Report - img.dll

DLL PE File OS Processor Check PE32
ScreenShot
Created 2021.05.21 09:57 Machine s1_win7_x6402
Filename img.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score Not founds Behavior Score
3.4
ZERO API file : clean
VT API (file) 10 detected (ZedlaF, Hu4@aSig, Static AI, Suspicious PE, Wacatac, Malicious, score, BScope, TrojanBanker, Gozi, Unsafe)
md5 d2fe28f11e61c88847055640d0d92b41
sha256 b706c4069b014fee3dc18079519e77c9f75e8fc2736264866119a4c0a7bc06c3
ssdeep 12288:n7jCgJ8TDXqANCvmA6vdot2lY4ieYHcftQ:nPFSDFNCvmAyot7/Hy
imphash 06f93f21e442e4a78f913197fb155cfc
impfuzzy 48:W8p3tQS18Gs+pp5XgZN3j51cJwFSU0TH2qV+:lp3tQS18Gs+ppZA0Y
  Network IP location

Signature (10cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch File has been identified by 10 AntiVirus engines on VirusTotal as malicious
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Performs some HTTP requests
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (12cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://app3.maintorna.com/DOnp8FFIHxzkzO_2BI6as/Fk0cpZuJStBv_2Bf/7dz0Pm9_2FDrH_2/BzURhMGfKY7dgLun5s/iJYbzM_2F/OpXZ4LNbk_2Fg61I1stG/_2BebEv8Xkqy5n2biLH/11_2Bgm6kPAWWd2iIKpjRo/G4rSkBS3HoKhG/EYgrqAFJ/AL6M1PWxcCpetsvV1oiFf_2/BohAk_2FI9/F_2BEUu9lzeyW1whp/ZaCzX US GOOGLE 35.247.240.15 clean
http://chat.billionady.com/6UJSnOoZaJnsH/_2FnSXfG/ln0aL5nX3zhg1UG0FK3qlut/6LZhHclyKd/I_2BKVhzQWMWrcGcT/ZTTdNTGlVi9S/I_2BAWt0RO9/er8HPcbpFhwm36/a1eGThTcirHujHLF1hMPY/2MVDtK4kSPDf6x73/kBOc3g9jxsxeT0e/L10KY1NatyOr4ZwtIc/K_2Fvjy1Q/srpejgSg7907lJY9reM9/9Qw_2Fj US GOOGLE 35.247.240.15 clean
http://chat.billionady.com/_2BajllG2W5QT7c_2BZ752/OUUsE0PdrCWti/u9hmphDr/_2F9VYvDpC09PqHzWQ_2FgV/MgOXJ_2BYm/vglQH6ZyKvTwcWC2l/9KkU02SFeC5O/8WYERoLeYTH/YXQmDuxxY7zygt/d5870sTfet2nG0xBg_2FD/l4lJZP2MJLjZmoGm/X_2Fqttce3zZyDw/zj6OUwPJSioOxqH_2F/X7tf_2ByV/RoBMC US GOOGLE 35.247.240.15 clean
http://chat.veminiare.com/lN4ZajfSnftzc7Dl/Zr0OE4FzP7c3zQB/jGkKqDLiYl_2FSgzkC/IsLtY5lOe/_2BINzYKsAYitV_2B6iY/_2F_2FO_2FOWTH4Lh5x/d7vtLNqHW83WIFHjo5ZqI6/bLVkD1v5Lpzxf/OkXnFjV9/kb3Qz61muiBunA_2BK_2BYp/xlKBbqYPKl/gKaNm2lkuGFA8P9JV/vYzvXLsNzSOI/em46rn0AL6j/jj US GOOGLE 35.247.240.15 clean
http://app3.maintorna.com/8D1iapHyZLACTh/rcVgyTqKzXA6LpliF4YXu/XzM08QA0f3i7z2Ji/5n2Aq_2F0nnzvZE/fgvsm6sx70duziYeT2/m1YbOFs_2/BnZ3Nsio6pU1esvY2GaB/072K4jXWAaNHHzJBgKQ/cjz9OMjQ8jFdM66FM0X5PH/8sMCLzWI9KYKG/P9401_2B/4_2BUA4sQyYHR1erUXLu0MR/4bIIrt07vu/dFa8mj1H US GOOGLE 35.247.240.15 clean
http://chat.veminiare.com/XG7VMRXz6CIgQVN/FIntP9vcoEkPSFVbFS/fYS8e36TX/47lcuBGwy_2Fxx2vh551/lqWwG1U_2B_2B1jEskE/JXiowlyiqpwwViroADLTPB/X_2BWBHu8SYGn/eSBJSBRB/dF6BXDtumGC6qp3_2F77amm/xs_2BDlWuF/q_2BNO2mypx9x4I9I/Mf_2F_2BfEaM/dYEJV1IL6pP/veKpGWZ2qUuoLp/mkzQ US GOOGLE 35.247.240.15 clean
http://chat.veminiare.com/SWKRRoakONjHS/sJUvOXim/_2B9jP62X8_2FGlg4YDjd4d/qcmm7f7ClO/0z_2FBik6zsFUb_2B/mdQuBGZWJbZi/6xjwfL8HuMz/d_2FSpDSI_2BKI/JPFoCEypL2oX91Q4Ez8Ol/_2BbhoEWQeeBD5YI/8AKl5Z_2B2W818y/o2LGNPqkk0KZ7SqM_2/BMAI5eaIh/c2V1xT0MggHgb9EHebVm/6sBZ5NPX US GOOGLE 35.247.240.15 clean
chat.veminiare.com US GOOGLE 35.247.240.15 clean
app.buboleinov.com Unknown clean
app3.maintorna.com US GOOGLE 35.247.240.15 mailcious
chat.billionady.com US GOOGLE 35.247.240.15 clean
