ScreenShot
Created | 2021.08.20 17:12 | Machine | s1_win7_x6401 |
Filename | sefile.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 35 detected (AIDetect, malware2, malicious, high confidence, score, Unsafe, Save, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, Fragtor, CLASSIC, HPGen, StopCrypt, ZexaF, pq0@aGDPdhhi, ai score=85, BScope, Blocker, Static AI, Suspicious PE, susgen, QVM10) | ||
md5 | adb3434ca0e21949f5bb6e50edcc974d | ||
sha256 | 8508e39dc2086f0552da06a2f7bd20accbd20ef4c0f78172dcaca2c3651b7bbb | ||
ssdeep | 3072:hAcEUqyEvIQdjwbYWpgHkGN5Jw+ENmp3QZs4Gmen/RzRfPyaLzgFnLmS:HEUOIIkxgEGLakpgu4G/pdPjgFnL | ||
imphash | 9351114812ade0773cab5940b106fe09 | ||
impfuzzy | 24:jkrkebkDQu9ErjtZE+XB1Fj76IHM02dnoJcDS1+n8GFh8PrttoLOovEGhn2cw2B4:kzZ1XNKdd81mn8jtto6VGgcDvv0wU |
Network IP location
Signature (5cnts)
Level | Description |
---|---|
danger | File has been identified by 35 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x42b000 GetConsoleAliasesLengthW
0x42b004 SetLocalTime
0x42b008 WriteConsoleOutputW
0x42b00c InterlockedIncrement
0x42b010 GetConsoleAliasA
0x42b014 InterlockedDecrement
0x42b018 GetCurrentProcess
0x42b01c ReadConsoleOutputAttribute
0x42b020 SetEnvironmentVariableW
0x42b024 GetEnvironmentStringsW
0x42b028 WaitForSingleObject
0x42b02c GetSystemDefaultLCID
0x42b030 GetModuleHandleW
0x42b034 EnumCalendarInfoExW
0x42b038 SetThreadUILanguage
0x42b03c GetConsoleTitleA
0x42b040 CreateActCtxW
0x42b044 GetConsoleCP
0x42b048 GetSystemDirectoryW
0x42b04c ReadConsoleInputA
0x42b050 SetVolumeMountPointA
0x42b054 GetSystemWindowsDirectoryA
0x42b058 GetVersionExW
0x42b05c GetFileAttributesA
0x42b060 lstrcpynW
0x42b064 SetConsoleCursorPosition
0x42b068 SetTimeZoneInformation
0x42b06c WriteConsoleW
0x42b070 IsBadWritePtr
0x42b074 GetMailslotInfo
0x42b078 lstrcatA
0x42b07c GetACP
0x42b080 lstrlenW
0x42b084 FlushFileBuffers
0x42b088 VerifyVersionInfoW
0x42b08c InterlockedExchange
0x42b090 FillConsoleOutputCharacterW
0x42b094 SetLastError
0x42b098 GetProcAddress
0x42b09c PeekConsoleInputW
0x42b0a0 EnumDateFormatsExA
0x42b0a4 CreateTimerQueueTimer
0x42b0a8 LocalLock
0x42b0ac EnterCriticalSection
0x42b0b0 SetTimerQueueTimer
0x42b0b4 GlobalGetAtomNameA
0x42b0b8 ResetEvent
0x42b0bc LocalAlloc
0x42b0c0 DnsHostnameToComputerNameA
0x42b0c4 SetConsoleOutputCP
0x42b0c8 SetFileApisToANSI
0x42b0cc BeginUpdateResourceA
0x42b0d0 GetModuleHandleA
0x42b0d4 HeapSetInformation
0x42b0d8 GetCPInfoExA
0x42b0dc FindFirstVolumeA
0x42b0e0 EndUpdateResourceA
0x42b0e4 GetCurrentProcessId
0x42b0e8 GetConsoleProcessList
0x42b0ec GetModuleFileNameW
0x42b0f0 LCMapStringW
0x42b0f4 LCMapStringA
0x42b0f8 UnhandledExceptionFilter
0x42b0fc SetUnhandledExceptionFilter
0x42b100 HeapAlloc
0x42b104 Sleep
0x42b108 ExitProcess
0x42b10c GetCommandLineA
0x42b110 GetStartupInfoA
0x42b114 RaiseException
0x42b118 RtlUnwind
0x42b11c GetLastError
0x42b120 WriteFile
0x42b124 GetStdHandle
0x42b128 GetModuleFileNameA
0x42b12c TerminateProcess
0x42b130 IsDebuggerPresent
0x42b134 HeapFree
0x42b138 DeleteCriticalSection
0x42b13c LeaveCriticalSection
0x42b140 VirtualFree
0x42b144 VirtualAlloc
0x42b148 HeapReAlloc
0x42b14c HeapCreate
0x42b150 TlsGetValue
0x42b154 TlsAlloc
0x42b158 TlsSetValue
0x42b15c TlsFree
0x42b160 GetCurrentThreadId
0x42b164 LoadLibraryA
0x42b168 InitializeCriticalSectionAndSpinCount
0x42b16c FreeEnvironmentStringsA
0x42b170 GetEnvironmentStrings
0x42b174 FreeEnvironmentStringsW
0x42b178 WideCharToMultiByte
0x42b17c SetHandleCount
0x42b180 GetFileType
0x42b184 QueryPerformanceCounter
0x42b188 GetTickCount
0x42b18c GetSystemTimeAsFileTime
0x42b190 GetCPInfo
0x42b194 GetOEMCP
0x42b198 IsValidCodePage
0x42b19c HeapSize
0x42b1a0 GetLocaleInfoA
0x42b1a4 GetStringTypeA
0x42b1a8 MultiByteToWideChar
0x42b1ac GetStringTypeW
USER32.dll
0x42b1b4 RealGetWindowClassA
EAT(Export Address Table) Library
0x401065 @SetFirstEverVice@8
KERNEL32.dll
0x42b000 GetConsoleAliasesLengthW
0x42b004 SetLocalTime
0x42b008 WriteConsoleOutputW
0x42b00c InterlockedIncrement
0x42b010 GetConsoleAliasA
0x42b014 InterlockedDecrement
0x42b018 GetCurrentProcess
0x42b01c ReadConsoleOutputAttribute
0x42b020 SetEnvironmentVariableW
0x42b024 GetEnvironmentStringsW
0x42b028 WaitForSingleObject
0x42b02c GetSystemDefaultLCID
0x42b030 GetModuleHandleW
0x42b034 EnumCalendarInfoExW
0x42b038 SetThreadUILanguage
0x42b03c GetConsoleTitleA
0x42b040 CreateActCtxW
0x42b044 GetConsoleCP
0x42b048 GetSystemDirectoryW
0x42b04c ReadConsoleInputA
0x42b050 SetVolumeMountPointA
0x42b054 GetSystemWindowsDirectoryA
0x42b058 GetVersionExW
0x42b05c GetFileAttributesA
0x42b060 lstrcpynW
0x42b064 SetConsoleCursorPosition
0x42b068 SetTimeZoneInformation
0x42b06c WriteConsoleW
0x42b070 IsBadWritePtr
0x42b074 GetMailslotInfo
0x42b078 lstrcatA
0x42b07c GetACP
0x42b080 lstrlenW
0x42b084 FlushFileBuffers
0x42b088 VerifyVersionInfoW
0x42b08c InterlockedExchange
0x42b090 FillConsoleOutputCharacterW
0x42b094 SetLastError
0x42b098 GetProcAddress
0x42b09c PeekConsoleInputW
0x42b0a0 EnumDateFormatsExA
0x42b0a4 CreateTimerQueueTimer
0x42b0a8 LocalLock
0x42b0ac EnterCriticalSection
0x42b0b0 SetTimerQueueTimer
0x42b0b4 GlobalGetAtomNameA
0x42b0b8 ResetEvent
0x42b0bc LocalAlloc
0x42b0c0 DnsHostnameToComputerNameA
0x42b0c4 SetConsoleOutputCP
0x42b0c8 SetFileApisToANSI
0x42b0cc BeginUpdateResourceA
0x42b0d0 GetModuleHandleA
0x42b0d4 HeapSetInformation
0x42b0d8 GetCPInfoExA
0x42b0dc FindFirstVolumeA
0x42b0e0 EndUpdateResourceA
0x42b0e4 GetCurrentProcessId
0x42b0e8 GetConsoleProcessList
0x42b0ec GetModuleFileNameW
0x42b0f0 LCMapStringW
0x42b0f4 LCMapStringA
0x42b0f8 UnhandledExceptionFilter
0x42b0fc SetUnhandledExceptionFilter
0x42b100 HeapAlloc
0x42b104 Sleep
0x42b108 ExitProcess
0x42b10c GetCommandLineA
0x42b110 GetStartupInfoA
0x42b114 RaiseException
0x42b118 RtlUnwind
0x42b11c GetLastError
0x42b120 WriteFile
0x42b124 GetStdHandle
0x42b128 GetModuleFileNameA
0x42b12c TerminateProcess
0x42b130 IsDebuggerPresent
0x42b134 HeapFree
0x42b138 DeleteCriticalSection
0x42b13c LeaveCriticalSection
0x42b140 VirtualFree
0x42b144 VirtualAlloc
0x42b148 HeapReAlloc
0x42b14c HeapCreate
0x42b150 TlsGetValue
0x42b154 TlsAlloc
0x42b158 TlsSetValue
0x42b15c TlsFree
0x42b160 GetCurrentThreadId
0x42b164 LoadLibraryA
0x42b168 InitializeCriticalSectionAndSpinCount
0x42b16c FreeEnvironmentStringsA
0x42b170 GetEnvironmentStrings
0x42b174 FreeEnvironmentStringsW
0x42b178 WideCharToMultiByte
0x42b17c SetHandleCount
0x42b180 GetFileType
0x42b184 QueryPerformanceCounter
0x42b188 GetTickCount
0x42b18c GetSystemTimeAsFileTime
0x42b190 GetCPInfo
0x42b194 GetOEMCP
0x42b198 IsValidCodePage
0x42b19c HeapSize
0x42b1a0 GetLocaleInfoA
0x42b1a4 GetStringTypeA
0x42b1a8 MultiByteToWideChar
0x42b1ac GetStringTypeW
USER32.dll
0x42b1b4 RealGetWindowClassA
EAT(Export Address Table) Library
0x401065 @SetFirstEverVice@8