ScreenShot
Created 2021.04.05 10:50 Machine s1_win7_x6401
Filename qs73wd.rar
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
2.2
ZERO API file : malware
VT API (file) 35 detected (AIDetect, malware2, GenericKD, Wacatac, Attribute, HighConfidence, Kryptik, HKFQ, Malware@#2mx9uo1pq50dx, Dridex, Malicious, svrqf, ai score=82, score, Undefined, CLOUD, x4KXGVpiNjY, Generik, GMXBOUE, GdSda)
md5 6f3d820ee9c069a6710e743d53a9bb25
sha256 b78b0aee4e5c072ea24d4d9d8e89c8990076fbe96ef353950b7006ea50eabfac
ssdeep 6144:x16vYH/guLTgQb1oFtIaJmGDtDplcJqiD4IU2fQ/TxH9ztrHayYm:j6vYouLTgQ5oFt/hRDfkL1U2Y/Txdztn
imphash 02e581d639f814ba43d9c6c8be6f316e
impfuzzy 48:RUKtMS17Mbc+ppXr36cLE6x9j/11t9oGAi:RVtMS17Mbc+ppXdxZ
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info This executable has a PDB path

Rules (8cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check Signature Zero binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info win_files_operation Affect private profile binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1041000 MoveFileA
 0x1041004 VirtualProtect
 0x1041008 LocalAlloc
 0x104100c GetCurrentDirectoryA
 0x1041010 Sleep
 0x1041014 GlobalAlloc
 0x1041018 GlobalFree
 0x104101c CreateThread
 0x1041020 LocalFree
 0x1041024 FindFirstChangeNotificationA
 0x1041028 WriteConsoleW
 0x104102c CloseHandle
 0x1041030 CreateFileW
 0x1041034 SetFilePointerEx
 0x1041038 GetConsoleMode
 0x104103c GetConsoleCP
 0x1041040 WriteFile
 0x1041044 UnhandledExceptionFilter
 0x1041048 SetUnhandledExceptionFilter
 0x104104c GetCurrentProcess
 0x1041050 TerminateProcess
 0x1041054 IsProcessorFeaturePresent
 0x1041058 QueryPerformanceCounter
 0x104105c GetCurrentProcessId
 0x1041060 GetCurrentThreadId
 0x1041064 GetSystemTimeAsFileTime
 0x1041068 InitializeSListHead
 0x104106c IsDebuggerPresent
 0x1041070 GetStartupInfoW
 0x1041074 GetModuleHandleW
 0x1041078 RtlUnwind
 0x104107c RaiseException
 0x1041080 InterlockedFlushSList
 0x1041084 GetLastError
 0x1041088 SetLastError
 0x104108c EncodePointer
 0x1041090 EnterCriticalSection
 0x1041094 LeaveCriticalSection
 0x1041098 DeleteCriticalSection
 0x104109c InitializeCriticalSectionAndSpinCount
 0x10410a0 TlsAlloc
 0x10410a4 TlsGetValue
 0x10410a8 TlsSetValue
 0x10410ac TlsFree
 0x10410b0 FreeLibrary
 0x10410b4 GetProcAddress
 0x10410b8 LoadLibraryExW
 0x10410bc ExitProcess
 0x10410c0 GetModuleHandleExW
 0x10410c4 GetModuleFileNameW
 0x10410c8 HeapAlloc
 0x10410cc HeapFree
 0x10410d0 FindClose
 0x10410d4 FindFirstFileExW
 0x10410d8 FindNextFileW
 0x10410dc IsValidCodePage
 0x10410e0 GetACP
 0x10410e4 GetOEMCP
 0x10410e8 GetCPInfo
 0x10410ec GetCommandLineA
 0x10410f0 GetCommandLineW
 0x10410f4 MultiByteToWideChar
 0x10410f8 WideCharToMultiByte
 0x10410fc GetEnvironmentStringsW
 0x1041100 FreeEnvironmentStringsW
 0x1041104 LCMapStringW
 0x1041108 GetProcessHeap
 0x104110c GetStdHandle
 0x1041110 GetFileType
 0x1041114 GetStringTypeW
 0x1041118 HeapSize
 0x104111c HeapReAlloc
 0x1041120 SetStdHandle
 0x1041124 FlushFileBuffers
 0x1041128 DecodePointer
USER32.dll
 0x1041130 GetWindowRect
 0x1041134 CreatePopupMenu
 0x1041138 DialogBoxIndirectParamA
 0x104113c GetWindowThreadProcessId
 0x1041140 DefWindowProcA
 0x1041144 CreateDialogIndirectParamA
 0x1041148 GetClientRect
 0x104114c GetSysColorBrush
 0x1041150 GetForegroundWindow

EAT(Export Address Table) Library

0x100e230 Columnspot 1
0x100e370 Groundhuman 2
0x100eb80 Hotelement 3
0x100e140 Wheredesert 4


Similarity measure (PE file only) - Checking for service failure