Report - rollerkind.exe

UPX Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.08.20 09:56 Machine s1_win7_x6401
Filename rollerkind.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.2
ZERO API file : malware
VT API (file) 32 detected (AIDetect, malware2, malicious, high confidence, Artemis, Unsafe, Save, confidence, Kryptik, Eldorado, Attribute, HighConfidence, HMDM, Zenpak, DropperX, A + Troj, Krypt, Zurgop, Sabsik, Ilgergop, UNI2RA, score, MalPe, R426948, BScope, Glupteba, Static AI, Malicious PE, susgen, GenKryptik, FJEX, Genetic)
md5 b6b054b0a63ed8e89b4a55c1679b8743
sha256 57df320d3530fe17721f6c50db2451e1791c2eba9634f4d07a7907f87ae0df95
ssdeep 12288:gqfhpDiL50b71oL5YCTs66/0V66qEmhKzFujjr4TbWVYD:Rhm0712LT070UVYD
imphash 9e6cdfd867cec1c30d2ae8894f290a78
impfuzzy 24:KbkD20ZZkrkRr1F/xQIIV4FP7SdcKcDSvpX8Q+Hbhu/WgY25tTecdYSJ3nplOuOk:VZmq/jTSdHlTWgY25tTecJpkuuHGAs
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x478008 WriteConsoleOutputW
 0x47800c InterlockedIncrement
 0x478010 GetConsoleAliasA
 0x478014 InterlockedDecrement
 0x478018 GetSystemWindowsDirectoryW
 0x47801c GetEnvironmentStringsW
 0x478020 GetUserDefaultLCID
 0x478024 SetEvent
 0x478028 GetConsoleAliasesLengthA
 0x47802c GetConsoleTitleA
 0x478030 CreateActCtxW
 0x478034 InitializeCriticalSection
 0x478038 GetConsoleCP
 0x47803c GlobalAlloc
 0x478040 GetSystemDirectoryW
 0x478044 GetFileAttributesA
 0x478048 lstrcpynW
 0x47804c SetConsoleCursorPosition
 0x478050 HeapQueryInformation
 0x478054 WritePrivateProfileSectionW
 0x478058 IsBadWritePtr
 0x47805c GetModuleFileNameW
 0x478060 GetCompressedFileSizeA
 0x478064 CreateFileW
 0x478068 lstrcatA
 0x47806c GetACP
 0x478070 lstrlenW
 0x478074 EnumDateFormatsExW
 0x478078 VerifyVersionInfoW
 0x47807c InterlockedExchange
 0x478080 GetCPInfoExW
 0x478084 FillConsoleOutputCharacterW
 0x478088 GetLastError
 0x47808c GetProcAddress
 0x478090 PeekConsoleInputW
 0x478094 CreateTimerQueueTimer
 0x478098 LocalLock
 0x47809c GetConsoleDisplayMode
 0x4780a0 EnterCriticalSection
 0x4780a4 SetTimerQueueTimer
 0x4780a8 GetLocalTime
 0x4780ac WriteConsoleA
 0x4780b0 DeleteTimerQueue
 0x4780b4 DnsHostnameToComputerNameA
 0x4780b8 BeginUpdateResourceA
 0x4780bc GlobalGetAtomNameW
 0x4780c0 WaitForMultipleObjects
 0x4780c4 SetEnvironmentVariableA
 0x4780c8 GetModuleFileNameA
 0x4780cc GetModuleHandleA
 0x4780d0 EraseTape
 0x4780d4 EndUpdateResourceA
 0x4780d8 ReadConsoleInputW
 0x4780dc FindFirstVolumeW
 0x4780e0 GetCurrentProcessId
 0x4780e4 AreFileApisANSI
 0x4780e8 LCMapStringW
 0x4780ec FlushFileBuffers
 0x4780f0 LCMapStringA
 0x4780f4 GetStringTypeW
 0x4780f8 UnhandledExceptionFilter
 0x4780fc SetUnhandledExceptionFilter
 0x478100 HeapAlloc
 0x478104 GetModuleHandleW
 0x478108 Sleep
 0x47810c ExitProcess
 0x478110 GetStartupInfoW
 0x478114 WriteFile
 0x478118 GetStdHandle
 0x47811c DeleteCriticalSection
 0x478120 LeaveCriticalSection
 0x478124 HeapFree
 0x478128 VirtualFree
 0x47812c VirtualAlloc
 0x478130 HeapReAlloc
 0x478134 HeapCreate
 0x478138 TlsGetValue
 0x47813c TlsAlloc
 0x478140 TlsSetValue
 0x478144 TlsFree
 0x478148 SetLastError
 0x47814c GetCurrentThreadId
 0x478150 TerminateProcess
 0x478154 GetCurrentProcess
 0x478158 IsDebuggerPresent
 0x47815c LoadLibraryA
 0x478160 InitializeCriticalSectionAndSpinCount
 0x478164 FreeEnvironmentStringsW
 0x478168 GetCommandLineW
 0x47816c SetHandleCount
 0x478170 GetFileType
 0x478174 GetStartupInfoA
 0x478178 QueryPerformanceCounter
 0x47817c GetTickCount
 0x478180 GetSystemTimeAsFileTime
 0x478184 RaiseException
 0x478188 RtlUnwind
 0x47818c GetCPInfo
 0x478190 GetOEMCP
 0x478194 IsValidCodePage
 0x478198 HeapSize
 0x47819c GetLocaleInfoA
 0x4781a0 WideCharToMultiByte
 0x4781a4 GetStringTypeA
 0x4781a8 MultiByteToWideChar
USER32.dll
 0x4781b0 RealGetWindowClassA
ADVAPI32.dll
 0x478000 AdjustTokenGroups

EAT(Export Address Table) Library

0x401003 @GetAnotherVice@12
0x401000 @SetFirstEverVice@4


Similarity measure (PE file only) - Checking for service failure