Report - n9yo6g3m.rar

DLL PE File OS Processor Check PE32
ScreenShot
Created 2021.05.18 09:07 Machine s1_win7_x6402
Filename n9yo6g3m.rar
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
1.8
ZERO API file : malware
VT API (file) 7 detected (malicious, high confidence, Save, Wacapew, score)
md5 e5769bdf194b0a6369c0f58cc16e5a96
sha256 3a2300c069338bb09fabbccb368930a85e7390a1dc02fa8a08f9aaeec0223123
ssdeep 12288:AWM5dKYoaXExbYau0l4BaauBv+te08MX7nPH+lGr2jLYN9fM+:AWaK5xdJl4QnJ+teumlOe8TM+
imphash bb0de8a8adafa3758124639bf7d99d8c
impfuzzy 24:jjM6vVrOov2g9FTelVGdloXDuc9JgvgSuZatRlrqDSM1w2MlwaTmdIEp4wubBBg9:h0Ng9FCGdlXcKgSdtR6hW5mrqiFl
  Network IP location

Signature (5cnts)

Level Description
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice File has been identified by 7 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x20cc084 GetConsoleCP
 0x20cc088 GetConsoleMode
 0x20cc08c SetFilePointerEx
 0x20cc090 SetStdHandle
 0x20cc094 WriteConsoleW
 0x20cc098 SetSystemPowerState
 0x20cc09c CreateFileA
 0x20cc0a0 GetTempPathA
 0x20cc0a4 GetCommandLineA
 0x20cc0a8 GetModuleFileNameA
 0x20cc0ac OpenMutexA
 0x20cc0b0 FormatMessageA
 0x20cc0b4 GetSystemTimeAsFileTime
 0x20cc0b8 CloseHandle
 0x20cc0bc GetFileSize
 0x20cc0c0 DeleteCriticalSection
 0x20cc0c4 VirtualProtectEx
 0x20cc0c8 VirtualProtect
 0x20cc0cc EncodePointer
 0x20cc0d0 DecodePointer
 0x20cc0d4 GetLastError
 0x20cc0d8 HeapFree
 0x20cc0dc HeapAlloc
 0x20cc0e0 RaiseException
 0x20cc0e4 RtlUnwind
 0x20cc0e8 GetCurrentThreadId
 0x20cc0ec IsProcessorFeaturePresent
 0x20cc0f0 ExitProcess
 0x20cc0f4 GetModuleHandleExW
 0x20cc0f8 GetProcAddress
 0x20cc0fc MultiByteToWideChar
 0x20cc100 WideCharToMultiByte
 0x20cc104 HeapSize
 0x20cc108 GetProcessHeap
 0x20cc10c GetStdHandle
 0x20cc110 WriteFile
 0x20cc114 GetModuleFileNameW
 0x20cc118 IsDebuggerPresent
 0x20cc11c EnterCriticalSection
 0x20cc120 LeaveCriticalSection
 0x20cc124 SetLastError
 0x20cc128 GetFileType
 0x20cc12c GetStartupInfoW
 0x20cc130 QueryPerformanceCounter
 0x20cc134 GetCurrentProcessId
 0x20cc138 GetEnvironmentStringsW
 0x20cc13c FreeEnvironmentStringsW
 0x20cc140 UnhandledExceptionFilter
 0x20cc144 SetUnhandledExceptionFilter
 0x20cc148 InitializeCriticalSectionAndSpinCount
 0x20cc14c Sleep
 0x20cc150 GetCurrentProcess
 0x20cc154 TerminateProcess
 0x20cc158 TlsAlloc
 0x20cc15c TlsGetValue
 0x20cc160 TlsSetValue
 0x20cc164 TlsFree
 0x20cc168 GetModuleHandleW
 0x20cc16c LCMapStringW
 0x20cc170 LoadLibraryExW
 0x20cc174 IsValidCodePage
 0x20cc178 GetACP
 0x20cc17c GetOEMCP
 0x20cc180 GetCPInfo
 0x20cc184 HeapReAlloc
 0x20cc188 OutputDebugStringW
 0x20cc18c GetStringTypeW
 0x20cc190 FlushFileBuffers
 0x20cc194 CreateFileW
ole32.dll
 0x20cc19c CoTaskMemAlloc
 0x20cc1a0 CoUninitialize
 0x20cc1a4 CoInitialize
 0x20cc1a8 CoTaskMemFree
ADVAPI32.dll
 0x20cc000 RegCloseKey
 0x20cc004 RegQueryValueExA
 0x20cc008 RegOpenKeyExA
 0x20cc00c RegEnumKeyA
 0x20cc010 RegDeleteKeyA
 0x20cc014 RegCreateKeyExA
 0x20cc018 LookupPrivilegeValueA
 0x20cc01c SetSecurityDescriptorDacl
 0x20cc020 InitializeSecurityDescriptor
 0x20cc024 SetEntriesInAclA
 0x20cc028 StartServiceCtrlDispatcherA
 0x20cc02c SetServiceStatus
 0x20cc030 RegisterServiceCtrlHandlerA
 0x20cc034 QueryServiceStatus
 0x20cc038 OpenServiceA
 0x20cc03c OpenSCManagerA
 0x20cc040 CreateServiceW
 0x20cc044 ControlService
 0x20cc048 OpenProcessToken
 0x20cc04c OpenThreadToken
 0x20cc050 AllocateAndInitializeSid
 0x20cc054 FreeSid
 0x20cc058 RegSetValueExA
Cabinet.dll
 0x20cc060 None
 0x20cc064 None
 0x20cc068 None
GPEDIT.DLL
 0x20cc070 DeleteGPOLink
 0x20cc074 BrowseForGPO
 0x20cc078 ExportRSoPData
 0x20cc07c CreateGPOLink

EAT(Export Address Table) Library

0x10ad2f0 Me
0x10acc00 Specialgun
0x10ad3b0 Spendbroke


Similarity measure (PE file only) - Checking for service failure