Report - readytans.png

Malicious Library PE File OS Processor Check DLL PE32
ScreenShot
Created 2021.09.02 09:43 Machine s1_win7_x6402
Filename readytans.png
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
5.6
ZERO API file : clean
VT API (file)
md5 539614a94256046c940b95493fedb6ec
sha256 c5fc478a5c1a2ba80ae3373ef9ae078247eabaf50ecda3762ecda6a54f47b6f4
ssdeep 6144:bsGb+3pcbr68feSS65+RH9IgOmUQdOfAZ3xirQAX57LIgbo:ov3pkrVfeS5+RtIxKWQA9jb
imphash 9b1adb266f8f339c45ccfafdc830f22f
impfuzzy 48:N9HK6jUtcclqqKp2cdKQ/grzlKo/ACA457Fp:NNK6Atcclqq+2ccgmtFp
  Network IP location

Signature (16cnts)

Level Description
watch Communicates with host for which no DNS query was performed
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://179.189.229.254/rob127/TEST22-PC_W617601.C6F7758F1FE1C33B9A957BEA732BE3DF/5/file/ BR America-NET Ltda. 179.189.229.254 clean
179.189.229.254 BR America-NET Ltda. 179.189.229.254 mailcious
103.133.111.221 VN VIETNAM POSTS AND TELECOMMUNICATIONS GROUP 103.133.111.221 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1000d028 FormatMessageA
 0x1000d02c LockResource
 0x1000d030 SizeofResource
 0x1000d034 LoadResource
 0x1000d038 FindResourceA
 0x1000d03c CreateThread
 0x1000d040 Sleep
 0x1000d044 VirtualAlloc
 0x1000d048 GetProcAddress
 0x1000d04c IsBadReadPtr
 0x1000d050 VirtualProtect
 0x1000d054 VirtualQuery
 0x1000d058 GetCurrentProcess
 0x1000d05c lstrlenA
 0x1000d060 CloseHandle
 0x1000d064 CreateFileW
 0x1000d068 HeapSize
 0x1000d06c FlushFileBuffers
 0x1000d070 GetStringTypeW
 0x1000d074 LCMapStringW
 0x1000d078 WriteConsoleW
 0x1000d07c SetStdHandle
 0x1000d080 GetModuleFileNameW
 0x1000d084 LocalAlloc
 0x1000d088 LocalSize
 0x1000d08c LocalFree
 0x1000d090 GetStdHandle
 0x1000d094 GetConsoleScreenBufferInfo
 0x1000d098 SetConsoleTextAttribute
 0x1000d09c MultiByteToWideChar
 0x1000d0a0 GetLastError
 0x1000d0a4 GetModuleHandleA
 0x1000d0a8 GetSystemTimeAsFileTime
 0x1000d0ac HeapFree
 0x1000d0b0 GetCurrentThreadId
 0x1000d0b4 DecodePointer
 0x1000d0b8 GetCommandLineA
 0x1000d0bc UnhandledExceptionFilter
 0x1000d0c0 SetUnhandledExceptionFilter
 0x1000d0c4 IsDebuggerPresent
 0x1000d0c8 EncodePointer
 0x1000d0cc TerminateProcess
 0x1000d0d0 EnterCriticalSection
 0x1000d0d4 LeaveCriticalSection
 0x1000d0d8 HeapCreate
 0x1000d0dc HeapDestroy
 0x1000d0e0 IsProcessorFeaturePresent
 0x1000d0e4 RtlUnwind
 0x1000d0e8 TlsAlloc
 0x1000d0ec TlsGetValue
 0x1000d0f0 TlsSetValue
 0x1000d0f4 TlsFree
 0x1000d0f8 InterlockedIncrement
 0x1000d0fc GetModuleHandleW
 0x1000d100 SetLastError
 0x1000d104 InterlockedDecrement
 0x1000d108 ExitProcess
 0x1000d10c SetHandleCount
 0x1000d110 InitializeCriticalSectionAndSpinCount
 0x1000d114 GetFileType
 0x1000d118 GetStartupInfoW
 0x1000d11c DeleteCriticalSection
 0x1000d120 GetModuleFileNameA
 0x1000d124 FreeEnvironmentStringsW
 0x1000d128 WideCharToMultiByte
 0x1000d12c GetEnvironmentStringsW
 0x1000d130 QueryPerformanceCounter
 0x1000d134 GetTickCount
 0x1000d138 GetCurrentProcessId
 0x1000d13c SetFilePointer
 0x1000d140 WriteFile
 0x1000d144 GetConsoleCP
 0x1000d148 GetConsoleMode
 0x1000d14c GetCPInfo
 0x1000d150 GetACP
 0x1000d154 GetOEMCP
 0x1000d158 IsValidCodePage
 0x1000d15c HeapAlloc
 0x1000d160 HeapReAlloc
 0x1000d164 LoadLibraryW
USER32.dll
 0x1000d16c wsprintfA
 0x1000d170 MessageBoxW
 0x1000d174 GetDesktopWindow
 0x1000d178 CreateWindowExA
 0x1000d17c ShowWindow
 0x1000d180 SetWindowRgn
 0x1000d184 DestroyWindow
 0x1000d188 SetWindowTextA
 0x1000d18c GetWindowDC
 0x1000d190 GetDC
 0x1000d194 ReleaseDC
 0x1000d198 MessageBoxIndirectA
GDI32.dll
 0x1000d000 CreateICA
 0x1000d004 CreateEllipticRgn
 0x1000d008 Rectangle
 0x1000d00c DeleteDC
 0x1000d010 CreateDCA
IPHLPAPI.DLL
 0x1000d018 IcmpSendEcho
 0x1000d01c IcmpCloseHandle
 0x1000d020 IcmpCreateFile

EAT(Export Address Table) Library

0x100015d0 Dpi400
0x10001350 Dpi800
0x100012f0 GetMouse


Similarity measure (PE file only) - Checking for service failure