Report - Vids.exe

Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.09.06 18:08 Machine s1_win7_x6402
Filename Vids.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.0
ZERO API file : malware
VT API (file) 28 detected (AIDetect, malware1, malicious, high confidence, Babar, Unsafe, Save, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, Upatre, ai score=83, Wacatac, score, MachineLearning, Anomalous, CLASSIC, Static AI, Malicious PE, susgen, ZexaF, Qq0@aSj, zBac)
md5 07d8a630c42701bd47b10d5a15059720
sha256 295d3a815f7917fd944d28e08e46d1a45c7ac9a5ffcb9fd2a697cc4d84352d56
ssdeep 12288:KO0L7aRIZOHeUnxKB+wDEcwWibM+KhYi+uXaHISCqDAiA1uy16KDLW:70faRR++kvibEEuoUaA1VwKHW
imphash b3c77ddf52d3747349b325f3828cda41
impfuzzy 24:qbG2Sj20Z/Z57axdAx/DoP1M5692hOSt5Oovol3/J3Njyv9rvklRTeplrjMcvfE:91DZ/Z1aHj+56bSt8DPNg9KW1vfE
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x48b000 lstrcpynA
 0x48b004 GetDefaultCommConfigW
 0x48b008 DeleteVolumeMountPointA
 0x48b00c ReadConsoleA
 0x48b010 InterlockedDecrement
 0x48b014 GetSystemWindowsDirectoryW
 0x48b018 GetEnvironmentStringsW
 0x48b01c GetUserDefaultLCID
 0x48b020 SetEvent
 0x48b024 GetSystemDefaultLCID
 0x48b028 GetFileAttributesExA
 0x48b02c GetEnvironmentStrings
 0x48b030 GlobalAlloc
 0x48b034 ReadConsoleInputA
 0x48b038 CopyFileW
 0x48b03c LeaveCriticalSection
 0x48b040 GetComputerNameExA
 0x48b044 UnregisterWait
 0x48b048 ReadFile
 0x48b04c GetACP
 0x48b050 GetConsoleOutputCP
 0x48b054 VerifyVersionInfoW
 0x48b058 GetCPInfoExW
 0x48b05c GetLongPathNameW
 0x48b060 GetProcAddress
 0x48b064 VerLanguageNameW
 0x48b068 GetLocalTime
 0x48b06c WriteConsoleA
 0x48b070 CreateTapePartition
 0x48b074 GetModuleFileNameA
 0x48b078 SetConsoleTitleW
 0x48b07c GetModuleHandleA
 0x48b080 PeekConsoleInputA
 0x48b084 Module32NextW
 0x48b088 GetCurrentProcessId
 0x48b08c AddConsoleAliasA
 0x48b090 EnumCalendarInfoExA
 0x48b094 FindNextVolumeA
 0x48b098 LCMapStringW
 0x48b09c GetAtomNameW
 0x48b0a0 GetCommandLineW
 0x48b0a4 UnhandledExceptionFilter
 0x48b0a8 SetUnhandledExceptionFilter
 0x48b0ac GetCommandLineA
 0x48b0b0 GetStartupInfoA
 0x48b0b4 GetModuleHandleW
 0x48b0b8 Sleep
 0x48b0bc ExitProcess
 0x48b0c0 GetLastError
 0x48b0c4 WriteFile
 0x48b0c8 GetStdHandle
 0x48b0cc TerminateProcess
 0x48b0d0 GetCurrentProcess
 0x48b0d4 IsDebuggerPresent
 0x48b0d8 TlsGetValue
 0x48b0dc TlsAlloc
 0x48b0e0 TlsSetValue
 0x48b0e4 TlsFree
 0x48b0e8 InterlockedIncrement
 0x48b0ec SetLastError
 0x48b0f0 GetCurrentThreadId
 0x48b0f4 EnterCriticalSection
 0x48b0f8 HeapSize
 0x48b0fc SetHandleCount
 0x48b100 GetFileType
 0x48b104 DeleteCriticalSection
 0x48b108 SetFilePointer
 0x48b10c FreeEnvironmentStringsA
 0x48b110 FreeEnvironmentStringsW
 0x48b114 WideCharToMultiByte
 0x48b118 HeapCreate
 0x48b11c VirtualFree
 0x48b120 HeapFree
 0x48b124 QueryPerformanceCounter
 0x48b128 GetTickCount
 0x48b12c GetSystemTimeAsFileTime
 0x48b130 LoadLibraryA
 0x48b134 InitializeCriticalSectionAndSpinCount
 0x48b138 GetConsoleCP
 0x48b13c GetConsoleMode
 0x48b140 GetCPInfo
 0x48b144 GetOEMCP
 0x48b148 IsValidCodePage
 0x48b14c RaiseException
 0x48b150 MultiByteToWideChar
 0x48b154 RtlUnwind
 0x48b158 HeapAlloc
 0x48b15c HeapReAlloc
 0x48b160 VirtualAlloc
 0x48b164 SetStdHandle
 0x48b168 FlushFileBuffers
 0x48b16c GetLocaleInfoA
 0x48b170 WriteConsoleW
 0x48b174 LCMapStringA
 0x48b178 GetStringTypeA
 0x48b17c GetStringTypeW
 0x48b180 CreateFileA
 0x48b184 CloseHandle

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure