Report - v1.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2025.04.04 09:58 Machine s1_win7_x6403
Filename v1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
5.0
ZERO API file : malware
VT API (file) 50 detected (AIDetectMalware, Fsysna, Malicious, score, Artemis, Lazy, Unsafe, Save, confidence, 100%, Attribute, HighConfidence, moderate confidence, AHGU, MalwareX, CLOUD, zcthx, DarkCrystal, high, Static AI, Malicious PE, Detected, GrayWare, Wacapew, Wacatac, ABApplication, GSJC, BScope, Chgt, PE04C9V, Gencirc, susgen, PossibleThreat, C9nj)
md5 5b61fae91f37fdfd32ff77482ae052de
sha256 08bd79b8333434a9f742c9e686f1586712bc5c16b306b029b1bb35d6ac06a41e
ssdeep 49152:8BtYGfDXn9BbTm1Sgc33QkkUWr4ysJtWFcMESQw1jetufbP49GDt7AXQ2sFC5fmn:KYYVJQklcRMKje+A9Yt8A2sSm82
imphash 7834776e1264ca97747afdbb59e43246
impfuzzy 24:ziucpVWjstMS1JMdlJBl3eDoxHvJ9GZYGMACpOovbOPZpP:eucpVwstMS1JMDphyZ/3jP
  Network IP location

Signature (12cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
watch Detects VMWare through the in instruction feature
notice A process created a hidden window
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://xabanak.ru/cl1/hick.txt TR M247 Ltd 185.100.157.137 clean
xabanak.ru TR M247 Ltd 185.100.157.137 clean
185.100.157.137 TR M247 Ltd 185.100.157.137 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x425000 SetErrorMode
 0x425004 Sleep
 0x425008 GetTempPathA
 0x42500c CloseHandle
 0x425010 ExitProcess
 0x425014 CreateProcessA
 0x425018 GetTempFileNameA
 0x42501c IsDebuggerPresent
 0x425020 WriteConsoleW
 0x425024 HeapSize
 0x425028 CreateFileW
 0x42502c GetProcessHeap
 0x425030 SetStdHandle
 0x425034 EnterCriticalSection
 0x425038 LeaveCriticalSection
 0x42503c InitializeCriticalSectionEx
 0x425040 DeleteCriticalSection
 0x425044 EncodePointer
 0x425048 DecodePointer
 0x42504c MultiByteToWideChar
 0x425050 WideCharToMultiByte
 0x425054 LCMapStringEx
 0x425058 GetStringTypeW
 0x42505c GetCPInfo
 0x425060 UnhandledExceptionFilter
 0x425064 SetUnhandledExceptionFilter
 0x425068 GetCurrentProcess
 0x42506c TerminateProcess
 0x425070 IsProcessorFeaturePresent
 0x425074 QueryPerformanceCounter
 0x425078 GetCurrentProcessId
 0x42507c GetCurrentThreadId
 0x425080 GetSystemTimeAsFileTime
 0x425084 InitializeSListHead
 0x425088 GetStartupInfoW
 0x42508c GetModuleHandleW
 0x425090 RtlUnwind
 0x425094 RaiseException
 0x425098 GetLastError
 0x42509c SetLastError
 0x4250a0 InitializeCriticalSectionAndSpinCount
 0x4250a4 TlsAlloc
 0x4250a8 TlsGetValue
 0x4250ac TlsSetValue
 0x4250b0 TlsFree
 0x4250b4 FreeLibrary
 0x4250b8 GetProcAddress
 0x4250bc LoadLibraryExW
 0x4250c0 GetStdHandle
 0x4250c4 WriteFile
 0x4250c8 GetModuleFileNameW
 0x4250cc GetModuleHandleExW
 0x4250d0 GetFileSizeEx
 0x4250d4 SetFilePointerEx
 0x4250d8 GetFileType
 0x4250dc HeapAlloc
 0x4250e0 HeapFree
 0x4250e4 FlsAlloc
 0x4250e8 FlsGetValue
 0x4250ec FlsSetValue
 0x4250f0 FlsFree
 0x4250f4 VirtualProtect
 0x4250f8 LCMapStringW
 0x4250fc GetLocaleInfoW
 0x425100 IsValidLocale
 0x425104 GetUserDefaultLCID
 0x425108 EnumSystemLocalesW
 0x42510c FlushFileBuffers
 0x425110 GetConsoleOutputCP
 0x425114 GetConsoleMode
 0x425118 ReadFile
 0x42511c ReadConsoleW
 0x425120 HeapReAlloc
 0x425124 FindClose
 0x425128 FindFirstFileExW
 0x42512c FindNextFileW
 0x425130 IsValidCodePage
 0x425134 GetACP
 0x425138 GetOEMCP
 0x42513c GetCommandLineA
 0x425140 GetCommandLineW
 0x425144 GetEnvironmentStringsW
 0x425148 FreeEnvironmentStringsW
 0x42514c SetEndOfFile
WININET.dll
 0x425154 InternetOpenW
 0x425158 InternetOpenUrlA
 0x42515c InternetCloseHandle
 0x425160 InternetReadFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure