ScreenShot
Created | 2021.08.04 10:01 | Machine | s1_win7_x6401 |
Filename | a24a7a925420fc48542f870656109fb0.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 31 detected (Jaik, Zusy, Wacatac, DropperX, Artemis, xxmmf, ai score=85, kcloud, Sabsik, Malicious, score, BScope, R002H09H221, HgIASZkA) | ||
md5 | a92922a71a9bf58cc2d95a6039c9a1b6 | ||
sha256 | 213ea943865069cf1210a58860c619a8fa8928258abe8919fee8180feafea547 | ||
ssdeep | 768:URFJRVA3O2pxNojkTnJQ6XWzQjkpC/xbjNxxuCqXKClZt9:MMoITVXGpC5bpHPmlZt9 | ||
imphash | 2cdeda7a0aa27475a825e9c41d4d95f0 | ||
impfuzzy | 24:mDozy4vLXHOovuXg7JHniv8ERRv6uk3zfcVAJXK6wxGTuEnk1EQDX:q4TXuhw9WKzfcVAJXKtQnFC |
Network IP location
Signature (5cnts)
Level | Description |
---|---|
danger | File has been identified by 31 AntiVirus engines on VirusTotal as malicious |
watch | Tries to unhook Windows functions monitored by Cuckoo |
info | Checks amount of memory in system |
info | One or more processes crashed |
info | The executable uses a known packer |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x408000 GetProcAddress
0x408004 LoadLibraryA
0x408008 lstrlenW
0x40800c InterlockedDecrement
0x408010 CloseHandle
0x408014 WriteFile
0x408018 CreateFileW
0x40801c lstrcatW
0x408020 GetModuleFileNameW
0x408024 RaiseException
0x408028 LocalFree
0x40802c lstrlenA
0x408030 InterlockedIncrement
0x408034 GetStringTypeW
0x408038 GetStringTypeA
0x40803c LCMapStringW
0x408040 LCMapStringA
0x408044 MultiByteToWideChar
0x408048 RtlUnwind
0x40804c GetCommandLineA
0x408050 GetVersion
0x408054 ExitProcess
0x408058 HeapFree
0x40805c HeapAlloc
0x408060 GetCurrentThreadId
0x408064 TlsSetValue
0x408068 TlsAlloc
0x40806c SetLastError
0x408070 TlsGetValue
0x408074 GetLastError
0x408078 TerminateProcess
0x40807c GetCurrentProcess
0x408080 UnhandledExceptionFilter
0x408084 GetModuleFileNameA
0x408088 FreeEnvironmentStringsA
0x40808c FreeEnvironmentStringsW
0x408090 WideCharToMultiByte
0x408094 GetEnvironmentStrings
0x408098 GetEnvironmentStringsW
0x40809c SetHandleCount
0x4080a0 GetStdHandle
0x4080a4 GetFileType
0x4080a8 GetStartupInfoA
0x4080ac GetModuleHandleA
0x4080b0 GetEnvironmentVariableA
0x4080b4 GetVersionExA
0x4080b8 HeapDestroy
0x4080bc HeapCreate
0x4080c0 VirtualFree
0x4080c4 VirtualAlloc
0x4080c8 HeapReAlloc
0x4080cc IsBadWritePtr
0x4080d0 InitializeCriticalSection
0x4080d4 EnterCriticalSection
0x4080d8 LeaveCriticalSection
0x4080dc SetUnhandledExceptionFilter
0x4080e0 IsBadReadPtr
0x4080e4 IsBadCodePtr
0x4080e8 GetCPInfo
0x4080ec GetACP
0x4080f0 GetOEMCP
0x4080f4 HeapSize
USER32.dll
0x408130 wsprintfW
ole32.dll
0x408138 CoInitializeSecurity
0x40813c CoUninitialize
0x408140 CoInitialize
0x408144 CoCreateInstance
0x408148 CoSetProxyBlanket
OLEAUT32.dll
0x4080fc VariantInit
0x408100 SafeArrayGetDim
0x408104 SafeArrayGetLBound
0x408108 SafeArrayGetUBound
0x40810c SafeArrayAccessData
0x408110 SafeArrayUnaccessData
0x408114 SysStringLen
0x408118 SysAllocStringLen
0x40811c SysAllocString
0x408120 VariantClear
0x408124 SysFreeString
0x408128 GetErrorInfo
EAT(Export Address Table) is none
KERNEL32.dll
0x408000 GetProcAddress
0x408004 LoadLibraryA
0x408008 lstrlenW
0x40800c InterlockedDecrement
0x408010 CloseHandle
0x408014 WriteFile
0x408018 CreateFileW
0x40801c lstrcatW
0x408020 GetModuleFileNameW
0x408024 RaiseException
0x408028 LocalFree
0x40802c lstrlenA
0x408030 InterlockedIncrement
0x408034 GetStringTypeW
0x408038 GetStringTypeA
0x40803c LCMapStringW
0x408040 LCMapStringA
0x408044 MultiByteToWideChar
0x408048 RtlUnwind
0x40804c GetCommandLineA
0x408050 GetVersion
0x408054 ExitProcess
0x408058 HeapFree
0x40805c HeapAlloc
0x408060 GetCurrentThreadId
0x408064 TlsSetValue
0x408068 TlsAlloc
0x40806c SetLastError
0x408070 TlsGetValue
0x408074 GetLastError
0x408078 TerminateProcess
0x40807c GetCurrentProcess
0x408080 UnhandledExceptionFilter
0x408084 GetModuleFileNameA
0x408088 FreeEnvironmentStringsA
0x40808c FreeEnvironmentStringsW
0x408090 WideCharToMultiByte
0x408094 GetEnvironmentStrings
0x408098 GetEnvironmentStringsW
0x40809c SetHandleCount
0x4080a0 GetStdHandle
0x4080a4 GetFileType
0x4080a8 GetStartupInfoA
0x4080ac GetModuleHandleA
0x4080b0 GetEnvironmentVariableA
0x4080b4 GetVersionExA
0x4080b8 HeapDestroy
0x4080bc HeapCreate
0x4080c0 VirtualFree
0x4080c4 VirtualAlloc
0x4080c8 HeapReAlloc
0x4080cc IsBadWritePtr
0x4080d0 InitializeCriticalSection
0x4080d4 EnterCriticalSection
0x4080d8 LeaveCriticalSection
0x4080dc SetUnhandledExceptionFilter
0x4080e0 IsBadReadPtr
0x4080e4 IsBadCodePtr
0x4080e8 GetCPInfo
0x4080ec GetACP
0x4080f0 GetOEMCP
0x4080f4 HeapSize
USER32.dll
0x408130 wsprintfW
ole32.dll
0x408138 CoInitializeSecurity
0x40813c CoUninitialize
0x408140 CoInitialize
0x408144 CoCreateInstance
0x408148 CoSetProxyBlanket
OLEAUT32.dll
0x4080fc VariantInit
0x408100 SafeArrayGetDim
0x408104 SafeArrayGetLBound
0x408108 SafeArrayGetUBound
0x40810c SafeArrayAccessData
0x408110 SafeArrayUnaccessData
0x408114 SysStringLen
0x408118 SysAllocStringLen
0x40811c SysAllocString
0x408120 VariantClear
0x408124 SysFreeString
0x408128 GetErrorInfo
EAT(Export Address Table) is none