Report - clip.exe

Malicious Library PE File PE32 OS Processor Check
ScreenShot
Created 2021.09.07 19:15 Machine s1_win7_x6402
Filename clip.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
2.2
ZERO API file : malware
VT API (file) 35 detected (AIDetect, malware1, malicious, high confidence, Fragtor, Unsafe, Save, Hacktool, Jaik, Kryptik, Eldorado, Attribute, HighConfidence, GenKryptik, FKCI, Convagent, DropperX, Generic@ML, RDML, T9KeLS0fdqbKHPf9HgQn9A, Emotet, Static AI, Malicious PE, Sabsik, score, SmokeLoader, R440306, GenericRXAA, ai score=83, ZexaF, lq0@aCZ2Y7bc, Genetic, confidence, 100%, susgen)
md5 483715033eb4f12ab5c3d9a7e2953221
sha256 f0f3f39e63a0fa9d1af8b6b23f23af1f1274f5f2a5a181a0070fb397fb7225a4
ssdeep 3072:fk8NCwrp3GknF7Q9XnHxm7y5Rk4Q/pzT3WvTTaA421M:iknZQ93Re46pzjMaA4A
imphash b740348189b21a2cbef41493dadcafe4
impfuzzy 24:yk20Z9YZ3Oovi7axyD9Yn/M564Rt+lbJ3Vyv9rvklRTeplrjM0pyN:9ZaZ+BaTn0560t+Xa9KWhpyN
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x415000 GetLocaleInfoA
 0x415004 SetLocalTime
 0x415008 lstrcpynA
 0x41500c DeleteVolumeMountPointA
 0x415010 InterlockedIncrement
 0x415014 InterlockedDecrement
 0x415018 GetSystemWindowsDirectoryW
 0x41501c GetEnvironmentStringsW
 0x415020 GetUserDefaultLCID
 0x415024 AddConsoleAliasW
 0x415028 SetEvent
 0x41502c GetSystemDefaultLCID
 0x415030 GetFileAttributesExA
 0x415034 ReadConsoleW
 0x415038 WriteFile
 0x41503c GetCommandLineA
 0x415040 GetEnvironmentStrings
 0x415044 GlobalAlloc
 0x415048 ReadConsoleInputA
 0x41504c CopyFileW
 0x415050 LeaveCriticalSection
 0x415054 VerifyVersionInfoA
 0x415058 WriteConsoleW
 0x41505c GetAtomNameW
 0x415060 GetConsoleOutputCP
 0x415064 GetCPInfoExW
 0x415068 GetProcAddress
 0x41506c GetLongPathNameA
 0x415070 VerLanguageNameA
 0x415074 EnterCriticalSection
 0x415078 CreateTapePartition
 0x41507c GetModuleFileNameA
 0x415080 GetOEMCP
 0x415084 SetConsoleTitleW
 0x415088 GetModuleHandleA
 0x41508c PeekConsoleInputA
 0x415090 Module32NextW
 0x415094 GetCurrentProcessId
 0x415098 FindNextVolumeA
 0x41509c GetComputerNameExA
 0x4150a0 UnhandledExceptionFilter
 0x4150a4 SetUnhandledExceptionFilter
 0x4150a8 GetStartupInfoA
 0x4150ac GetModuleHandleW
 0x4150b0 Sleep
 0x4150b4 ExitProcess
 0x4150b8 GetLastError
 0x4150bc GetStdHandle
 0x4150c0 TerminateProcess
 0x4150c4 GetCurrentProcess
 0x4150c8 IsDebuggerPresent
 0x4150cc TlsGetValue
 0x4150d0 TlsAlloc
 0x4150d4 TlsSetValue
 0x4150d8 TlsFree
 0x4150dc SetLastError
 0x4150e0 GetCurrentThreadId
 0x4150e4 HeapSize
 0x4150e8 SetHandleCount
 0x4150ec GetFileType
 0x4150f0 DeleteCriticalSection
 0x4150f4 SetFilePointer
 0x4150f8 FreeEnvironmentStringsA
 0x4150fc FreeEnvironmentStringsW
 0x415100 WideCharToMultiByte
 0x415104 HeapCreate
 0x415108 VirtualFree
 0x41510c HeapFree
 0x415110 QueryPerformanceCounter
 0x415114 GetTickCount
 0x415118 GetSystemTimeAsFileTime
 0x41511c LoadLibraryA
 0x415120 InitializeCriticalSectionAndSpinCount
 0x415124 GetConsoleCP
 0x415128 GetConsoleMode
 0x41512c GetCPInfo
 0x415130 GetACP
 0x415134 IsValidCodePage
 0x415138 RaiseException
 0x41513c HeapAlloc
 0x415140 HeapReAlloc
 0x415144 VirtualAlloc
 0x415148 RtlUnwind
 0x41514c SetStdHandle
 0x415150 FlushFileBuffers
 0x415154 WriteConsoleA
 0x415158 MultiByteToWideChar
 0x41515c LCMapStringA
 0x415160 LCMapStringW
 0x415164 GetStringTypeA
 0x415168 GetStringTypeW
 0x41516c CreateFileA
 0x415170 CloseHandle

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure