Report - bbb93408-47df-4f4a-804c-3eaf3ace1ba7

Gen1 Generic Malware Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2025.05.04 12:48 Machine s1_win7_x6403
Filename bbb93408-47df-4f4a-804c-3eaf3ace1ba7
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
4
Behavior Score
2.0
ZERO API file : malware
VT API (file) 59 detected (Common, Lumma, Malicious, score, Ghanarava, VirusWinExpiro, Lazy, Unsafe, Save, confidence, 100%, GenusT, EVLI, Attribute, HighConfidence, high confidence, Kryptik, MalwareX, Misc, TrojanPSW, ShellCodeLoader, CLASSIC, rztue, DarkCloud, GenKryptik, AMADEY, YXFDNZ, Krypt, Detected, Malware@#1d9lk7ct9mfaz, LummaC, R700157, Artemis, GdSda, PE04C9Z, Lummastealer, Wm69qn7NSv0, susgen, HIDQ, GYH2XJC)
md5 1b5112e140ac0198d1b372c364c40eea
sha256 5bca93120244ae288480d720109bdb58928cfb4737d8a1c76c1d6f0428372ded
ssdeep 24576:rFtBhmrPJpYSHCLuc/NQXzwX6pYPq50IIyXzwX6pYPq50II:xfo6NfXMYPqEXMYPq
imphash a898adc0428740dd4fad8431feafaf7a
impfuzzy 24:hWsWWDoelQtzOovbOGMUD1uUvgkWDpZW7UlnjBLPxQXRKT07GyiJUc8:hWhQo5y361PMZhJjBbxQrGyJc8
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (7cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1400c6090 AcquireSRWLockExclusive
 0x1400c6098 CloseHandle
 0x1400c60a0 CloseThreadpoolWork
 0x1400c60a8 CreateFileA
 0x1400c60b0 CreateFileW
 0x1400c60b8 CreateThreadpoolWork
 0x1400c60c0 DecodePointer
 0x1400c60c8 DeleteCriticalSection
 0x1400c60d0 EncodePointer
 0x1400c60d8 EnterCriticalSection
 0x1400c60e0 EnumSystemLocalesW
 0x1400c60e8 ExitProcess
 0x1400c60f0 FindClose
 0x1400c60f8 FindFirstFileExW
 0x1400c6100 FindNextFileW
 0x1400c6108 FlsAlloc
 0x1400c6110 FlsFree
 0x1400c6118 FlsGetValue
 0x1400c6120 FlsSetValue
 0x1400c6128 FlushFileBuffers
 0x1400c6130 FreeEnvironmentStringsW
 0x1400c6138 FreeLibrary
 0x1400c6140 FreeLibraryWhenCallbackReturns
 0x1400c6148 GetACP
 0x1400c6150 GetCPInfo
 0x1400c6158 GetCommandLineA
 0x1400c6160 GetCommandLineW
 0x1400c6168 GetConsoleMode
 0x1400c6170 GetConsoleOutputCP
 0x1400c6178 GetCurrentProcess
 0x1400c6180 GetCurrentProcessId
 0x1400c6188 GetCurrentThreadId
 0x1400c6190 GetEnvironmentStringsW
 0x1400c6198 GetFileSize
 0x1400c61a0 GetFileSizeEx
 0x1400c61a8 GetFileType
 0x1400c61b0 GetLastError
 0x1400c61b8 GetLocaleInfoW
 0x1400c61c0 GetModuleFileNameW
 0x1400c61c8 GetModuleHandleA
 0x1400c61d0 GetModuleHandleExW
 0x1400c61d8 GetModuleHandleW
 0x1400c61e0 GetOEMCP
 0x1400c61e8 GetProcAddress
 0x1400c61f0 GetProcessHeap
 0x1400c61f8 GetStartupInfoW
 0x1400c6200 GetStdHandle
 0x1400c6208 GetStringTypeW
 0x1400c6210 GetSystemTimeAsFileTime
 0x1400c6218 GetUserDefaultLCID
 0x1400c6220 HeapAlloc
 0x1400c6228 HeapFree
 0x1400c6230 HeapReAlloc
 0x1400c6238 HeapSize
 0x1400c6240 InitOnceBeginInitialize
 0x1400c6248 InitOnceComplete
 0x1400c6250 InitializeCriticalSectionAndSpinCount
 0x1400c6258 InitializeCriticalSectionEx
 0x1400c6260 InitializeSListHead
 0x1400c6268 IsDebuggerPresent
 0x1400c6270 IsProcessorFeaturePresent
 0x1400c6278 IsValidCodePage
 0x1400c6280 IsValidLocale
 0x1400c6288 LCMapStringEx
 0x1400c6290 LCMapStringW
 0x1400c6298 LeaveCriticalSection
 0x1400c62a0 LoadLibraryExW
 0x1400c62a8 MultiByteToWideChar
 0x1400c62b0 QueryPerformanceCounter
 0x1400c62b8 QueryPerformanceFrequency
 0x1400c62c0 RaiseException
 0x1400c62c8 ReadConsoleW
 0x1400c62d0 ReadFile
 0x1400c62d8 ReleaseSRWLockExclusive
 0x1400c62e0 RtlCaptureContext
 0x1400c62e8 RtlLookupFunctionEntry
 0x1400c62f0 RtlPcToFileHeader
 0x1400c62f8 RtlUnwind
 0x1400c6300 RtlUnwindEx
 0x1400c6308 RtlVirtualUnwind
 0x1400c6310 SetFilePointerEx
 0x1400c6318 SetLastError
 0x1400c6320 SetStdHandle
 0x1400c6328 SetUnhandledExceptionFilter
 0x1400c6330 Sleep
 0x1400c6338 SleepConditionVariableSRW
 0x1400c6340 SubmitThreadpoolWork
 0x1400c6348 TerminateProcess
 0x1400c6350 TlsAlloc
 0x1400c6358 TlsFree
 0x1400c6360 TlsGetValue
 0x1400c6368 TlsSetValue
 0x1400c6370 TryAcquireSRWLockExclusive
 0x1400c6378 UnhandledExceptionFilter
 0x1400c6380 WakeAllConditionVariable
 0x1400c6388 WideCharToMultiByte
 0x1400c6390 WriteConsoleW
 0x1400c6398 WriteFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure