Report - f746365d-e454-4fac-a059-be9e01e75e0f

Generic Malware Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2025.05.04 12:59 Machine s1_win7_x6403
Filename f746365d-e454-4fac-a059-be9e01e75e0f
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
9
Behavior Score
2.6
ZERO API file : malware
VT API (file) 61 detected (Common, Lumma, Malicious, score, Trojanpws, RAHack, Lazy, Unsafe, Save, confidence, 100%, GenusT, EVXL, Attribute, HighConfidence, high confidence, Kryptik, MalwareX, Cryp, Generickdz, GenKryptik, RQXP1syK4OE, eauvo, AMADEY, YXFDQZ, Krypt, Static AI, Suspicious PE, Detected, Sabsik, Malware@#l2xfxuqrg9re, LummaC, ABTrojan, JFLR, R700938, Artemis, TrojanPSW, Chgt, PE04C9Z, BSZouKqpwC0, susgen)
md5 36bf166a1ffe829e06d98d49040f8f52
sha256 b58247965374b18d62e2ba91ef3e217ffdc89136ab45d51357a05cc787d53be7
ssdeep 24576:3Kcz2aN34WWXN/FA2TSfMwnFOQtbuxw8uDSfBgTSfMwnFOQtbuxw8uDSfBJ:ZV3WFA22E/QxuwXaBg2E/QxuwXaBJ
imphash 27edcdc26ece14730711ef2521583ca2
impfuzzy 24:hWnxWDoQlQtyOovbOGMUD1ulvgkWDpZWylnjBLPxQXRKT07GyiJUJYjz:hWxQo3l3612MZxJjBbxQrGyJJC
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 61 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
45.227.253.10 PA Global Layer B.V. 45.227.253.10 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14007d758 AcquireSRWLockExclusive
 0x14007d760 CloseHandle
 0x14007d768 CreateFileA
 0x14007d770 CreateFileW
 0x14007d778 CreateThread
 0x14007d780 DecodePointer
 0x14007d788 DeleteCriticalSection
 0x14007d790 EncodePointer
 0x14007d798 EnterCriticalSection
 0x14007d7a0 EnumSystemLocalesW
 0x14007d7a8 ExitProcess
 0x14007d7b0 ExitThread
 0x14007d7b8 FindClose
 0x14007d7c0 FindFirstFileExW
 0x14007d7c8 FindNextFileW
 0x14007d7d0 FlsAlloc
 0x14007d7d8 FlsFree
 0x14007d7e0 FlsGetValue
 0x14007d7e8 FlsSetValue
 0x14007d7f0 FlushFileBuffers
 0x14007d7f8 FreeEnvironmentStringsW
 0x14007d800 FreeLibrary
 0x14007d808 FreeLibraryAndExitThread
 0x14007d810 GetACP
 0x14007d818 GetCPInfo
 0x14007d820 GetCommandLineA
 0x14007d828 GetCommandLineW
 0x14007d830 GetConsoleMode
 0x14007d838 GetConsoleOutputCP
 0x14007d840 GetCurrentProcess
 0x14007d848 GetCurrentProcessId
 0x14007d850 GetCurrentThreadId
 0x14007d858 GetEnvironmentStringsW
 0x14007d860 GetExitCodeThread
 0x14007d868 GetFileSize
 0x14007d870 GetFileSizeEx
 0x14007d878 GetFileType
 0x14007d880 GetLastError
 0x14007d888 GetLocaleInfoW
 0x14007d890 GetModuleFileNameW
 0x14007d898 GetModuleHandleA
 0x14007d8a0 GetModuleHandleExW
 0x14007d8a8 GetModuleHandleW
 0x14007d8b0 GetOEMCP
 0x14007d8b8 GetProcAddress
 0x14007d8c0 GetProcessHeap
 0x14007d8c8 GetStartupInfoW
 0x14007d8d0 GetStdHandle
 0x14007d8d8 GetStringTypeW
 0x14007d8e0 GetSystemTimeAsFileTime
 0x14007d8e8 GetUserDefaultLCID
 0x14007d8f0 HeapAlloc
 0x14007d8f8 HeapFree
 0x14007d900 HeapReAlloc
 0x14007d908 HeapSize
 0x14007d910 InitializeCriticalSectionAndSpinCount
 0x14007d918 InitializeCriticalSectionEx
 0x14007d920 InitializeSListHead
 0x14007d928 IsDebuggerPresent
 0x14007d930 IsProcessorFeaturePresent
 0x14007d938 IsValidCodePage
 0x14007d940 IsValidLocale
 0x14007d948 LCMapStringEx
 0x14007d950 LCMapStringW
 0x14007d958 LeaveCriticalSection
 0x14007d960 LoadLibraryExW
 0x14007d968 MultiByteToWideChar
 0x14007d970 QueryPerformanceCounter
 0x14007d978 QueryPerformanceFrequency
 0x14007d980 RaiseException
 0x14007d988 ReadConsoleW
 0x14007d990 ReadFile
 0x14007d998 ReleaseSRWLockExclusive
 0x14007d9a0 RtlCaptureContext
 0x14007d9a8 RtlLookupFunctionEntry
 0x14007d9b0 RtlPcToFileHeader
 0x14007d9b8 RtlUnwind
 0x14007d9c0 RtlUnwindEx
 0x14007d9c8 RtlVirtualUnwind
 0x14007d9d0 SetFilePointerEx
 0x14007d9d8 SetLastError
 0x14007d9e0 SetStdHandle
 0x14007d9e8 SetUnhandledExceptionFilter
 0x14007d9f0 Sleep
 0x14007d9f8 SleepConditionVariableSRW
 0x14007da00 TerminateProcess
 0x14007da08 TlsAlloc
 0x14007da10 TlsFree
 0x14007da18 TlsGetValue
 0x14007da20 TlsSetValue
 0x14007da28 TryAcquireSRWLockExclusive
 0x14007da30 UnhandledExceptionFilter
 0x14007da38 WaitForSingleObjectEx
 0x14007da40 WakeAllConditionVariable
 0x14007da48 WideCharToMultiByte
 0x14007da50 WriteConsoleW
 0x14007da58 WriteFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure