Report - Soft_win64_ue500.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.09.27 14:59 Machine s1_win7_x6402
Filename Soft_win64_ue500.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.4
ZERO API file : malware
VT API (file) 32 detected (AIDetect, malware2, Racealer, malicious, high confidence, DownLoader42, GenericKD, Unsafe, Save, ZexaF, Aq0@a87O97lO, Kryptik, Eldorado, Attribute, HighConfidence, GenKryptik, FLEN, FileRepMalware, Generic@ML, RDML, 5lHt260cZuAqegRPvx+VfQ, kcloud, Sabsik, score, MachineLearning, Anomalous, 100%, Static AI, Malicious PE, HMPU, Genetic, confidence)
md5 3cb723cd64267d73d1c08867d4ea9909
sha256 c169596df6ecb34d460a6012d943e8014befa2f160c5dd8497bfaed4170c7cce
ssdeep 6144:Q/lKu9zuhs9cDhUim1CpfF0zvEkjOhRDljXlL4zUrx6Iw1M8zznDKO:qKUzusKDhB0CpNYyLp54dy
imphash d219b4c81d3038e0b353f2c453352508
impfuzzy 24:0OjCOovrN+sKdv/DHFJOrabiDl4FPRv9GtdklMVv8TJ3IjT4zlLHjMn09n3p+:vQ8sk+rhS9Gtd1WMczdNn5+
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x459010 InterlockedIncrement
 0x459014 WaitForSingleObject
 0x459018 SetEvent
 0x45901c GetSystemTimeAsFileTime
 0x459020 GetCommandLineA
 0x459024 WriteFileGather
 0x459028 CreateActCtxW
 0x45902c EnumResourceTypesA
 0x459030 GetEnvironmentStrings
 0x459034 GlobalAlloc
 0x459038 SizeofResource
 0x45903c LeaveCriticalSection
 0x459040 FindNextVolumeW
 0x459044 GetFileAttributesW
 0x459048 MapUserPhysicalPages
 0x45904c GetDevicePowerState
 0x459050 GetProcAddress
 0x459054 HeapSize
 0x459058 VerLanguageNameA
 0x45905c RemoveDirectoryA
 0x459060 GlobalGetAtomNameA
 0x459064 PrepareTape
 0x459068 WriteConsoleA
 0x45906c GetProcessId
 0x459070 WaitForMultipleObjects
 0x459074 GetModuleFileNameA
 0x459078 GetModuleHandleA
 0x45907c EndUpdateResourceA
 0x459080 FindFirstVolumeW
 0x459084 AddConsoleAliasA
 0x459088 LocalFree
 0x45908c lstrcpyW
 0x459090 GetLocaleInfoA
 0x459094 ReadFile
 0x459098 HeapReAlloc
 0x45909c GetLastError
 0x4590a0 HeapAlloc
 0x4590a4 GetStartupInfoA
 0x4590a8 SetHandleCount
 0x4590ac GetStdHandle
 0x4590b0 GetFileType
 0x4590b4 DeleteCriticalSection
 0x4590b8 SetFilePointer
 0x4590bc TerminateProcess
 0x4590c0 GetCurrentProcess
 0x4590c4 UnhandledExceptionFilter
 0x4590c8 SetUnhandledExceptionFilter
 0x4590cc IsDebuggerPresent
 0x4590d0 EnterCriticalSection
 0x4590d4 HeapCreate
 0x4590d8 VirtualFree
 0x4590dc HeapFree
 0x4590e0 VirtualAlloc
 0x4590e4 GetModuleHandleW
 0x4590e8 Sleep
 0x4590ec ExitProcess
 0x4590f0 WriteFile
 0x4590f4 FreeEnvironmentStringsA
 0x4590f8 FreeEnvironmentStringsW
 0x4590fc WideCharToMultiByte
 0x459100 GetEnvironmentStringsW
 0x459104 TlsGetValue
 0x459108 TlsAlloc
 0x45910c TlsSetValue
 0x459110 TlsFree
 0x459114 SetLastError
 0x459118 GetCurrentThreadId
 0x45911c InterlockedDecrement
 0x459120 QueryPerformanceCounter
 0x459124 GetTickCount
 0x459128 GetCurrentProcessId
 0x45912c InitializeCriticalSectionAndSpinCount
 0x459130 SetStdHandle
 0x459134 RtlUnwind
 0x459138 GetConsoleCP
 0x45913c GetConsoleMode
 0x459140 FlushFileBuffers
 0x459144 LoadLibraryA
 0x459148 GetCPInfo
 0x45914c GetACP
 0x459150 GetOEMCP
 0x459154 IsValidCodePage
 0x459158 GetConsoleOutputCP
 0x45915c WriteConsoleW
 0x459160 MultiByteToWideChar
 0x459164 LCMapStringA
 0x459168 LCMapStringW
 0x45916c GetStringTypeA
 0x459170 GetStringTypeW
 0x459174 CloseHandle
 0x459178 CreateFileA
USER32.dll
 0x459180 GetCursorPos
GDI32.dll
 0x459008 GetCharWidthFloatA
ADVAPI32.dll
 0x459000 DeregisterEventSource

EAT(Export Address Table) Library

0x401000 @SetFirstEverVice@8


Similarity measure (PE file only) - Checking for service failure