Report - 555.exe

Generic Malware ASPack Malicious Library UPX Antivirus AntiDebug AntiVM PE File PE64 OS Processor Check PowerShell
ScreenShot
Created 2025.05.07 10:48 Machine s1_win7_x6403
Filename 555.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
3
Behavior Score
5.4
ZERO API file : clean
VT API (file) 17 detected (malicious, confidence, MalwareX, gCcZotw6NvJ, kmqar, Malgent, Wacatac, M7YQWK, Artemis, Oader, Xdkl)
md5 de6af1eafe53bd667bb1f8af8b216278
sha256 8e483c74f3ae9b8e4b3321a2a639d272cf15845957b14f82ac297fb6c7ab63a8
ssdeep 3072:DyKSmX8M5mlhzgEXbDTBhBOMZUMLEcg63tXjwy5AoUytnRPF9EVnb43jaI5grk:DvzX8ymlhzgEXbDYMZUMgc3RAojtnRPT
imphash bafa80c3a38668b486cc90952176fceb
impfuzzy 24:Wj702tMS17BgdlJeDc+pl3eDoLoBUSOovbO9Ziv8GGMM:0tMS17Bgic+ppXX3Ac
  Network IP location

Signature (16cnts)

Level Description
watch File has been identified by 17 AntiVirus engines on VirusTotal as malicious
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (19cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140014000 WaitForSingleObject
 0x140014008 Sleep
 0x140014010 CloseHandle
 0x140014018 GetExitCodeProcess
 0x140014020 WriteConsoleW
 0x140014028 CreateFileW
 0x140014030 RtlCaptureContext
 0x140014038 RtlLookupFunctionEntry
 0x140014040 RtlVirtualUnwind
 0x140014048 UnhandledExceptionFilter
 0x140014050 SetUnhandledExceptionFilter
 0x140014058 GetCurrentProcess
 0x140014060 TerminateProcess
 0x140014068 IsProcessorFeaturePresent
 0x140014070 QueryPerformanceCounter
 0x140014078 GetCurrentProcessId
 0x140014080 GetCurrentThreadId
 0x140014088 GetSystemTimeAsFileTime
 0x140014090 InitializeSListHead
 0x140014098 IsDebuggerPresent
 0x1400140a0 GetStartupInfoW
 0x1400140a8 GetModuleHandleW
 0x1400140b0 RtlUnwindEx
 0x1400140b8 RtlPcToFileHeader
 0x1400140c0 RaiseException
 0x1400140c8 GetLastError
 0x1400140d0 SetLastError
 0x1400140d8 EncodePointer
 0x1400140e0 EnterCriticalSection
 0x1400140e8 LeaveCriticalSection
 0x1400140f0 DeleteCriticalSection
 0x1400140f8 InitializeCriticalSectionAndSpinCount
 0x140014100 TlsAlloc
 0x140014108 TlsGetValue
 0x140014110 TlsSetValue
 0x140014118 TlsFree
 0x140014120 FreeLibrary
 0x140014128 GetProcAddress
 0x140014130 LoadLibraryExW
 0x140014138 GetStdHandle
 0x140014140 WriteFile
 0x140014148 GetModuleFileNameW
 0x140014150 ExitProcess
 0x140014158 GetModuleHandleExW
 0x140014160 HeapAlloc
 0x140014168 HeapFree
 0x140014170 FindClose
 0x140014178 FindFirstFileExW
 0x140014180 FindNextFileW
 0x140014188 IsValidCodePage
 0x140014190 GetACP
 0x140014198 GetOEMCP
 0x1400141a0 GetCPInfo
 0x1400141a8 GetCommandLineA
 0x1400141b0 GetCommandLineW
 0x1400141b8 MultiByteToWideChar
 0x1400141c0 WideCharToMultiByte
 0x1400141c8 GetEnvironmentStringsW
 0x1400141d0 FreeEnvironmentStringsW
 0x1400141d8 SetStdHandle
 0x1400141e0 GetFileType
 0x1400141e8 GetStringTypeW
 0x1400141f0 FlsAlloc
 0x1400141f8 FlsGetValue
 0x140014200 FlsSetValue
 0x140014208 FlsFree
 0x140014210 LCMapStringW
 0x140014218 GetProcessHeap
 0x140014220 HeapSize
 0x140014228 HeapReAlloc
 0x140014230 FlushFileBuffers
 0x140014238 GetConsoleOutputCP
 0x140014240 GetConsoleMode
 0x140014248 SetFilePointerEx
SHELL32.dll
 0x140014258 ShellExecuteExW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure