Report - update.dll

Antivirus UPX Malicious Library OS Processor Check DLL PE File PE32
ScreenShot
Created 2021.08.13 20:33 Machine s1_win7_x6402
Filename update.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
5.0
ZERO API file : malware
VT API (file) 37 detected (Danabot, malicious, high confidence, score, GenericRXAA, Unsafe, ONMW, Attribute, HighConfidence, BankerX, Stjx, AGEN, Siggen14, Infected, CK4OC3, susgen, kcloud, R430712, R002H0CHC21, GdSda, TrojanPSW, HgkASaQA)
md5 c00d207efb855910154389b48404e550
sha256 716e5a3d29ff525aed30c18061daff4b496f3f828ba2ac763efd857062a42e96
ssdeep 24576:qcFPyLyEv4NeAXD+Rk+p736lDEU4KgTfp:RQa+lKlDJgT
imphash 5f64f70cee34af5497ae02dd3fd387b7
impfuzzy 96:ocOvXVR0MYg2cfprt0hX11bFJecn1V+eKh1DwPOQ7:occFcvFdeA1sh2POQ7
  Network IP location

Signature (12cnts)

Level Description
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch One or more of the buffers contains an embedded PE file
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
info Checks if process is being debugged by a debugger
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (7cnts)

Level Name Description Collection
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
103.229.126.73 TW Cloudie Limited 103.229.126.73 clean
192.52.167.44 US ASN-QUADRANET-GLOBAL 192.52.167.44 clean

