Report - toolspab2.exe

Malicious Library AntiDebug AntiVM PE File OS Processor Check PE32
ScreenShot
Created 2021.09.23 08:57 Machine s1_win7_x6402
Filename toolspab2.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
6.6
ZERO API file : malware
VT API (file)
md5 b17b3e448ea6c4904e9bb92ffb544d5e
sha256 71fd73396d9fc7c010183f0881742828a3d8306391b93c950c658c4bc3c13f08
ssdeep 3072:+0dBHqG2d1RRt+oWGoytUw/5eIcr93NexX:jk/vt+xnyb0px3Q
imphash b423274974f58a1d1a63a5242c6dcf99
impfuzzy 24:Qd4BrjrZWbOov26dv8e5DoYYvmur5rAKG1tD2wA+yvEFQh/J3vT42l9wjMynNp1G:ldZWqfUDYOIr3G1tSPH5vc2enhG
  Network IP location

Signature (14cnts)

Level Description
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Detects Avast Antivirus through the presence of a library
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks if process is being debugged by a debugger
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (11cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x418008 GetLocaleInfoA
 0x41800c LoadResource
 0x418010 EndUpdateResourceW
 0x418014 InterlockedDecrement
 0x418018 GlobalSize
 0x41801c GetEnvironmentStringsW
 0x418020 WaitForSingleObject
 0x418024 SetEvent
 0x418028 GetSystemDefaultLCID
 0x41802c ReadConsoleW
 0x418030 FindActCtxSectionStringA
 0x418034 GetCommandLineA
 0x418038 GlobalAlloc
 0x41803c LeaveCriticalSection
 0x418040 GetModuleFileNameW
 0x418044 GetDevicePowerState
 0x418048 ReleaseSemaphore
 0x41804c GetConsoleOutputCP
 0x418050 GetProcAddress
 0x418054 VerLanguageNameA
 0x418058 EnterCriticalSection
 0x41805c WriteConsoleA
 0x418060 GetProcessId
 0x418064 LockResource
 0x418068 BeginUpdateResourceA
 0x41806c GlobalGetAtomNameW
 0x418070 SetSystemTime
 0x418074 EnumResourceTypesW
 0x418078 GetModuleFileNameA
 0x41807c GetModuleHandleA
 0x418080 EraseTape
 0x418084 FindFirstVolumeW
 0x418088 AddConsoleAliasA
 0x41808c lstrcpyA
 0x418090 GetSystemDefaultLangID
 0x418094 HeapAlloc
 0x418098 GetLastError
 0x41809c HeapReAlloc
 0x4180a0 GetStartupInfoA
 0x4180a4 RaiseException
 0x4180a8 RtlUnwind
 0x4180ac TerminateProcess
 0x4180b0 GetCurrentProcess
 0x4180b4 UnhandledExceptionFilter
 0x4180b8 SetUnhandledExceptionFilter
 0x4180bc IsDebuggerPresent
 0x4180c0 HeapFree
 0x4180c4 DeleteCriticalSection
 0x4180c8 VirtualFree
 0x4180cc VirtualAlloc
 0x4180d0 HeapCreate
 0x4180d4 GetModuleHandleW
 0x4180d8 Sleep
 0x4180dc ExitProcess
 0x4180e0 WriteFile
 0x4180e4 GetStdHandle
 0x4180e8 SetHandleCount
 0x4180ec GetFileType
 0x4180f0 SetFilePointer
 0x4180f4 FreeEnvironmentStringsA
 0x4180f8 GetEnvironmentStrings
 0x4180fc FreeEnvironmentStringsW
 0x418100 WideCharToMultiByte
 0x418104 TlsGetValue
 0x418108 TlsAlloc
 0x41810c TlsSetValue
 0x418110 TlsFree
 0x418114 InterlockedIncrement
 0x418118 SetLastError
 0x41811c GetCurrentThreadId
 0x418120 QueryPerformanceCounter
 0x418124 GetTickCount
 0x418128 GetCurrentProcessId
 0x41812c GetSystemTimeAsFileTime
 0x418130 InitializeCriticalSectionAndSpinCount
 0x418134 LoadLibraryA
 0x418138 SetStdHandle
 0x41813c GetConsoleCP
 0x418140 GetConsoleMode
 0x418144 FlushFileBuffers
 0x418148 HeapSize
 0x41814c GetCPInfo
 0x418150 GetACP
 0x418154 GetOEMCP
 0x418158 IsValidCodePage
 0x41815c WriteConsoleW
 0x418160 MultiByteToWideChar
 0x418164 LCMapStringA
 0x418168 LCMapStringW
 0x41816c GetStringTypeA
 0x418170 GetStringTypeW
 0x418174 CloseHandle
 0x418178 CreateFileA
USER32.dll
 0x418180 RealChildWindowFromPoint
GDI32.dll
 0x418000 GetCharWidth32A

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure