Report - b8c97f27-6a38-42ce-8655-fb96a3efd9f3

Generic Malware Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2025.05.04 13:00 Machine s1_win7_x6401
Filename b8c97f27-6a38-42ce-8655-fb96a3efd9f3
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
9
Behavior Score
2.0
ZERO API file : malware
VT API (file) 60 detected (AIDetectMalware, Lumma, Malicious, score, Ghanarava, Midie, Unsafe, Save, confidence, 100%, GenusT, EUOA, Attribute, HighConfidence, high confidence, Kryptik, MalwareX, Cryp, Tedy, TrojanPSW, ShellCodeLoader, CLASSIC, gfkes, AMADEY, YXFDNZ, high, Krypt, Static AI, Suspicious PE, Detected, Malware@#wvyuqcs4hkq6, LummaC, ABTrojan, GPPO, Lazy, Artemis, GdSda, PE04C9Z, Y4yTE8TdR6Q, susgen, AP8PHU)
md5 e4af4fa65df7f861b671ca22bab64b45
sha256 3a85bdd8b7e6a8c4c148ede1282bd637425f26c362c2458b31f0ed268499f6c3
ssdeep 24576:Q4HgiyW6cRe30ZD/K/GCbSTdinsxX0zk/Hrha:QDVUM1uSSTdisxkQHrha
imphash 3a5649d16d788396ce56dd8cdabd426f
impfuzzy 24:hWs5WDCelQtzOovbOGMUG91uUvg0WDQ7UlnULPOTRKT07GiJUF6u:hW0QC5y3Z1PoJUbO/GJF6u
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 60 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1400a90c8 AcquireSRWLockExclusive
 0x1400a90d0 CloseHandle
 0x1400a90d8 CloseThreadpoolWork
 0x1400a90e0 CreateFileA
 0x1400a90e8 CreateFileW
 0x1400a90f0 CreateThreadpoolWork
 0x1400a90f8 DeleteCriticalSection
 0x1400a9100 EncodePointer
 0x1400a9108 EnterCriticalSection
 0x1400a9110 ExitProcess
 0x1400a9118 FindClose
 0x1400a9120 FindFirstFileExW
 0x1400a9128 FindNextFileW
 0x1400a9130 FlsAlloc
 0x1400a9138 FlsFree
 0x1400a9140 FlsGetValue
 0x1400a9148 FlsSetValue
 0x1400a9150 FlushFileBuffers
 0x1400a9158 FreeEnvironmentStringsW
 0x1400a9160 FreeLibrary
 0x1400a9168 FreeLibraryWhenCallbackReturns
 0x1400a9170 GetACP
 0x1400a9178 GetCPInfo
 0x1400a9180 GetCommandLineA
 0x1400a9188 GetCommandLineW
 0x1400a9190 GetConsoleMode
 0x1400a9198 GetConsoleOutputCP
 0x1400a91a0 GetConsoleWindow
 0x1400a91a8 GetCurrentProcess
 0x1400a91b0 GetCurrentProcessId
 0x1400a91b8 GetCurrentThreadId
 0x1400a91c0 GetEnvironmentStringsW
 0x1400a91c8 GetFileSize
 0x1400a91d0 GetFileSizeEx
 0x1400a91d8 GetFileType
 0x1400a91e0 GetLastError
 0x1400a91e8 GetModuleFileNameA
 0x1400a91f0 GetModuleFileNameW
 0x1400a91f8 GetModuleHandleExW
 0x1400a9200 GetModuleHandleW
 0x1400a9208 GetOEMCP
 0x1400a9210 GetProcAddress
 0x1400a9218 GetProcessHeap
 0x1400a9220 GetStartupInfoW
 0x1400a9228 GetStdHandle
 0x1400a9230 GetStringTypeW
 0x1400a9238 GetSystemTimeAsFileTime
 0x1400a9240 HeapAlloc
 0x1400a9248 HeapFree
 0x1400a9250 HeapReAlloc
 0x1400a9258 HeapSize
 0x1400a9260 InitOnceBeginInitialize
 0x1400a9268 InitOnceComplete
 0x1400a9270 InitializeCriticalSectionAndSpinCount
 0x1400a9278 InitializeCriticalSectionEx
 0x1400a9280 InitializeSListHead
 0x1400a9288 IsDebuggerPresent
 0x1400a9290 IsProcessorFeaturePresent
 0x1400a9298 IsValidCodePage
 0x1400a92a0 LCMapStringW
 0x1400a92a8 LeaveCriticalSection
 0x1400a92b0 LoadLibraryExW
 0x1400a92b8 MultiByteToWideChar
 0x1400a92c0 QueryPerformanceCounter
 0x1400a92c8 RaiseException
 0x1400a92d0 ReadFile
 0x1400a92d8 ReleaseSRWLockExclusive
 0x1400a92e0 RtlCaptureContext
 0x1400a92e8 RtlLookupFunctionEntry
 0x1400a92f0 RtlPcToFileHeader
 0x1400a92f8 RtlUnwindEx
 0x1400a9300 RtlVirtualUnwind
 0x1400a9308 SetFilePointerEx
 0x1400a9310 SetLastError
 0x1400a9318 SetStdHandle
 0x1400a9320 SetUnhandledExceptionFilter
 0x1400a9328 SleepConditionVariableSRW
 0x1400a9330 SubmitThreadpoolWork
 0x1400a9338 TerminateProcess
 0x1400a9340 TlsAlloc
 0x1400a9348 TlsFree
 0x1400a9350 TlsGetValue
 0x1400a9358 TlsSetValue
 0x1400a9360 TryAcquireSRWLockExclusive
 0x1400a9368 UnhandledExceptionFilter
 0x1400a9370 WakeAllConditionVariable
 0x1400a9378 WideCharToMultiByte
 0x1400a9380 WriteConsoleW
 0x1400a9388 WriteFile
USER32.dll
 0x1400a9398 GetWindowDC

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure