Report - 428558fcf4133715cf08d2fdf904b35f3c5e47dadbb5128b43785648688abfa1.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.09.21 17:52 Machine s1_win7_x6401
Filename 428558fcf4133715cf08d2fdf904b35f3c5e47dadbb5128b43785648688abfa1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
4.2
ZERO API file : malware
VT API (file) 59 detected (AIDetect, malware1, Mansabo, trFy, malicious, high confidence, score, Trickster, TrickBot, Save, confidence, 100%, Kryptik, FYCJ, iaoyyg, Generic@ML, RDML, 8gDeLmCy13QY0g5lKAkzAA, Malware@#wgnmfhr65pvr, AGEN, Trick, TSPY, GOLROTED, GenericRXCZ, R + Troj, Trikbot, ASMalwS, kcloud, Skeeyah, ai score=100, BScope, Unsafe, Pciz, GenAsa, 0CEqU9iCyHA, Static AI, Malicious PE, GenKryptik, BCDU, ZexaF, FqW@aiPr4pmG, GdSda, susgen)
md5 4849ab316b3dcde68a2a23c22dee2d98
sha256 428558fcf4133715cf08d2fdf904b35f3c5e47dadbb5128b43785648688abfa1
ssdeep 6144:GmWhfxau8aL2lDSqF6TbuxbpWHVZTfv3bexsVQs2tZfG/NecanqvkP7j:0hfx7InEr/zTAsrfNeq6X
imphash 15a92363039fb41362406845afb153a0
impfuzzy 48:0+JF09inB6Uy/KA/Svlj3XKC4LQZXmCrzZD5AGlECOB8tkn++Aw4e:Y86ekJ++L4e
  Network IP location

Signature (10cnts)

Level Description
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
watch Detects Avast Antivirus through the presence of a library
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable uses a known packer

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x4460ac TranslateMessage
 0x4460b0 LoadCursorW
 0x4460b4 DispatchMessageW
 0x4460b8 GetMessageW
 0x4460bc RegisterClassExW
 0x4460c0 MoveWindow
 0x4460c4 PostQuitMessage
 0x4460c8 DialogBoxParamW
 0x4460cc DefWindowProcW
 0x4460d0 DestroyWindow
 0x4460d4 EndDialog
 0x4460d8 SendMessageW
 0x4460dc LoadStringW
 0x4460e0 wsprintfW
 0x4460e4 CreateWindowExW
 0x4460e8 ShowWindow
 0x4460ec UpdateWindow
 0x4460f0 LoadCursorA
 0x4460f4 GetWindowRect
 0x4460f8 InvalidateRect
 0x4460fc RemovePropA
 0x446100 SetMenu
 0x446104 PtInRect
 0x446108 GetDesktopWindow
 0x44610c SetScrollRange
 0x446110 GetActiveWindow
 0x446114 ScreenToClient
 0x446118 RedrawWindow
 0x44611c GetDlgCtrlID
 0x446120 GetScrollRange
 0x446124 GetWindowTextA
 0x446128 GetScrollInfo
 0x44612c GetWindowLongA
 0x446130 GetClassNameA
KERNEL32.dll
 0x446008 VirtualAlloc
 0x44600c HeapAlloc
 0x446010 HeapFree
 0x446014 WriteFile
 0x446018 RtlUnwind
 0x44601c VirtualFree
 0x446020 HeapCreate
 0x446024 HeapDestroy
 0x446028 GetFileType
 0x44602c GetStdHandle
 0x446030 SetHandleCount
 0x446034 GetOEMCP
 0x446038 GetACP
 0x44603c GetProcAddress
 0x446040 WideCharToMultiByte
 0x446044 GetEnvironmentStringsW
 0x446048 GetEnvironmentStrings
 0x44604c FreeEnvironmentStringsW
 0x446050 FreeEnvironmentStringsA
 0x446054 GetModuleFileNameA
 0x446058 UnhandledExceptionFilter
 0x44605c GetCurrentProcess
 0x446060 TerminateProcess
 0x446064 ExitProcess
 0x446068 GetVersion
 0x44606c GetCommandLineA
 0x446070 GetModuleHandleA
 0x446074 GetCPInfo
 0x446078 CreateFileA
 0x44607c GetModuleHandleW
 0x446080 GetCurrentDirectoryW
 0x446084 GetStartupInfoA
 0x446088 CloseHandle
 0x44608c GetFileSize
 0x446090 CreateFileMappingA
 0x446094 LoadLibraryA
 0x446098 GetLastError
 0x44609c CreateFileW
GDI32.dll
 0x446000 CreateCompatibleDC
SHELL32.dll
 0x4460a4 ExtractIconW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure