Report - ReR.exe

Generic Malware Malicious Library Antivirus Malicious Packer UPX PE File PE64
ScreenShot
Created 2025.04.21 12:38 Machine s1_win7_x6401
Filename ReR.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
1.6
ZERO API file : malware
VT API (file) 53 detected (Common, Crysan, Malicious, score, Ghanarava, GenericKD, Unsafe, A0fr, confidence, 100%, high confidence, Kryptik, swgtIFjZzO, lfogk, Detected, GrayWare, Wacapew, Malware@#8vjyf7d09bqx, Znyonm, ABTrojan, VNMR, Artemis, TrojanPSW, Rusty, AEZG, Gencirc, Gq3KUDISBxo, susgen, GenKryptik, HGGK)
md5 f3b99592f40e424a2fb51e8f60b98077
sha256 aa63cf25cfc47e6a53dc1b286e425faa8775ac0311c47ca6c59d1950cfa03251
ssdeep 24576:862XyfQvJkX7gwS264/8i3a/Hc2VQsNVrlgKueni:862XJvJkX7gwW4/Rb2+shXdn
imphash 184e98d1d9ae7bd5be8a15e7dcad9e4c
impfuzzy 48:8fpcmG+JGfwAkoqtTbfItMlmf9/4nenb1XHK:8fpcmG+JGnRqtnQtimfqnSb1XHK
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 53 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1400d54f8 DeleteCriticalSection
 0x1400d5500 EnterCriticalSection
 0x1400d5508 InitializeCriticalSection
 0x1400d5510 LeaveCriticalSection
 0x1400d5518 RaiseException
 0x1400d5520 RtlUnwindEx
 0x1400d5528 VirtualQuery
 0x1400d5530 __C_specific_handler
msvcrt.dll
 0x1400d5540 __getmainargs
 0x1400d5548 __initenv
 0x1400d5550 __iob_func
 0x1400d5558 __set_app_type
 0x1400d5560 __setusermatherr
 0x1400d5568 _amsg_exit
 0x1400d5570 _cexit
 0x1400d5578 _commode
 0x1400d5580 _fmode
 0x1400d5588 _fpreset
 0x1400d5590 _initterm
 0x1400d5598 abort
 0x1400d55a0 atexit
 0x1400d55a8 calloc
 0x1400d55b0 exit
 0x1400d55b8 fprintf
 0x1400d55c0 free
 0x1400d55c8 fwrite
 0x1400d55d0 malloc
 0x1400d55d8 memcmp
 0x1400d55e0 memcpy
 0x1400d55e8 memmove
 0x1400d55f0 memset
 0x1400d55f8 signal
 0x1400d5600 strlen
 0x1400d5608 strncmp
 0x1400d5610 vfprintf
ntdll.dll
 0x1400d5620 NtReadFile
 0x1400d5628 NtWriteFile
 0x1400d5630 RtlCaptureContext
 0x1400d5638 RtlLookupFunctionEntry
 0x1400d5640 RtlNtStatusToDosError
 0x1400d5648 RtlVirtualUnwind
advapi32.dll
 0x1400d5658 GetTokenInformation
 0x1400d5660 OpenProcessToken
 0x1400d5668 SystemFunction036
crypt.dll
 0x1400d5678 BCryptGenRandom
kernel32.dll
 0x1400d5688 AddVectoredExceptionHandler
 0x1400d5690 CancelIo
 0x1400d5698 CloseHandle
 0x1400d56a0 CompareStringOrdinal
 0x1400d56a8 CreateEventW
 0x1400d56b0 CreateFileMappingA
 0x1400d56b8 CreateFileW
 0x1400d56c0 CreateMutexA
 0x1400d56c8 CreateNamedPipeW
 0x1400d56d0 CreateProcessW
 0x1400d56d8 CreateThread
 0x1400d56e0 CreateTimerQueue
 0x1400d56e8 CreateToolhelp32Snapshot
 0x1400d56f0 DeleteProcThreadAttributeList
 0x1400d56f8 DeleteTimerQueue
 0x1400d5700 DuplicateHandle
 0x1400d5708 ExitProcess
 0x1400d5710 FindClose
 0x1400d5718 FindFirstFileExW
 0x1400d5720 FormatMessageW
 0x1400d5728 FreeEnvironmentStringsW
 0x1400d5730 GetCommandLineW
 0x1400d5738 GetConsoleMode
 0x1400d5740 GetCurrentDirectoryW
 0x1400d5748 GetCurrentProcess
 0x1400d5750 GetCurrentProcessId
 0x1400d5758 GetCurrentThread
 0x1400d5760 GetEnvironmentStringsW
 0x1400d5768 GetEnvironmentVariableW
 0x1400d5770 GetExitCodeProcess
 0x1400d5778 GetFileAttributesW
 0x1400d5780 GetFileInformationByHandle
 0x1400d5788 GetFileInformationByHandleEx
 0x1400d5790 GetFullPathNameW
 0x1400d5798 GetLastError
 0x1400d57a0 GetModuleFileNameW
 0x1400d57a8 GetModuleHandleA
 0x1400d57b0 GetModuleHandleExW
 0x1400d57b8 GetModuleHandleW
 0x1400d57c0 GetOverlappedResult
 0x1400d57c8 GetProcAddress
 0x1400d57d0 GetProcessHeap
 0x1400d57d8 GetStdHandle
 0x1400d57e0 GetSystemDirectoryW
 0x1400d57e8 GetWindowsDirectoryW
 0x1400d57f0 HeapAlloc
 0x1400d57f8 HeapCreate
 0x1400d5800 HeapFree
 0x1400d5808 HeapReAlloc
 0x1400d5810 InitOnceBeginInitialize
 0x1400d5818 InitOnceComplete
 0x1400d5820 InitializeProcThreadAttributeList
 0x1400d5828 LoadLibraryA
 0x1400d5830 MapViewOfFile
 0x1400d5838 Module32FirstW
 0x1400d5840 Module32NextW
 0x1400d5848 MultiByteToWideChar
 0x1400d5850 Process32FirstW
 0x1400d5858 Process32NextW
 0x1400d5860 ReadFile
 0x1400d5868 ReadFileEx
 0x1400d5870 SetEvent
 0x1400d5878 SetFileInformationByHandle
 0x1400d5880 SetLastError
 0x1400d5888 SetThreadStackGuarantee
 0x1400d5890 SetUnhandledExceptionFilter
 0x1400d5898 Sleep
 0x1400d58a0 SleepEx
 0x1400d58a8 TlsAlloc
 0x1400d58b0 TlsFree
 0x1400d58b8 TlsGetValue
 0x1400d58c0 TlsSetValue
 0x1400d58c8 UnmapViewOfFile
 0x1400d58d0 UpdateProcThreadAttribute
 0x1400d58d8 VirtualProtect
 0x1400d58e0 WaitForMultipleObjects
 0x1400d58e8 WaitForSingleObject
 0x1400d58f0 WriteConsoleW
 0x1400d58f8 WriteFileEx
api-ms-win-core-synch-l1-2-0.dll
 0x1400d5908 WaitOnAddress
 0x1400d5910 WakeByAddressAll
 0x1400d5918 WakeByAddressSingle
cryptprimitives.dll
 0x1400d5928 ProcessPrng

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure