Report - dexploer.exe

PE File PE32
ScreenShot
Created 2021.07.12 09:56 Machine s1_win7_x6402
Filename dexploer.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
2.2
ZERO API file : clean
VT API (file) 48 detected (AIDetect, malware1, Agentb, Graftor, Wacatac, Unsafe, malicious, confidence, ZexaE, iuW@aaR6iRoi, PRCO, Attribute, HighConfidence, PowerPool, jxrj, Wqcm, Malware@#3e73yri9ucvng, Redcap, mupbo, VSNTG821, Static AI, Malicious PE, kcloud, ai score=85, GdSda)
md5 d4602d1663b6b8b5dea53a0ef463eaf6
sha256 bf0762b9fc3866fa23cf6e76326d3164ff72af1cfc6094ff8f69b8f48f4e211d
ssdeep 3072:0RiB5BH9Ta1YlkAwca1TBfqTNOhctZRm9IOxXoQ:0R29TmEHwd1TBCBOkZ8IOxX
imphash 777800c7ddc0a42fc0145d8d93a4860a
impfuzzy 96:QJYwh9nX3Hs3HE+7satrcS3rObbGDIvhX7PuVcazIjuoZ1o9AclNzeQQcuGIuayv:QVh9nsHrR3rObKL6a5oZPdgnB
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 48 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Checks adapter addresses which can be used to detect virtual network interfaces

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
www.bcmnlux.com Unknown 127.0.0.1 clean
www.qnglsmc.com Unknown clean
104.21.21.221 US CLOUDFLARENET 104.21.21.221 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

