ScreenShot
Created | 2022.01.17 17:39 | Machine | s1_win7_x6401 |
Filename | .csrss.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 24 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Save, confidence, 100%, Kryptik, Eldorado, Attribute, HighConfidence, Mikey, Convagent, FileRepMalware, MultiPlug, Krypt, Krypter, Artemis, Static AI, Malicious PE) | ||
md5 | 917673e1f99f2450c9274a482a0862b8 | ||
sha256 | 7218c94691a6d69887f816cd92e30530698611c4f94e1f50eeb239f2bd3eeb3a | ||
ssdeep | 6144:wiZbBZ0ofpD+al3RkSgSpDsVVmLlQjJkWO+Wjxr2jiuJwEiOH7b/IYs:wQVmoRD++KXSpDsVVmCjJkWO+Wjxajmq | ||
imphash | bed56fcc334b35bbcbc5c3e5d6f4e894 | ||
impfuzzy | 96:hoscMxvBWPTUhpxX8PiXFJoGWn6DC6GIt+gQfc1GVULMhC:CYBWPTUtsPiX0oDsk |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
warning | File has been identified by 24 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Foreign language identified in PE resource |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x401000 HeapLock
0x401004 GetExitCodeProcess
0x401008 DeactivateActCtx
0x40100c GetVersionExW
0x401010 GetConsoleCP
0x401014 GetConsoleAliasesLengthA
0x401018 GetDefaultCommConfigA
0x40101c FindFirstFileExA
0x401020 GetDriveTypeA
0x401024 FreeEnvironmentStringsW
0x401028 SetProcessPriorityBoost
0x40102c SetVolumeMountPointW
0x401030 SetCurrentDirectoryW
0x401034 GetLongPathNameA
0x401038 CopyFileW
0x40103c TlsGetValue
0x401040 GetConsoleCursorInfo
0x401044 SetComputerNameExW
0x401048 SystemTimeToTzSpecificLocalTime
0x40104c FindAtomA
0x401050 ReleaseSemaphore
0x401054 CallNamedPipeW
0x401058 CreateMailslotW
0x40105c BuildCommDCBAndTimeoutsA
0x401060 VirtualProtect
0x401064 LoadLibraryA
0x401068 LocalAlloc
0x40106c TryEnterCriticalSection
0x401070 GetCommandLineA
0x401074 InterlockedDecrement
0x401078 GetCalendarInfoW
0x40107c DeleteFileA
0x401080 CreateActCtxW
0x401084 OutputDebugStringA
0x401088 SetSystemTimeAdjustment
0x40108c SetPriorityClass
0x401090 WritePrivateProfileStringW
0x401094 GetProcessHeaps
0x401098 GlobalUnWire
0x40109c GetProcessHeap
0x4010a0 GetStartupInfoW
0x4010a4 GetDiskFreeSpaceExW
0x4010a8 GetCPInfoExW
0x4010ac GetWindowsDirectoryA
0x4010b0 GetSystemWow64DirectoryW
0x4010b4 GetProfileStringA
0x4010b8 WriteProfileSectionA
0x4010bc GetProfileStringW
0x4010c0 SetLastError
0x4010c4 DeleteVolumeMountPointW
0x4010c8 DebugBreak
0x4010cc GetPrivateProfileSectionW
0x4010d0 lstrcmpA
0x4010d4 ReadFileScatter
0x4010d8 GetSystemWindowsDirectoryA
0x4010dc TerminateProcess
0x4010e0 GlobalFindAtomW
0x4010e4 FindCloseChangeNotification
0x4010e8 SetTapeParameters
0x4010ec SetMailslotInfo
0x4010f0 InterlockedExchange
0x4010f4 DefineDosDeviceW
0x4010f8 FindVolumeMountPointClose
0x4010fc EndUpdateResourceA
0x401100 WriteConsoleA
0x401104 GetSystemTimeAdjustment
0x401108 GetPrivateProfileSectionA
0x40110c WritePrivateProfileSectionA
0x401110 GetPrivateProfileStructW
0x401114 GetFileAttributesExW
0x401118 FileTimeToLocalFileTime
0x40111c MoveFileA
0x401120 GetVolumePathNameA
0x401124 HeapUnlock
0x401128 lstrcmpW
0x40112c SetDefaultCommConfigA
0x401130 FindActCtxSectionGuid
0x401134 SetThreadContext
0x401138 MoveFileExW
0x40113c GlobalUnlock
0x401140 UnregisterWaitEx
0x401144 BuildCommDCBA
0x401148 PeekConsoleInputW
0x40114c OpenEventW
0x401150 TransmitCommChar
0x401154 WaitNamedPipeA
0x401158 GetPrivateProfileSectionNamesW
0x40115c FindResourceExA
0x401160 EnumTimeFormatsW
0x401164 GetLocalTime
0x401168 SetLocalTime
0x40116c OpenSemaphoreA
0x401170 GetProcAddress
0x401174 SetFileShortNameA
0x401178 lstrcpyW
0x40117c VerLanguageNameW
0x401180 SetThreadExecutionState
0x401184 SetSystemTime
0x401188 SetConsoleCP
0x40118c GetConsoleAliasW
0x401190 FlushConsoleInputBuffer
0x401194 AllocConsole
0x401198 GetAtomNameW
0x40119c WriteConsoleInputA
0x4011a0 TransactNamedPipe
0x4011a4 EnumDateFormatsW
0x4011a8 GetCommState
0x4011ac LockFile
0x4011b0 _lopen
0x4011b4 GetWriteWatch
0x4011b8 SetConsoleMode
0x4011bc GetModuleHandleA
0x4011c0 WriteConsoleOutputCharacterA
0x4011c4 GetConsoleAliasExesLengthA
0x4011c8 HeapReAlloc
0x4011cc GetLastError
0x4011d0 GetCommMask
0x4011d4 SetFilePointer
0x4011d8 CancelWaitableTimer
0x4011dc GetProcessHandleCount
0x4011e0 GetCurrentProcessId
0x4011e4 SetNamedPipeHandleState
0x4011e8 GetCompressedFileSizeA
0x4011ec FindNextVolumeMountPointW
0x4011f0 GetFullPathNameA
0x4011f4 WriteProfileStringA
0x4011f8 DeleteAtom
0x4011fc GlobalAddAtomW
0x401200 AssignProcessToJobObject
0x401204 QueryDosDeviceW
0x401208 InitializeCriticalSection
0x40120c Process32FirstW
0x401210 GetBinaryTypeA
0x401214 CreateIoCompletionPort
0x401218 UnhandledExceptionFilter
0x40121c SetUnhandledExceptionFilter
0x401220 RaiseException
0x401224 GetStartupInfoA
0x401228 HeapValidate
0x40122c IsBadReadPtr
0x401230 DeleteCriticalSection
0x401234 EnterCriticalSection
0x401238 LeaveCriticalSection
0x40123c GetModuleFileNameW
0x401240 GetCurrentProcess
0x401244 IsDebuggerPresent
0x401248 GetModuleHandleW
0x40124c Sleep
0x401250 InterlockedIncrement
0x401254 ExitProcess
0x401258 GetModuleFileNameA
0x40125c WriteFile
0x401260 GetStdHandle
0x401264 SetHandleCount
0x401268 GetFileType
0x40126c QueryPerformanceCounter
0x401270 GetTickCount
0x401274 GetCurrentThreadId
0x401278 GetSystemTimeAsFileTime
0x40127c FreeEnvironmentStringsA
0x401280 GetEnvironmentStrings
0x401284 WideCharToMultiByte
0x401288 GetEnvironmentStringsW
0x40128c TlsAlloc
0x401290 TlsSetValue
0x401294 TlsFree
0x401298 HeapDestroy
0x40129c HeapCreate
0x4012a0 HeapFree
0x4012a4 VirtualFree
0x4012a8 HeapAlloc
0x4012ac HeapSize
0x4012b0 VirtualAlloc
0x4012b4 GetACP
0x4012b8 GetOEMCP
0x4012bc GetCPInfo
0x4012c0 IsValidCodePage
0x4012c4 RtlUnwind
0x4012c8 InitializeCriticalSectionAndSpinCount
0x4012cc WriteConsoleW
0x4012d0 OutputDebugStringW
0x4012d4 LoadLibraryW
0x4012d8 GetConsoleMode
0x4012dc MultiByteToWideChar
0x4012e0 LCMapStringA
0x4012e4 LCMapStringW
0x4012e8 GetStringTypeA
0x4012ec GetStringTypeW
0x4012f0 GetLocaleInfoA
0x4012f4 FlushFileBuffers
0x4012f8 SetStdHandle
0x4012fc GetConsoleOutputCP
0x401300 CloseHandle
0x401304 CreateFileA
USER32.dll
0x40130c OemToCharW
EAT(Export Address Table) is none
KERNEL32.dll
0x401000 HeapLock
0x401004 GetExitCodeProcess
0x401008 DeactivateActCtx
0x40100c GetVersionExW
0x401010 GetConsoleCP
0x401014 GetConsoleAliasesLengthA
0x401018 GetDefaultCommConfigA
0x40101c FindFirstFileExA
0x401020 GetDriveTypeA
0x401024 FreeEnvironmentStringsW
0x401028 SetProcessPriorityBoost
0x40102c SetVolumeMountPointW
0x401030 SetCurrentDirectoryW
0x401034 GetLongPathNameA
0x401038 CopyFileW
0x40103c TlsGetValue
0x401040 GetConsoleCursorInfo
0x401044 SetComputerNameExW
0x401048 SystemTimeToTzSpecificLocalTime
0x40104c FindAtomA
0x401050 ReleaseSemaphore
0x401054 CallNamedPipeW
0x401058 CreateMailslotW
0x40105c BuildCommDCBAndTimeoutsA
0x401060 VirtualProtect
0x401064 LoadLibraryA
0x401068 LocalAlloc
0x40106c TryEnterCriticalSection
0x401070 GetCommandLineA
0x401074 InterlockedDecrement
0x401078 GetCalendarInfoW
0x40107c DeleteFileA
0x401080 CreateActCtxW
0x401084 OutputDebugStringA
0x401088 SetSystemTimeAdjustment
0x40108c SetPriorityClass
0x401090 WritePrivateProfileStringW
0x401094 GetProcessHeaps
0x401098 GlobalUnWire
0x40109c GetProcessHeap
0x4010a0 GetStartupInfoW
0x4010a4 GetDiskFreeSpaceExW
0x4010a8 GetCPInfoExW
0x4010ac GetWindowsDirectoryA
0x4010b0 GetSystemWow64DirectoryW
0x4010b4 GetProfileStringA
0x4010b8 WriteProfileSectionA
0x4010bc GetProfileStringW
0x4010c0 SetLastError
0x4010c4 DeleteVolumeMountPointW
0x4010c8 DebugBreak
0x4010cc GetPrivateProfileSectionW
0x4010d0 lstrcmpA
0x4010d4 ReadFileScatter
0x4010d8 GetSystemWindowsDirectoryA
0x4010dc TerminateProcess
0x4010e0 GlobalFindAtomW
0x4010e4 FindCloseChangeNotification
0x4010e8 SetTapeParameters
0x4010ec SetMailslotInfo
0x4010f0 InterlockedExchange
0x4010f4 DefineDosDeviceW
0x4010f8 FindVolumeMountPointClose
0x4010fc EndUpdateResourceA
0x401100 WriteConsoleA
0x401104 GetSystemTimeAdjustment
0x401108 GetPrivateProfileSectionA
0x40110c WritePrivateProfileSectionA
0x401110 GetPrivateProfileStructW
0x401114 GetFileAttributesExW
0x401118 FileTimeToLocalFileTime
0x40111c MoveFileA
0x401120 GetVolumePathNameA
0x401124 HeapUnlock
0x401128 lstrcmpW
0x40112c SetDefaultCommConfigA
0x401130 FindActCtxSectionGuid
0x401134 SetThreadContext
0x401138 MoveFileExW
0x40113c GlobalUnlock
0x401140 UnregisterWaitEx
0x401144 BuildCommDCBA
0x401148 PeekConsoleInputW
0x40114c OpenEventW
0x401150 TransmitCommChar
0x401154 WaitNamedPipeA
0x401158 GetPrivateProfileSectionNamesW
0x40115c FindResourceExA
0x401160 EnumTimeFormatsW
0x401164 GetLocalTime
0x401168 SetLocalTime
0x40116c OpenSemaphoreA
0x401170 GetProcAddress
0x401174 SetFileShortNameA
0x401178 lstrcpyW
0x40117c VerLanguageNameW
0x401180 SetThreadExecutionState
0x401184 SetSystemTime
0x401188 SetConsoleCP
0x40118c GetConsoleAliasW
0x401190 FlushConsoleInputBuffer
0x401194 AllocConsole
0x401198 GetAtomNameW
0x40119c WriteConsoleInputA
0x4011a0 TransactNamedPipe
0x4011a4 EnumDateFormatsW
0x4011a8 GetCommState
0x4011ac LockFile
0x4011b0 _lopen
0x4011b4 GetWriteWatch
0x4011b8 SetConsoleMode
0x4011bc GetModuleHandleA
0x4011c0 WriteConsoleOutputCharacterA
0x4011c4 GetConsoleAliasExesLengthA
0x4011c8 HeapReAlloc
0x4011cc GetLastError
0x4011d0 GetCommMask
0x4011d4 SetFilePointer
0x4011d8 CancelWaitableTimer
0x4011dc GetProcessHandleCount
0x4011e0 GetCurrentProcessId
0x4011e4 SetNamedPipeHandleState
0x4011e8 GetCompressedFileSizeA
0x4011ec FindNextVolumeMountPointW
0x4011f0 GetFullPathNameA
0x4011f4 WriteProfileStringA
0x4011f8 DeleteAtom
0x4011fc GlobalAddAtomW
0x401200 AssignProcessToJobObject
0x401204 QueryDosDeviceW
0x401208 InitializeCriticalSection
0x40120c Process32FirstW
0x401210 GetBinaryTypeA
0x401214 CreateIoCompletionPort
0x401218 UnhandledExceptionFilter
0x40121c SetUnhandledExceptionFilter
0x401220 RaiseException
0x401224 GetStartupInfoA
0x401228 HeapValidate
0x40122c IsBadReadPtr
0x401230 DeleteCriticalSection
0x401234 EnterCriticalSection
0x401238 LeaveCriticalSection
0x40123c GetModuleFileNameW
0x401240 GetCurrentProcess
0x401244 IsDebuggerPresent
0x401248 GetModuleHandleW
0x40124c Sleep
0x401250 InterlockedIncrement
0x401254 ExitProcess
0x401258 GetModuleFileNameA
0x40125c WriteFile
0x401260 GetStdHandle
0x401264 SetHandleCount
0x401268 GetFileType
0x40126c QueryPerformanceCounter
0x401270 GetTickCount
0x401274 GetCurrentThreadId
0x401278 GetSystemTimeAsFileTime
0x40127c FreeEnvironmentStringsA
0x401280 GetEnvironmentStrings
0x401284 WideCharToMultiByte
0x401288 GetEnvironmentStringsW
0x40128c TlsAlloc
0x401290 TlsSetValue
0x401294 TlsFree
0x401298 HeapDestroy
0x40129c HeapCreate
0x4012a0 HeapFree
0x4012a4 VirtualFree
0x4012a8 HeapAlloc
0x4012ac HeapSize
0x4012b0 VirtualAlloc
0x4012b4 GetACP
0x4012b8 GetOEMCP
0x4012bc GetCPInfo
0x4012c0 IsValidCodePage
0x4012c4 RtlUnwind
0x4012c8 InitializeCriticalSectionAndSpinCount
0x4012cc WriteConsoleW
0x4012d0 OutputDebugStringW
0x4012d4 LoadLibraryW
0x4012d8 GetConsoleMode
0x4012dc MultiByteToWideChar
0x4012e0 LCMapStringA
0x4012e4 LCMapStringW
0x4012e8 GetStringTypeA
0x4012ec GetStringTypeW
0x4012f0 GetLocaleInfoA
0x4012f4 FlushFileBuffers
0x4012f8 SetStdHandle
0x4012fc GetConsoleOutputCP
0x401300 CloseHandle
0x401304 CreateFileA
USER32.dll
0x40130c OemToCharW
EAT(Export Address Table) is none