Report - 2708-b6c4ee2dbf451589.exe_

Gen1 Malicious Packer Malicious Library UPX PE File PE64
ScreenShot
Created 2025.05.04 16:46 Machine s1_win7_x6401
Filename 2708-b6c4ee2dbf451589.exe_
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
4
Behavior Score
0.2
ZERO API file : clean
VT API (file)
md5 307d30b4b02c9d2bae54d825a7117219
sha256 6d02217f1cc0de64bcb6b4c3dd7311b227dc51e6af08bbd8e87045fb05536ffd
ssdeep 12288:MU9G6DMzHMMHMMMyMMMZMMMVcR9bzOXmMMMiMMMz8JMMHMMM6MMZMMMeXNMMzMMw:MMGLbMMHMMMvMMZMMMKzb6XmMMMiMMMJ
imphash 1ef9fb38f852f07964d44af800f98c5a
impfuzzy 48:hb/CTVKMCL3IprZPZNop7QdP1l9uIAjv5yj+pLnSbUFQBYhC/XG3yf6Dm0:BCTVKjL3edBNop7QdP1l9uybbBYhEG3b
  Network IP location

Signature (1cnts)

Level Description
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (6cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0xa36000 EventWrite
 0xa36008 GetTraceEnableFlags
 0xa36010 RegQueryValueExW
 0xa36018 EventUnregister
 0xa36020 GetTraceLoggerHandle
 0xa36028 TraceEvent
 0xa36030 UnregisterTraceGuids
 0xa36038 RegOpenKeyExW
 0xa36040 EventRegister
 0xa36048 GetTraceEnableLevel
 0xa36050 RegCloseKey
 0xa36058 RegisterTraceGuidsW
KERNEL32.dll
 0xa36068 TerminateProcess
 0xa36070 CreateFileW
 0xa36078 lstrlenW
 0xa36080 VerifyVersionInfoW
 0xa36088 GetProcAddress
 0xa36090 LocalAlloc
 0xa36098 IsWow64Process
 0xa360a0 HeapSetInformation
 0xa360a8 GetFileTime
 0xa360b0 DeleteCriticalSection
 0xa360b8 CloseHandle
 0xa360c0 GetWindowsDirectoryW
 0xa360c8 LocalFree
 0xa360d0 InitializeCriticalSection
 0xa360d8 LoadLibraryW
 0xa360e0 GetModuleHandleW
 0xa360e8 GetCurrentProcess
 0xa360f0 VerSetConditionMask
 0xa360f8 SetDllDirectoryW
 0xa36100 CreateProcessW
 0xa36108 SetErrorMode
 0xa36110 GetCommandLineW
 0xa36118 RaiseException
 0xa36120 LoadLibraryA
 0xa36128 VirtualAlloc
 0xa36130 GetLastError
 0xa36138 GetSystemDefaultLCID
 0xa36140 GetUserDefaultLCID
 0xa36148 EnterCriticalSection
 0xa36150 GetModuleFileNameW
 0xa36158 LeaveCriticalSection
 0xa36160 InitializeCriticalSectionAndSpinCount
 0xa36168 GetVersionExA
 0xa36170 ExpandEnvironmentStringsW
 0xa36178 FreeLibrary
 0xa36180 UnhandledExceptionFilter
 0xa36188 GetSystemTimeAsFileTime
 0xa36190 GetCurrentProcessId
 0xa36198 GetCurrentThreadId
 0xa361a0 GetTickCount
 0xa361a8 QueryPerformanceCounter
 0xa361b0 SetUnhandledExceptionFilter
 0xa361b8 GetStartupInfoW
 0xa361c0 Sleep
 0xa361c8 GetCurrentDirectoryW
USER32.dll
 0xa361d8 IsWindowEnabled
 0xa361e0 LoadStringW
 0xa361e8 CharNextW
 0xa361f0 SendMessageTimeoutW
 0xa361f8 GetWindowThreadProcessId
 0xa36200 FindWindowExW
 0xa36208 AllowSetForegroundWindow
 0xa36210 IsWindowVisible
 0xa36218 MessageBoxW
msvcrt.dll
 0xa36228 rand_s
 0xa36230 memset
 0xa36238 ??3@YAXPEAX@Z
 0xa36240 ??2@YAPEAX_K@Z
 0xa36248 wcschr
 0xa36250 iswalpha
 0xa36258 _vsnwprintf
 0xa36260 iswspace
 0xa36268 _onexit
 0xa36270 _lock
 0xa36278 __dllonexit
 0xa36280 _unlock
 0xa36288 ?terminate@@YAXXZ
 0xa36290 __set_app_type
 0xa36298 _fmode
 0xa362a0 _commode
 0xa362a8 __setusermatherr
 0xa362b0 _amsg_exit
 0xa362b8 _initterm
 0xa362c0 _wcmdln
 0xa362c8 exit
 0xa362d0 _cexit
 0xa362d8 _exit
 0xa362e0 _XcptFilter
 0xa362e8 __C_specific_handler
 0xa362f0 __wgetmainargs
 0xa362f8 wcsncmp
 0xa36300 memcpy
ntdll.dll
 0xa36310 RtlVirtualUnwind
 0xa36318 RtlCaptureContext
 0xa36320 RtlLookupFunctionEntry
SHLWAPI.dll
 0xa36330 None
 0xa36338 SHGetValueW
 0xa36340 SHRegGetValueW
 0xa36348 SHSetValueW
 0xa36350 UrlApplySchemeW
 0xa36358 PathIsURLW
 0xa36360 UrlCanonicalizeW
 0xa36368 StrStrW
 0xa36370 None
 0xa36378 PathFindFileNameW
 0xa36380 UrlCreateFromPathW
SHELL32.dll
 0xa36390 CommandLineToArgvW
ole32.dll
 0xa363a0 CoUninitialize
 0xa363a8 CoInitialize
urlmon.dll
 0xa363b8 None
 0xa363c0 None
iertutil.dll
 0xa363d0 None
 0xa363d8 None
 0xa363e0 None
 0xa363e8 None
 0xa363f0 None
 0xa363f8 None
 0xa36400 None
 0xa36408 None
 0xa36410 None

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure