Report - sefile.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.08.24 09:39 Machine s1_win7_x6402
Filename sefile.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
1
Behavior Score
2.0
ZERO API file : malware
VT API (file) 25 detected (malicious, high confidence, Unsafe, Save, ZexaF, pq0@aucgBlbi, Kryptik, Eldorado, Attribute, HighConfidence, CLASSIC, A + Troj, Krypt, HPGen, Static AI, Suspicious PE, Score, Sabsik, Artemis, susgen, confidence, 100%)
md5 b1c5a3368b6c0c2aa2042560821dbe69
sha256 69d7cda8caed6f8d1ae68bdf79e10bfeb398dbb163301904b8dd7906b05e1381
ssdeep 6144:274Mdt5NhmKSENDuhYMrdfn4l4AEIhygrs0Duho:2nBhCEJ2RniPEIhyg4quh
imphash 7f519e58768c36b2651aa4c0b9c28c9d
impfuzzy 48:kJp8Z1Xe5BdH1m6OMrJtdVGjUc9HvWNd6:yc1XurVmpMrJtzGjUctvWNo
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x42c000 GetConsoleAliasesLengthW
 0x42c004 WriteConsoleOutputCharacterA
 0x42c008 BuildCommDCBAndTimeoutsA
 0x42c00c WriteConsoleOutputW
 0x42c010 EndUpdateResourceW
 0x42c014 InterlockedIncrement
 0x42c018 InterlockedDecrement
 0x42c01c GetCurrentProcess
 0x42c020 GetSystemWindowsDirectoryW
 0x42c024 SetEnvironmentVariableW
 0x42c028 WaitForSingleObject
 0x42c02c GetSystemDefaultLCID
 0x42c030 GetModuleHandleW
 0x42c034 EnumCalendarInfoExW
 0x42c038 SetThreadUILanguage
 0x42c03c GetConsoleAliasesLengthA
 0x42c040 GetConsoleTitleA
 0x42c044 GetEnvironmentStrings
 0x42c048 GetConsoleCP
 0x42c04c ReadConsoleInputA
 0x42c050 SetVolumeMountPointA
 0x42c054 lstrcpynW
 0x42c058 SetConsoleCursorPosition
 0x42c05c GetFileAttributesW
 0x42c060 SetTimeZoneInformation
 0x42c064 WriteConsoleW
 0x42c068 IsBadWritePtr
 0x42c06c GetMailslotInfo
 0x42c070 lstrcatA
 0x42c074 lstrlenW
 0x42c078 FlushFileBuffers
 0x42c07c InterlockedExchange
 0x42c080 FillConsoleOutputCharacterW
 0x42c084 ChangeTimerQueueTimer
 0x42c088 SetLastError
 0x42c08c GetProcAddress
 0x42c090 PeekConsoleInputW
 0x42c094 EnumDateFormatsExA
 0x42c098 CreateTimerQueueTimer
 0x42c09c LocalLock
 0x42c0a0 EnterCriticalSection
 0x42c0a4 GlobalGetAtomNameA
 0x42c0a8 ResetEvent
 0x42c0ac GetLocalTime
 0x42c0b0 LocalAlloc
 0x42c0b4 SetConsoleOutputCP
 0x42c0b8 SetFileApisToANSI
 0x42c0bc GetOEMCP
 0x42c0c0 GetModuleHandleA
 0x42c0c4 HeapSetInformation
 0x42c0c8 GetCPInfoExA
 0x42c0cc FindFirstVolumeA
 0x42c0d0 DeleteTimerQueueTimer
 0x42c0d4 GetCurrentProcessId
 0x42c0d8 GetConsoleProcessList
 0x42c0dc GetModuleFileNameW
 0x42c0e0 GetSystemDefaultLangID
 0x42c0e4 UnhandledExceptionFilter
 0x42c0e8 SetUnhandledExceptionFilter
 0x42c0ec HeapAlloc
 0x42c0f0 GetCommandLineA
 0x42c0f4 GetStartupInfoA
 0x42c0f8 RaiseException
 0x42c0fc RtlUnwind
 0x42c100 Sleep
 0x42c104 ExitProcess
 0x42c108 GetLastError
 0x42c10c WriteFile
 0x42c110 GetStdHandle
 0x42c114 GetModuleFileNameA
 0x42c118 TerminateProcess
 0x42c11c IsDebuggerPresent
 0x42c120 HeapFree
 0x42c124 DeleteCriticalSection
 0x42c128 LeaveCriticalSection
 0x42c12c VirtualFree
 0x42c130 VirtualAlloc
 0x42c134 HeapReAlloc
 0x42c138 HeapCreate
 0x42c13c FreeEnvironmentStringsA
 0x42c140 FreeEnvironmentStringsW
 0x42c144 WideCharToMultiByte
 0x42c148 GetEnvironmentStringsW
 0x42c14c SetHandleCount
 0x42c150 GetFileType
 0x42c154 TlsGetValue
 0x42c158 TlsAlloc
 0x42c15c TlsSetValue
 0x42c160 TlsFree
 0x42c164 GetCurrentThreadId
 0x42c168 QueryPerformanceCounter
 0x42c16c GetTickCount
 0x42c170 GetSystemTimeAsFileTime
 0x42c174 LoadLibraryA
 0x42c178 InitializeCriticalSectionAndSpinCount
 0x42c17c HeapSize
 0x42c180 GetCPInfo
 0x42c184 GetACP
 0x42c188 IsValidCodePage
 0x42c18c GetLocaleInfoA
 0x42c190 LCMapStringA
 0x42c194 MultiByteToWideChar
 0x42c198 LCMapStringW
 0x42c19c GetStringTypeA
 0x42c1a0 GetStringTypeW
USER32.dll
 0x42c1a8 GetAltTabInfoW

EAT(Export Address Table) Library

0x401065 @SetFirstEverVice@8


Similarity measure (PE file only) - Checking for service failure