Report - sefile2.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.08.30 21:14 Machine s1_win7_x6401
Filename sefile2.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
3
Behavior Score
1.8
ZERO API file : malware
VT API (file) 26 detected (AIDetect, malware2, malicious, high confidence, Unsafe, Save, Kryptik, Eldorado, Attribute, HighConfidence, CLASSIC, HPGen, Emotet, Sabsik, score, Artemis, Static AI, Malicious PE, ZexaF, tq0@auuWn2gG, confidence, susgen)
md5 ad89701003aac4cb9faf20e58471cd37
sha256 694c2240b27d908d83ee9b8c066d586a04a4fdea897ef123dae5da599cf43348
ssdeep 6144:5lLS8u2ergugl6CPi1wyxUGPTg+Z/hyUFXe1+VXfVRSP7EsI5/:5lujr5C6CKpqGLT0cv1Hc9c
imphash 2fb51ab3c5f5a75e2a51c3be9bfc585e
impfuzzy 24:puu9EukrkRr1Fruqo8oDSql/6kbbyHOb1bG2O24fbOS6dx+cjtrlHIeWJ3zlORyJ:SWrCcObsdq1dx+cjtFIVzRucaZU
  Network IP location

Signature (4cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x42c000 GetCPInfo
 0x42c004 HeapAlloc
 0x42c008 EndUpdateResourceW
 0x42c00c InterlockedIncrement
 0x42c010 GetCurrentProcess
 0x42c014 SetEnvironmentVariableW
 0x42c018 GetEnvironmentStringsW
 0x42c01c GetConsoleAliasesLengthA
 0x42c020 GetConsoleTitleA
 0x42c024 WriteFile
 0x42c028 GetUserDefaultLangID
 0x42c02c GetEnvironmentStrings
 0x42c030 GlobalAlloc
 0x42c034 SetVolumeMountPointA
 0x42c038 GetSystemWindowsDirectoryA
 0x42c03c WriteConsoleOutputA
 0x42c040 lstrcpynW
 0x42c044 HeapQueryInformation
 0x42c048 GetModuleFileNameW
 0x42c04c lstrlenA
 0x42c050 VerifyVersionInfoW
 0x42c054 GetCPInfoExW
 0x42c058 ChangeTimerQueueTimer
 0x42c05c GetProcAddress
 0x42c060 PeekConsoleInputW
 0x42c064 GetComputerNameExW
 0x42c068 VerLanguageNameA
 0x42c06c CreateTimerQueueTimer
 0x42c070 FreeUserPhysicalPages
 0x42c074 EnterCriticalSection
 0x42c078 GetLocalTime
 0x42c07c LoadLibraryA
 0x42c080 GetCurrentConsoleFont
 0x42c084 WaitForMultipleObjects
 0x42c088 GetDefaultCommConfigA
 0x42c08c VirtualProtect
 0x42c090 FindFirstVolumeA
 0x42c094 GetVersionExA
 0x42c098 ReadConsoleInputW
 0x42c09c GetVersion
 0x42c0a0 AddConsoleAliasA
 0x42c0a4 EnumCalendarInfoExA
 0x42c0a8 CreateThread
 0x42c0ac CreateFileA
 0x42c0b0 LCMapStringA
 0x42c0b4 GetCommandLineW
 0x42c0b8 SetStdHandle
 0x42c0bc WriteConsoleW
 0x42c0c0 WideCharToMultiByte
 0x42c0c4 InterlockedDecrement
 0x42c0c8 InterlockedExchange
 0x42c0cc MultiByteToWideChar
 0x42c0d0 Sleep
 0x42c0d4 InitializeCriticalSection
 0x42c0d8 DeleteCriticalSection
 0x42c0dc LeaveCriticalSection
 0x42c0e0 UnhandledExceptionFilter
 0x42c0e4 SetUnhandledExceptionFilter
 0x42c0e8 GetLastError
 0x42c0ec HeapFree
 0x42c0f0 TerminateProcess
 0x42c0f4 IsDebuggerPresent
 0x42c0f8 GetModuleHandleW
 0x42c0fc ExitProcess
 0x42c100 GetStartupInfoW
 0x42c104 RtlUnwind
 0x42c108 LCMapStringW
 0x42c10c GetStringTypeW
 0x42c110 GetStdHandle
 0x42c114 GetModuleFileNameA
 0x42c118 HeapCreate
 0x42c11c VirtualFree
 0x42c120 VirtualAlloc
 0x42c124 HeapReAlloc
 0x42c128 TlsGetValue
 0x42c12c TlsAlloc
 0x42c130 TlsSetValue
 0x42c134 TlsFree
 0x42c138 SetLastError
 0x42c13c GetCurrentThreadId
 0x42c140 InitializeCriticalSectionAndSpinCount
 0x42c144 FreeEnvironmentStringsW
 0x42c148 SetHandleCount
 0x42c14c GetFileType
 0x42c150 GetStartupInfoA
 0x42c154 QueryPerformanceCounter
 0x42c158 GetTickCount
 0x42c15c GetCurrentProcessId
 0x42c160 GetSystemTimeAsFileTime
 0x42c164 GetStringTypeA
 0x42c168 HeapSize
 0x42c16c GetACP
 0x42c170 GetOEMCP
 0x42c174 IsValidCodePage
 0x42c178 GetLocaleInfoA
 0x42c17c GetConsoleCP
 0x42c180 GetConsoleMode
 0x42c184 FlushFileBuffers
 0x42c188 SetFilePointer
 0x42c18c CloseHandle
 0x42c190 WriteConsoleA
 0x42c194 GetConsoleOutputCP
USER32.dll
 0x42c19c ClientToScreen
 0x42c1a0 RealGetWindowClassA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure