Report - sefile.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.08.20 17:12 Machine s1_win7_x6401
Filename sefile.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
1
Behavior Score
2.2
ZERO API file : malware
VT API (file) 35 detected (AIDetect, malware2, malicious, high confidence, score, Unsafe, Save, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, Fragtor, CLASSIC, HPGen, StopCrypt, ZexaF, pq0@aGDPdhhi, ai score=85, BScope, Blocker, Static AI, Suspicious PE, susgen, QVM10)
md5 adb3434ca0e21949f5bb6e50edcc974d
sha256 8508e39dc2086f0552da06a2f7bd20accbd20ef4c0f78172dcaca2c3651b7bbb
ssdeep 3072:hAcEUqyEvIQdjwbYWpgHkGN5Jw+ENmp3QZs4Gmen/RzRfPyaLzgFnLmS:HEUOIIkxgEGLakpgu4G/pdPjgFnL
imphash 9351114812ade0773cab5940b106fe09
impfuzzy 24:jkrkebkDQu9ErjtZE+XB1Fj76IHM02dnoJcDS1+n8GFh8PrttoLOovEGhn2cw2B4:kzZ1XNKdd81mn8jtto6VGgcDvv0wU
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x42b000 GetConsoleAliasesLengthW
 0x42b004 SetLocalTime
 0x42b008 WriteConsoleOutputW
 0x42b00c InterlockedIncrement
 0x42b010 GetConsoleAliasA
 0x42b014 InterlockedDecrement
 0x42b018 GetCurrentProcess
 0x42b01c ReadConsoleOutputAttribute
 0x42b020 SetEnvironmentVariableW
 0x42b024 GetEnvironmentStringsW
 0x42b028 WaitForSingleObject
 0x42b02c GetSystemDefaultLCID
 0x42b030 GetModuleHandleW
 0x42b034 EnumCalendarInfoExW
 0x42b038 SetThreadUILanguage
 0x42b03c GetConsoleTitleA
 0x42b040 CreateActCtxW
 0x42b044 GetConsoleCP
 0x42b048 GetSystemDirectoryW
 0x42b04c ReadConsoleInputA
 0x42b050 SetVolumeMountPointA
 0x42b054 GetSystemWindowsDirectoryA
 0x42b058 GetVersionExW
 0x42b05c GetFileAttributesA
 0x42b060 lstrcpynW
 0x42b064 SetConsoleCursorPosition
 0x42b068 SetTimeZoneInformation
 0x42b06c WriteConsoleW
 0x42b070 IsBadWritePtr
 0x42b074 GetMailslotInfo
 0x42b078 lstrcatA
 0x42b07c GetACP
 0x42b080 lstrlenW
 0x42b084 FlushFileBuffers
 0x42b088 VerifyVersionInfoW
 0x42b08c InterlockedExchange
 0x42b090 FillConsoleOutputCharacterW
 0x42b094 SetLastError
 0x42b098 GetProcAddress
 0x42b09c PeekConsoleInputW
 0x42b0a0 EnumDateFormatsExA
 0x42b0a4 CreateTimerQueueTimer
 0x42b0a8 LocalLock
 0x42b0ac EnterCriticalSection
 0x42b0b0 SetTimerQueueTimer
 0x42b0b4 GlobalGetAtomNameA
 0x42b0b8 ResetEvent
 0x42b0bc LocalAlloc
 0x42b0c0 DnsHostnameToComputerNameA
 0x42b0c4 SetConsoleOutputCP
 0x42b0c8 SetFileApisToANSI
 0x42b0cc BeginUpdateResourceA
 0x42b0d0 GetModuleHandleA
 0x42b0d4 HeapSetInformation
 0x42b0d8 GetCPInfoExA
 0x42b0dc FindFirstVolumeA
 0x42b0e0 EndUpdateResourceA
 0x42b0e4 GetCurrentProcessId
 0x42b0e8 GetConsoleProcessList
 0x42b0ec GetModuleFileNameW
 0x42b0f0 LCMapStringW
 0x42b0f4 LCMapStringA
 0x42b0f8 UnhandledExceptionFilter
 0x42b0fc SetUnhandledExceptionFilter
 0x42b100 HeapAlloc
 0x42b104 Sleep
 0x42b108 ExitProcess
 0x42b10c GetCommandLineA
 0x42b110 GetStartupInfoA
 0x42b114 RaiseException
 0x42b118 RtlUnwind
 0x42b11c GetLastError
 0x42b120 WriteFile
 0x42b124 GetStdHandle
 0x42b128 GetModuleFileNameA
 0x42b12c TerminateProcess
 0x42b130 IsDebuggerPresent
 0x42b134 HeapFree
 0x42b138 DeleteCriticalSection
 0x42b13c LeaveCriticalSection
 0x42b140 VirtualFree
 0x42b144 VirtualAlloc
 0x42b148 HeapReAlloc
 0x42b14c HeapCreate
 0x42b150 TlsGetValue
 0x42b154 TlsAlloc
 0x42b158 TlsSetValue
 0x42b15c TlsFree
 0x42b160 GetCurrentThreadId
 0x42b164 LoadLibraryA
 0x42b168 InitializeCriticalSectionAndSpinCount
 0x42b16c FreeEnvironmentStringsA
 0x42b170 GetEnvironmentStrings
 0x42b174 FreeEnvironmentStringsW
 0x42b178 WideCharToMultiByte
 0x42b17c SetHandleCount
 0x42b180 GetFileType
 0x42b184 QueryPerformanceCounter
 0x42b188 GetTickCount
 0x42b18c GetSystemTimeAsFileTime
 0x42b190 GetCPInfo
 0x42b194 GetOEMCP
 0x42b198 IsValidCodePage
 0x42b19c HeapSize
 0x42b1a0 GetLocaleInfoA
 0x42b1a4 GetStringTypeA
 0x42b1a8 MultiByteToWideChar
 0x42b1ac GetStringTypeW
USER32.dll
 0x42b1b4 RealGetWindowClassA

EAT(Export Address Table) Library

0x401065 @SetFirstEverVice@8


Similarity measure (PE file only) - Checking for service failure