Report - 5.php

Malicious Library PE File PE32
ScreenShot
Created 2021.08.24 12:29 Machine s1_win7_x6401
Filename 5.php
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.0
ZERO API file : malware
VT API (file) 20 detected (AIDetect, malware1, malicious, high confidence, Artemis, Unsafe, confidence, 100%, Attribute, HighConfidence, Kryptik, CLASSIC, HPGen, susgen, Azorult, score, MachineLearning, Anomalous, Static AI, Malicious PE)
md5 da06f080170b823ad617874958f2fcaf
sha256 b874e1727cc652a60a2f879d8f3e233d554e013c6d78d6496c3823abe5fbbcfa
ssdeep 1536:/h4ZeRwR3gZqkmc3SOIvp2i0Tn2Q6n+c6vr9xGO3JcMgu5oxQgf9jNjvJATEL+hZ:+R3gZQplvpR2/iQ5xGA2M95oagzJQKt
imphash 7f519e58768c36b2651aa4c0b9c28c9d
impfuzzy 48:kJp8Z1Xe5BdH1m6OMrJtdVGjUc9HvWNd6:yc1XurVmpMrJtzGjUctvWNo
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x416000 GetConsoleAliasesLengthW
 0x416004 WriteConsoleOutputCharacterA
 0x416008 BuildCommDCBAndTimeoutsA
 0x41600c WriteConsoleOutputW
 0x416010 EndUpdateResourceW
 0x416014 InterlockedIncrement
 0x416018 InterlockedDecrement
 0x41601c GetCurrentProcess
 0x416020 GetSystemWindowsDirectoryW
 0x416024 SetEnvironmentVariableW
 0x416028 WaitForSingleObject
 0x41602c GetSystemDefaultLCID
 0x416030 GetModuleHandleW
 0x416034 EnumCalendarInfoExW
 0x416038 SetThreadUILanguage
 0x41603c GetConsoleAliasesLengthA
 0x416040 GetConsoleTitleA
 0x416044 GetEnvironmentStrings
 0x416048 GetConsoleCP
 0x41604c ReadConsoleInputA
 0x416050 SetVolumeMountPointA
 0x416054 lstrcpynW
 0x416058 SetConsoleCursorPosition
 0x41605c GetFileAttributesW
 0x416060 SetTimeZoneInformation
 0x416064 WriteConsoleW
 0x416068 IsBadWritePtr
 0x41606c GetMailslotInfo
 0x416070 lstrcatA
 0x416074 lstrlenW
 0x416078 FlushFileBuffers
 0x41607c InterlockedExchange
 0x416080 FillConsoleOutputCharacterW
 0x416084 ChangeTimerQueueTimer
 0x416088 SetLastError
 0x41608c GetProcAddress
 0x416090 PeekConsoleInputW
 0x416094 EnumDateFormatsExA
 0x416098 CreateTimerQueueTimer
 0x41609c LocalLock
 0x4160a0 EnterCriticalSection
 0x4160a4 GlobalGetAtomNameA
 0x4160a8 ResetEvent
 0x4160ac GetLocalTime
 0x4160b0 LocalAlloc
 0x4160b4 SetConsoleOutputCP
 0x4160b8 SetFileApisToANSI
 0x4160bc GetOEMCP
 0x4160c0 GetModuleHandleA
 0x4160c4 HeapSetInformation
 0x4160c8 GetCPInfoExA
 0x4160cc FindFirstVolumeA
 0x4160d0 DeleteTimerQueueTimer
 0x4160d4 GetCurrentProcessId
 0x4160d8 GetConsoleProcessList
 0x4160dc GetModuleFileNameW
 0x4160e0 GetSystemDefaultLangID
 0x4160e4 UnhandledExceptionFilter
 0x4160e8 SetUnhandledExceptionFilter
 0x4160ec HeapAlloc
 0x4160f0 GetCommandLineA
 0x4160f4 GetStartupInfoA
 0x4160f8 RaiseException
 0x4160fc RtlUnwind
 0x416100 Sleep
 0x416104 ExitProcess
 0x416108 GetLastError
 0x41610c WriteFile
 0x416110 GetStdHandle
 0x416114 GetModuleFileNameA
 0x416118 TerminateProcess
 0x41611c IsDebuggerPresent
 0x416120 HeapFree
 0x416124 DeleteCriticalSection
 0x416128 LeaveCriticalSection
 0x41612c VirtualFree
 0x416130 VirtualAlloc
 0x416134 HeapReAlloc
 0x416138 HeapCreate
 0x41613c FreeEnvironmentStringsA
 0x416140 FreeEnvironmentStringsW
 0x416144 WideCharToMultiByte
 0x416148 GetEnvironmentStringsW
 0x41614c SetHandleCount
 0x416150 GetFileType
 0x416154 TlsGetValue
 0x416158 TlsAlloc
 0x41615c TlsSetValue
 0x416160 TlsFree
 0x416164 GetCurrentThreadId
 0x416168 QueryPerformanceCounter
 0x41616c GetTickCount
 0x416170 GetSystemTimeAsFileTime
 0x416174 LoadLibraryA
 0x416178 InitializeCriticalSectionAndSpinCount
 0x41617c HeapSize
 0x416180 GetCPInfo
 0x416184 GetACP
 0x416188 IsValidCodePage
 0x41618c GetLocaleInfoA
 0x416190 LCMapStringA
 0x416194 MultiByteToWideChar
 0x416198 LCMapStringW
 0x41619c GetStringTypeA
 0x4161a0 GetStringTypeW
USER32.dll
 0x4161a8 GetAltTabInfoW

EAT(Export Address Table) Library

0x401065 @SetFirstEverVice@8


Similarity measure (PE file only) - Checking for service failure