ScreenShot
Created | 2021.10.16 09:44 | Machine | s1_win7_x6401 |
Filename | TimeLimit.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 20 detected (Aexlz, WinlogonHook, NG0@aeXlZ3mO, Attribute, HighConfidence, Malicious, FileRepMalware, ai score=80, Rundis, Static AI, Suspicious PE, Unsafe, Score) | ||
md5 | 465784e139b2fb62fa2ee0cce3ee5551 | ||
sha256 | 2fb141022b005c0cd9836a27a0679f10816a468855107d515bc7e4d658217f0a | ||
ssdeep | 6144:JVz/6wB7zS96GyZzlhWIUiOjD7jiH4/a7+9spfnuHifcYcn8oS:JVDpBqa9U3iHGa7jxDcqoS | ||
imphash | f8afebc5e4c1593e64efcf788d8c65a3 | ||
impfuzzy | 6:dBJAEHGDzyRlbRmVOZ/EwVdZuVM4PioOQyLn3E7s2b0TSMyyTch:VA/DzqYOZ9VJ4KT9j3EjITC |
Network IP location
Signature (10cnts)
Level | Description |
---|---|
warning | File has been identified by 20 AntiVirus engines on VirusTotal as malicious |
watch | Disables Windows' Task Manager |
watch | Installs itself for autorun at Windows startup |
watch | Uses suspicious command line tools or Windows utilities |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Creates a suspicious process |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is compressed using UPX |
info | Checks amount of memory in system |
info | Command line console output was observed |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Crossrider_Adware_IN | Crossrider Adware | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.DLL
0x4b0d3c LoadLibraryA
0x4b0d40 GetProcAddress
0x4b0d44 VirtualProtect
0x4b0d48 VirtualAlloc
0x4b0d4c VirtualFree
0x4b0d50 ExitProcess
advapi32.dll
0x4b0d58 RegFlushKey
comctl32.dll
0x4b0d60 ImageList_Add
gdi32.dll
0x4b0d68 SaveDC
NetApi32.dll
0x4b0d70 NetUserEnum
oleaut32.dll
0x4b0d78 VariantCopy
shell32.dll
0x4b0d80 Shell_NotifyIconA
user32.dll
0x4b0d88 GetDC
version.dll
0x4b0d90 VerQueryValueA
EAT(Export Address Table) is none
KERNEL32.DLL
0x4b0d3c LoadLibraryA
0x4b0d40 GetProcAddress
0x4b0d44 VirtualProtect
0x4b0d48 VirtualAlloc
0x4b0d4c VirtualFree
0x4b0d50 ExitProcess
advapi32.dll
0x4b0d58 RegFlushKey
comctl32.dll
0x4b0d60 ImageList_Add
gdi32.dll
0x4b0d68 SaveDC
NetApi32.dll
0x4b0d70 NetUserEnum
oleaut32.dll
0x4b0d78 VariantCopy
shell32.dll
0x4b0d80 Shell_NotifyIconA
user32.dll
0x4b0d88 GetDC
version.dll
0x4b0d90 VerQueryValueA
EAT(Export Address Table) is none