ScreenShot
Created | 2022.12.07 09:44 | Machine | s1_win7_x6403 |
Filename | s2lub.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 35 detected (Jaik, Unsafe, None, Redline, Eldorado, Attribute, HighConfidence, malicious, high confidence, Kryptik, HRVP, Strab, PWSX, StealerNET, YXCLFZ, moderate, score, Static AI, Suspicious PE, kcloud, Detected, Artemis, ai score=87, Generic@AI, RDML, 9UK+llQfcxDcPDD71Q, Outbreak, susgen, HRVA) | ||
md5 | 2c7867a1749edef10274f3e34b047865 | ||
sha256 | 8845215ed3299ff3381580ab3c1e1feb69d8c44361bc15d64b57a597147a74c7 | ||
ssdeep | 12288:p7HdieNsYHk31Qb9b01KCgZg7bn8eI3ilumDo+Wxga7oRFL:q31Qxg1K/g7z8r3iC+Qf0L | ||
imphash | 3a25e3f90ed97610850855a91e61572c | ||
impfuzzy | 24:9brXYEO2teS1Nv6hlJnc+pl3eDo/Y2OovSOuFZMvalRZHu95TZGMa:9br82teS1Nv65c+ppsRguFZGC |
Network IP location
Signature (26cnts)
Level | Description |
---|---|
danger | Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | Executed a process and injected code into it |
danger | File has been identified by 35 AntiVirus engines on VirusTotal as malicious |
warning | Generates some ICMP traffic |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Collects information about installed applications |
watch | Communicates with host for which no DNS query was performed |
watch | Harvests credentials from local FTP client softwares |
watch | One or more of the buffers contains an embedded PE file |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | One or more potentially interesting buffers were extracted |
notice | Queries for potentially installed applications |
notice | Steals private information from local Internet browsers |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
info | This executable has a PDB path |
info | Tries to locate where the browsers are installed |
info | Uses Windows APIs to generate a cryptographic key |
Rules (14cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | RedLine_Stealer_m_Zero | RedLine stealer | memory |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | anti_dbg | Checks if being debugged | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
Network (56cnts) ?
Suricata ids
PE API
IAT(Import Address Table) Library
SHELL32.dll
0x446158 CommandLineToArgvW
0x44615c SHGetFolderPathAndSubDirW
ADVAPI32.dll
0x446000 GetLengthSid
KERNEL32.dll
0x446008 ReadFile
0x44600c ReadConsoleW
0x446010 GetModuleHandleExW
0x446014 GetCommandLineW
0x446018 GetCurrentProcess
0x44601c FreeConsole
0x446020 LocalFree
0x446024 UnhandledExceptionFilter
0x446028 SetUnhandledExceptionFilter
0x44602c TerminateProcess
0x446030 IsProcessorFeaturePresent
0x446034 QueryPerformanceCounter
0x446038 GetCurrentProcessId
0x44603c GetCurrentThreadId
0x446040 GetSystemTimeAsFileTime
0x446044 InitializeSListHead
0x446048 IsDebuggerPresent
0x44604c GetStartupInfoW
0x446050 GetModuleHandleW
0x446054 SetEndOfFile
0x446058 RaiseException
0x44605c InterlockedPushEntrySList
0x446060 InterlockedFlushSList
0x446064 RtlUnwind
0x446068 GetLastError
0x44606c SetLastError
0x446070 EnterCriticalSection
0x446074 LeaveCriticalSection
0x446078 DeleteCriticalSection
0x44607c InitializeCriticalSectionAndSpinCount
0x446080 TlsAlloc
0x446084 TlsGetValue
0x446088 TlsSetValue
0x44608c TlsFree
0x446090 FreeLibrary
0x446094 GetProcAddress
0x446098 LoadLibraryExW
0x44609c EncodePointer
0x4460a0 GetStdHandle
0x4460a4 WriteFile
0x4460a8 GetModuleFileNameW
0x4460ac ExitProcess
0x4460b0 WriteConsoleW
0x4460b4 GetCommandLineA
0x4460b8 HeapAlloc
0x4460bc HeapFree
0x4460c0 GetDateFormatW
0x4460c4 GetTimeFormatW
0x4460c8 CompareStringW
0x4460cc LCMapStringW
0x4460d0 GetLocaleInfoW
0x4460d4 IsValidLocale
0x4460d8 GetUserDefaultLCID
0x4460dc EnumSystemLocalesW
0x4460e0 GetFileType
0x4460e4 CloseHandle
0x4460e8 GetCurrentThread
0x4460ec OutputDebugStringW
0x4460f0 FindClose
0x4460f4 FindFirstFileExW
0x4460f8 FindNextFileW
0x4460fc IsValidCodePage
0x446100 GetACP
0x446104 GetOEMCP
0x446108 GetCPInfo
0x44610c MultiByteToWideChar
0x446110 WideCharToMultiByte
0x446114 GetEnvironmentStringsW
0x446118 FreeEnvironmentStringsW
0x44611c SetEnvironmentVariableW
0x446120 SetStdHandle
0x446124 GetStringTypeW
0x446128 GetProcessHeap
0x44612c SetConsoleCtrlHandler
0x446130 CreateFileW
0x446134 FlushFileBuffers
0x446138 GetConsoleOutputCP
0x44613c GetConsoleMode
0x446140 GetFileSizeEx
0x446144 SetFilePointerEx
0x446148 DecodePointer
0x44614c HeapSize
0x446150 HeapReAlloc
EAT(Export Address Table) is none
SHELL32.dll
0x446158 CommandLineToArgvW
0x44615c SHGetFolderPathAndSubDirW
ADVAPI32.dll
0x446000 GetLengthSid
KERNEL32.dll
0x446008 ReadFile
0x44600c ReadConsoleW
0x446010 GetModuleHandleExW
0x446014 GetCommandLineW
0x446018 GetCurrentProcess
0x44601c FreeConsole
0x446020 LocalFree
0x446024 UnhandledExceptionFilter
0x446028 SetUnhandledExceptionFilter
0x44602c TerminateProcess
0x446030 IsProcessorFeaturePresent
0x446034 QueryPerformanceCounter
0x446038 GetCurrentProcessId
0x44603c GetCurrentThreadId
0x446040 GetSystemTimeAsFileTime
0x446044 InitializeSListHead
0x446048 IsDebuggerPresent
0x44604c GetStartupInfoW
0x446050 GetModuleHandleW
0x446054 SetEndOfFile
0x446058 RaiseException
0x44605c InterlockedPushEntrySList
0x446060 InterlockedFlushSList
0x446064 RtlUnwind
0x446068 GetLastError
0x44606c SetLastError
0x446070 EnterCriticalSection
0x446074 LeaveCriticalSection
0x446078 DeleteCriticalSection
0x44607c InitializeCriticalSectionAndSpinCount
0x446080 TlsAlloc
0x446084 TlsGetValue
0x446088 TlsSetValue
0x44608c TlsFree
0x446090 FreeLibrary
0x446094 GetProcAddress
0x446098 LoadLibraryExW
0x44609c EncodePointer
0x4460a0 GetStdHandle
0x4460a4 WriteFile
0x4460a8 GetModuleFileNameW
0x4460ac ExitProcess
0x4460b0 WriteConsoleW
0x4460b4 GetCommandLineA
0x4460b8 HeapAlloc
0x4460bc HeapFree
0x4460c0 GetDateFormatW
0x4460c4 GetTimeFormatW
0x4460c8 CompareStringW
0x4460cc LCMapStringW
0x4460d0 GetLocaleInfoW
0x4460d4 IsValidLocale
0x4460d8 GetUserDefaultLCID
0x4460dc EnumSystemLocalesW
0x4460e0 GetFileType
0x4460e4 CloseHandle
0x4460e8 GetCurrentThread
0x4460ec OutputDebugStringW
0x4460f0 FindClose
0x4460f4 FindFirstFileExW
0x4460f8 FindNextFileW
0x4460fc IsValidCodePage
0x446100 GetACP
0x446104 GetOEMCP
0x446108 GetCPInfo
0x44610c MultiByteToWideChar
0x446110 WideCharToMultiByte
0x446114 GetEnvironmentStringsW
0x446118 FreeEnvironmentStringsW
0x44611c SetEnvironmentVariableW
0x446120 SetStdHandle
0x446124 GetStringTypeW
0x446128 GetProcessHeap
0x44612c SetConsoleCtrlHandler
0x446130 CreateFileW
0x446134 FlushFileBuffers
0x446138 GetConsoleOutputCP
0x44613c GetConsoleMode
0x446140 GetFileSizeEx
0x446144 SetFilePointerEx
0x446148 DecodePointer
0x44614c HeapSize
0x446150 HeapReAlloc
EAT(Export Address Table) is none