Report - ChairSyllabuses_2021-09-04_05-53.exe

Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.09.09 16:33 Machine s1_win7_x6402
Filename ChairSyllabuses_2021-09-04_05-53.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
1
Behavior Score
2.2
ZERO API file : malware
VT API (file) 42 detected (AIDetect, malware2, malicious, high confidence, Fragtor, Unsafe, Save, Kryptik, Eldorado, Attribute, HighConfidence, HMIT, Raccoon, Stop, CrypterX, DownLoader42, Azorult, dnao, ai score=84, ASMalwS, Sabsik, 1W914KA, score, CoinMiner, Glupteba, R440163, BScope, Chapak, Static AI, Malicious PE, GenKryptik, FKAM, ZexaF, vqW@aqA3EfmO, Genetic, confidence, 100%)
md5 56bf0659c6d08974d34baa2a8206524e
sha256 7bcac3d96ae069bc795f7173619fa1bcaccb59ebcc2c3bc3622657ffc93ff4dd
ssdeep 6144:aE17Fdr0XLPRLrgR87AIEV2hhtMuz2GcGsEN5+Gzu:nzr0XLPpgRWAIWI2/GsENlzu
imphash 193b8a18b82d2d8f5b36c7239901d2c7
impfuzzy 48:7oODvX13BrX581YK8XIbO5+fcYtHaEGKUcvGp4LM:7TDX1RrX5898XIb0+fcYt6EGKUcvO4w
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 42 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x425000 EnumResourceNamesW
 0x425004 GetNativeSystemInfo
 0x425008 lstrlenA
 0x42500c CopyFileExW
 0x425010 GetStringTypeA
 0x425014 InterlockedIncrement
 0x425018 ReadConsoleA
 0x42501c InterlockedDecrement
 0x425020 GlobalLock
 0x425024 FreeEnvironmentStringsA
 0x425028 GetModuleHandleW
 0x42502c GetPrivateProfileStringW
 0x425030 WriteFile
 0x425034 SetCommState
 0x425038 GetCommandLineA
 0x42503c GlobalAlloc
 0x425040 GetPrivateProfileIntA
 0x425044 LoadLibraryW
 0x425048 GetSystemWindowsDirectoryA
 0x42504c GetConsoleAliasExesLengthW
 0x425050 GlobalFlags
 0x425054 GetExitCodeProcess
 0x425058 IsDBCSLeadByte
 0x42505c ReadFile
 0x425060 SetThreadPriority
 0x425064 GetNamedPipeHandleStateW
 0x425068 LCMapStringA
 0x42506c GetPrivateProfileIntW
 0x425070 GetStartupInfoA
 0x425074 SetThreadLocale
 0x425078 GetLastError
 0x42507c GetProcAddress
 0x425080 CopyFileA
 0x425084 GetPrivateProfileStringA
 0x425088 OpenWaitableTimerA
 0x42508c LoadLibraryA
 0x425090 GetFileType
 0x425094 SetCurrentDirectoryW
 0x425098 SetThreadIdealProcessor
 0x42509c HeapWalk
 0x4250a0 FindAtomA
 0x4250a4 Process32NextW
 0x4250a8 CreateIoCompletionPort
 0x4250ac QueryMemoryResourceNotification
 0x4250b0 EnumResourceNamesA
 0x4250b4 GetCPInfoExA
 0x4250b8 TlsAlloc
 0x4250bc ReadConsoleOutputCharacterW
 0x4250c0 GetSystemTime
 0x4250c4 DeleteFileA
 0x4250c8 Sleep
 0x4250cc InitializeCriticalSection
 0x4250d0 DeleteCriticalSection
 0x4250d4 EnterCriticalSection
 0x4250d8 LeaveCriticalSection
 0x4250dc MultiByteToWideChar
 0x4250e0 GetStartupInfoW
 0x4250e4 UnhandledExceptionFilter
 0x4250e8 SetUnhandledExceptionFilter
 0x4250ec GetModuleFileNameW
 0x4250f0 HeapValidate
 0x4250f4 IsBadReadPtr
 0x4250f8 RaiseException
 0x4250fc RtlUnwind
 0x425100 TerminateProcess
 0x425104 GetCurrentProcess
 0x425108 IsDebuggerPresent
 0x42510c GetACP
 0x425110 GetOEMCP
 0x425114 GetCPInfo
 0x425118 IsValidCodePage
 0x42511c TlsGetValue
 0x425120 TlsSetValue
 0x425124 GetCurrentThreadId
 0x425128 TlsFree
 0x42512c SetLastError
 0x425130 QueryPerformanceCounter
 0x425134 GetTickCount
 0x425138 GetCurrentProcessId
 0x42513c GetSystemTimeAsFileTime
 0x425140 ExitProcess
 0x425144 FreeEnvironmentStringsW
 0x425148 GetEnvironmentStringsW
 0x42514c GetCommandLineW
 0x425150 SetHandleCount
 0x425154 GetStdHandle
 0x425158 HeapDestroy
 0x42515c HeapCreate
 0x425160 HeapFree
 0x425164 VirtualFree
 0x425168 GetModuleFileNameA
 0x42516c FlushFileBuffers
 0x425170 WideCharToMultiByte
 0x425174 GetConsoleCP
 0x425178 GetConsoleMode
 0x42517c DebugBreak
 0x425180 OutputDebugStringA
 0x425184 WriteConsoleW
 0x425188 OutputDebugStringW
 0x42518c HeapAlloc
 0x425190 HeapSize
 0x425194 HeapReAlloc
 0x425198 VirtualAlloc
 0x42519c InitializeCriticalSectionAndSpinCount
 0x4251a0 LCMapStringW
 0x4251a4 GetStringTypeW
 0x4251a8 GetLocaleInfoA
 0x4251ac SetStdHandle
 0x4251b0 WriteConsoleA
 0x4251b4 GetConsoleOutputCP
 0x4251b8 SetFilePointer
 0x4251bc CloseHandle
 0x4251c0 CreateFileA
 0x4251c4 GetModuleHandleA
USER32.dll
 0x4251d4 GetComboBoxInfo
MSIMG32.dll
 0x4251cc TransparentBlt

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure