Report - santa.clo

Malicious Library PE File PE32
ScreenShot
Created 2021.09.05 09:05 Machine s1_win7_x6401
Filename santa.clo
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
2.0
ZERO API file : malware
VT API (file) 28 detected (malicious, high confidence, Fragtor, Unsafe, Save, confidence, 100%, Kryptik, Eldorado, Convagent, Emotet, Azorult, Sabsik, score, ai score=87, CLASSIC, Static AI, Malicious PE, ZexaF, uq0@aWaVW8aG, susgen)
md5 316b8cc927e4a9ad4258fc367873d988
sha256 09e90f1b1169b4725f8f7f5daabde617449a1a6817f12eaacc945451e001c62f
ssdeep 6144:H9h1HLyKYAm1P9PbzvOwrL5kcNTazVpMGt7Tm5R67mq:dhp2n7VPbz/rL5kCan7Tm5ct
imphash 06fbc87344400a3722a88a2791d1fe43
impfuzzy 24:qbG2SU8u9E0ZZZPk1LBlAJxAQdEDSYZPUen9YOn/J3JnftOmRyvDklRTfGNjM70S:91+ZZZyaeQdruNnthhftOrD+bWS
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x433008 lstrcpynA
 0x43300c GetDefaultCommConfigW
 0x433010 ReadConsoleA
 0x433014 InterlockedDecrement
 0x433018 SetEnvironmentVariableW
 0x43301c GetEnvironmentStringsW
 0x433020 GetUserDefaultLCID
 0x433024 GetSystemDefaultLCID
 0x433028 EnumCalendarInfoExW
 0x43302c GetConsoleTitleA
 0x433030 WriteFile
 0x433034 GetEnvironmentStrings
 0x433038 InitializeCriticalSectionAndSpinCount
 0x43303c SetVolumeMountPointA
 0x433040 GetSystemWindowsDirectoryA
 0x433044 LeaveCriticalSection
 0x433048 GetComputerNameExA
 0x43304c GetModuleFileNameW
 0x433050 GetACP
 0x433054 LCMapStringA
 0x433058 VerifyVersionInfoW
 0x43305c InterlockedExchange
 0x433060 GetProcAddress
 0x433064 PeekConsoleInputW
 0x433068 VerLanguageNameA
 0x43306c CopyFileA
 0x433070 GetLocalTime
 0x433074 WriteConsoleA
 0x433078 LocalAlloc
 0x43307c SetConsoleOutputCP
 0x433080 Module32FirstW
 0x433084 GetModuleFileNameA
 0x433088 GetModuleHandleA
 0x43308c QueueUserWorkItem
 0x433090 PeekConsoleInputA
 0x433094 ReadConsoleInputW
 0x433098 GetCurrentProcessId
 0x43309c AddConsoleAliasA
 0x4330a0 FindNextVolumeA
 0x4330a4 PulseEvent
 0x4330a8 GetCommandLineW
 0x4330ac GetStartupInfoW
 0x4330b0 GetModuleHandleW
 0x4330b4 TlsGetValue
 0x4330b8 TlsAlloc
 0x4330bc TlsSetValue
 0x4330c0 TlsFree
 0x4330c4 InterlockedIncrement
 0x4330c8 SetLastError
 0x4330cc GetCurrentThreadId
 0x4330d0 GetLastError
 0x4330d4 EnterCriticalSection
 0x4330d8 TerminateProcess
 0x4330dc GetCurrentProcess
 0x4330e0 UnhandledExceptionFilter
 0x4330e4 SetUnhandledExceptionFilter
 0x4330e8 IsDebuggerPresent
 0x4330ec Sleep
 0x4330f0 HeapSize
 0x4330f4 ExitProcess
 0x4330f8 SetFilePointer
 0x4330fc GetStdHandle
 0x433100 FreeEnvironmentStringsW
 0x433104 SetHandleCount
 0x433108 GetFileType
 0x43310c GetStartupInfoA
 0x433110 DeleteCriticalSection
 0x433114 HeapCreate
 0x433118 VirtualFree
 0x43311c HeapFree
 0x433120 QueryPerformanceCounter
 0x433124 GetTickCount
 0x433128 GetSystemTimeAsFileTime
 0x43312c GetCPInfo
 0x433130 GetOEMCP
 0x433134 IsValidCodePage
 0x433138 MultiByteToWideChar
 0x43313c RtlUnwind
 0x433140 HeapAlloc
 0x433144 HeapReAlloc
 0x433148 VirtualAlloc
 0x43314c LoadLibraryA
 0x433150 WideCharToMultiByte
 0x433154 SetStdHandle
 0x433158 GetConsoleCP
 0x43315c GetConsoleMode
 0x433160 FlushFileBuffers
 0x433164 GetLocaleInfoA
 0x433168 GetStringTypeA
 0x43316c GetStringTypeW
 0x433170 LCMapStringW
 0x433174 GetConsoleOutputCP
 0x433178 WriteConsoleW
 0x43317c CloseHandle
 0x433180 CreateFileA
USER32.dll
 0x433188 RealGetWindowClassW
GDI32.dll
 0x433000 GetCharWidthFloatW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure