Report - dHAfdxR.img

Emotet UPX Malicious Library OS Processor Check DLL PE File PE32
ScreenShot
Created 2021.08.06 08:07 Machine s1_win7_x6401
Filename dHAfdxR.img
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
6.4
ZERO API file : clean
VT API (file) 9 detected (Artemis, malicious, confidence, BadFile, TrickBotCrypt, score, Kryptik, CLASSIC)
md5 7c44e0a43e508476eda5f699d39a0c7f
sha256 bf81ad343dce8b514941ffd47576b78e02b41c23aec991fd5a48ad00c67ad942
ssdeep 12288:5bjfhtlWxycV80o3xKA3cHfnoEQOuG/ENYIm8MxxO9qrcOJz8:5bj9ZcG0CxKA3cHPoEQRjNXNYxtnF
imphash 8b7fb8fc4de24822c3d2cd067d85f8ec
impfuzzy 192:R1Rs9JaiI+uOkZtYAC7xkZu0IpcRcIcxri:6i9YkWfxpE7r
  Network IP location

Signature (17cnts)

Level Description
watch Communicates with host for which no DNS query was performed
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice File has been identified by 9 AntiVirus engines on VirusTotal as malicious
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Looks up the external IP address
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info Queries for the computername
info The executable uses a known packer

Rules (7cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_1_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (13cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://wtfismyip.com/text FI Hetzner Online GmbH 95.217.228.176 clean
https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/14/path/C:%5CUsers%5Ctest22%5CAppData%5CRoaming%5Cwise-tools5HD5PH%5CnxdHAfdxRxl.grf/0/ AL IPKO Telecommunications LLC 46.99.175.217 3807 mailcious
https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/5/file/ AL IPKO Telecommunications LLC 46.99.175.217 3807 mailcious
https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/14/DNSBL/listed/0/ AL IPKO Telecommunications LLC 46.99.175.217 3807 mailcious
https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/fhTbf7JhRDRVtj5VTdXtfPPzNxH/ AL IPKO Telecommunications LLC 46.99.175.217 3807 mailcious
https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/23/100019/ AL IPKO Telecommunications LLC 46.99.175.217 3807 mailcious
https://46.99.175.217/rob120/TEST22-PC_W617601.7FE1BBFB3D97947F3041B3C9EB33D5D9/14/user/test22/0/ AL IPKO Telecommunications LLC 46.99.175.217 3807 mailcious
150.134.208.175.b.barracudacentral.org Unknown 127.0.0.2 clean
150.134.208.175.cbl.abuseat.org Unknown clean
wtfismyip.com FI Hetzner Online GmbH 95.217.228.176 clean
150.134.208.175.zen.spamhaus.org Unknown clean
46.99.175.217 AL IPKO Telecommunications LLC 46.99.175.217 mailcious
95.217.228.176 FI Hetzner Online GmbH 95.217.228.176 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1004b198 GetStringTypeW
 0x1004b19c IsBadReadPtr
 0x1004b1a0 IsBadCodePtr
 0x1004b1a4 GetStringTypeA
 0x1004b1a8 CompareStringA
 0x1004b1ac CompareStringW
 0x1004b1b0 SetEnvironmentVariableA
 0x1004b1b4 GetProfileStringA
 0x1004b1b8 LCMapStringW
 0x1004b1bc LCMapStringA
 0x1004b1c0 GetEnvironmentStringsW
 0x1004b1c4 GetEnvironmentStrings
 0x1004b1c8 FreeEnvironmentStringsW
 0x1004b1cc FreeEnvironmentStringsA
 0x1004b1d0 GetStartupInfoA
 0x1004b1d4 GetStdHandle
 0x1004b1d8 SetHandleCount
 0x1004b1dc GetFileType
 0x1004b1e0 SetUnhandledExceptionFilter
 0x1004b1e4 IsBadWritePtr
 0x1004b1e8 VirtualAlloc
 0x1004b1ec VirtualFree
 0x1004b1f0 HeapCreate
 0x1004b1f4 HeapDestroy
 0x1004b1f8 GetTimeZoneInformation
 0x1004b1fc GetACP
 0x1004b200 HeapSize
 0x1004b204 HeapReAlloc
 0x1004b208 TerminateProcess
 0x1004b20c ExitProcess
 0x1004b210 GetCommandLineA
 0x1004b214 RaiseException
 0x1004b218 HeapAlloc
 0x1004b21c HeapFree
 0x1004b220 RtlUnwind
 0x1004b224 FileTimeToLocalFileTime
 0x1004b228 FileTimeToSystemTime
 0x1004b22c SystemTimeToFileTime
 0x1004b230 LocalFileTimeToFileTime
 0x1004b234 GetFileSize
 0x1004b238 GetCurrentDirectoryA
 0x1004b23c WritePrivateProfileStringA
 0x1004b240 GetPrivateProfileStringA
 0x1004b244 GetPrivateProfileIntA
 0x1004b248 GetOEMCP
 0x1004b24c GetCPInfo
 0x1004b250 TlsGetValue
 0x1004b254 LocalReAlloc
 0x1004b258 TlsSetValue
 0x1004b25c EnterCriticalSection
 0x1004b260 GlobalReAlloc
 0x1004b264 LeaveCriticalSection
 0x1004b268 TlsFree
 0x1004b26c GlobalHandle
 0x1004b270 DeleteCriticalSection
 0x1004b274 TlsAlloc
 0x1004b278 InitializeCriticalSection
 0x1004b27c LocalAlloc
 0x1004b280 GlobalFlags
 0x1004b284 GetProcessVersion
 0x1004b288 MulDiv
 0x1004b28c GetShortPathNameA
 0x1004b290 GetThreadLocale
 0x1004b294 GetStringTypeExA
 0x1004b298 GetVolumeInformationA
 0x1004b29c FindFirstFileA
 0x1004b2a0 FindClose
 0x1004b2a4 DeleteFileA
 0x1004b2a8 MoveFileA
 0x1004b2ac SetEndOfFile
 0x1004b2b0 UnlockFile
 0x1004b2b4 LockFile
 0x1004b2b8 FlushFileBuffers
 0x1004b2bc SetFilePointer
 0x1004b2c0 WriteFile
 0x1004b2c4 ReadFile
 0x1004b2c8 CreateFileA
 0x1004b2cc DuplicateHandle
 0x1004b2d0 SetLastError
 0x1004b2d4 GetLastError
 0x1004b2d8 GetDiskFreeSpaceA
 0x1004b2dc GetFileTime
 0x1004b2e0 SetFileTime
 0x1004b2e4 GetFullPathNameA
 0x1004b2e8 GetTempFileNameA
 0x1004b2ec GetFileAttributesA
 0x1004b2f0 LocalFree
 0x1004b2f4 MultiByteToWideChar
 0x1004b2f8 WideCharToMultiByte
 0x1004b2fc InterlockedDecrement
 0x1004b300 QueryPerformanceFrequency
 0x1004b304 InterlockedIncrement
 0x1004b308 GetModuleFileNameA
 0x1004b30c GetCurrentThread
 0x1004b310 lstrcmpA
 0x1004b314 FindResourceA
 0x1004b318 GetCurrentThreadId
 0x1004b31c lstrcmpiA
 0x1004b320 GlobalFindAtomA
 0x1004b324 GlobalDeleteAtom
 0x1004b328 GetModuleHandleA
 0x1004b32c lstrcatA
 0x1004b330 lstrcpynA
 0x1004b334 GlobalGetAtomNameA
 0x1004b338 GlobalAddAtomA
 0x1004b33c GetVersion
 0x1004b340 lstrcpyA
 0x1004b344 lstrlenA
 0x1004b348 SizeofResource
 0x1004b34c LoadResource
 0x1004b350 LockResource
 0x1004b354 GlobalAlloc
 0x1004b358 GlobalLock
 0x1004b35c GlobalUnlock
 0x1004b360 GlobalFree
 0x1004b364 LoadLibraryA
 0x1004b368 GetProcAddress
 0x1004b36c FreeLibrary
 0x1004b370 LoadLibraryW
 0x1004b374 GetCurrentProcess
 0x1004b378 QueryPerformanceCounter
 0x1004b37c CreateThread
 0x1004b380 Sleep
 0x1004b384 WaitForSingleObject
 0x1004b388 CloseHandle
 0x1004b38c ResumeThread
 0x1004b390 SetStdHandle
USER32.dll
 0x1004b3b0 ValidateRect
 0x1004b3b4 TranslateMessage
 0x1004b3b8 GetMessageA
 0x1004b3bc CharUpperA
 0x1004b3c0 DestroyCursor
 0x1004b3c4 LoadCursorA
 0x1004b3c8 SetRect
 0x1004b3cc PtInRect
 0x1004b3d0 FindWindowA
 0x1004b3d4 IsRectEmpty
 0x1004b3d8 ClientToScreen
 0x1004b3dc BeginPaint
 0x1004b3e0 EndPaint
 0x1004b3e4 InflateRect
 0x1004b3e8 wvsprintfA
 0x1004b3ec SetParent
 0x1004b3f0 AppendMenuA
 0x1004b3f4 DeleteMenu
 0x1004b3f8 GetSystemMenu
 0x1004b3fc SetTimer
 0x1004b400 KillTimer
 0x1004b404 WindowFromPoint
 0x1004b408 GetSysColorBrush
 0x1004b40c GetClassNameA
 0x1004b410 LoadStringA
 0x1004b414 InsertMenuA
 0x1004b418 GetMenuStringA
 0x1004b41c DestroyIcon
 0x1004b420 GetTabbedTextExtentA
 0x1004b424 SetCapture
 0x1004b428 InvertRect
 0x1004b42c GetDCEx
 0x1004b430 LockWindowUpdate
 0x1004b434 GetMenuState
 0x1004b438 ModifyMenuA
 0x1004b43c SetMenuItemBitmaps
 0x1004b440 CheckMenuItem
 0x1004b444 EnableMenuItem
 0x1004b448 GetNextDlgTabItem
 0x1004b44c SetWindowTextA
 0x1004b450 IsDialogMessageA
 0x1004b454 SetDlgItemTextA
 0x1004b458 SendDlgItemMessageA
 0x1004b45c MapWindowPoints
 0x1004b460 DispatchMessageA
 0x1004b464 ScreenToClient
 0x1004b468 DeferWindowPos
 0x1004b46c BeginDeferWindowPos
 0x1004b470 EndDeferWindowPos
 0x1004b474 ScrollWindow
 0x1004b478 GetScrollInfo
 0x1004b47c SetScrollInfo
 0x1004b480 ShowScrollBar
 0x1004b484 GetScrollRange
 0x1004b488 SetScrollRange
 0x1004b48c GetScrollPos
 0x1004b490 SetScrollPos
 0x1004b494 GetTopWindow
 0x1004b498 MessageBoxA
 0x1004b49c IsChild
 0x1004b4a0 RegisterClassA
 0x1004b4a4 TrackPopupMenu
 0x1004b4a8 GetWindowTextLengthA
 0x1004b4ac DefWindowProcA
 0x1004b4b0 SetWindowsHookExA
 0x1004b4b4 CallNextHookEx
 0x1004b4b8 GetClassLongA
 0x1004b4bc SetPropA
 0x1004b4c0 UnhookWindowsHookEx
 0x1004b4c4 GetPropA
 0x1004b4c8 CallWindowProcA
 0x1004b4cc GetCursorPos
 0x1004b4d0 GetMessageTime
 0x1004b4d4 GetMessagePos
 0x1004b4d8 GetForegroundWindow
 0x1004b4dc SetForegroundWindow
 0x1004b4e0 OffsetRect
 0x1004b4e4 IntersectRect
 0x1004b4e8 SystemParametersInfoA
 0x1004b4ec GetWindowPlacement
 0x1004b4f0 GetSystemMetrics
 0x1004b4f4 GetLastActivePopup
 0x1004b4f8 GetFocus
 0x1004b4fc EqualRect
 0x1004b500 GetDlgItem
 0x1004b504 GetKeyState
 0x1004b508 GetDlgCtrlID
 0x1004b50c UnpackDDElParam
 0x1004b510 ReuseDDElParam
 0x1004b514 SetActiveWindow
 0x1004b518 WinHelpA
 0x1004b51c SetMenu
 0x1004b520 LoadIconA
 0x1004b524 GetClassInfoA
 0x1004b528 DestroyMenu
 0x1004b52c SetFocus
 0x1004b530 GetWindow
 0x1004b534 IsWindowEnabled
 0x1004b538 SetCursor
 0x1004b53c PeekMessageA
 0x1004b540 PostMessageA
 0x1004b544 GetCapture
 0x1004b548 ReleaseCapture
 0x1004b54c LoadAcceleratorsA
 0x1004b550 SetRectEmpty
 0x1004b554 RegisterWindowMessageA
 0x1004b558 GetActiveWindow
 0x1004b55c wsprintfA
 0x1004b560 GetParent
 0x1004b564 GetMenuItemID
 0x1004b568 AdjustWindowRectEx
 0x1004b56c GetWindowLongA
 0x1004b570 SetWindowLongA
 0x1004b574 DefMDIChildProcA
 0x1004b578 DrawMenuBar
 0x1004b57c TranslateAcceleratorA
 0x1004b580 TranslateMDISysAccel
 0x1004b584 DefFrameProcA
 0x1004b588 CreateWindowExA
 0x1004b58c BringWindowToTop
 0x1004b590 GetMenu
 0x1004b594 GetMenuItemCount
 0x1004b598 ReleaseDC
 0x1004b59c IsWindow
 0x1004b5a0 SetWindowPos
 0x1004b5a4 GetDC
 0x1004b5a8 GetWindowDC
 0x1004b5ac IsClipboardFormatAvailable
 0x1004b5b0 GetClipboardData
 0x1004b5b4 ShowWindow
 0x1004b5b8 HideCaret
 0x1004b5bc ShowCaret
 0x1004b5c0 ExcludeUpdateRgn
 0x1004b5c4 DrawFocusRect
 0x1004b5c8 DefDlgProcA
 0x1004b5cc CharNextA
 0x1004b5d0 IsWindowUnicode
 0x1004b5d4 UpdateWindow
 0x1004b5d8 EnableWindow
 0x1004b5dc LoadBitmapA
 0x1004b5e0 CloseClipboard
 0x1004b5e4 RedrawWindow
 0x1004b5e8 CopyRect
 0x1004b5ec GetSysColor
 0x1004b5f0 EnumWindows
 0x1004b5f4 GetDesktopWindow
 0x1004b5f8 IsWindowVisible
 0x1004b5fc GetWindowTextA
 0x1004b600 InvalidateRect
 0x1004b604 LoadMenuA
 0x1004b608 GetSubMenu
 0x1004b60c IsIconic
 0x1004b610 IsZoomed
 0x1004b614 GetWindowRect
 0x1004b618 GrayStringA
 0x1004b61c DrawTextA
 0x1004b620 ShowOwnedPopups
 0x1004b624 PostQuitMessage
 0x1004b628 EndDialog
 0x1004b62c CreateDialogIndirectParamA
 0x1004b630 RemovePropA
 0x1004b634 GetMenuCheckMarkDimensions
 0x1004b638 TabbedTextOutA
 0x1004b63c GetClientRect
 0x1004b640 FillRect
 0x1004b644 SendMessageA
 0x1004b648 OpenClipboard
 0x1004b64c EmptyClipboard
 0x1004b650 SetClipboardData
 0x1004b654 DestroyWindow
GDI32.dll
 0x1004b044 StretchBlt
 0x1004b048 SetStretchBltMode
 0x1004b04c SetTextColor
 0x1004b050 SetBkColor
 0x1004b054 CreateBitmap
 0x1004b058 StretchDIBits
 0x1004b05c CreateDIBitmap
 0x1004b060 GetClipBox
 0x1004b064 GetStockObject
 0x1004b068 Rectangle
 0x1004b06c CreatePen
 0x1004b070 GetViewportOrgEx
 0x1004b074 AbortDoc
 0x1004b078 EndDoc
 0x1004b07c EndPage
 0x1004b080 StartPage
 0x1004b084 StartDocA
 0x1004b088 SetAbortProc
 0x1004b08c CreateDCA
 0x1004b090 SaveDC
 0x1004b094 RestoreDC
 0x1004b098 SetBkMode
 0x1004b09c SetPolyFillMode
 0x1004b0a0 SetROP2
 0x1004b0a4 SetMapMode
 0x1004b0a8 SetViewportOrgEx
 0x1004b0ac OffsetViewportOrgEx
 0x1004b0b0 SetViewportExtEx
 0x1004b0b4 ScaleViewportExtEx
 0x1004b0b8 SetWindowOrgEx
 0x1004b0bc SetWindowExtEx
 0x1004b0c0 ScaleWindowExtEx
 0x1004b0c4 SelectClipRgn
 0x1004b0c8 ExcludeClipRect
 0x1004b0cc IntersectClipRect
 0x1004b0d0 MoveToEx
 0x1004b0d4 DeleteDC
 0x1004b0d8 SetTextAlign
 0x1004b0dc GetCurrentPositionEx
 0x1004b0e0 CreateRectRgn
 0x1004b0e4 GetViewportExtEx
 0x1004b0e8 GetWindowExtEx
 0x1004b0ec CreateSolidBrush
 0x1004b0f0 CreatePatternBrush
 0x1004b0f4 SetRectRgn
 0x1004b0f8 CombineRgn
 0x1004b0fc CreateRectRgnIndirect
 0x1004b100 CreateFontIndirectA
 0x1004b104 GetCharWidthA
 0x1004b108 GetNearestColor
 0x1004b10c GetTextColor
 0x1004b110 GetStretchBltMode
 0x1004b114 GetPolyFillMode
 0x1004b118 GetTextAlign
 0x1004b11c GetBkMode
 0x1004b120 GetROP2
 0x1004b124 GetTextFaceA
 0x1004b128 GetWindowOrgEx
 0x1004b12c GetObjectA
 0x1004b130 GetDIBits
 0x1004b134 SelectObject
 0x1004b138 DeleteObject
 0x1004b13c PatBlt
 0x1004b140 GetTextMetricsA
 0x1004b144 GetTextExtentPoint32A
 0x1004b148 CreateFontA
 0x1004b14c BitBlt
 0x1004b150 CreateCompatibleDC
 0x1004b154 CreateCompatibleBitmap
 0x1004b158 GetMapMode
 0x1004b15c DPtoLP
 0x1004b160 GetBkColor
 0x1004b164 Escape
 0x1004b168 ExtTextOutA
 0x1004b16c TextOutA
 0x1004b170 RectVisible
 0x1004b174 PtVisible
 0x1004b178 UnrealizeObject
 0x1004b17c LPtoDP
 0x1004b180 SetBrushOrgEx
 0x1004b184 GetDeviceCaps
 0x1004b188 LineTo
 0x1004b18c GetTextExtentPointA
 0x1004b190 CreateHatchBrush
comdlg32.dll
 0x1004b66c GetFileTitleA
 0x1004b670 GetOpenFileNameA
 0x1004b674 GetSaveFileNameA
 0x1004b678 CommDlgExtendedError
 0x1004b67c PrintDlgA
WINSPOOL.DRV
 0x1004b65c OpenPrinterA
 0x1004b660 DocumentPropertiesA
 0x1004b664 ClosePrinter
ADVAPI32.dll
 0x1004b000 RegDeleteValueA
 0x1004b004 RegCloseKey
 0x1004b008 RegEnumKeyA
 0x1004b00c RegOpenKeyA
 0x1004b010 RegDeleteKeyA
 0x1004b014 SetFileSecurityA
 0x1004b018 GetFileSecurityA
 0x1004b01c RegQueryValueExA
 0x1004b020 RegOpenKeyExA
 0x1004b024 RegSetValueA
 0x1004b028 RegCreateKeyA
 0x1004b02c RegQueryValueA
 0x1004b030 RegSetValueExA
 0x1004b034 RegCreateKeyExA
SHELL32.dll
 0x1004b398 SHGetFileInfoA
 0x1004b39c DragAcceptFiles
 0x1004b3a0 DragQueryFileA
 0x1004b3a4 DragFinish
 0x1004b3a8 ExtractIconA
COMCTL32.dll
 0x1004b03c None

EAT(Export Address Table) Library

0x10015154 StartW


Similarity measure (PE file only) - Checking for service failure