect
 0x537b48 CreatePalette
 0x537b4c CreateHalftonePalette
 0x537b50 CreateFontIndirectA
 0x537b54 CreateDIBitmap
 0x537b58 CreateDIBSection
 0x537b5c CreateCompatibleDC
 0x537b60 CreateCompatibleBitmap
 0x537b64 CreateBrushIndirect
 0x537b68 CreateBitmap
 0x537b6c BitBlt
version.dll
 0x537b74 VerQueryValueA
 0x537b78 GetFileVersionInfoSizeA
 0x537b7c GetFileVersionInfoA
kernel32.dll
 0x537b84 lstrcpyA
 0x537b88 WriteFile
 0x537b8c WaitForSingleObject
 0x537b90 VirtualQuery
 0x537b94 VirtualAlloc
 0x537b98 SizeofResource
 0x537b9c SetThreadLocale
 0x537ba0 SetFilePointer
 0x537ba4 SetEvent
 0x537ba8 SetErrorMode
 0x537bac SetEndOfFile
 0x537bb0 ResetEvent
 0x537bb4 ReadFile
 0x537bb8 MultiByteToWideChar
 0x537bbc MulDiv
 0x537bc0 LockResource
 0x537bc4 LoadResource
 0x537bc8 LoadLibraryA
 0x537bcc LeaveCriticalSection
 0x537bd0 InitializeCriticalSection
 0x537bd4 GlobalFindAtomA
 0x537bd8 GlobalDeleteAtom
 0x537bdc GlobalAddAtomA
 0x537be0 GetVersionExA
 0x537be4 GetVersion
 0x537be8 GetTickCount
 0x537bec GetThreadLocale
 0x537bf0 GetStdHandle
 0x537bf4 GetProcAddress
 0x537bf8 GetModuleHandleW
 0x537bfc GetModuleHandleA
 0x537c00 GetModuleFileNameA
 0x537c04 GetLocaleInfoA
 0x537c08 GetLocalTime
 0x537c0c GetLastError
 0x537c10 GetFullPathNameA
 0x537c14 GetDiskFreeSpaceA
 0x537c18 GetDateFormatA
 0x537c1c GetCurrentThreadId
 0x537c20 GetCurrentProcessId
 0x537c24 GetCPInfo
 0x537c28 FreeResource
 0x537c2c InterlockedExchange
 0x537c30 FreeLibrary
 0x537c34 FormatMessageA
 0x537c38 FindResourceA
 0x537c3c EnumCalendarInfoA
 0x537c40 EnterCriticalSection
 0x537c44 DeleteCriticalSection
 0x537c48 CreateThread
 0x537c4c CreateFileA
 0x537c50 CreateEventA
 0x537c54 CompareStringA
 0x537c58 CloseHandle
advapi32.dll
 0x537c60 RegQueryValueExA
 0x537c64 RegOpenKeyExA
 0x537c68 RegFlushKey
 0x537c6c RegCloseKey
oleaut32.dll
 0x537c74 GetErrorInfo
 0x537c78 SysFreeString
ole32.dll
 0x537c80 CoUninitialize
 0x537c84 CoInitialize
kernel32.dll
 0x537c8c Sleep
oleaut32.dll
 0x537c94 SafeArrayPtrOfIndex
 0x537c98 SafeArrayGetUBound
 0x537c9c SafeArrayGetLBound
 0x537ca0 SafeArrayCreate
 0x537ca4 VariantChangeType
 0x537ca8 VariantCopy
 0x537cac VariantClear
 0x537cb0 VariantInit
comctl32.dll
 0x537cb8 _TrackMouseEvent
 0x537cbc ImageList_SetIconSize
 0x537cc0 ImageList_GetIconSize
 0x537cc4 ImageList_Write
 0x537cc8 ImageList_Read
 0x537ccc ImageList_DragShowNolock
 0x537cd0 ImageList_DragMove
 0x537cd4 ImageList_DragLeave
 0x537cd8 ImageList_DragEnter
 0x537cdc ImageList_EndDrag
 0x537ce0 ImageList_BeginDrag
 0x537ce4 ImageList_Remove
 0x537ce8 ImageList_DrawEx
 0x537cec ImageList_Draw
 0x537cf0 ImageList_GetBkColor
 0x537cf4 ImageList_SetBkColor
 0x537cf8 ImageList_Add
 0x537cfc ImageList_GetImageCount
 0x537d00 ImageList_Destroy
 0x537d04 ImageList_Create

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure