Report - ds.exe

Malicious Library PE File PE32
ScreenShot
Created 2021.09.29 10:18 Machine s1_win7_x6402
Filename ds.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
2.8
ZERO API file : malware
VT API (file) 27 detected (Convagent, malicious, high confidence, Unsafe, Save, confidence, ZexaF, hq0@ae@PnUdO, Kryptik, Eldorado, Attribute, HighConfidence, HMQC, FileRepMalware, Emotet, Static AI, Malicious PE, Racealer, MachineLearning, Anomalous, R002H0CIR21, CLASSIC, Score, HMPX)
md5 1d29d6cd39010976adcb9fcba517f3bc
sha256 c27741b9e50da0c369b848179c9a4f9b0362b6d5e384055c6c72fc9667a270ec
ssdeep 1536:KWNxxYnM24WxbpPxwGOFJBszdNoyNA2kjh3uJp+Q7Jgz70xWAcfz:KqYsWY2zduyNA2kxqfPxjcfz
imphash 26b2a22c1afb78875d9384441bc03abe
impfuzzy 24:MiiIxOovrVpEdv/DozkUEbQCqlvfdYA+yvgOtyFQ8J3IjT4zluZwjMF9z3n:UQVMlUJpvfNH7tMMczsVz3
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
172.67.188.154 US CLOUDFLARENET 172.67.188.154 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40f000 HeapReAlloc
 0x40f004 GetLocaleInfoA
 0x40f008 LoadResource
 0x40f00c InterlockedIncrement
 0x40f010 GetEnvironmentStringsW
 0x40f014 AddConsoleAliasW
 0x40f018 SetEvent
 0x40f01c GetSystemTimeAsFileTime
 0x40f020 GetCommandLineA
 0x40f024 WriteFileGather
 0x40f028 CreateActCtxW
 0x40f02c EnumResourceTypesA
 0x40f030 LeaveCriticalSection
 0x40f034 GetFileAttributesA
 0x40f038 ReadFile
 0x40f03c GetDevicePowerState
 0x40f040 GetProcAddress
 0x40f044 VerLanguageNameA
 0x40f048 FreeUserPhysicalPages
 0x40f04c WriteConsoleA
 0x40f050 GetProcessId
 0x40f054 LocalAlloc
 0x40f058 RemoveDirectoryW
 0x40f05c GlobalGetAtomNameW
 0x40f060 WaitForMultipleObjects
 0x40f064 GetModuleFileNameA
 0x40f068 GetModuleHandleA
 0x40f06c UpdateResourceW
 0x40f070 EraseTape
 0x40f074 GetStringTypeW
 0x40f078 OpenSemaphoreW
 0x40f07c ReleaseMutex
 0x40f080 EndUpdateResourceA
 0x40f084 LocalSize
 0x40f088 FindFirstVolumeW
 0x40f08c FindNextVolumeA
 0x40f090 lstrcpyW
 0x40f094 HeapAlloc
 0x40f098 GetStartupInfoA
 0x40f09c DeleteCriticalSection
 0x40f0a0 EnterCriticalSection
 0x40f0a4 HeapFree
 0x40f0a8 VirtualFree
 0x40f0ac VirtualAlloc
 0x40f0b0 HeapCreate
 0x40f0b4 GetModuleHandleW
 0x40f0b8 Sleep
 0x40f0bc ExitProcess
 0x40f0c0 WriteFile
 0x40f0c4 GetStdHandle
 0x40f0c8 SetHandleCount
 0x40f0cc GetFileType
 0x40f0d0 GetLastError
 0x40f0d4 SetFilePointer
 0x40f0d8 TerminateProcess
 0x40f0dc GetCurrentProcess
 0x40f0e0 UnhandledExceptionFilter
 0x40f0e4 SetUnhandledExceptionFilter
 0x40f0e8 IsDebuggerPresent
 0x40f0ec FreeEnvironmentStringsA
 0x40f0f0 GetEnvironmentStrings
 0x40f0f4 FreeEnvironmentStringsW
 0x40f0f8 WideCharToMultiByte
 0x40f0fc TlsGetValue
 0x40f100 TlsAlloc
 0x40f104 TlsSetValue
 0x40f108 TlsFree
 0x40f10c SetLastError
 0x40f110 GetCurrentThreadId
 0x40f114 InterlockedDecrement
 0x40f118 QueryPerformanceCounter
 0x40f11c GetTickCount
 0x40f120 GetCurrentProcessId
 0x40f124 InitializeCriticalSectionAndSpinCount
 0x40f128 RtlUnwind
 0x40f12c LoadLibraryA
 0x40f130 SetStdHandle
 0x40f134 GetConsoleCP
 0x40f138 GetConsoleMode
 0x40f13c FlushFileBuffers
 0x40f140 GetCPInfo
 0x40f144 GetACP
 0x40f148 GetOEMCP
 0x40f14c IsValidCodePage
 0x40f150 HeapSize
 0x40f154 GetConsoleOutputCP
 0x40f158 WriteConsoleW
 0x40f15c MultiByteToWideChar
 0x40f160 LCMapStringA
 0x40f164 LCMapStringW
 0x40f168 GetStringTypeA
 0x40f16c CloseHandle
 0x40f170 CreateFileA
USER32.dll
 0x40f178 GetCursorPos

EAT(Export Address Table) Library

0x401000 @SetViceVariants@12


Similarity measure (PE file only) - Checking for service failure