ScreenShot
Created | 2021.07.25 12:19 | Machine | s1_win7_x6401 |
Filename | toolspab3.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 20 detected (AIDetect, malware1, malicious, high confidence, Unsafe, confidence, 100%, ZexaF, tuW@aKL0pgaG, A + Troj, Kryptik, Azorult, Mokes, score, Artemis, BScope, CLASSIC, Static AI, Malicious PE, susgen, QVM10) | ||
md5 | e1efc9ffe52d619e45016f1b81a3415a | ||
sha256 | 8b7ec00a2826c2285eb35271029ec360505b3ed7fd00f7a289536e183cff2a67 | ||
ssdeep | 6144:IudpyCC94krINIHDIGz5pcKTYcxD2LN7gbjz8CTpNo16YIf6I:nZC9/kNIHD5pz1DSZ+B4 | ||
imphash | df9f8478a5324ab8dd6d2dd50515fa50 | ||
impfuzzy | 48:sAteXO5YerVnciEp0tOCKaEZtn6c+JUXBr/E2Gg:sRehrxch0t7EZtn6c+JURr/EO |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
warning | File has been identified by 20 AntiVirus engines on VirusTotal as malicious |
watch | Tries to unhook Windows functions monitored by Cuckoo |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | One or more processes crashed |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
Rules (5cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x42a000 GetFileSize
0x42a004 GlobalDeleteAtom
0x42a008 SetFilePointer
0x42a00c lstrlenA
0x42a010 CopyFileExW
0x42a014 SetLocalTime
0x42a018 CommConfigDialogA
0x42a01c MapUserPhysicalPages
0x42a020 FreeLibrary
0x42a024 InterlockedIncrement
0x42a028 GetCommState
0x42a02c InterlockedDecrement
0x42a030 ZombifyActCtx
0x42a034 SetFirmwareEnvironmentVariableA
0x42a038 GetSystemWindowsDirectoryW
0x42a03c GlobalLock
0x42a040 GetComputerNameW
0x42a044 CreateDirectoryExA
0x42a048 FreeEnvironmentStringsA
0x42a04c GetProcessPriorityBoost
0x42a050 GetTickCount
0x42a054 GetCommConfig
0x42a058 GetConsoleAliasesLengthA
0x42a05c GetWindowsDirectoryA
0x42a060 GetConsoleAliasExesW
0x42a064 WriteFile
0x42a068 FindActCtxSectionStringA
0x42a06c TlsSetValue
0x42a070 GlobalAlloc
0x42a074 GetSystemDirectoryW
0x42a078 VirtualFreeEx
0x42a07c LoadLibraryW
0x42a080 GetConsoleMode
0x42a084 _hread
0x42a088 GetSystemWow64DirectoryW
0x42a08c SetSystemTimeAdjustment
0x42a090 GlobalFlags
0x42a094 GetBinaryTypeA
0x42a098 GetAtomNameW
0x42a09c ReadFile
0x42a0a0 ExitThread
0x42a0a4 SetConsoleTitleA
0x42a0a8 VirtualUnlock
0x42a0ac DeactivateActCtx
0x42a0b0 GetNamedPipeHandleStateW
0x42a0b4 ReleaseActCtx
0x42a0b8 GetStartupInfoA
0x42a0bc GetCPInfoExW
0x42a0c0 GetCurrentDirectoryW
0x42a0c4 ReadConsoleOutputCharacterA
0x42a0c8 GetProcAddress
0x42a0cc GetProcessHeaps
0x42a0d0 GetComputerNameExW
0x42a0d4 CreateNamedPipeA
0x42a0d8 SetStdHandle
0x42a0dc SetComputerNameA
0x42a0e0 VerLanguageNameW
0x42a0e4 LoadLibraryA
0x42a0e8 Process32FirstW
0x42a0ec CreateSemaphoreW
0x42a0f0 SetCalendarInfoW
0x42a0f4 SetConsoleCtrlHandler
0x42a0f8 SetCurrentDirectoryW
0x42a0fc WriteProfileSectionW
0x42a100 SetConsoleWindowInfo
0x42a104 FindAtomA
