Report - inst1.exe

Gen2 Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.08.30 09:46 Machine s1_win7_x6401
Filename inst1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
2.0
ZERO API file : clean
VT API (file) 32 detected (AIDetect, malware1, Zusy, malicious, high confidence, score, Artemis, Unsafe, confidence, ZexaF, qy0@aeszWEci, Attribute, HighConfidence, BadOffer, ccnc, SuspBehav, Ramnit, Generic ML PUA, Glupteba, ai score=81, R06CH0CHP21, Static AI, Malicious PE)
md5 c06d807e7287add5d460530e3d87648c
sha256 d5855e6292d04c6ab247c1b550168cde3d4a73831ed792cf15c1d0c650137e3d
ssdeep 6144:bajSf7oQiNDh3K8UBO4N6dH6oc+m7OymiPs5qg6D:bajSBYRGqda0EJE5
imphash b900dc5ab09e702140c5c289f35fb91f
impfuzzy 48:dQLfG1LY+5xcwW7p3GTXlwFGAzACSv6x9Se44vuoo/1CKEvall/RS5tiiKl0vnsh:dMfG1LH5xcwAoCvabwKT
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

COMCTL32.dll
 0x411024 None
 0x411028 None
KERNEL32.dll
 0x411060 GetCommandLineW
 0x411064 OutputDebugStringW
 0x411068 RtlUnwind
 0x41106c WriteConsoleW
 0x411070 HeapReAlloc
 0x411074 SetFilePointerEx
 0x411078 LCMapStringW
 0x41107c GetStringTypeW
 0x411080 FreeEnvironmentStringsW
 0x411084 GetEnvironmentStringsW
 0x411088 GetSystemTimeAsFileTime
 0x41108c GetModuleHandleA
 0x411090 QueryPerformanceCounter
 0x411094 CloseHandle
 0x411098 CreateFileW
 0x41109c LoadLibraryExW
 0x4110a0 GetProcessHeap
 0x4110a4 GetModuleHandleW
 0x4110a8 TlsFree
 0x4110ac TlsSetValue
 0x4110b0 TlsGetValue
 0x4110b4 TlsAlloc
 0x4110b8 TerminateProcess
 0x4110bc GetCurrentProcess
 0x4110c0 InitializeCriticalSectionAndSpinCount
 0x4110c4 SetUnhandledExceptionFilter
 0x4110c8 UnhandledExceptionFilter
 0x4110cc GetStartupInfoW
 0x4110d0 LoadLibraryA
 0x4110d4 GetStdHandle
 0x4110d8 LocalFree
 0x4110dc LocalAlloc
 0x4110e0 GetProcAddress
 0x4110e4 GetModuleFileNameW
 0x4110e8 GetModuleFileNameA
 0x4110ec GetFileType
 0x4110f0 GetLastError
 0x4110f4 Sleep
 0x4110f8 GetCurrentProcessId
 0x4110fc GlobalUnlock
 0x411100 GlobalLock
 0x411104 GlobalAlloc
 0x411108 GetConsoleCP
 0x41110c WriteFile
 0x411110 FlushFileBuffers
 0x411114 DeleteCriticalSection
 0x411118 IsProcessorFeaturePresent
 0x41111c HeapSize
 0x411120 IsDebuggerPresent
 0x411124 EnterCriticalSection
 0x411128 LeaveCriticalSection
 0x41112c SetStdHandle
 0x411130 HeapAlloc
 0x411134 EncodePointer
 0x411138 DecodePointer
 0x41113c ExitProcess
 0x411140 GetModuleHandleExW
 0x411144 MultiByteToWideChar
 0x411148 WideCharToMultiByte
 0x41114c HeapFree
 0x411150 GetConsoleMode
 0x411154 ReadConsoleInputA
 0x411158 SetConsoleMode
 0x41115c GetCommandLineA
 0x411160 IsValidCodePage
 0x411164 GetACP
 0x411168 GetOEMCP
 0x41116c GetCPInfo
 0x411170 SetLastError
 0x411174 GetCurrentThreadId
USER32.dll
 0x411184 TranslateAcceleratorA
 0x411188 GetMessageA
 0x41118c TranslateMessage
 0x411190 DispatchMessageA
 0x411194 SendMessageA
 0x411198 WaitForInputIdle
 0x41119c InflateRect
 0x4111a0 GetSysColorBrush
 0x4111a4 SetCursor
 0x4111a8 SetWindowTextA
 0x4111ac EndDialog
 0x4111b0 DialogBoxIndirectParamA
 0x4111b4 LoadIconA
 0x4111b8 LoadCursorA
 0x4111bc FindWindowExA
 0x4111c0 FindWindowA
 0x4111c4 MessageBoxA
 0x4111c8 GetClientRect
 0x4111cc SetForegroundWindow
 0x4111d0 DefWindowProcA
 0x4111d4 UpdateWindow
 0x4111d8 LoadAcceleratorsA
 0x4111dc EnableWindow
 0x4111e0 SetFocus
 0x4111e4 EmptyClipboard
 0x4111e8 SetClipboardData
 0x4111ec CloseClipboard
 0x4111f0 OpenClipboard
 0x4111f4 GetDlgItem
 0x4111f8 EndDeferWindowPos
 0x4111fc DeferWindowPos
 0x411200 BeginDeferWindowPos
 0x411204 MoveWindow
 0x411208 ShowWindow
 0x41120c CreateWindowExA
 0x411210 RegisterClassExA
 0x411214 PostQuitMessage
GDI32.dll
 0x411038 StartPage
 0x41103c EndDoc
 0x411040 StartDocA
 0x411044 SetMapMode
 0x411048 GetStockObject
 0x41104c GetDeviceCaps
 0x411050 DeleteDC
 0x411054 CreateDCA
 0x411058 EndPage
COMDLG32.dll
 0x411030 PrintDlgA
ADVAPI32.dll
 0x411000 RegQueryValueExA
 0x411004 RegEnumKeyA
 0x411008 RegOpenKeyExA
 0x41100c RegSetValueExA
 0x411010 RegQueryValueExW
 0x411014 RegOpenKeyA
 0x411018 RegCreateKeyA
 0x41101c RegCloseKey
SHELL32.dll
 0x41117c ShellExecuteExA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure