ScreenShot
Created | 2023.03.05 04:20 | Machine | s1_win7_x6401 |
Filename | driver.dat | ||
Type | PE32+ executable (native) x86-64, for MS Windows | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | |||
md5 | ba40c472200733aebad89bc5e5c2ebd0 | ||
sha256 | c1f437c927f576ea8b5cb8b26963e557f13b647c8fce070c5855974941e87b33 | ||
ssdeep | 24576:JunZl8GIfgdDP+QwMXUFwlJ8A/oZiGcnv1hlkft7T:kn71IfgF+QwhwlJ8vZ7H1f | ||
imphash | d1121bdaaed8c80a666e7a1ee74cfff1 | ||
impfuzzy | 24:sYSGa56xYg2JqBuqmTG8oULnwGz1lsMjRK2KupPK8/wEG/wgBJ+EwUpw+woMwfwj:sn5aQkudjF/M/XTpTzC |
Network IP location
Signature (11cnts)
Level | Description |
---|---|
watch | Communicates with host for which no DNS query was performed |
watch | Found URLs in memory pointing to an IP address rather than a domain (potentially indicative of Command & Control traffic) |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Potentially malicious URLs were found in the process memory dump |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | One or more processes crashed |
Rules (36cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Network_Downloader | File Downloader | memory |
notice | Code_injection | Code injection with CreateRemoteThread in a remote process | memory |
notice | Create_Service | Create a windows service | memory |
notice | Escalate_priviledges | Escalate priviledges | memory |
notice | Generic_PWS_Memory_Zero | PWS Memory | memory |
notice | Hijack_Network | Hijack network configuration | memory |
notice | KeyLogger | Run a KeyLogger | memory |
notice | local_credential_Steal | Steal credential | memory |
notice | Network_DGA | Communication using DGA | memory |
notice | Network_DNS | Communications use DNS | memory |
notice | Network_FTP | Communications over FTP | memory |
notice | Network_HTTP | Communications over HTTP | memory |
notice | Network_P2P_Win | Communications over P2P network | memory |
notice | Network_TCP_Socket | Communications over RAW Socket | memory |
notice | Persistence | Install itself for autorun at Windows startup | memory |
notice | ScreenShot | Take ScreenShot | memory |
notice | Sniff_Audio | Record Audio | memory |
notice | Str_Win32_Http_API | Match Windows Http API call | memory |
notice | Str_Win32_Internet_API | Match Windows Inet API call | memory |
info | anti_dbg | Checks if being debugged | memory |
info | antisb_threatExpert | Anti-Sandbox checks for ThreatExpert | memory |
info | Check_Dlls | (no description) | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerCheck__RemoteAPI | (no description) | memory |
info | DebuggerException__ConsoleCtrl | (no description) | memory |
info | DebuggerException__SetConsoleCtrl | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | IsPE64 | (no description) | binaries (download) |
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
info | win_hook | Affect hook table | memory |
Suricata ids
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET INFO TLS Handshake Failure
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET INFO TLS Handshake Failure
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
PE API
IAT(Import Address Table) Library
NETIO.SYS
0x140003000 WskCaptureProviderNPI
0x140003008 WskReleaseProviderNPI
0x140003010 WskDeregister
0x140003018 WskRegister
ntoskrnl.exe
0x140003050 ExAllocatePoolWithTag
0x140003058 ExFreePoolWithTag
0x140003060 KeInitializeEvent
0x140003068 KeResetEvent
0x140003070 KeSetEvent
0x140003078 KeWaitForSingleObject
0x140003080 MmProbeAndLockPages
0x140003088 IoAllocateIrp
0x140003090 IoAllocateMdl
0x140003098 IoFreeIrp
0x1400030a0 IoFreeMdl
0x1400030a8 IoReuseIrp
0x1400030b0 KeEnterGuardedRegion
0x1400030b8 KeLeaveGuardedRegion
0x1400030c0 ExQueueWorkItem
0x1400030c8 RtlCompareUnicodeString
0x1400030d0 ObfDereferenceObject
0x1400030d8 MmSecureVirtualMemory
0x1400030e0 MmUnsecureVirtualMemory
0x1400030e8 KeStackAttachProcess
0x1400030f0 KeUnstackDetachProcess
0x1400030f8 PsLookupProcessByProcessId
0x140003100 ZwAllocateVirtualMemory
0x140003108 ZwFreeVirtualMemory
0x140003110 MmCopyVirtualMemory
0x140003118 PsGetProcessSectionBaseAddress
0x140003120 PsGetProcessPeb
0x140003128 ZwProtectVirtualMemory
0x140003130 RtlInitUnicodeString
0x140003138 __C_specific_handler
EAT(Export Address Table) is none
NETIO.SYS
0x140003000 WskCaptureProviderNPI
0x140003008 WskReleaseProviderNPI
0x140003010 WskDeregister
0x140003018 WskRegister
ntoskrnl.exe
0x140003050 ExAllocatePoolWithTag
0x140003058 ExFreePoolWithTag
0x140003060 KeInitializeEvent
0x140003068 KeResetEvent
0x140003070 KeSetEvent
0x140003078 KeWaitForSingleObject
0x140003080 MmProbeAndLockPages
0x140003088 IoAllocateIrp
0x140003090 IoAllocateMdl
0x140003098 IoFreeIrp
0x1400030a0 IoFreeMdl
0x1400030a8 IoReuseIrp
0x1400030b0 KeEnterGuardedRegion
0x1400030b8 KeLeaveGuardedRegion
0x1400030c0 ExQueueWorkItem
0x1400030c8 RtlCompareUnicodeString
0x1400030d0 ObfDereferenceObject
0x1400030d8 MmSecureVirtualMemory
0x1400030e0 MmUnsecureVirtualMemory
0x1400030e8 KeStackAttachProcess
0x1400030f0 KeUnstackDetachProcess
0x1400030f8 PsLookupProcessByProcessId
0x140003100 ZwAllocateVirtualMemory
0x140003108 ZwFreeVirtualMemory
0x140003110 MmCopyVirtualMemory
0x140003118 PsGetProcessSectionBaseAddress
0x140003120 PsGetProcessPeb
0x140003128 ZwProtectVirtualMemory
0x140003130 RtlInitUnicodeString
0x140003138 __C_specific_handler
EAT(Export Address Table) is none