WINHTTP.dll
 0x4162f4 WinHttpQueryHeaders
 0x4162f8 WinHttpOpenRequest
 0x4162fc WinHttpConnect
 0x416300 WinHttpSendRequest
 0x416304 WinHttpSetOption
 0x416308 WinHttpSetTimeouts
 0x41630c WinHttpGetProxyForUrl
 0x416310 WinHttpReadData
 0x416314 WinHttpOpen
 0x416318 WinHttpQueryDataAvailable
 0x41631c WinHttpReceiveResponse
 0x416320 WinHttpCloseHandle
 0x416324 WinHttpWriteData
 0x416328 WinHttpGetIEProxyConfigForCurrentUser
 0x41632c WinHttpAddRequestHeaders
WS2_32.dll
 0x416334 WSAStartup
 0x416338 inet_ntoa
 0x41633c gethostname
 0x416340 ntohs
 0x416344 gethostbyname
SHLWAPI.dll
 0x4162dc PathAppendW
VERSION.dll
 0x4162e4 GetFileVersionInfoW
 0x4162e8 VerQueryValueW
 0x4162ec GetFileVersionInfoSizeW
IPHLPAPI.DLL
 0x416068 GetExtendedUdpTable
 0x41606c GetAdaptersAddresses
 0x416070 GetExtendedTcpTable
PSAPI.DLL
 0x4162cc GetModuleFileNameExW
WTSAPI32.dll
 0x41634c WTSQueryUserToken
CRYPT32.dll
 0x41605c CryptBinaryToStringA
 0x416060 CryptStringToBinaryA
mfc90u.dll
 0x416354 None
 0x416358 None
 0x41635c None
 0x416360 None
 0x416364 None
 0x416368 None
 0x41636c None
 0x416370 None
 0x416374 None
 0x416378 None
 0x41637c None
 0x416380 None
 0x416384 None
 0x416388 None
 0x41638c None
 0x416390 None
 0x416394 None
 0x416398 None
 0x41639c None
 0x4163a0 None
 0x4163a4 None
 0x4163a8 None
MSVCR90.dll
 0x4161e0 _CxxThrowException
 0x4161e4 __wgetmainargs
 0x4161e8 _amsg_exit
 0x4161ec wcsncat_s
 0x4161f0 vswprintf_s
 0x4161f4 fseek
 0x4161f8 ftell
 0x4161fc fread
 0x416200 _wfopen
 0x416204 wprintf
 0x416208 _vsnwprintf_s
 0x41620c wcsncmp
 0x416210 strncpy
 0x416214 _beginthread
 0x416218 _wtoi
 0x41621c strncmp
 0x416220 _vscwprintf
 0x416224 wcsncpy_s
 0x416228 sprintf
 0x41622c _invalid_parameter_noinfo
 0x416230 wcsncpy
 0x416234 malloc
 0x416238 free
 0x41623c ??0exception@std@@QAE@ABV01@@Z
 0x416240 ??0exception@std@@QAE@ABQBD@Z
 0x416244 ??0exception@std@@QAE@XZ
 0x416248 ??1exception@std@@UAE@XZ
 0x41624c ?what@exception@std@@UBEPBDXZ
 0x416250 swprintf_s
 0x416254 _vswprintf
 0x416258 sprintf_s
 0x41625c _crt_debugger_hook
 0x416260 _controlfp_s
 0x416264 _invoke_watson
 0x416268 _except_handler4_common
 0x41626c ?terminate@@YAXXZ
 0x416270 _decode_pointer
 0x416274 _onexit
 0x416278 _lock
 0x41627c __dllonexit
 0x416280 _unlock
 0x416284 __set_app_type
 0x416288 _encode_pointer
 0x41628c __p__fmode
 0x416290 __p__commode
 0x416294 _adjust_fdiv
 0x416298 __setusermatherr
 0x41629c _configthreadlocale
 0x4162a0 _initterm_e
 0x4162a4 _initterm
 0x4162a8 _wcmdln
 0x4162ac exit
 0x4162b0 _XcptFilter
 0x4162b4 _exit
 0x4162b8 _cexit
 0x4162bc __CxxFrameHandler3
 0x4162c0 fclose
 0x4162c4 ?_type_info_dtor_internal_method@type_info@@QAEXXZ
KERNEL32.dll
 0x416078 GetModuleFileNameW
 0x41607c VerifyVersionInfoW
 0x416080 GetLastError
 0x416084 SetCurrentDirectoryW
 0x416088 GetVersionExW
 0x41608c SetEvent
 0x416090 GetExitCodeThread
 0x416094 CreateEventW
 0x416098 FindVolumeClose
 0x41609c FreeLibrary
 0x4160a0 OpenProcess
 0x4160a4 GetSystemDirectoryW
 0x4160a8 LoadLibraryW
 0x4160ac FindNextVolumeW
 0x4160b0 GetVolumePathNamesForVolumeNameW
 0x4160b4 Process32FirstW
 0x4160b8 QueryDosDeviceW
 0x4160bc Process32NextW
 0x4160c0 GetModuleHandleA
 0x4160c4 CreateToolhelp32Snapshot
 0x4160c8 FindFirstVolumeW
 0x4160cc InterlockedExchange
 0x4160d0 InterlockedCompareExchange
 0x4160d4 GetStartupInfoW
 0x4160d8 SetUnhandledExceptionFilter
 0x4160dc QueryPerformanceCounter
 0x4160e0 GetCurrentThreadId
 0x4160e4 IsDebuggerPresent
 0x4160e8 UnhandledExceptionFilter
 0x4160ec GetSystemTimeAsFileTime
 0x4160f0 GetCurrentProcessId
 0x4160f4 VerSetConditionMask
 0x4160f8 GetSystemDefaultUILanguage
 0x4160fc CreateMutexW
 0x416100 ExitProcess
 0x416104 GetCurrentDirectoryW
 0x416108 FlushFileBuffers
 0x41610c MultiByteToWideChar
 0x416110 ExitThread
 0x416114 TerminateProcess
 0x416118 Sleep
 0x41611c TerminateThread
 0x416120 OutputDebugStringW
 0x416124 PeekNamedPipe
 0x416128 FileTimeToLocalFileTime
 0x41612c FileTimeToSystemTime
 0x416130 GetDriveTypeW
 0x416134 DeleteFileW
 0x416138 CloseHandle
 0x41613c WTSGetActiveConsoleSessionId
 0x416140 CreateFileW
 0x416144 ReadFile
 0x416148 WaitForSingleObject
 0x41614c SetFilePointer
 0x416150 GetFileSize
 0x416154 CreatePipe
 0x416158 GetProcAddress
 0x41615c WideCharToMultiByte
 0x416160 WriteFile
 0x416164 GetTickCount
 0x416168 GetModuleHandleW
 0x41616c GetSystemDefaultLCID
 0x416170 GetCurrentProcess
 0x416174 CreateProcessW
ADVAPI32.dll
 0x416000 CreateProcessAsUserW
 0x416004 ImpersonateLoggedOnUser
 0x416008 RevertToSelf
 0x41600c CryptGetHashParam
 0x416010 OpenServiceA
 0x416014 CloseServiceHandle
 0x416018 CryptAcquireContextW
 0x41601c OpenSCManagerW
 0x416020 GetUserNameW
 0x416024 CryptReleaseContext
 0x416028 CryptCreateHash
 0x41602c GetUserNameA
 0x416030 CryptDestroyHash
 0x416034 CryptHashData
 0x416038 StartServiceCtrlDispatcherA
 0x41603c RegisterServiceCtrlHandlerA
 0x416040 SetServiceStatus
 0x416044 OpenProcessToken
 0x416048 AdjustTokenPrivileges
 0x41604c LookupAccountSidW
 0x416050 LookupPrivilegeValueW
 0x416054 GetTokenInformation
SHELL32.dll
 0x4162d4 ShellExecuteW
MSVCP90.dll
 0x41617c ??A?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAA_WI@Z
 0x416180 ?length@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEIXZ
 0x416184 ?find_first_of@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEI_WI@Z
 0x416188 ??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
 0x41618c ?clear@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEXXZ
 0x416190 ?empty@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE_NXZ
 0x416194 ??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
 0x416198 ?erase@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@II@Z
 0x41619c ?rfind@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEI_WI@Z
 0x4161a0 ??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
 0x4161a4 ??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
 0x4161a8 ??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
 0x4161ac ??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
 0x4161b0 ?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
 0x4161b4 ?size@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEIXZ
 0x4161b8 ?find@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEIPB_WI@Z
 0x4161bc ?find@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEI_WI@Z
 0x4161c0 ?substr@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBE?AV12@II@Z
 0x4161c4 ?npos@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@2IB
 0x4161c8 ??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
 0x4161cc ??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
 0x4161d0 ??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
 0x4161d4 ?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
 0x4161d8 ?at@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAA_WI@Z

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure