Report - 3_Microsoft.Office.Infopath.Client.Internal.Host.dll.dll

Malicious Library PE File DLL PE32
ScreenShot
Created 2021.09.17 10:54 Machine s1_win7_x6401
Filename 3_Microsoft.Office.Infopath.Client.Internal.Host.dll.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
2.4
ZERO API file : malware
VT API (file) 26 detected (malicious, high confidence, Zusy, Drixed, Unsafe, Save, confidence, ZedlaF, lu8@aeJAEjbi, Kryptik, HMKB, Cridex, Generic@ML, RDML, RGHExegSxU, 10ovqOPq2tA, Static AI, Malicious PE, ai score=85, Wacatac, score, Dridex, GdSda)
md5 1e057c393a8684cd569ad803edb08980
sha256 897e25637fa64cdea321686e18d77dfeb63704bd2036e7d187b73f2ad218bba7
ssdeep 3072:/pGV8NX/ggu2n5z6308/H6zHENt5+ojP8LhaICmrG746ic:/gl2nc/gW+wPUhaIl6
imphash e2d6c63bd1fc98c4582f60ca16347983
impfuzzy 12:DU6wFBlaP375F1G2cupWHdjryRfdpvoNp6i/4r0:AFBs5bG2cuskfdMpQY
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

GDI32.dll
 0x10008018 StretchBlt
msvcrt.dll
 0x10008094 memset
 0x10008098 iswlower
ADVAPI32.dll
 0x10008000 RegLoadAppKeyA
 0x10008004 CreateServiceA
 0x10008008 FreeSid
SETUPAPI.dll
 0x10008064 SetupLogErrorW
KERNEL32.dll
 0x10008020 GetModuleHandleA
 0x10008024 GetModuleFileNameW
 0x10008028 EndUpdateResourceA
 0x1000802c WriteFile
 0x10008030 TransactNamedPipe
 0x10008034 DebugBreak
 0x10008038 SetDefaultCommConfigA
 0x1000803c GetTempPathA
 0x10008040 VirtualFree
MPRAPI.dll
 0x10008048 MprAdminGetErrorString
OLEAUT32.dll
 0x10008050 BSTR_UserFree
 0x10008054 VarUdateFromDate
RASAPI32.dll
 0x1000805c RasDeleteEntryW
USER32.dll
 0x10008078 ImpersonateDdeClientWindow
 0x1000807c ShowOwnedPopups
WINTRUST.dll
 0x1000808c CryptSIPCreateIndirectData
SHLWAPI.dll
 0x1000806c StrCmpNW
 0x10008070 ChrCmpIA
WINMM.dll
 0x10008084 waveOutGetNumDevs
ESENT.dll
 0x10008010 JetEndSession

EAT(Export Address Table) Library

0x100280b6 QwmdpoyyNooldenntdef


Similarity measure (PE file only) - Checking for service failure