Report - hofile.exe

Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.10.04 16:21 Machine s1_win7_x6401
Filename hofile.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
2.0
ZERO API file : clean
VT API (file) 20 detected (malicious, high confidence, Unsafe, Save, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, score, Jaik, VirRansom, Static AI, Malicious PE, ai score=82, StopCrypt, Generic@ML, RDML, KjZMPWNEFFcuZzZPIhjHew, ZexaF, Hq0@aCxhExki)
md5 d111824423a23721dc128900f359067a
sha256 e1ed255245ed1a4380ffcdcf33d95873d110234601cce625305789bbf0695d84
ssdeep 12288:5cnmCXlQkA8Z20QQV0GyiZyU5mi428HMIc7wjr0zxp6L:56O78Z2iDXZyU5mi428HM7wf436L
imphash ea6e9add4feec4142f4eaf80b256f47a
impfuzzy 24:UokFQOovFPh71SFdED8SL7uJXOaV4wly1R+fjlntsMZ6LJ3NQuOZyvuTzZrnlejq:1AcPhwdJO2U+fRtsMZINsuuXZ7V
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x463000 HeapReAlloc
 0x463004 GlobalDeleteAtom
 0x463008 GetLocaleInfoA
 0x46300c InterlockedIncrement
 0x463010 GetQueuedCompletionStatus
 0x463014 ReadConsoleA
 0x463018 GetEnvironmentStringsW
 0x46301c SetEvent
 0x463020 GetCommandLineA
 0x463024 CreateActCtxW
 0x463028 GlobalAlloc
 0x46302c CopyFileW
 0x463030 FreeConsole
 0x463034 LeaveCriticalSection
 0x463038 HeapCreate
 0x46303c FindNextVolumeW
 0x463040 GetFileAttributesW
 0x463044 GetModuleFileNameW
 0x463048 lstrlenW
 0x46304c SetConsoleTitleA
 0x463050 FlushFileBuffers
 0x463054 DeactivateActCtx
 0x463058 InterlockedExchange
 0x46305c GetProcAddress
 0x463060 BeginUpdateResourceW
 0x463064 RemoveDirectoryA
 0x463068 VerLanguageNameW
 0x46306c WriteConsoleA
 0x463070 LocalAlloc
 0x463074 SetConsoleWindowInfo
 0x463078 GetTapeParameters
 0x46307c SetEnvironmentVariableA
 0x463080 SetConsoleTitleW
 0x463084 GetModuleHandleA
 0x463088 EraseTape
 0x46308c VirtualProtect
 0x463090 EndUpdateResourceA
 0x463094 FindFirstVolumeW
 0x463098 GetCurrentProcessId
 0x46309c GetPrivateProfileSectionW
 0x4630a0 FindNextVolumeA
 0x4630a4 lstrcpyW
 0x4630a8 CreateFileA
 0x4630ac WideCharToMultiByte
 0x4630b0 InterlockedDecrement
 0x4630b4 InterlockedCompareExchange
 0x4630b8 MultiByteToWideChar
 0x4630bc Sleep
 0x4630c0 InitializeCriticalSection
 0x4630c4 DeleteCriticalSection
 0x4630c8 EnterCriticalSection
 0x4630cc GetLastError
 0x4630d0 HeapFree
 0x4630d4 TerminateProcess
 0x4630d8 GetCurrentProcess
 0x4630dc UnhandledExceptionFilter
 0x4630e0 SetUnhandledExceptionFilter
 0x4630e4 IsDebuggerPresent
 0x4630e8 HeapAlloc
 0x4630ec GetStartupInfoW
 0x4630f0 GetCPInfo
 0x4630f4 RtlUnwind
 0x4630f8 RaiseException
 0x4630fc LCMapStringW
 0x463100 LCMapStringA
 0x463104 GetStringTypeW
 0x463108 VirtualFree
 0x46310c VirtualAlloc
 0x463110 GetModuleHandleW
 0x463114 TlsGetValue
 0x463118 TlsAlloc
 0x46311c TlsSetValue
 0x463120 TlsFree
 0x463124 SetLastError
 0x463128 GetCurrentThreadId
 0x46312c SetFilePointer
 0x463130 CloseHandle
 0x463134 ExitProcess
 0x463138 WriteFile
 0x46313c GetStdHandle
 0x463140 GetModuleFileNameA
 0x463144 FreeEnvironmentStringsW
 0x463148 GetCommandLineW
 0x46314c SetHandleCount
 0x463150 GetFileType
 0x463154 GetStartupInfoA
 0x463158 QueryPerformanceCounter
 0x46315c GetTickCount
 0x463160 GetSystemTimeAsFileTime
 0x463164 GetStringTypeA
 0x463168 HeapSize
 0x46316c GetACP
 0x463170 GetOEMCP
 0x463174 IsValidCodePage
 0x463178 GetUserDefaultLCID
 0x46317c EnumSystemLocalesA
 0x463180 IsValidLocale
 0x463184 InitializeCriticalSectionAndSpinCount
 0x463188 SetStdHandle
 0x46318c GetConsoleCP
 0x463190 GetConsoleMode
 0x463194 LoadLibraryA
 0x463198 GetLocaleInfoW
 0x46319c GetConsoleOutputCP
 0x4631a0 WriteConsoleW

EAT(Export Address Table) Library

0x401763 @GetFirstVice@8


Similarity measure (PE file only) - Checking for service failure