Report - 5afe4f55-3d33-485a-a988-c907a1833384

Generic Malware Malicious Library UPX Antivirus PE File PE64 OS Processor Check PowerShell
ScreenShot
Created 2025.05.04 12:53 Machine s1_win7_x6403
Filename 5afe4f55-3d33-485a-a988-c907a1833384
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
2
Behavior Score
4.0
ZERO API file : malware
VT API (file) 55 detected (tsNZ, Zusy, Unsafe, Save, malicious, confidence, 100%, GenusT, EVTO, Attribute, HighConfidence, high confidence, MalwareX, score, DCRat, kwurrn, G6VgOTp807H, Nekark, ntpkl, Siggen31, AMADEY, YXFDNZ, gqdh, Detected, Convagent, Malware@#21ply9g7ho70c, LummaStealer, ABApplication, MMZM, R701314, Artemis, GdSda, Gencirc, OzB5rdsgqUs, susgen)
md5 98e9c5d144a56f8c6f4c1dde7a5b3d1e
sha256 936afe44531e08524efa9d8886b709aaa851eadea3d295189a4628f2d6bb0d6d
ssdeep 6144:qhTZ8heoxl135RPVw2e96lJGf83dZ7Kax1nOg:qh9XO1pRP26lJGkt
imphash aa2ac8e0a800e04e9552a74a0feb58f2
impfuzzy 24:X+xQBKAWnjDYc+WZF02tVrBgdlJBl39ro6rOovbO39RFZMvNjzGMAkEZHu9F9+i4:OxQ/WnQc+eltVrBgDpZu3rFZGb9oKC
  Network IP location

Signature (11cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (9cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14003d040 CreateFileW
 0x14003d048 WriteConsoleW
 0x14003d050 GetConsoleWindow
 0x14003d058 Sleep
 0x14003d060 GetModuleFileNameW
 0x14003d068 CreateDirectoryW
 0x14003d070 HeapSize
 0x14003d078 SetStdHandle
 0x14003d080 MultiByteToWideChar
 0x14003d088 QueryPerformanceCounter
 0x14003d090 QueryPerformanceFrequency
 0x14003d098 GetStringTypeW
 0x14003d0a0 WideCharToMultiByte
 0x14003d0a8 GetCurrentThreadId
 0x14003d0b0 ReleaseSRWLockExclusive
 0x14003d0b8 AcquireSRWLockExclusive
 0x14003d0c0 TryAcquireSRWLockExclusive
 0x14003d0c8 CloseHandle
 0x14003d0d0 InitializeCriticalSectionEx
 0x14003d0d8 GetSystemTimeAsFileTime
 0x14003d0e0 GetModuleHandleW
 0x14003d0e8 GetProcAddress
 0x14003d0f0 EnterCriticalSection
 0x14003d0f8 LeaveCriticalSection
 0x14003d100 DeleteCriticalSection
 0x14003d108 EncodePointer
 0x14003d110 DecodePointer
 0x14003d118 LCMapStringEx
 0x14003d120 WakeAllConditionVariable
 0x14003d128 GetCPInfo
 0x14003d130 RtlCaptureContext
 0x14003d138 RtlLookupFunctionEntry
 0x14003d140 RtlVirtualUnwind
 0x14003d148 UnhandledExceptionFilter
 0x14003d150 SetUnhandledExceptionFilter
 0x14003d158 GetCurrentProcess
 0x14003d160 TerminateProcess
 0x14003d168 IsProcessorFeaturePresent
 0x14003d170 IsDebuggerPresent
 0x14003d178 GetStartupInfoW
 0x14003d180 GetCurrentProcessId
 0x14003d188 InitializeSListHead
 0x14003d190 RtlUnwindEx
 0x14003d198 RtlPcToFileHeader
 0x14003d1a0 RaiseException
 0x14003d1a8 GetLastError
 0x14003d1b0 SetLastError
 0x14003d1b8 InitializeCriticalSectionAndSpinCount
 0x14003d1c0 TlsAlloc
 0x14003d1c8 TlsGetValue
 0x14003d1d0 TlsSetValue
 0x14003d1d8 TlsFree
 0x14003d1e0 FreeLibrary
 0x14003d1e8 LoadLibraryExW
 0x14003d1f0 ExitProcess
 0x14003d1f8 GetModuleHandleExW
 0x14003d200 CreateThread
 0x14003d208 ExitThread
 0x14003d210 FreeLibraryAndExitThread
 0x14003d218 GetStdHandle
 0x14003d220 WriteFile
 0x14003d228 GetCommandLineA
 0x14003d230 GetCommandLineW
 0x14003d238 HeapAlloc
 0x14003d240 HeapFree
 0x14003d248 FlsAlloc
 0x14003d250 FlsGetValue
 0x14003d258 FlsSetValue
 0x14003d260 FlsFree
 0x14003d268 CompareStringW
 0x14003d270 LCMapStringW
 0x14003d278 GetLocaleInfoW
 0x14003d280 IsValidLocale
 0x14003d288 GetUserDefaultLCID
 0x14003d290 EnumSystemLocalesW
 0x14003d298 GetFileType
 0x14003d2a0 WaitForSingleObject
 0x14003d2a8 GetExitCodeProcess
 0x14003d2b0 CreateProcessW
 0x14003d2b8 GetFileAttributesExW
 0x14003d2c0 FlushFileBuffers
 0x14003d2c8 GetConsoleOutputCP
 0x14003d2d0 GetConsoleMode
 0x14003d2d8 ReadFile
 0x14003d2e0 GetFileSizeEx
 0x14003d2e8 SetFilePointerEx
 0x14003d2f0 ReadConsoleW
 0x14003d2f8 HeapReAlloc
 0x14003d300 FindClose
 0x14003d308 FindFirstFileExW
 0x14003d310 FindNextFileW
 0x14003d318 IsValidCodePage
 0x14003d320 GetACP
 0x14003d328 GetOEMCP
 0x14003d330 GetEnvironmentStringsW
 0x14003d338 FreeEnvironmentStringsW
 0x14003d340 SetEnvironmentVariableW
 0x14003d348 GetProcessHeap
 0x14003d350 RtlUnwind
USER32.dll
 0x14003d370 ShowWindow
ADVAPI32.dll
 0x14003d000 RegCloseKey
 0x14003d008 AllocateAndInitializeSid
 0x14003d010 RegSetValueExW
 0x14003d018 FreeSid
 0x14003d020 CheckTokenMembership
 0x14003d028 RegOpenKeyExW
 0x14003d030 GetUserNameW
SHELL32.dll
 0x14003d360 ShellExecuteW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure