Report - sufile.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.09.03 17:16 Machine s1_win7_x6401
Filename sufile.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
1.2
ZERO API file : malware
VT API (file)
md5 feb9288d05f4484a9e90b6861de5c6a6
sha256 0ca7e97f688770f19fb726076d916f4dfeafb21cb8fa6b082d599bcc81c6d8c6
ssdeep 3072:texdpLh1cCaBVPdRINnVknFXfMTksr5z6V9ENPGdwDYTuKJIX:Qx/Lh1rAxdGVkFXfMYpMGd7TuK
imphash ecda7b3fe7f3df133ca77cddd8e4064d
impfuzzy 24:seOu9E0Z9aTcru865DSql/0bG24oeOStslDJ3NryvDrHlRT4CplCqbjMU/8:9ZRrp5C8Sts7NYDbc2MqLE
  Network IP location

Signature (4cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x419008 SetLocalTime
 0x41900c InterlockedIncrement
 0x419010 ReadConsoleA
 0x419014 InterlockedDecrement
 0x419018 GetCurrentProcess
 0x41901c GetSystemWindowsDirectoryW
 0x419020 SetEnvironmentVariableW
 0x419024 GetEnvironmentStringsW
 0x419028 GetUserDefaultLCID
 0x41902c AddConsoleAliasW
 0x419030 SetVolumeMountPointW
 0x419034 EnumCalendarInfoExW
 0x419038 WriteFile
 0x41903c GetUserDefaultLangID
 0x419040 GetEnvironmentStrings
 0x419044 WriteConsoleOutputA
 0x419048 LeaveCriticalSection
 0x41904c lstrcpynW
 0x419050 FindNextVolumeW
 0x419054 VerifyVersionInfoA
 0x419058 GetModuleFileNameW
 0x41905c GetACP
 0x419060 GetConsoleOutputCP
 0x419064 GetProcAddress
 0x419068 PeekConsoleInputW
 0x41906c GetComputerNameExW
 0x419070 VerLanguageNameA
 0x419074 CreateTimerQueueTimer
 0x419078 HeapUnlock
 0x41907c LocalAlloc
 0x419080 GetDefaultCommConfigA
 0x419084 GetModuleHandleA
 0x419088 QueueUserWorkItem
 0x41908c HeapSetInformation
 0x419090 GetConsoleTitleW
 0x419094 ReadConsoleInputW
 0x419098 GlobalReAlloc
 0x41909c LCMapStringW
 0x4190a0 PulseEvent
 0x4190a4 GetCommandLineW
 0x4190a8 UnhandledExceptionFilter
 0x4190ac SetUnhandledExceptionFilter
 0x4190b0 GetStartupInfoW
 0x4190b4 GetModuleHandleW
 0x4190b8 Sleep
 0x4190bc ExitProcess
 0x4190c0 GetLastError
 0x4190c4 GetStdHandle
 0x4190c8 GetModuleFileNameA
 0x4190cc TlsGetValue
 0x4190d0 TlsAlloc
 0x4190d4 TlsSetValue
 0x4190d8 TlsFree
 0x4190dc SetLastError
 0x4190e0 GetCurrentThreadId
 0x4190e4 EnterCriticalSection
 0x4190e8 TerminateProcess
 0x4190ec IsDebuggerPresent
 0x4190f0 HeapSize
 0x4190f4 SetHandleCount
 0x4190f8 GetFileType
 0x4190fc GetStartupInfoA
 0x419100 DeleteCriticalSection
 0x419104 SetFilePointer
 0x419108 FreeEnvironmentStringsW
 0x41910c HeapCreate
 0x419110 VirtualFree
 0x419114 HeapFree
 0x419118 QueryPerformanceCounter
 0x41911c GetTickCount
 0x419120 GetCurrentProcessId
 0x419124 GetSystemTimeAsFileTime
 0x419128 LoadLibraryA
 0x41912c InitializeCriticalSectionAndSpinCount
 0x419130 GetCPInfo
 0x419134 GetOEMCP
 0x419138 IsValidCodePage
 0x41913c MultiByteToWideChar
 0x419140 RtlUnwind
 0x419144 HeapAlloc
 0x419148 HeapReAlloc
 0x41914c VirtualAlloc
 0x419150 WideCharToMultiByte
 0x419154 SetStdHandle
 0x419158 GetLocaleInfoA
 0x41915c GetStringTypeA
 0x419160 GetStringTypeW
 0x419164 LCMapStringA
 0x419168 GetConsoleCP
 0x41916c GetConsoleMode
 0x419170 FlushFileBuffers
 0x419174 CloseHandle
 0x419178 WriteConsoleA
 0x41917c WriteConsoleW
 0x419180 CreateFileA
USER32.dll
 0x419188 RealGetWindowClassW
GDI32.dll
 0x419000 GetCharWidthFloatA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure