Report - 123.dll

Emotet Gen1 UPX Malicious Library PE File PE32 OS Processor Check DLL
ScreenShot
Created 2021.10.14 15:38 Machine s1_win7_x6402
Filename 123.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
7.8
ZERO API file : clean
VT API (file) 17 detected (malicious, high confidence, Bulz, Trickster, confidence, Kryptik, HMWS, Trickpak, ai score=87, score, Trickbot, FTYL)
md5 584aa8473d873ecccb7601672550f4dc
sha256 0304fe2f5cbac1cc2e79bdbc8daa3824d6a8eb139f4d5bec7b57358cd4de8252
ssdeep 12288:izMrEY/8q9j0uOEcLmWtQqqCSoHhMVr9fC6n:Z/8e0vEcLmWKIwr9
imphash dc56e072f32d1e6dbbad8cbe6ec04fdb
impfuzzy 96:GNVtQ0Wojo14q2DsDe5rgvASQds4CDgWcncMrQPD:HcsDmrgvASQds4CHcncCQPD
  Network IP location

Signature (17cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch File has been identified by 17 AntiVirus engines on VirusTotal as malicious
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername

Rules (8cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_1_Zero Win32 Trojan Emotet binaries (upload)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://45.36.99.184/sat4/TEST22-PC_W617601.F57A8FB7AD33F1A6BBC8B31029F34741/5/file/ US TWC-11426-CAROLINAS 45.36.99.184 clean
179.189.229.254 BR America-NET Ltda. 179.189.229.254 mailcious
216.166.148.187 US CYBERNET1 216.166.148.187 mailcious
60.51.47.65 MY TM Net, Internet Service Provider 60.51.47.65 mailcious
185.56.175.122 PL Virtuaoperator Sp. z o.o. 185.56.175.122 mailcious
45.36.99.184 US TWC-11426-CAROLINAS 45.36.99.184 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1001d060 RtlUnwind
 0x1001d064 HeapAlloc
 0x1001d068 GetCommandLineA
 0x1001d06c HeapFree
 0x1001d070 RaiseException
 0x1001d074 VirtualAlloc
 0x1001d078 HeapReAlloc
 0x1001d07c HeapSize
 0x1001d080 Sleep
 0x1001d084 TerminateProcess
 0x1001d088 UnhandledExceptionFilter
 0x1001d08c SetUnhandledExceptionFilter
 0x1001d090 IsDebuggerPresent
 0x1001d094 GetACP
 0x1001d098 IsValidCodePage
 0x1001d09c LCMapStringA
 0x1001d0a0 LCMapStringW
 0x1001d0a4 VirtualFree
 0x1001d0a8 HeapCreate
 0x1001d0ac HeapDestroy
 0x1001d0b0 GetStdHandle
 0x1001d0b4 SetHandleCount
 0x1001d0b8 GetStartupInfoA
 0x1001d0bc FreeEnvironmentStringsA
 0x1001d0c0 GetEnvironmentStrings
 0x1001d0c4 FreeEnvironmentStringsW
 0x1001d0c8 GetEnvironmentStringsW
 0x1001d0cc QueryPerformanceCounter
 0x1001d0d0 GetTickCount
 0x1001d0d4 GetSystemTimeAsFileTime
 0x1001d0d8 InitializeCriticalSectionAndSpinCount
 0x1001d0dc GetConsoleCP
 0x1001d0e0 GetConsoleMode
 0x1001d0e4 GetStringTypeA
 0x1001d0e8 GetStringTypeW
 0x1001d0ec SetStdHandle
 0x1001d0f0 WriteConsoleA
 0x1001d0f4 GetConsoleOutputCP
 0x1001d0f8 WriteConsoleW
 0x1001d0fc CreateFileA
 0x1001d100 GetCurrentProcess
 0x1001d104 FlushFileBuffers
 0x1001d108 SetFilePointer
 0x1001d10c WriteFile
 0x1001d110 GetOEMCP
 0x1001d114 GetCPInfo
 0x1001d118 GetLocaleInfoA
 0x1001d11c InterlockedExchange
 0x1001d120 CloseHandle
 0x1001d124 GlobalFlags
 0x1001d128 TlsFree
 0x1001d12c DeleteCriticalSection
 0x1001d130 LocalReAlloc
 0x1001d134 TlsSetValue
 0x1001d138 TlsAlloc
 0x1001d13c InitializeCriticalSection
 0x1001d140 GlobalHandle
 0x1001d144 GlobalReAlloc
 0x1001d148 EnterCriticalSection
 0x1001d14c TlsGetValue
 0x1001d150 LeaveCriticalSection
 0x1001d154 LocalAlloc
 0x1001d158 InterlockedIncrement
 0x1001d15c GetModuleHandleW
 0x1001d160 GetCurrentProcessId
 0x1001d164 GetModuleFileNameA
 0x1001d168 InterlockedDecrement
 0x1001d16c lstrcmpA
 0x1001d170 GetCurrentThreadId
 0x1001d174 GlobalGetAtomNameA
 0x1001d178 GlobalAddAtomA
 0x1001d17c GlobalFindAtomA
 0x1001d180 GlobalDeleteAtom
 0x1001d184 FreeLibrary
 0x1001d188 CompareStringA
 0x1001d18c lstrcmpW
 0x1001d190 GetVersionExA
 0x1001d194 GlobalFree
 0x1001d198 GlobalAlloc
 0x1001d19c GlobalLock
 0x1001d1a0 GlobalUnlock
 0x1001d1a4 FormatMessageA
 0x1001d1a8 LocalFree
 0x1001d1ac MultiByteToWideChar
 0x1001d1b0 lstrlenA
 0x1001d1b4 LoadLibraryW
 0x1001d1b8 ExitProcess
 0x1001d1bc WideCharToMultiByte
 0x1001d1c0 FindResourceA
 0x1001d1c4 LoadResource
 0x1001d1c8 LockResource
 0x1001d1cc SizeofResource
 0x1001d1d0 GetLastError
 0x1001d1d4 SetLastError
 0x1001d1d8 GetProcAddress
 0x1001d1dc GetModuleHandleA
 0x1001d1e0 GetFileType
 0x1001d1e4 LoadLibraryA
USER32.dll
 0x1001d1fc PostQuitMessage
 0x1001d200 ValidateRect
 0x1001d204 DestroyMenu
 0x1001d208 LoadCursorA
 0x1001d20c GetSysColorBrush
 0x1001d210 GetWindowThreadProcessId
 0x1001d214 IsWindowEnabled
 0x1001d218 SetWindowTextA
 0x1001d21c SetMenuItemBitmaps
 0x1001d220 GetMenuCheckMarkDimensions
 0x1001d224 LoadBitmapA
 0x1001d228 ModifyMenuA
 0x1001d22c EnableMenuItem
 0x1001d230 CheckMenuItem
 0x1001d234 RegisterWindowMessageA
 0x1001d238 WinHelpA
 0x1001d23c GetCapture
 0x1001d240 CallNextHookEx
 0x1001d244 GetClassLongA
 0x1001d248 SetPropA
 0x1001d24c GetPropA
 0x1001d250 RemovePropA
 0x1001d254 GetFocus
 0x1001d258 IsWindow
 0x1001d25c GetWindowTextA
 0x1001d260 GetForegroundWindow
 0x1001d264 GetLastActivePopup
 0x1001d268 DispatchMessageA
 0x1001d26c GetDlgItem
 0x1001d270 GetTopWindow
 0x1001d274 DestroyWindow
 0x1001d278 UnhookWindowsHookEx
 0x1001d27c GetMessageTime
 0x1001d280 GetMessagePos
 0x1001d284 PeekMessageA
 0x1001d288 MapWindowPoints
 0x1001d28c GetKeyState
 0x1001d290 SetMenu
 0x1001d294 SetForegroundWindow
 0x1001d298 PostMessageA
 0x1001d29c MessageBoxA
 0x1001d2a0 CreateWindowExA
 0x1001d2a4 GetClassInfoExA
 0x1001d2a8 GetClassInfoA
 0x1001d2ac AdjustWindowRectEx
 0x1001d2b0 PtInRect
 0x1001d2b4 CopyRect
 0x1001d2b8 DrawTextA
 0x1001d2bc EnableWindow
 0x1001d2c0 GetDlgCtrlID
 0x1001d2c4 CallWindowProcA
 0x1001d2c8 GetMenu
 0x1001d2cc GetWindowLongA
 0x1001d2d0 SetWindowLongA
 0x1001d2d4 SetWindowPos
 0x1001d2d8 SystemParametersInfoA
 0x1001d2dc GetWindowPlacement
 0x1001d2e0 GetWindow
 0x1001d2e4 SetWindowsHookExA
 0x1001d2e8 SendMessageA
 0x1001d2ec GetWindowRect
 0x1001d2f0 GetClientRect
 0x1001d2f4 GetParent
 0x1001d2f8 GetSystemMetrics
 0x1001d2fc GetSysColor
 0x1001d300 GetDC
 0x1001d304 DefWindowProcA
 0x1001d308 RegisterClassA
 0x1001d30c IsIconic
 0x1001d310 LoadIconA
 0x1001d314 ReleaseDC
 0x1001d318 ClientToScreen
 0x1001d31c GrayStringA
 0x1001d320 DrawTextExA
 0x1001d324 TabbedTextOutA
 0x1001d328 GetMenuState
 0x1001d32c GetMenuItemID
 0x1001d330 GetMenuItemCount
 0x1001d334 GetSubMenu
 0x1001d338 GetClassNameA
GDI32.dll
 0x1001d000 DeleteDC
 0x1001d004 CreateBitmap
 0x1001d008 ScaleWindowExtEx
 0x1001d00c SetWindowExtEx
 0x1001d010 ScaleViewportExtEx
 0x1001d014 SetViewportExtEx
 0x1001d018 OffsetViewportOrgEx
 0x1001d01c SetViewportOrgEx
 0x1001d020 SelectObject
 0x1001d024 Escape
 0x1001d028 ExtTextOutA
 0x1001d02c TextOutA
 0x1001d030 RectVisible
 0x1001d034 DeleteObject
 0x1001d038 GetClipBox
 0x1001d03c SetMapMode
 0x1001d040 SetTextColor
 0x1001d044 SetBkColor
 0x1001d048 RestoreDC
 0x1001d04c SaveDC
 0x1001d050 GetDeviceCaps
 0x1001d054 GetStockObject
 0x1001d058 PtVisible
WINSPOOL.DRV
 0x1001d340 DocumentPropertiesA
 0x1001d344 OpenPrinterA
 0x1001d348 ClosePrinter
OLEAUT32.dll
 0x1001d1ec VariantClear
 0x1001d1f0 VariantChangeType
 0x1001d1f4 VariantInit

EAT(Export Address Table) Library

0x100020a0 DllRegisterServer


Similarity measure (PE file only) - Checking for service failure