Report - c.bin

Emotet Malicious Library PE File PE32
ScreenShot
Created 2021.09.13 08:58 Machine s1_win7_x6401
Filename c.bin
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.6
ZERO API file : clean
VT API (file)
md5 df81ed87368141a4e55a550efba25460
sha256 198e2a81285466b05c9c0784a6add452efa3ccabc2e1a17236f2203ef4bf8fc4
ssdeep 98304:GxZD9rtnyWHlfybIJjnptnHrOBx35Azua4pLMQLrAxXrV:G/5xnyWH1yQrpVrOBx3oypLVMx7V
imphash f9e61196cbf799259ee40ecd8a6e5c8f
impfuzzy 12:VAGRiQ5kBZGoQtXJxZGb9AJcDfA5kLfP9m:VRiQ58QtXJHc9NDI5Q8
  Network IP location

Signature (9cnts)

Level Description
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_2_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0xb0d000 LoadLibraryW
SHELL32.dll
 0xb0d008 SHGetFolderPathW
WTSAPI32.dll
 0xb0d010 WTSSendMessageW
KERNEL32.dll
 0xb0d018 VirtualQuery
USER32.dll
 0xb0d020 GetProcessWindowStation
KERNEL32.dll
 0xb0d028 LocalAlloc
 0xb0d02c LocalFree
 0xb0d030 GetModuleFileNameW
 0xb0d034 GetProcessAffinityMask
 0xb0d038 SetProcessAffinityMask
 0xb0d03c SetThreadAffinityMask
 0xb0d040 Sleep
 0xb0d044 ExitProcess
 0xb0d048 FreeLibrary
 0xb0d04c LoadLibraryA
 0xb0d050 GetModuleHandleA
 0xb0d054 GetProcAddress
USER32.dll
 0xb0d05c GetProcessWindowStation
 0xb0d060 GetUserObjectInformationW

EAT(Export Address Table) Library



Similarity measure (PE file only) - Checking for service failure