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x53852c SysFreeString
 0x538530 SysReAllocStringLen
 0x538534 SysAllocStringLen
advapi32.dll
 0x53853c RegQueryValueExW
 0x538540 RegOpenKeyExW
 0x538544 RegCloseKey
user32.dll
 0x53854c CharNextW
 0x538550 LoadStringW
kernel32.dll
 0x538558 Sleep
 0x53855c VirtualFree
 0x538560 VirtualAlloc
 0x538564 lstrlenW
 0x538568 VirtualQuery
 0x53856c QueryPerformanceCounter
 0x538570 GetTickCount
 0x538574 GetSystemInfo
 0x538578 GetVersion
 0x53857c CompareStringW
 0x538580 IsValidLocale
 0x538584 SetThreadLocale
 0x538588 GetSystemDefaultUILanguage
 0x53858c GetUserDefaultUILanguage
 0x538590 GetLocaleInfoW
 0x538594 WideCharToMultiByte
 0x538598 MultiByteToWideChar
 0x53859c GetACP
 0x5385a0 LoadLibraryExW
 0x5385a4 GetStartupInfoW
 0x5385a8 GetProcAddress
 0x5385ac GetModuleHandleW
 0x5385b0 GetModuleFileNameW
 0x5385b4 GetCommandLineW
 0x5385b8 FreeLibrary
 0x5385bc GetLastError
 0x5385c0 UnhandledExceptionFilter
 0x5385c4 RtlUnwind
 0x5385c8 RaiseException
 0x5385cc ExitProcess
 0x5385d0 ExitThread
 0x5385d4 SwitchToThread
 0x5385d8 GetCurrentThreadId
 0x5385dc CreateThread
 0x5385e0 DeleteCriticalSection
 0x5385e4 LeaveCriticalSection
 0x5385e8 EnterCriticalSection
 0x5385ec InitializeCriticalSection
 0x5385f0 FindFirstFileW
 0x5385f4 FindClose
 0x5385f8 WriteFile
 0x5385fc GetStdHandle
 0x538600 CloseHandle
kernel32.dll
 0x538608 GetProcAddress
 0x53860c RaiseException
 0x538610 LoadLibraryA
 0x538614 GetLastError
 0x538618 TlsSetValue
 0x53861c TlsGetValue
 0x538620 TlsFree
 0x538624 TlsAlloc
 0x538628 LocalFree
 0x53862c LocalAlloc
 0x538630 FreeLibrary
user32.dll
 0x538638 ReleaseDC
 0x53863c PeekMessageW
 0x538640 MsgWaitForMultipleObjects
 0x538644 MessageBoxW
 0x538648 LoadStringW
 0x53864c LoadIconW
 0x538650 GetSystemMetrics
 0x538654 GetSysColor
 0x538658 GetDC
 0x53865c FrameRect
 0x538660 FillRect
 0x538664 DrawTextExW
 0x538668 DrawFocusRect
 0x53866c CharUpperBuffW
 0x538670 CharUpperW
 0x538674 CharLowerBuffW
gdi32.dll
 0x53867c UnrealizeObject
 0x538680 StretchBlt
 0x538684 SetTextColor
 0x538688 SetStretchBltMode
 0x53868c SetROP2
 0x538690 SetPixel
 0x538694 SetDIBColorTable
 0x538698 SetBrushOrgEx
 0x53869c SetBkMode
 0x5386a0 SetBkColor
 0x5386a4 SelectPalette
 0x5386a8 SelectObject
 0x5386ac RoundRect
 0x5386b0 Rectangle
 0x5386b4 RealizePalette
 0x5386b8 Polyline
 0x5386bc Polygon
 0x5386c0 PolyBezierTo
 0x5386c4 PolyBezier
 0x5386c8 Pie
 0x5386cc PatBlt
 0x5386d0 MoveToEx
 0x5386d4 MaskBlt
 0x5386d8 LineTo
 0x5386dc GetWindowOrgEx
 0x5386e0 GetTextMetricsW
 0x5386e4 GetTextExtentPoint32W
 0x5386e8 GetSystemPaletteEntries
 0x5386ec GetStretchBltMode
 0x5386f0 GetStockObject
 0x5386f4 GetPixel
 0x5386f8 GetPaletteEntries
 0x5386fc GetObjectW
 0x538700 GetDeviceCaps
 0x538704 GetDIBits
 0x538708 GetDIBColorTable
 0x53870c GetCurrentPositionEx
 0x538710 GetClipBox
 0x538714 GetBrushOrgEx
 0x538718 GdiFlush
 0x53871c ExtTextOutW
 0x538720 ExtFloodFill
 0x538724 Ellipse
 0x538728 DeleteObject
 0x53872c DeleteDC
 0x538730 CreatePenIndirect
 0x538734 CreatePalette
 0x538738 CreateHalftonePalette
 0x53873c CreateFontIndirectW
 0x538740 CreateDIBitmap
 0x538744 CreateDIBSection
 0x538748 CreateCompatibleDC
 0x53874c CreateCompatibleBitmap
 0x538750 CreateBrushIndirect
 0x538754 CreateBitmap
 0x538758 Chord
 0x53875c BitBlt
 0x538760 ArcTo
 0x538764 Arc
 0x538768 AngleArc
version.dll
 0x538770 VerQueryValueW
 0x538774 GetFileVersionInfoSizeW
 0x538778 GetFileVersionInfoW
kernel32.dll
 0x538780 WriteFile
 0x538784 WideCharToMultiByte
 0x538788 WaitForSingleObject
 0x53878c VirtualQueryEx
 0x538790 VirtualQuery
 0x538794 VirtualProtect
 0x538798 VirtualFree
 0x53879c VerSetConditionMask
 0x5387a0 VerifyVersionInfoW
 0x5387a4 TerminateProcess
 0x5387a8 SwitchToThread
 0x5387ac SuspendThread
 0x5387b0 Sleep
 0x5387b4 SizeofResource
 0x5387b8 SetThreadPriority
 0x5387bc SetFilePointer
 0x5387c0 SetEvent
 0x5387c4 SetEndOfFile
 0x5387c8 ResumeThread
 0x5387cc ResetEvent
 0x5387d0 ReadFile
 0x5387d4 RaiseException
 0x5387d8 IsDebuggerPresent
 0x5387dc MulDiv
 0x5387e0 LockResource
 0x5387e4 LocalFree
 0x5387e8 LoadResource
 0x5387ec LoadLibraryW
 0x5387f0 LeaveCriticalSection
 0x5387f4 IsValidLocale
 0x5387f8 InitializeCriticalSection
 0x5387fc HeapSize
 0x538800 HeapFree
 0x538804 HeapDestroy
 0x538808 HeapCreate
 0x53880c HeapAlloc
 0x538810 GetVersionExW
 0x538814 GetTickCount
 0x538818 GetThreadPriority
 0x53881c GetThreadLocale
 0x538820 GetStdHandle
 0x538824 GetProcAddress
 0x538828 GetModuleHandleW
 0x53882c GetModuleFileNameW
 0x538830 GetLocaleInfoW
 0x538834 GetLocalTime
 0x538838 GetLastError
 0x53883c GetFullPathNameW
 0x538840 GetFileAttributesW
 0x538844 GetExitCodeThread
 0x538848 GetDiskFreeSpaceW
 0x53884c GetDateFormatW
 0x538850 GetCurrentThreadId
 0x538854 GetCurrentThread
 0x538858 GetCurrentProcess
 0x53885c GetCPInfoExW
 0x538860 GetCPInfo
 0x538864 GetACP
 0x538868 FreeResource
 0x53886c FreeLibrary
 0x538870 FormatMessageW
 0x538874 FindResourceW
 0x538878 FindFirstFileW
 0x53887c FindClose
 0x538880 EnumSystemLocalesW
 0x538884 EnumCalendarInfoW
 0x538888 EnterCriticalSection
 0x53888c DeleteCriticalSection
 0x538890 CreateFileW
 0x538894 CreateEventW
 0x538898 CompareStringW
 0x53889c CloseHandle
advapi32.dll
 0x5388a4 RegUnLoadKeyW
 0x5388a8 RegSetValueExW
 0x5388ac RegSaveKeyW
 0x5388b0 RegRestoreKeyW
 0x5388b4 RegReplaceKeyW
 0x5388b8 RegQueryValueExW
 0x5388bc RegQueryInfoKeyW
 0x5388c0 RegOpenKeyExW
 0x5388c4 RegLoadKeyW
 0x5388c8 RegFlushKey
 0x5388cc RegEnumValueW
 0x5388d0 RegEnumKeyExW
 0x5388d4 RegDeleteValueW
 0x5388d8 RegDeleteKeyW
 0x5388dc RegCreateKeyExW
 0x5388e0 RegConnectRegistryW
 0x5388e4 RegCloseKey
kernel32.dll
 0x5388ec Sleep
netapi32.dll
 0x5388f4 NetApiBufferFree
 0x5388f8 NetWkstaGetInfo
oleaut32.dll
 0x538900 SafeArrayPtrOfIndex
 0x538904 SafeArrayGetUBound
 0x538908 SafeArrayGetLBound
 0x53890c SafeArrayCreate
 0x538910 VariantChangeType
 0x538914 VariantCopy
 0x538918 VariantClear
 0x53891c VariantInit
msvcrt.dll
 0x538924 memcpy

EAT(Export Address Table) Library

0x45f4e0 TMethodImplementationIntercept
0x410488 __dbk_fcall_wrapper
0x535630 dbkFCallWrapperAddr


Similarity measure (PE file only) - Checking for service failure