35.247.240.15 US GOOGLE 35.247.240.15 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x103d038 RemoveDirectoryA
 0x103d03c GetFileAttributesA
 0x103d040 CopyFileA
 0x103d044 SetConsoleCP
 0x103d048 SetConsoleOutputCP
 0x103d04c GetWindowsDirectoryA
 0x103d050 HeapReAlloc
 0x103d054 HeapSize
 0x103d058 WriteConsoleW
 0x103d05c FlushFileBuffers
 0x103d060 GetProcessHeap
 0x103d064 GetTempFileNameA
 0x103d068 GetSystemDirectoryA
 0x103d06c GetEnvironmentVariableA
 0x103d070 GetModuleHandleA
 0x103d074 OpenMutexA
 0x103d078 WaitForMultipleObjects
 0x103d07c EnterCriticalSection
 0x103d080 InitializeCriticalSection
 0x103d084 CreateThread
 0x103d088 GetShortPathNameA
 0x103d08c VirtualProtectEx
 0x103d090 LocalFree
 0x103d094 LocalAlloc
 0x103d098 IsProcessorFeaturePresent
 0x103d09c IsDebuggerPresent
 0x103d0a0 UnhandledExceptionFilter
 0x103d0a4 SetUnhandledExceptionFilter
 0x103d0a8 GetStartupInfoW
 0x103d0ac GetModuleHandleW
 0x103d0b0 GetCurrentProcess
 0x103d0b4 TerminateProcess
 0x103d0b8 QueryPerformanceCounter
 0x103d0bc GetCurrentProcessId
 0x103d0c0 GetCurrentThreadId
 0x103d0c4 GetSystemTimeAsFileTime
 0x103d0c8 InitializeSListHead
 0x103d0cc RaiseException
 0x103d0d0 RtlUnwind
 0x103d0d4 InterlockedFlushSList
 0x103d0d8 GetLastError
 0x103d0dc SetLastError
 0x103d0e0 EncodePointer
 0x103d0e4 LeaveCriticalSection
 0x103d0e8 DeleteCriticalSection
 0x103d0ec InitializeCriticalSectionAndSpinCount
 0x103d0f0 TlsAlloc
 0x103d0f4 TlsGetValue
 0x103d0f8 TlsSetValue
 0x103d0fc TlsFree
 0x103d100 FreeLibrary
 0x103d104 GetProcAddress
 0x103d108 LoadLibraryExW
 0x103d10c CloseHandle
 0x103d110 DuplicateHandle
 0x103d114 CreateFileW
 0x103d118 GetFileType
 0x103d11c ExitProcess
 0x103d120 GetModuleHandleExW
 0x103d124 GetModuleFileNameA
 0x103d128 MultiByteToWideChar
 0x103d12c WideCharToMultiByte
 0x103d130 HeapAlloc
 0x103d134 GetStringTypeW
 0x103d138 GetACP
 0x103d13c HeapFree
 0x103d140 LCMapStringW
 0x103d144 GetLocaleInfoW
 0x103d148 IsValidLocale
 0x103d14c GetUserDefaultLCID
 0x103d150 EnumSystemLocalesW
 0x103d154 GetStdHandle
 0x103d158 SetStdHandle
 0x103d15c WriteFile
 0x103d160 GetConsoleCP
 0x103d164 GetConsoleMode
 0x103d168 SetEndOfFile
 0x103d16c ReadFile
 0x103d170 ReadConsoleW
 0x103d174 SetFilePointerEx
 0x103d178 FindClose
 0x103d17c FindFirstFileExA
 0x103d180 FindNextFileA
 0x103d184 IsValidCodePage
 0x103d188 GetOEMCP
 0x103d18c GetCPInfo
 0x103d190 GetCommandLineA
 0x103d194 GetCommandLineW
 0x103d198 GetEnvironmentStringsW
 0x103d19c FreeEnvironmentStringsW
 0x103d1a0 DecodePointer
USER32.dll
 0x103d1a8 ExitWindowsEx
 0x103d1ac GetDoubleClickTime
 0x103d1b0 IntersectRect
 0x103d1b4 InflateRect
 0x103d1b8 EndDeferWindowPos
WININET.dll
 0x103d1c0 InternetCloseHandle
 0x103d1c4 InternetOpenA
COMCTL32.dll
 0x103d000 CreateToolbarEx
 0x103d004 None
 0x103d008 ImageList_Destroy
 0x103d00c ImageList_Add
 0x103d010 ImageList_SetOverlayImage
 0x103d014 None
 0x103d018 DestroyPropertySheetPage
 0x103d01c ImageList_LoadImageA
GPEDIT.DLL
 0x103d024 DeleteGPOLink
 0x103d028 BrowseForGPO
 0x103d02c ImportRSoPData
 0x103d030 CreateGPOLink

EAT(Export Address Table) Library

0x101cc00 DllRegisterServer
0x101d040 DllUnregisterServer
0x101d150 Doubleboy
0x101c900 Drivetube


Similarity measure (PE file only) - Checking for service failure