0x42a108 Process32NextW
0x42a10c QueryMemoryResourceNotification
0x42a110 WriteProfileStringW
0x42a114 BuildCommDCBA
0x42a118 VirtualProtect
0x42a11c CompareStringA
0x42a120 GetFileAttributesExW
0x42a124 _lopen
0x42a128 TlsAlloc
0x42a12c GetVolumeNameForVolumeMountPointW
0x42a130 GetCurrentProcessId
0x42a134 GetProfileSectionW
0x42a138 LCMapStringW
0x42a13c DeleteFileA
0x42a140 GetLastError
0x42a144 WideCharToMultiByte
0x42a148 GetCommandLineA
0x42a14c HeapValidate
0x42a150 IsBadReadPtr
0x42a154 RaiseException
0x42a158 TerminateProcess
0x42a15c GetCurrentProcess
0x42a160 UnhandledExceptionFilter
0x42a164 SetUnhandledExceptionFilter
0x42a168 IsDebuggerPresent
0x42a16c GetModuleFileNameW
0x42a170 GetACP
0x42a174 GetOEMCP
0x42a178 GetCPInfo
0x42a17c IsValidCodePage
0x42a180 TlsGetValue
0x42a184 GetModuleHandleW
0x42a188 GetCurrentThreadId
0x42a18c TlsFree
0x42a190 SetLastError
0x42a194 EnterCriticalSection
0x42a198 LeaveCriticalSection
0x42a19c DeleteCriticalSection
0x42a1a0 QueryPerformanceCounter
0x42a1a4 GetSystemTimeAsFileTime
0x42a1a8 Sleep
0x42a1ac ExitProcess
0x42a1b0 GetModuleFileNameA
0x42a1b4 GetEnvironmentStrings
0x42a1b8 FreeEnvironmentStringsW
0x42a1bc GetEnvironmentStringsW
0x42a1c0 SetHandleCount
0x42a1c4 GetStdHandle
0x42a1c8 GetFileType
0x42a1cc HeapDestroy
0x42a1d0 HeapCreate
0x42a1d4 HeapFree
0x42a1d8 VirtualFree
0x42a1dc HeapAlloc
0x42a1e0 HeapSize
0x42a1e4 HeapReAlloc
0x42a1e8 VirtualAlloc
0x42a1ec DebugBreak
0x42a1f0 OutputDebugStringA
0x42a1f4 WriteConsoleW
0x42a1f8 OutputDebugStringW
0x42a1fc RtlUnwind
0x42a200 MultiByteToWideChar
0x42a204 LCMapStringA
0x42a208 GetStringTypeA
0x42a20c GetStringTypeW
0x42a210 GetLocaleInfoA
0x42a214 GetConsoleCP
0x42a218 InitializeCriticalSectionAndSpinCount
0x42a21c FlushFileBuffers
0x42a220 WriteConsoleA
0x42a224 GetConsoleOutputCP
0x42a228 CloseHandle
0x42a22c CreateFileA
0x42a230 GetModuleHandleA
USER32.dll
0x42a238 GetMenuInfo
0x42a23c GetListBoxInfo
EAT(Export Address Table) is none
KERNEL32.dll
0x42a000 GetFileSize
0x42a004 GlobalDeleteAtom
0x42a008 SetFilePointer
0x42a00c lstrlenA
0x42a010 CopyFileExW
0x42a014 SetLocalTime
0x42a018 CommConfigDialogA
0x42a01c MapUserPhysicalPages
0x42a020 FreeLibrary
0x42a024 InterlockedIncrement
0x42a028 GetCommState
0x42a02c InterlockedDecrement
0x42a030 ZombifyActCtx
0x42a034 SetFirmwareEnvironmentVariableA
0x42a038 GetSystemWindowsDirectoryW
0x42a03c GlobalLock
0x42a040 GetComputerNameW
0x42a044 CreateDirectoryExA
0x42a048 FreeEnvironmentStringsA
0x42a04c GetProcessPriorityBoost
0x42a050 GetTickCount
0x42a054 GetCommConfig
0x42a058 GetConsoleAliasesLengthA
0x42a05c GetWindowsDirectoryA
0x42a060 GetConsoleAliasExesW
0x42a064 WriteFile
0x42a068 FindActCtxSectionStringA
0x42a06c TlsSetValue
0x42a070 GlobalAlloc
0x42a074 GetSystemDirectoryW
0x42a078 VirtualFreeEx
0x42a07c LoadLibraryW
0x42a080 GetConsoleMode
0x42a084 _hread
0x42a088 GetSystemWow64DirectoryW
0x42a08c SetSystemTimeAdjustment
0x42a090 GlobalFlags
0x42a094 GetBinaryTypeA
0x42a098 GetAtomNameW
0x42a09c ReadFile
0x42a0a0 ExitThread
0x42a0a4 SetConsoleTitleA
0x42a0a8 VirtualUnlock
0x42a0ac DeactivateActCtx
0x42a0b0 GetNamedPipeHandleStateW
0x42a0b4 ReleaseActCtx
0x42a0b8 GetStartupInfoA
0x42a0bc GetCPInfoExW
0x42a0c0 GetCurrentDirectoryW
0x42a0c4 ReadConsoleOutputCharacterA
0x42a0c8 GetProcAddress
0x42a0cc GetProcessHeaps
0x42a0d0 GetComputerNameExW
0x42a0d4 CreateNamedPipeA
0x42a0d8 SetStdHandle
0x42a0dc SetComputerNameA
0x42a0e0 VerLanguageNameW
0x42a0e4 LoadLibraryA
0x42a0e8 Process32FirstW
0x42a0ec CreateSemaphoreW
0x42a0f0 SetCalendarInfoW
0x42a0f4 SetConsoleCtrlHandler
0x42a0f8 SetCurrentDirectoryW
0x42a0fc WriteProfileSectionW
0x42a100 SetConsoleWindowInfo
0x42a104 FindAtomA
0x42a108 Process32NextW
0x42a10c QueryMemoryResourceNotification
0x42a110 WriteProfileStringW
0x42a114 BuildCommDCBA
0x42a118 VirtualProtect
0x42a11c CompareStringA
0x42a120 GetFileAttributesExW
0x42a124 _lopen
0x42a128 TlsAlloc
0x42a12c GetVolumeNameForVolumeMountPointW
0x42a130 GetCurrentProcessId
0x42a134 GetProfileSectionW
0x42a138 LCMapStringW
0x42a13c DeleteFileA
0x42a140 GetLastError
0x42a144 WideCharToMultiByte
0x42a148 GetCommandLineA
0x42a14c HeapValidate
0x42a150 IsBadReadPtr
0x42a154 RaiseException
0x42a158 TerminateProcess
0x42a15c GetCurrentProcess
0x42a160 UnhandledExceptionFilter
0x42a164 SetUnhandledExceptionFilter
0x42a168 IsDebuggerPresent
0x42a16c GetModuleFileNameW
0x42a170 GetACP
0x42a174 GetOEMCP
0x42a178 GetCPInfo
0x42a17c IsValidCodePage
0x42a180 TlsGetValue
0x42a184 GetModuleHandleW
0x42a188 GetCurrentThreadId
0x42a18c TlsFree
0x42a190 SetLastError
0x42a194 EnterCriticalSection
0x42a198 LeaveCriticalSection
0x42a19c DeleteCriticalSection
0x42a1a0 QueryPerformanceCounter
0x42a1a4 GetSystemTimeAsFileTime
0x42a1a8 Sleep
0x42a1ac ExitProcess
0x42a1b0 GetModuleFileNameA
0x42a1b4 GetEnvironmentStrings
0x42a1b8 FreeEnvironmentStringsW
0x42a1bc GetEnvironmentStringsW
0x42a1c0 SetHandleCount
0x42a1c4 GetStdHandle
0x42a1c8 GetFileType
0x42a1cc HeapDestroy
0x42a1d0 HeapCreate
0x42a1d4 HeapFree
0x42a1d8 VirtualFree
0x42a1dc HeapAlloc
0x42a1e0 HeapSize
0x42a1e4 HeapReAlloc
0x42a1e8 VirtualAlloc
0x42a1ec DebugBreak
0x42a1f0 OutputDebugStringA
0x42a1f4 WriteConsoleW
0x42a1f8 OutputDebugStringW
0x42a1fc RtlUnwind
0x42a200 MultiByteToWideChar
0x42a204 LCMapStringA
0x42a208 GetStringTypeA
0x42a20c GetStringTypeW
0x42a210 GetLocaleInfoA
0x42a214 GetConsoleCP
0x42a218 InitializeCriticalSectionAndSpinCount
0x42a21c FlushFileBuffers
0x42a220 WriteConsoleA
0x42a224 GetConsoleOutputCP
0x42a228 CloseHandle
0x42a22c CreateFileA
0x42a230 GetModuleHandleA
USER32.dll
0x42a238 GetMenuInfo
0x42a23c GetListBoxInfo
EAT(Export Address Table) is none