Report - fV8FBMo.exe

Generic Malware Malicious Library UPX Antivirus PE File PE64 OS Processor Check PowerShell
ScreenShot
Created 2025.05.03 16:47 Machine s1_win7_x6401
Filename fV8FBMo.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
2
Behavior Score
5.0
ZERO API file : malware
VT API (file) 46 detected (Malicious, score, trojanpws, lumma, Midie, Unsafe, Vb74, confidence, Attribute, HighConfidence, high confidence, MalwareX, Zusy, smehks, iz8Ybn2nrCG, Nekark, rcezp, AMADEY, YXFEBZ, Detected, Phonzy, Egairtigado, ABTrojan, ZOZJ, R702902, Artemis, Outbreak, Chgt, Oader, Edhl, susgen, Sonbokli, A9uj)
md5 e486514c59693500ac16578e8f41c267
sha256 0f19f2867c4bf94646b3410baa29092856f29e3851d144cd4e18b0475f53d017
ssdeep 6144:yIPiTodq23+vUwqVs9jiFZbLHLifOXaiWEXsNjmcohdfts:YwqxvUnsIZbLHGIBsN9oh
imphash 261b2bf5d3e981c1d4ef0b71f10a899a
impfuzzy 24:+FxQBKAWnjDYc+WZF02tVrBgdlJBl39ro6rOovbO39RFZMvNjzGMAkEZHu9F9Dh:AxQ/WnQc+eltVrBgDpZu3rFZGb9l
  Network IP location

Signature (13cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
watch The process powershell.exe wrote an executable file to disk
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (9cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140043028 HeapSize
 0x140043030 GetConsoleWindow
 0x140043038 Sleep
 0x140043040 GetModuleFileNameW
 0x140043048 CreateFileW
 0x140043050 WriteConsoleW
 0x140043058 CreateDirectoryW
 0x140043060 SetStdHandle
 0x140043068 MultiByteToWideChar
 0x140043070 QueryPerformanceCounter
 0x140043078 QueryPerformanceFrequency
 0x140043080 GetStringTypeW
 0x140043088 WideCharToMultiByte
 0x140043090 GetCurrentThreadId
 0x140043098 ReleaseSRWLockExclusive
 0x1400430a0 AcquireSRWLockExclusive
 0x1400430a8 TryAcquireSRWLockExclusive
 0x1400430b0 CloseHandle
 0x1400430b8 InitializeCriticalSectionEx
 0x1400430c0 GetSystemTimeAsFileTime
 0x1400430c8 GetModuleHandleW
 0x1400430d0 GetProcAddress
 0x1400430d8 EnterCriticalSection
 0x1400430e0 LeaveCriticalSection
 0x1400430e8 DeleteCriticalSection
 0x1400430f0 EncodePointer
 0x1400430f8 DecodePointer
 0x140043100 LCMapStringEx
 0x140043108 WakeAllConditionVariable
 0x140043110 GetCPInfo
 0x140043118 RtlCaptureContext
 0x140043120 RtlLookupFunctionEntry
 0x140043128 RtlVirtualUnwind
 0x140043130 UnhandledExceptionFilter
 0x140043138 SetUnhandledExceptionFilter
 0x140043140 GetCurrentProcess
 0x140043148 TerminateProcess
 0x140043150 IsProcessorFeaturePresent
 0x140043158 IsDebuggerPresent
 0x140043160 GetStartupInfoW
 0x140043168 GetCurrentProcessId
 0x140043170 InitializeSListHead
 0x140043178 RtlUnwindEx
 0x140043180 RtlPcToFileHeader
 0x140043188 RaiseException
 0x140043190 GetLastError
 0x140043198 SetLastError
 0x1400431a0 InitializeCriticalSectionAndSpinCount
 0x1400431a8 TlsAlloc
 0x1400431b0 TlsGetValue
 0x1400431b8 TlsSetValue
 0x1400431c0 TlsFree
 0x1400431c8 FreeLibrary
 0x1400431d0 LoadLibraryExW
 0x1400431d8 ExitProcess
 0x1400431e0 GetModuleHandleExW
 0x1400431e8 CreateThread
 0x1400431f0 ExitThread
 0x1400431f8 FreeLibraryAndExitThread
 0x140043200 GetStdHandle
 0x140043208 WriteFile
 0x140043210 GetCommandLineA
 0x140043218 GetCommandLineW
 0x140043220 HeapAlloc
 0x140043228 HeapFree
 0x140043230 FlsAlloc
 0x140043238 FlsGetValue
 0x140043240 FlsSetValue
 0x140043248 FlsFree
 0x140043250 CompareStringW
 0x140043258 LCMapStringW
 0x140043260 GetLocaleInfoW
 0x140043268 IsValidLocale
 0x140043270 GetUserDefaultLCID
 0x140043278 EnumSystemLocalesW
 0x140043280 GetFileType
 0x140043288 WaitForSingleObject
 0x140043290 GetExitCodeProcess
 0x140043298 CreateProcessW
 0x1400432a0 GetFileAttributesExW
 0x1400432a8 FlushFileBuffers
 0x1400432b0 GetConsoleOutputCP
 0x1400432b8 GetConsoleMode
 0x1400432c0 ReadFile
 0x1400432c8 GetFileSizeEx
 0x1400432d0 SetFilePointerEx
 0x1400432d8 ReadConsoleW
 0x1400432e0 HeapReAlloc
 0x1400432e8 FindClose
 0x1400432f0 FindFirstFileExW
 0x1400432f8 FindNextFileW
 0x140043300 IsValidCodePage
 0x140043308 GetACP
 0x140043310 GetOEMCP
 0x140043318 GetEnvironmentStringsW
 0x140043320 FreeEnvironmentStringsW
 0x140043328 SetEnvironmentVariableW
 0x140043330 GetProcessHeap
 0x140043338 RtlUnwind
USER32.dll
 0x140043358 ShowWindow
ADVAPI32.dll
 0x140043000 FreeSid
 0x140043008 CheckTokenMembership
 0x140043010 GetUserNameW
 0x140043018 AllocateAndInitializeSid
SHELL32.dll
 0x140043348 ShellExecuteW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure