Report - csrrs.exe

PE File OS Processor Check PE32
ScreenShot
Created 2021.06.24 23:46 Machine s1_win7_x6402
Filename csrrs.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
3.2
ZERO API file : clean
VT API (file) 32 detected (Gibon, Dridex, malicious, Attribute, HighConfidence, R011C0PFL21, susgen, ai score=81, score, ET#83%, RDMK, cmRtazoyxUVkqsyQNiqrTy+JKRx5, Unsafe, PossibleThreat, ZexaF, guW@aasZ44ni, GdSda, confidence)
md5 f07ce87fb0fee1ccc330e07141be91f9
sha256 af8d689527c8f558062465791525d862a6a68b0f2b51596d2509a70d3120cd5a
ssdeep 3072:U0oyTwRNNYzYQMvKnz06K+JDz+W8M4EaJG0e4/131roJ:9kmzYQM402DzP4vjkJ
imphash 0e43491088f941a4fc3b2a6a6fff516b
impfuzzy 24:o54/tMS17bJnc+pl3eDoTyoEOovbO3kPvNjvRZHu9oGMsSL:FtMS17lc+pp/yc30nsSL
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Creates a suspicious process
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
info Command line console output was observed
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x413000 CreateMutexW
 0x413004 CreateToolhelp32Snapshot
 0x413008 Sleep
 0x41300c GetLastError
 0x413010 Process32NextW
 0x413014 Process32FirstW
 0x413018 CloseHandle
 0x41301c WriteConsoleW
 0x413020 CreateFileW
 0x413024 UnhandledExceptionFilter
 0x413028 SetUnhandledExceptionFilter
 0x41302c GetCurrentProcess
 0x413030 TerminateProcess
 0x413034 IsProcessorFeaturePresent
 0x413038 QueryPerformanceCounter
 0x41303c GetCurrentProcessId
 0x413040 GetCurrentThreadId
 0x413044 GetSystemTimeAsFileTime
 0x413048 InitializeSListHead
 0x41304c IsDebuggerPresent
 0x413050 GetStartupInfoW
 0x413054 GetModuleHandleW
 0x413058 RtlUnwind
 0x41305c SetLastError
 0x413060 EnterCriticalSection
 0x413064 LeaveCriticalSection
 0x413068 DeleteCriticalSection
 0x41306c InitializeCriticalSectionAndSpinCount
 0x413070 TlsAlloc
 0x413074 TlsGetValue
 0x413078 TlsSetValue
 0x41307c TlsFree
 0x413080 FreeLibrary
 0x413084 GetProcAddress
 0x413088 LoadLibraryExW
 0x41308c RaiseException
 0x413090 GetStdHandle
 0x413094 WriteFile
 0x413098 GetModuleFileNameW
 0x41309c ExitProcess
 0x4130a0 GetModuleHandleExW
 0x4130a4 GetCommandLineA
 0x4130a8 GetCommandLineW
 0x4130ac HeapAlloc
 0x4130b0 HeapFree
 0x4130b4 CompareStringW
 0x4130b8 LCMapStringW
 0x4130bc GetFileType
 0x4130c0 WaitForSingleObject
 0x4130c4 GetExitCodeProcess
 0x4130c8 CreateProcessW
 0x4130cc GetFileAttributesExW
 0x4130d0 FindClose
 0x4130d4 FindFirstFileExW
 0x4130d8 FindNextFileW
 0x4130dc IsValidCodePage
 0x4130e0 GetACP
 0x4130e4 GetOEMCP
 0x4130e8 GetCPInfo
 0x4130ec MultiByteToWideChar
 0x4130f0 WideCharToMultiByte
 0x4130f4 GetEnvironmentStringsW
 0x4130f8 FreeEnvironmentStringsW
 0x4130fc SetEnvironmentVariableW
 0x413100 SetStdHandle
 0x413104 GetStringTypeW
 0x413108 GetProcessHeap
 0x41310c FlushFileBuffers
 0x413110 GetConsoleOutputCP
 0x413114 GetConsoleMode
 0x413118 GetFileSizeEx
 0x41311c SetFilePointerEx
 0x413120 HeapSize
 0x413124 HeapReAlloc
 0x413128 DecodePointer
USER32.dll
 0x413130 CharLowerBuffW
 0x413134 wsprintfW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure