Report - app.dll

Generic Malware PE File PE32 DLL OS Processor Check
ScreenShot
Created 2021.07.12 10:31 Machine s1_win7_x6401
Filename app.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.0
ZERO API file : clean
VT API (file) 23 detected (malicious, high confidence, GenericKD, Artemis, Unsafe, ZedlaF, Fq4@aeH3VMm, UrsnifDropper, wdbmm, ai score=82, Wacapew, Ursnif, 6U87J5, score, PossibleThreat)
md5 0bb29556ece1c51c751cb4e7c8752ddc
sha256 af1b052362469a67fcd871558b24efa2be44a4b29f88112e5c2d2295a1dc4252
ssdeep 12288:pvlT2EsAw96epX+uHfa7Z5svN/RM2ZcV8TFITzhz3VFVUJcXH4nw7P1N:ZsN96cfKFVUJQu
imphash df95180b6da9d16cb69b63ca8bb7f332
impfuzzy 48:dkOjBtc+8mWtMS1JGv4XErZEZX/hOpfln1K7ZGT:dk+c+8ntMS1JGvCIU8KgT
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info Collects information to fingerprint the system (MachineGuid
info One or more processes crashed
info Queries for the computername
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1051014 GetEnvironmentVariableA
 0x1051018 GetSystemDirectoryA
 0x105101c GetTempPathA
 0x1051020 GetWindowsDirectoryA
 0x1051024 GetCurrentDirectoryA
 0x1051028 DeleteFileA
 0x105102c SetConsoleCP
 0x1051030 GetStartupInfoA
 0x1051034 WriteConsoleW
 0x1051038 GetProcessHeap
 0x105103c SetEnvironmentVariableA
 0x1051040 FreeEnvironmentStringsW
 0x1051044 GetEnvironmentStringsW
 0x1051048 GetCommandLineW
 0x105104c GetCommandLineA
 0x1051050 GetOEMCP
 0x1051054 IsValidCodePage
 0x1051058 CreateProcessA
 0x105105c GetTickCount
 0x1051060 CloseHandle
 0x1051064 HeapSize
 0x1051068 VirtualProtect
 0x105106c FindNextFileA
 0x1051070 FindFirstFileExA
 0x1051074 FindClose
 0x1051078 HeapReAlloc
 0x105107c WideCharToMultiByte
 0x1051080 GetLastError
 0x1051084 EnterCriticalSection
 0x1051088 LeaveCriticalSection
 0x105108c DeleteCriticalSection
 0x1051090 MultiByteToWideChar
 0x1051094 EncodePointer
 0x1051098 DecodePointer
 0x105109c SetLastError
 0x10510a0 InitializeCriticalSectionAndSpinCount
 0x10510a4 SwitchToThread
 0x10510a8 TlsAlloc
 0x10510ac TlsGetValue
 0x10510b0 TlsSetValue
 0x10510b4 TlsFree
 0x10510b8 GetSystemTimeAsFileTime
 0x10510bc GetModuleHandleW
 0x10510c0 GetProcAddress
 0x10510c4 CompareStringW
 0x10510c8 LCMapStringW
 0x10510cc GetLocaleInfoW
 0x10510d0 GetStringTypeW
 0x10510d4 GetCPInfo
 0x10510d8 UnhandledExceptionFilter
 0x10510dc SetUnhandledExceptionFilter
 0x10510e0 GetCurrentProcess
 0x10510e4 TerminateProcess
 0x10510e8 IsProcessorFeaturePresent
 0x10510ec QueryPerformanceCounter
 0x10510f0 GetCurrentProcessId
 0x10510f4 GetCurrentThreadId
 0x10510f8 InitializeSListHead
 0x10510fc IsDebuggerPresent
 0x1051100 GetStartupInfoW
 0x1051104 RaiseException
 0x1051108 RtlUnwind
 0x105110c InterlockedFlushSList
 0x1051110 FreeLibrary
 0x1051114 LoadLibraryExW
 0x1051118 CreateFileW
 0x105111c GetFileType
 0x1051120 ExitProcess
 0x1051124 GetModuleHandleExW
 0x1051128 GetModuleFileNameA
 0x105112c HeapAlloc
 0x1051130 HeapFree
 0x1051134 GetACP
 0x1051138 GetStdHandle
 0x105113c GetTimeZoneInformation
 0x1051140 IsValidLocale
 0x1051144 GetUserDefaultLCID
 0x1051148 EnumSystemLocalesW
 0x105114c SetStdHandle
 0x1051150 WriteFile
 0x1051154 GetConsoleCP
 0x1051158 GetConsoleMode
 0x105115c SetEndOfFile
 0x1051160 ReadFile
 0x1051164 ReadConsoleW
 0x1051168 SetFilePointerEx
 0x105116c FlushFileBuffers
USER32.dll
 0x1051184 GetClipboardData
 0x1051188 SendMessageA
 0x105118c DestroyWindow
 0x1051190 CheckRadioButton
 0x1051194 SendDlgItemMessageW
 0x1051198 SetClipboardData
 0x105119c SetForegroundWindow
ole32.dll
 0x10511b0 CoTaskMemFree
 0x10511b4 CoInitialize
 0x10511b8 CoTaskMemAlloc
 0x10511bc CoUninitialize
ADVAPI32.dll
 0x1051000 RegOpenKeyExA
 0x1051004 RegCreateKeyA
 0x1051008 RegCloseKey
 0x105100c RegQueryValueExA
WTSAPI32.dll
 0x10511a4 WTSCloseServer
 0x10511a8 WTSOpenServerA
NETAPI32.dll
 0x1051174 NetWkstaGetInfo
 0x1051178 NetWkstaSetInfo
 0x105117c NetApiBufferFree

EAT(Export Address Table) Library

0x1028480 Busysection
0x1028730 Dealthis
0x1028560 Sing
0x1027390 Teethshould


Similarity measure (PE file only) - Checking for service failure