Report - file.exe

Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.08.28 17:50 Machine s1_win7_x6402
Filename file.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
2.2
ZERO API file : malware
VT API (file) 23 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Save, confidence, 100%, ZexaF, TqW@ayOFF8oG, Kryptik, Eldorado, Attribute, HighConfidence, Obscure, CLASSIC, Static AI, Malicious PE, Sabsik, score, HMFH, susgen)
md5 3c112a39d8866d896f68adfa3b78a16a
sha256 da0422f752076d4897a5616ff4ccde0e1088e3048074a869b8fe4da691eed621
ssdeep 12288:aDvBLv2FqZlrfp0gftgk47/jWCsCQPJPo0xnfTSsEUDEPO4I6eil+uQvSwMjcM8N:A5rOuwgftgk2yCsCcnusEUIPO40o3y
imphash e68f2e15edc1c604720a74f10b8483a6
impfuzzy 48:B4NtqzODtFZdP+jJGXGORaEBcUDftX9SWnXrqC:WdHP6GXGpEBciftX9S2XrqC
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x425000 GetThreadContext
 0x425004 EnumResourceNamesW
 0x425008 GetFileSize
 0x42500c CreateMutexW
 0x425010 SetPriorityClass
 0x425014 GetNativeSystemInfo
 0x425018 FindFirstChangeNotificationW
 0x42501c lstrlenA
 0x425020 SetLocalTime
 0x425024 SetEndOfFile
 0x425028 GetQueuedCompletionStatus
 0x42502c GetSystemWindowsDirectoryW
 0x425030 GetNamedPipeHandleStateA
 0x425034 GetModuleHandleW
 0x425038 GetTickCount
 0x42503c GetConsoleAliasesLengthA
 0x425040 GetSystemTimeAsFileTime
 0x425044 GetPrivateProfileStringW
 0x425048 ReadConsoleW
 0x42504c WriteFile
 0x425050 SetCommState
 0x425054 GetCommandLineA
 0x425058 FindResourceExA
 0x42505c GetPrivateProfileIntA
 0x425060 LoadLibraryW
 0x425064 CopyFileW
 0x425068 GetConsoleAliasExesLengthW
 0x42506c SetConsoleMode
 0x425070 IsDBCSLeadByte
 0x425074 GetOverlappedResult
 0x425078 GetStartupInfoW
 0x42507c GlobalUnlock
 0x425080 InterlockedExchange
 0x425084 SetCurrentDirectoryA
 0x425088 GetLastError
 0x42508c ReadConsoleOutputCharacterA
 0x425090 GetProcAddress
 0x425094 VirtualAlloc
 0x425098 WriteProfileSectionA
 0x42509c ResetEvent
 0x4250a0 LoadLibraryA
 0x4250a4 OpenMutexA
 0x4250a8 CreateSemaphoreW
 0x4250ac LocalAlloc
 0x4250b0 IsSystemResumeAutomatic
 0x4250b4 HeapWalk
 0x4250b8 Process32NextW
 0x4250bc FreeEnvironmentStringsW
 0x4250c0 EnumResourceNamesA
 0x4250c4 GetCurrentThreadId
 0x4250c8 GetCPInfoExA
 0x4250cc SetThreadAffinityMask
 0x4250d0 TlsAlloc
 0x4250d4 FindAtomW
 0x4250d8 DeleteFileW
 0x4250dc LCMapStringW
 0x4250e0 CopyFileExA
 0x4250e4 MultiByteToWideChar
 0x4250e8 HeapValidate
 0x4250ec IsBadReadPtr
 0x4250f0 RaiseException
 0x4250f4 EnterCriticalSection
 0x4250f8 LeaveCriticalSection
 0x4250fc SetHandleCount
 0x425100 GetStdHandle
 0x425104 GetFileType
 0x425108 GetStartupInfoA
 0x42510c DeleteCriticalSection
 0x425110 TerminateProcess
 0x425114 GetCurrentProcess
 0x425118 UnhandledExceptionFilter
 0x42511c SetUnhandledExceptionFilter
 0x425120 IsDebuggerPresent
 0x425124 GetModuleFileNameW
 0x425128 Sleep
 0x42512c InterlockedIncrement
 0x425130 InterlockedDecrement
 0x425134 ExitProcess
 0x425138 TlsGetValue
 0x42513c TlsSetValue
 0x425140 TlsFree
 0x425144 SetLastError
 0x425148 GetACP
 0x42514c GetOEMCP
 0x425150 GetCPInfo
 0x425154 IsValidCodePage
 0x425158 QueryPerformanceCounter
 0x42515c GetCurrentProcessId
 0x425160 GetEnvironmentStringsW
 0x425164 GetCommandLineW
 0x425168 HeapDestroy
 0x42516c HeapCreate
 0x425170 HeapFree
 0x425174 VirtualFree
 0x425178 GetModuleFileNameA
 0x42517c HeapAlloc
 0x425180 HeapSize
 0x425184 HeapReAlloc
 0x425188 SetFilePointer
 0x42518c WideCharToMultiByte
 0x425190 GetConsoleCP
 0x425194 GetConsoleMode
 0x425198 InitializeCriticalSectionAndSpinCount
 0x42519c DebugBreak
 0x4251a0 OutputDebugStringA
 0x4251a4 WriteConsoleW
 0x4251a8 OutputDebugStringW
 0x4251ac RtlUnwind
 0x4251b0 LCMapStringA
 0x4251b4 GetStringTypeA
 0x4251b8 GetStringTypeW
 0x4251bc GetLocaleInfoA
 0x4251c0 FlushFileBuffers
 0x4251c4 SetStdHandle
 0x4251c8 WriteConsoleA
 0x4251cc GetConsoleOutputCP
 0x4251d0 CloseHandle
 0x4251d4 CreateFileA
 0x4251d8 GetModuleHandleA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure