Report - update.dll

UPX Malicious Library Admin Tool (Sysinternals etc ...) OS Processor Check DLL PE File PE32
ScreenShot
Created 2021.08.14 09:53 Machine s1_win7_x6402
Filename update.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
5.2
ZERO API file : malware
VT API (file) 23 detected (malicious, high confidence, Attribute, HighConfidence, Danabot, BankerX, Generic@ML, RDML, a9aUzdfJ8ivNcDTZGblg, Infected, AGEN, Sabsik, N7EEU0, score, R430712, Artemis, susgen, GdSda)
md5 fef6b272e83c2db9338ad55ffb6e8f6e
sha256 90d3303cc9628d39013556750168afdcb0d3196d95ae004fd5a9642238636875
ssdeep 24576:2cFXB3P/KiY386VWysaBaotyaD8u9hZ0Bc0TU522c:tWzXko8awdc0Ty22c
imphash 5f64f70cee34af5497ae02dd3fd387b7
impfuzzy 96:ocOvXVR0MYg2cfprt0hX11bFJecn1V+eKh1DwPOQ7:occFcvFdeA1sh2POQ7
  Network IP location

Signature (13cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch One or more of the buffers contains an embedded PE file
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
info Checks if process is being debugged by a debugger
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (7cnts)

Level Name Description Collection
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
192.52.167.44 US ASN-QUADRANET-GLOBAL 192.52.167.44 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x53652c SysFreeString
 0x536530 SysReAllocStringLen
 0x536534 SysAllocStringLen
advapi32.dll
 0x53653c RegQueryValueExW
 0x536540 RegOpenKeyExW
 0x536544 RegCloseKey
user32.dll
 0x53654c CharNextW
 0x536550 LoadStringW
kernel32.dll
 0x536558 Sleep
 0x53655c VirtualFree
 0x536560 VirtualAlloc
 0x536564 lstrlenW
 0x536568 VirtualQuery
 0x53656c QueryPerformanceCounter
 0x536570 GetTickCount
 0x536574 GetSystemInfo
 0x536578 GetVersion
 0x53657c CompareStringW
 0x536580 IsValidLocale
 0x536584 SetThreadLocale
 0x536588 GetSystemDefaultUILanguage
 0x53658c GetUserDefaultUILanguage
 0x536590 GetLocaleInfoW
 0x536594 WideCharToMultiByte
 0x536598 MultiByteToWideChar
 0x53659c GetACP
 0x5365a0 LoadLibraryExW
 0x5365a4 GetStartupInfoW
 0x5365a8 GetProcAddress
 0x5365ac GetModuleHandleW
 0x5365b0 GetModuleFileNameW
 0x5365b4 GetCommandLineW
 0x5365b8 FreeLibrary
 0x5365bc GetLastError
 0x5365c0 UnhandledExceptionFilter
 0x5365c4 RtlUnwind
 0x5365c8 RaiseException
 0x5365cc ExitProcess
 0x5365d0 ExitThread
 0x5365d4 SwitchToThread
 0x5365d8 GetCurrentThreadId
 0x5365dc CreateThread
 0x5365e0 DeleteCriticalSection
 0x5365e4 LeaveCriticalSection
 0x5365e8 EnterCriticalSection
 0x5365ec InitializeCriticalSection
 0x5365f0 FindFirstFileW
 0x5365f4 FindClose
 0x5365f8 WriteFile
 0x5365fc GetStdHandle
 0x536600 CloseHandle
kernel32.dll
 0x536608 GetProcAddress
 0x53660c RaiseException
 0x536610 LoadLibraryA
 0x536614 GetLastError
 0x536618 TlsSetValue
 0x53661c TlsGetValue
 0x536620 TlsFree
 0x536624 TlsAlloc
 0x536628 LocalFree
 0x53662c LocalAlloc
 0x536630 FreeLibrary
user32.dll
 0x536638 ReleaseDC
 0x53663c PeekMessageW
 0x536640 MsgWaitForMultipleObjects
 0x536644 MessageBoxW
 0x536648 LoadStringW
 0x53664c LoadIconW
 0x536650 GetSystemMetrics
 0x536654 GetSysColor
 0x536658 GetDC
 0x53665c FrameRect
 0x536660 FillRect
 0x536664 DrawTextExW
 0x536668 DrawFocusRect
 0x53666c CharUpperBuffW
 0x536670 CharUpperW
 0x536674 CharLowerBuffW
gdi32.dll
 0x53667c UnrealizeObject
 0x536680 StretchBlt
 0x536684 SetTextColor
 0x536688 SetStretchBltMode
 0x53668c SetROP2
 0x536690 SetPixel
 0x536694 SetDIBColorTable
 0x536698 SetBrushOrgEx
 0x53669c SetBkMode
 0x5366a0 SetBkColor
 0x5366a4 SelectPalette
 0x5366a8 SelectObject
 0x5366ac RoundRect
 0x5366b0 Rectangle
 0x5366b4 RealizePalette
 0x5366b8 Polyline
 0x5366bc Polygon
 0x5366c0 PolyBezierTo
 0x5366c4 PolyBezier
 0x5366c8 Pie
 0x5366cc PatBlt
 0x5366d0 MoveToEx
 0x5366d4 MaskBlt
 0x5366d8 LineTo
 0x5366dc GetWindowOrgEx
 0x5366e0 GetTextMetricsW
 0x5366e4 GetTextExtentPoint32W
 0x5366e8 GetSystemPaletteEntries
 0x5366ec GetStretchBltMode
 0x5366f0 GetStockObject
 0x5366f4 GetPixel
 0x5366f8 GetPaletteEntries
 0x5366fc GetObjectW
 0x536700 GetDeviceCaps
 0x536704 GetDIBits
 0x536708 GetDIBColorTable
 0x53670c GetCurrentPositionEx
 0x536710 GetClipBox
 0x536714 GetBrushOrgEx
 0x536718 GdiFlush
 0x53671c ExtTextOutW
 0x536720 ExtFloodFill
 0x536724 Ellipse
 0x536728 DeleteObject
 0x53672c DeleteDC
 0x536730 CreatePenIndirect
 0x536734 CreatePalette
 0x536738 CreateHalftonePalette
 0x53673c CreateFontIndirectW
 0x536740 CreateDIBitmap
 0x536744 CreateDIBSection
 0x536748 CreateCompatibleDC
 0x53674c CreateCompatibleBitmap
 0x536750 CreateBrushIndirect
 0x536754 CreateBitmap
 0x536758 Chord
 0x53675c BitBlt
 0x536760 ArcTo
 0x536764 Arc
 0x536768 AngleArc
version.dll
 0x536770 VerQueryValueW
 0x536774 GetFileVersionInfoSizeW
 0x536778 GetFileVersionInfoW
kernel32.dll
 0x536780 WriteFile
 0x536784 WideCharToMultiByte
 0x536788 WaitForSingleObject
 0x53678c VirtualQueryEx
 0x536790 VirtualQuery
 0x536794 VirtualProtect
 0x536798 VirtualFree
 0x53679c VerSetConditionMask
 0x5367a0 VerifyVersionInfoW
 0x5367a4 TerminateProcess
 0x5367a8 SwitchToThread
 0x5367ac SuspendThread
 0x5367b0 Sleep
 0x5367b4 SizeofResource
 0x5367b8 SetThreadPriority
 0x5367bc SetFilePointer
 0x5367c0 SetEvent
 0x5367c4 SetEndOfFile
 0x5367c8 ResumeThread
 0x5367cc ResetEvent
 0x5367d0 ReadFile
 0x5367d4 RaiseException
 0x5367d8 IsDebuggerPresent
 0x5367dc MulDiv
 0x5367e0 LockResource
 0x5367e4 LocalFree
 0x5367e8 LoadResource
 0x5367ec LoadLibraryW
 0x5367f0 LeaveCriticalSection
 0x5367f4 IsValidLocale
 0x5367f8 InitializeCriticalSection
 0x5367fc HeapSize
 0x536800 HeapFree
 0x536804 HeapDestroy
 0x536808 HeapCreate
 0x53680c HeapAlloc
 0x536810 GetVersionExW
 0x536814 GetTickCount
 0x536818 GetThreadPriority
 0x53681c GetThreadLocale
 0x536820 GetStdHandle
 0x536824 GetProcAddress
 0x536828 GetModuleHandleW
 0x53682c GetModuleFileNameW
 0x536830 GetLocaleInfoW
 0x536834 GetLocalTime
 0x536838 GetLastError
 0x53683c GetFullPathNameW
 0x536840 GetFileAttributesW
 0x536844 GetExitCodeThread
 0x536848 GetDiskFreeSpaceW
 0x53684c GetDateFormatW
 0x536850 GetCurrentThreadId
 0x536854 GetCurrentThread
 0x536858 GetCurrentProcess
 0x53685c GetCPInfoExW
 0x536860 GetCPInfo
 0x536864 GetACP
 0x536868 FreeResource
 0x53686c FreeLibrary
 0x536870 FormatMessageW
 0x536874 FindResourceW
 0x536878 FindFirstFileW
 0x53687c FindClose
 0x536880 EnumSystemLocalesW
 0x536884 EnumCalendarInfoW
 0x536888 EnterCriticalSection
 0x53688c DeleteCriticalSection
 0x536890 CreateFileW
 0x536894 CreateEventW
 0x536898 CompareStringW
 0x53689c CloseHandle
advapi32.dll
 0x5368a4 RegUnLoadKeyW
 0x5368a8 RegSetValueExW
 0x5368ac RegSaveKeyW
 0x5368b0 RegRestoreKeyW
 0x5368b4 RegReplaceKeyW
 0x5368b8 RegQueryValueExW
 0x5368bc RegQueryInfoKeyW
 0x5368c0 RegOpenKeyExW
 0x5368c4 RegLoadKeyW
 0x5368c8 RegFlushKey
 0x5368cc RegEnumValueW
 0x5368d0 RegEnumKeyExW
 0x5368d4 RegDeleteValueW
 0x5368d8 RegDeleteKeyW
 0x5368dc RegCreateKeyExW
 0x5368e0 RegConnectRegistryW
 0x5368e4 RegCloseKey
kernel32.dll
 0x5368ec Sleep
netapi32.dll
 0x5368f4 NetApiBufferFree
 0x5368f8 NetWkstaGetInfo
oleaut32.dll
 0x536900 SafeArrayPtrOfIndex
 0x536904 SafeArrayGetUBound
 0x536908 SafeArrayGetLBound
 0x53690c SafeArrayCreate
 0x536910 VariantChangeType
 0x536914 VariantCopy
 0x536918 VariantClear
 0x53691c VariantInit
msvcrt.dll
 0x536924 memcpy

EAT(Export Address Table) Library

0x45fbbc TMethodImplementationIntercept
0x410488 __dbk_fcall_wrapper
0x533630 dbkFCallWrapperAddr


Similarity measure (PE file only) - Checking for service failure