Report - lipster.exe

Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.09.11 15:27 Machine s1_win7_x6401
Filename lipster.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
1
Behavior Score
1.8
ZERO API file : malware
VT API (file) 28 detected (malicious, high confidence, score, Save, Kryptik, Eldorado, HMKQ, CrypterX, HPGen, Emotet, Static AI, Malicious PE, Sabsik, ZexaF, qq0@aKehgUH, CLASSIC, HMKO, confidence, susgen)
md5 66a35e61e92a2c57a4c872f7d178df50
sha256 c692d6e7a7335237c6bd0687f8bdce29baaad5dd85cfeceff2bb32aecfd8fbb3
ssdeep 3072:g5Y8ocm0ifla2Eyc8rHTtiRacMA0L2FH9HmnZYqolK2+ZXvuzariTWS7A5nAoSSD:GY/flmhaztiR+AHUnBzlCariTWbVnD
imphash af15f8c81f40203c694f921fcf93798f
impfuzzy 24:sVZZZyVoFXDYeOhlZ901bQOGOovLt/J3JdObPv8Ryv9kRTAjMcTplJvjoS:WZZZchRjZIfB0thPOx9gAtzj
  Network IP location

Signature (4cnts)

Level Description
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x434014 InterlockedDecrement
 0x434018 GetCurrentProcess
 0x43401c GetSystemWindowsDirectoryW
 0x434020 GetUserDefaultLCID
 0x434024 GetSystemDefaultLCID
 0x434028 ReadConsoleW
 0x43402c GetEnvironmentStrings
 0x434030 GlobalAlloc
 0x434034 GetLocaleInfoW
 0x434038 LeaveCriticalSection
 0x43403c lstrcpynW
 0x434040 FindNextVolumeW
 0x434044 WriteConsoleW
 0x434048 GetModuleFileNameW
 0x43404c InterlockedIncrement
 0x434050 GetACP
 0x434054 GetConsoleOutputCP
 0x434058 VerifyVersionInfoW
 0x43405c GetProcAddress
 0x434060 EnterCriticalSection
 0x434064 PrepareTape
 0x434068 ResetEvent
 0x43406c GetAtomNameA
 0x434070 DebugSetProcessKillOnExit
 0x434074 SetConsoleTitleW
 0x434078 GetModuleHandleA
 0x43407c Module32Next
 0x434080 GetCurrentProcessId
 0x434084 AddConsoleAliasA
 0x434088 FindActCtxSectionStringW
 0x43408c GetSystemTime
 0x434090 GetProfileSectionW
 0x434094 FindActCtxSectionGuid
 0x434098 GetLocaleInfoA
 0x43409c GetCommandLineW
 0x4340a0 GetCommandLineA
 0x4340a4 GetStartupInfoA
 0x4340a8 TerminateProcess
 0x4340ac UnhandledExceptionFilter
 0x4340b0 SetUnhandledExceptionFilter
 0x4340b4 IsDebuggerPresent
 0x4340b8 GetModuleHandleW
 0x4340bc TlsGetValue
 0x4340c0 TlsAlloc
 0x4340c4 TlsSetValue
 0x4340c8 TlsFree
 0x4340cc SetLastError
 0x4340d0 GetCurrentThreadId
 0x4340d4 GetLastError
 0x4340d8 HeapAlloc
 0x4340dc Sleep
 0x4340e0 HeapSize
 0x4340e4 ExitProcess
 0x4340e8 RtlUnwind
 0x4340ec HeapFree
 0x4340f0 SetFilePointer
 0x4340f4 WriteFile
 0x4340f8 GetStdHandle
 0x4340fc GetModuleFileNameA
 0x434100 FreeEnvironmentStringsA
 0x434104 FreeEnvironmentStringsW
 0x434108 WideCharToMultiByte
 0x43410c GetEnvironmentStringsW
 0x434110 SetHandleCount
 0x434114 GetFileType
 0x434118 DeleteCriticalSection
 0x43411c HeapCreate
 0x434120 VirtualFree
 0x434124 QueryPerformanceCounter
 0x434128 GetTickCount
 0x43412c GetSystemTimeAsFileTime
 0x434130 GetConsoleCP
 0x434134 GetConsoleMode
 0x434138 GetCPInfo
 0x43413c GetOEMCP
 0x434140 IsValidCodePage
 0x434144 RaiseException
 0x434148 VirtualAlloc
 0x43414c HeapReAlloc
 0x434150 LoadLibraryA
 0x434154 InitializeCriticalSectionAndSpinCount
 0x434158 CloseHandle
 0x43415c CreateFileA
 0x434160 SetStdHandle
 0x434164 FlushFileBuffers
 0x434168 WriteConsoleA
 0x43416c MultiByteToWideChar
 0x434170 LCMapStringA
 0x434174 LCMapStringW
 0x434178 GetStringTypeA
 0x43417c GetStringTypeW
 0x434180 SetEndOfFile
 0x434184 GetProcessHeap
 0x434188 ReadFile
GDI32.dll
 0x43400c GetCharWidthFloatW
ADVAPI32.dll
 0x434000 BackupEventLogA
 0x434004 BackupEventLogW

EAT(Export Address Table) Library

0x401046 @GetAnotherVice@12


Similarity measure (PE file only) - Checking for service failure