Report - sefile.exe

Darkside Ransomware Cobalt Strike Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2021.11.13 11:18 Machine s1_win7_x6403
Filename sefile.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
1.8
ZERO API file : clean
VT API (file) 20 detected (malicious, high confidence, Unsafe, Kryptik, Eldorado, A + Troj, Krypt, Azorult, Sabsik, score, ET#90%, RDMK, cmRtazppjpupT5vzmNCPwr2BvvYN, Static AI, Malicious PE, confidence, susgen)
md5 e05a1928cd4ad6e8ffd8258bf653670b
sha256 0f8e043385e5b08919a340fdf4d1178e7e8c9c2a6272bda0710e47468b0656c3
ssdeep 12288:zLMvCZsSClU95RL4zhsN6wohblWZcGJ2:zLN2Soq5RLohw/F66
imphash ea99ca467492cc4d133feba5a83ca2ae
impfuzzy 48:kpfxgRG7buvKzmNAGJ9GRY8OuNYcHK9ftfcczVJlyAD:P4jWAGJwK8RYcHQftfcczVJlr
  Network IP location

Signature (4cnts)

Level Description
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
danger Trojan_DarkSide_Ransomware_1_Zero Darkside Ransomware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x401008 GetConsoleAliasesLengthW
 0x40100c TlsGetValue
 0x401010 CommConfigDialogA
 0x401014 LoadResource
 0x401018 SetDllDirectoryW
 0x40101c InterlockedIncrement
 0x401020 _lwrite
 0x401024 ZombifyActCtx
 0x401028 GetSystemWindowsDirectoryW
 0x40102c GetNamedPipeHandleStateA
 0x401030 SetConsoleScreenBufferSize
 0x401034 FreeEnvironmentStringsA
 0x401038 CreateNamedPipeW
 0x40103c GetSystemTimeAsFileTime
 0x401040 ReadConsoleW
 0x401044 GetWindowsDirectoryA
 0x401048 GetSystemWow64DirectoryA
 0x40104c QueryActCtxW
 0x401050 GetSystemTimes
 0x401054 GetDriveTypeA
 0x401058 GetSystemDirectoryW
 0x40105c GlobalFindAtomA
 0x401060 GetConsoleMode
 0x401064 CopyFileW
 0x401068 SetVolumeMountPointA
 0x40106c GetVersionExW
 0x401070 HeapValidate
 0x401074 GetVolumePathNamesForVolumeNameW
 0x401078 GetModuleFileNameW
 0x40107c CreateActCtxA
 0x401080 CompareStringW
 0x401084 GetACP
 0x401088 lstrlenW
 0x40108c VerifyVersionInfoW
 0x401090 GetStartupInfoA
 0x401094 FindFirstFileExA
 0x401098 SearchPathW
 0x40109c GetLastError
 0x4010a0 IsDBCSLeadByteEx
 0x4010a4 GetCurrentDirectoryW
 0x4010a8 SetLastError
 0x4010ac GetProcAddress
 0x4010b0 GetLongPathNameA
 0x4010b4 SetFirmwareEnvironmentVariableW
 0x4010b8 CopyFileA
 0x4010bc GetConsoleDisplayMode
 0x4010c0 GlobalGetAtomNameA
 0x4010c4 BuildCommDCBW
 0x4010c8 GetPrivateProfileStringA
 0x4010cc LoadLibraryA
 0x4010d0 OpenWaitableTimerW
 0x4010d4 LocalAlloc
 0x4010d8 IsWow64Process
 0x4010dc WritePrivateProfileStringA
 0x4010e0 SetCurrentDirectoryW
 0x4010e4 SetFileApisToANSI
 0x4010e8 QueryDosDeviceW
 0x4010ec GetModuleFileNameA
 0x4010f0 WriteProfileStringA
 0x4010f4 GetModuleHandleA
 0x4010f8 FindFirstChangeNotificationA
 0x4010fc CreateWaitableTimerW
 0x401100 GetFileTime
 0x401104 GetConsoleCursorInfo
 0x401108 SetProcessShutdownParameters
 0x40110c ReadConsoleInputW
 0x401110 FileTimeToLocalFileTime
 0x401114 TlsFree
 0x401118 GetProfileSectionW
 0x40111c CloseHandle
 0x401120 SetStdHandle
 0x401124 GetHandleInformation
 0x401128 GetComputerNameA
 0x40112c DeleteFileA
 0x401130 MultiByteToWideChar
 0x401134 GetCommandLineA
 0x401138 HeapSetInformation
 0x40113c GetStartupInfoW
 0x401140 IsProcessorFeaturePresent
 0x401144 EncodePointer
 0x401148 DecodePointer
 0x40114c InterlockedDecrement
 0x401150 GetOEMCP
 0x401154 GetCPInfo
 0x401158 IsValidCodePage
 0x40115c TlsAlloc
 0x401160 TlsSetValue
 0x401164 GetCurrentThreadId
 0x401168 GetModuleHandleW
 0x40116c EnterCriticalSection
 0x401170 LeaveCriticalSection
 0x401174 SetHandleCount
 0x401178 GetStdHandle
 0x40117c InitializeCriticalSectionAndSpinCount
 0x401180 GetFileType
 0x401184 DeleteCriticalSection
 0x401188 TerminateProcess
 0x40118c GetCurrentProcess
 0x401190 UnhandledExceptionFilter
 0x401194 SetUnhandledExceptionFilter
 0x401198 IsDebuggerPresent
 0x40119c QueryPerformanceCounter
 0x4011a0 GetTickCount
 0x4011a4 GetCurrentProcessId
 0x4011a8 ExitProcess
 0x4011ac FreeEnvironmentStringsW
 0x4011b0 WideCharToMultiByte
 0x4011b4 GetEnvironmentStringsW
 0x4011b8 IsBadReadPtr
 0x4011bc HeapCreate
 0x4011c0 WriteFile
 0x4011c4 RaiseException
 0x4011c8 GetStringTypeW
 0x4011cc OutputDebugStringA
 0x4011d0 WriteConsoleW
 0x4011d4 OutputDebugStringW
 0x4011d8 LoadLibraryW
 0x4011dc RtlUnwind
 0x4011e0 LCMapStringW
 0x4011e4 SetFilePointer
 0x4011e8 GetConsoleCP
 0x4011ec HeapAlloc
 0x4011f0 HeapReAlloc
 0x4011f4 HeapSize
 0x4011f8 HeapQueryInformation
 0x4011fc HeapFree
 0x401200 FlushFileBuffers
 0x401204 CreateFileW
USER32.dll
 0x40120c GetMessageTime
GDI32.dll
 0x401000 GetBitmapBits

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure