Report - apines.exe

Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.09.22 10:07 Machine s1_win7_x6402
Filename apines.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.4
ZERO API file : malware
VT API (file) 26 detected (AIDetect, malware2, malicious, high confidence, Fragtor, Unsafe, Save, Hacktool, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, RedLine, score, ai score=86, CLASSIC, Static AI, Malicious PE, ZexaF, tq0@a0m4U8pO)
md5 331ad3f4c9d14f480bad2dc82ae4f835
sha256 ce6ebaabe86af1f46e1b41caa619bceff86cb6adb25970f2be869b059aa0ab2f
ssdeep 6144:3qR8nLUIvjkA42/uAulJ/uvH9G9viO26yg/vOpGSBwjt4:6R8n4MwA4uulJWG9vh29GSBay
imphash b423274974f58a1d1a63a5242c6dcf99
impfuzzy 24:Qd4BrjrZWbOov26dv8e5DoYYvmur5rAKG1tD2wA+yvEFQh/J3vT42l9wjMynNp1G:ldZWqfUDYOIr3G1tSPH5vc2enhG
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x432008 GetLocaleInfoA
 0x43200c LoadResource
 0x432010 EndUpdateResourceW
 0x432014 InterlockedDecrement
 0x432018 GlobalSize
 0x43201c GetEnvironmentStringsW
 0x432020 WaitForSingleObject
 0x432024 SetEvent
 0x432028 GetSystemDefaultLCID
 0x43202c ReadConsoleW
 0x432030 FindActCtxSectionStringA
 0x432034 GetCommandLineA
 0x432038 GlobalAlloc
 0x43203c LeaveCriticalSection
 0x432040 GetModuleFileNameW
 0x432044 GetDevicePowerState
 0x432048 ReleaseSemaphore
 0x43204c GetConsoleOutputCP
 0x432050 GetProcAddress
 0x432054 VerLanguageNameA
 0x432058 EnterCriticalSection
 0x43205c WriteConsoleA
 0x432060 GetProcessId
 0x432064 LockResource
 0x432068 BeginUpdateResourceA
 0x43206c GlobalGetAtomNameW
 0x432070 SetSystemTime
 0x432074 EnumResourceTypesW
 0x432078 GetModuleFileNameA
 0x43207c GetModuleHandleA
 0x432080 EraseTape
 0x432084 FindFirstVolumeW
 0x432088 AddConsoleAliasA
 0x43208c lstrcpyA
 0x432090 GetSystemDefaultLangID
 0x432094 HeapAlloc
 0x432098 GetLastError
 0x43209c HeapReAlloc
 0x4320a0 GetStartupInfoA
 0x4320a4 RaiseException
 0x4320a8 RtlUnwind
 0x4320ac TerminateProcess
 0x4320b0 GetCurrentProcess
 0x4320b4 UnhandledExceptionFilter
 0x4320b8 SetUnhandledExceptionFilter
 0x4320bc IsDebuggerPresent
 0x4320c0 HeapFree
 0x4320c4 DeleteCriticalSection
 0x4320c8 VirtualFree
 0x4320cc VirtualAlloc
 0x4320d0 HeapCreate
 0x4320d4 GetModuleHandleW
 0x4320d8 Sleep
 0x4320dc ExitProcess
 0x4320e0 WriteFile
 0x4320e4 GetStdHandle
 0x4320e8 SetHandleCount
 0x4320ec GetFileType
 0x4320f0 SetFilePointer
 0x4320f4 FreeEnvironmentStringsA
 0x4320f8 GetEnvironmentStrings
 0x4320fc FreeEnvironmentStringsW
 0x432100 WideCharToMultiByte
 0x432104 TlsGetValue
 0x432108 TlsAlloc
 0x43210c TlsSetValue
 0x432110 TlsFree
 0x432114 InterlockedIncrement
 0x432118 SetLastError
 0x43211c GetCurrentThreadId
 0x432120 QueryPerformanceCounter
 0x432124 GetTickCount
 0x432128 GetCurrentProcessId
 0x43212c GetSystemTimeAsFileTime
 0x432130 InitializeCriticalSectionAndSpinCount
 0x432134 LoadLibraryA
 0x432138 SetStdHandle
 0x43213c GetConsoleCP
 0x432140 GetConsoleMode
 0x432144 FlushFileBuffers
 0x432148 HeapSize
 0x43214c GetCPInfo
 0x432150 GetACP
 0x432154 GetOEMCP
 0x432158 IsValidCodePage
 0x43215c WriteConsoleW
 0x432160 MultiByteToWideChar
 0x432164 LCMapStringA
 0x432168 LCMapStringW
 0x43216c GetStringTypeA
 0x432170 GetStringTypeW
 0x432174 CloseHandle
 0x432178 CreateFileA
USER32.dll
 0x432180 RealChildWindowFromPoint
GDI32.dll
 0x432000 GetCharWidth32A

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure