Report - bdxloc.jpg

Gen2 Gen1 Malicious Library PE File PE32 DLL
ScreenShot
Created 2021.10.14 07:55 Machine s1_win7_x6402
Filename bdxloc.jpg
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
1.4
ZERO API file : clean
VT API (file) 6 detected (malicious, high confidence, Unsafe, Sabsik, Static AI, Suspicious PE)
md5 07c2dc7047771b92bca28914cdfb4dad
sha256 0a29f3bbb012d4e71f0e9b147fc6bbf49a29809f1929861358f1a12804ea5556
ssdeep 12288:nZGQdqOGRFJqydLqQSeCqsVK8kPRGO35N9mV5zXc6:nZ0/WjeCVVK8kP9N9o1
imphash f3365777c64be56b4998dc4b02b58f1e
impfuzzy 48:FC/epupWdSyLnlILZTmccvIt1/jitRG1YwE0hE9c7ftc:FhcaSyLnl2T9cvIt1ZYUwelc
  Network IP location

Signature (5cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice File has been identified by 6 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system
info One or more processes crashed
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x42d000 CreateEventW
 0x42d004 GetVersion
 0x42d008 FindClose
 0x42d00c FindNextFileW
 0x42d010 FindFirstFileW
 0x42d014 TlsAlloc
 0x42d018 TlsSetValue
 0x42d01c GetTempPathW
 0x42d020 VirtualProtectEx
 0x42d024 GetCurrentDirectoryW
 0x42d028 GetWindowsDirectoryW
 0x42d02c OpenMutexW
 0x42d030 CompareStringW
 0x42d034 CompareStringA
 0x42d038 GetLocaleInfoW
 0x42d03c HeapSize
 0x42d040 GetTimeZoneInformation
 0x42d044 LCMapStringW
 0x42d048 LCMapStringA
 0x42d04c LoadLibraryA
 0x42d050 InterlockedExchange
 0x42d054 FreeLibrary
 0x42d058 SetConsoleCtrlHandler
 0x42d05c RtlUnwind
 0x42d060 InitializeCriticalSection
 0x42d064 GetSystemTimeAsFileTime
 0x42d068 GetCurrentProcessId
 0x42d06c GetTickCount
 0x42d070 QueryPerformanceCounter
 0x42d074 GetEnvironmentStringsW
 0x42d078 WideCharToMultiByte
 0x42d07c FreeEnvironmentStringsW
 0x42d080 GetEnvironmentStrings
 0x42d084 FreeEnvironmentStringsA
 0x42d088 GetStartupInfoA
 0x42d08c GetFileType
 0x42d090 SetHandleCount
 0x42d094 GetStringTypeW
 0x42d098 MultiByteToWideChar
 0x42d09c GetStringTypeA
 0x42d0a0 IsValidCodePage
 0x42d0a4 IsValidLocale
 0x42d0a8 EnumSystemLocalesA
 0x42d0ac GetLocaleInfoA
 0x42d0b0 GetUserDefaultLCID
 0x42d0b4 Sleep
 0x42d0b8 GetLastError
 0x42d0bc HeapReAlloc
 0x42d0c0 HeapAlloc
 0x42d0c4 HeapFree
 0x42d0c8 InterlockedIncrement
 0x42d0cc InterlockedDecrement
 0x42d0d0 GetCurrentThreadId
 0x42d0d4 GetCommandLineA
 0x42d0d8 GetVersionExA
 0x42d0dc GetProcessHeap
 0x42d0e0 DeleteCriticalSection
 0x42d0e4 LeaveCriticalSection
 0x42d0e8 FatalAppExitA
 0x42d0ec EnterCriticalSection
 0x42d0f0 HeapDestroy
 0x42d0f4 HeapCreate
 0x42d0f8 VirtualFree
 0x42d0fc VirtualAlloc
 0x42d100 TerminateProcess
 0x42d104 GetCurrentProcess
 0x42d108 UnhandledExceptionFilter
 0x42d10c SetUnhandledExceptionFilter
 0x42d110 IsDebuggerPresent
 0x42d114 GetProcAddress
 0x42d118 GetModuleHandleA
 0x42d11c ExitProcess
 0x42d120 WriteFile
 0x42d124 GetStdHandle
 0x42d128 GetModuleFileNameA
 0x42d12c GetCPInfo
 0x42d130 GetTimeFormatA
 0x42d134 GetDateFormatA
 0x42d138 TlsGetValue
 0x42d13c TlsFree
 0x42d140 SetLastError
 0x42d144 GetCurrentThread
 0x42d148 GetACP
 0x42d14c GetOEMCP
 0x42d150 SetEnvironmentVariableA
USER32.dll
 0x42d158 BeginDeferWindowPos
 0x42d15c DeferWindowPos
 0x42d160 GetPropW
 0x42d164 TranslateMessage
 0x42d168 UnregisterHotKey
 0x42d16c CreateMenu
 0x42d170 RegisterWindowMessageW
WinSCard.dll
 0x42d178 SCardLocateCardsByATRW
 0x42d17c SCardIsValidContext
 0x42d180 SCardLocateCardsA
 0x42d184 SCardListReaderGroupsW
 0x42d188 SCardReconnect
 0x42d18c SCardEndTransaction
 0x42d190 SCardReleaseContext
 0x42d194 SCardGetAttrib
 0x42d198 SCardLocateCardsW
 0x42d19c SCardIntroduceReaderGroupW
 0x42d1a0 SCardRemoveReaderFromGroupW
 0x42d1a4 SCardAccessStartedEvent
 0x42d1a8 SCardForgetReaderW
 0x42d1ac SCardGetStatusChangeW
 0x42d1b0 SCardEstablishContext
 0x42d1b4 SCardIntroduceReaderW
 0x42d1b8 SCardControl
 0x42d1bc SCardAddReaderToGroupW
 0x42d1c0 SCardForgetReaderGroupW
 0x42d1c4 SCardCancel
 0x42d1c8 SCardReleaseStartedEvent
 0x42d1cc SCardConnectW
 0x42d1d0 SCardBeginTransaction
 0x42d1d4 SCardListReadersW
 0x42d1d8 SCardDisconnect

EAT(Export Address Table) Library

0x41b980 DictionaryProcess
0x41ba10 Horsefraction
0x41bb20 Pitch


Similarity measure (PE file only) - Checking for service failure