Report - build_2021-09-03_19-07.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.09.04 13:58 Machine s1_win7_x6402
Filename build_2021-09-03_19-07.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
2.2
ZERO API file : malware
VT API (file) 36 detected (AIDetect, malware1, malicious, high confidence, score, Artemis, Unsafe, Save, confidence, 100%, Kryptik, Eldorado, Fragtor, FileRepMalware, Emotet, Static AI, Malicious PE, Azorult, BScope, Mokes, ai score=82, CLASSIC, PossibleThreat, ZexaF, Pq0@aOIelmdG, susgen)
md5 34d8bda29d961c5757f3a8a0ef971205
sha256 2409a78ac9ab93406bc5d9a812061af68e263f7ebeccadb95b1603b1ff128034
ssdeep 12288:xmjRpnqeNQY5yaIMRMdARLIFGdpXEaToAJi2C+v4t8GcvhC4vMP7THlSZ:Ya2QY54eJIUdp55DvcCvg4vMjJS
imphash db8792b8bee3a608cb91125b46190a07
impfuzzy 24:qbG2SKuu9E0ZZZPk13UJxZvdEDSYCo51MOn/J3JnJtOmRyvDklRT47GplrjMFi/8:91gZZZLzdrghhJtOrD+c7CEiE
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x486008 lstrcpynA
 0x48600c GetDefaultCommConfigW
 0x486010 InterlockedDecrement
 0x486014 GetCurrentProcess
 0x486018 SetEnvironmentVariableW
 0x48601c GetEnvironmentStringsW
 0x486020 GetUserDefaultLCID
 0x486024 GetSystemDefaultLCID
 0x486028 EnumCalendarInfoExW
 0x48602c GetConsoleTitleA
 0x486030 ReadConsoleW
 0x486034 WriteFile
 0x486038 GetEnvironmentStrings
 0x48603c ReadConsoleInputA
 0x486040 SetVolumeMountPointA
 0x486044 GetSystemWindowsDirectoryA
 0x486048 LeaveCriticalSection
 0x48604c GetComputerNameExA
 0x486050 GetModuleFileNameW
 0x486054 GetACP
 0x486058 GetConsoleOutputCP
 0x48605c VerifyVersionInfoW
 0x486060 InterlockedExchange
 0x486064 GetProcAddress
 0x486068 PeekConsoleInputW
 0x48606c VerLanguageNameA
 0x486070 HeapUnlock
 0x486074 GetLocalTime
 0x486078 LocalAlloc
 0x48607c GetModuleFileNameA
 0x486080 GetModuleHandleA
 0x486084 QueueUserWorkItem
 0x486088 HeapSetInformation
 0x48608c GetConsoleTitleW
 0x486090 AddConsoleAliasA
 0x486094 FindNextVolumeA
 0x486098 GlobalReAlloc
 0x48609c LCMapStringW
 0x4860a0 PulseEvent
 0x4860a4 CreateTimerQueue
 0x4860a8 GetCommandLineW
 0x4860ac GetStartupInfoW
 0x4860b0 GetModuleHandleW
 0x4860b4 TlsGetValue
 0x4860b8 TlsAlloc
 0x4860bc TlsSetValue
 0x4860c0 TlsFree
 0x4860c4 InterlockedIncrement
 0x4860c8 SetLastError
 0x4860cc GetCurrentThreadId
 0x4860d0 GetLastError
 0x4860d4 EnterCriticalSection
 0x4860d8 TerminateProcess
 0x4860dc UnhandledExceptionFilter
 0x4860e0 SetUnhandledExceptionFilter
 0x4860e4 IsDebuggerPresent
 0x4860e8 Sleep
 0x4860ec HeapSize
 0x4860f0 ExitProcess
 0x4860f4 SetFilePointer
 0x4860f8 GetStdHandle
 0x4860fc FreeEnvironmentStringsW
 0x486100 SetHandleCount
 0x486104 GetFileType
 0x486108 GetStartupInfoA
 0x48610c DeleteCriticalSection
 0x486110 HeapCreate
 0x486114 VirtualFree
 0x486118 HeapFree
 0x48611c QueryPerformanceCounter
 0x486120 GetTickCount
 0x486124 GetCurrentProcessId
 0x486128 GetSystemTimeAsFileTime
 0x48612c GetCPInfo
 0x486130 GetOEMCP
 0x486134 IsValidCodePage
 0x486138 MultiByteToWideChar
 0x48613c RtlUnwind
 0x486140 HeapAlloc
 0x486144 HeapReAlloc
 0x486148 VirtualAlloc
 0x48614c LoadLibraryA
 0x486150 InitializeCriticalSectionAndSpinCount
 0x486154 WideCharToMultiByte
 0x486158 SetStdHandle
 0x48615c GetConsoleCP
 0x486160 GetConsoleMode
 0x486164 FlushFileBuffers
 0x486168 GetLocaleInfoA
 0x48616c GetStringTypeA
 0x486170 GetStringTypeW
 0x486174 LCMapStringA
 0x486178 WriteConsoleA
 0x48617c WriteConsoleW
 0x486180 CloseHandle
 0x486184 CreateFileA
USER32.dll
 0x48618c RealGetWindowClassW
GDI32.dll
 0x486000 GetCharWidthFloatA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure