Report - pzOEfyaZPW1OyO690Z19HEU7.dll

Malicious Library Malicious Packer DLL PE File PE64
ScreenShot
Created 2023.03.08 14:01 Machine s1_win7_x6401
Filename pzOEfyaZPW1OyO690Z19HEU7.dll
Type PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
AI Score
3
Behavior Score
4.2
ZERO API file : clean
VT API (file) 22 detected (malicious, moderate confidence, score, Emotet, V0ir, confidence, 100%, Attribute, HighConfidence, cmsv, GenericKD, CLOUD, YXDCGZ, Infected, KKA17T, ai score=85, Artemis, susgen)
md5 fe1097b9754d8e3c54c7f54c68c4dabd
sha256 0442c122d6e81814ff1393a1cf430a4173acdf1b9df8228fe7bd3fc32455a9cc
ssdeep 12288:nbHoJMjhwwvAQ4c3wSlnJTrmONFV7iDpSpyNlTgibIUdzhnQawN/JsjHz:nbHoJMjx4c3wcFZSSpyNlcixzNQa0/m
imphash cc3581383698e8ac046128bd4d34bc22
impfuzzy 24:nutXOeCuO1yEsvg0D1raKTZcBplkqCLL7TqlWhTGvJTX/STg4I/Qw3d:n0XOeCr1mRr5TZSpeqCDufX94Xud
  Network IP location

Signature (11cnts)

Level Description
warning File has been identified by 22 AntiVirus engines on VirusTotal as malicious
watch Attempts to remove evidence of file being downloaded from the Internet
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Expresses interest in specific running processes
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32
 0x4832bc AddVectoredExceptionHandler
 0x4832c4 CloseHandle
 0x4832cc CreateDirectoryA
 0x4832d4 CreateFileA
 0x4832dc CreateFileW
 0x4832e4 DeleteCriticalSection
 0x4832ec DeleteFileA
 0x4832f4 EnterCriticalSection
 0x4832fc ExitProcess
 0x483304 FreeEnvironmentStringsW
 0x48330c GetACP
 0x483314 GetCPInfo
 0x48331c GetCurrentProcessId
 0x483324 GetCurrentThreadId
 0x48332c GetDateFormatA
 0x483334 GetEnvironmentStrings
 0x48333c GetEnvironmentStringsW
 0x483344 GetFileAttributesA
 0x48334c GetFileAttributesW
 0x483354 GetFileSize
 0x48335c GetFileType
 0x483364 GetLastError
 0x48336c GetLocalTime
 0x483374 GetLocaleInfoA
 0x48337c GetModuleFileNameA
 0x483384 GetModuleHandleA
 0x48338c GetOEMCP
 0x483394 GetProcAddress
 0x48339c GetProcessHeap
 0x4833a4 GetStartupInfoA
 0x4833ac GetStdHandle
 0x4833b4 GetStringTypeA
 0x4833bc GetStringTypeW
 0x4833c4 GetSystemDefaultLangID
 0x4833cc GetSystemInfo
 0x4833d4 GetTickCount
 0x4833dc GetTimeZoneInformation
 0x4833e4 GetUserDefaultLCID
 0x4833ec GetVersion
 0x4833f4 GetVersionExA
 0x4833fc HeapAlloc
 0x483404 HeapFree
 0x48340c InitializeCriticalSection
 0x483414 InitializeCriticalSectionAndSpinCount
 0x48341c IsDBCSLeadByteEx
 0x483424 IsDebuggerPresent
 0x48342c IsValidLocale
 0x483434 LCMapStringA
 0x48343c LeaveCriticalSection
 0x483444 LoadLibraryA
 0x48344c LoadLibraryW
 0x483454 LocalFileTimeToFileTime
 0x48345c MultiByteToWideChar
 0x483464 RaiseException
 0x48346c ReadFile
 0x483474 RemoveDirectoryA
 0x48347c RemoveVectoredExceptionHandler
 0x483484 RtlCaptureContext
 0x48348c SetConsoleCtrlHandler
 0x483494 SetEndOfFile
 0x48349c SetFilePointer
 0x4834a4 SetFileTime
 0x4834ac SetHandleCount
 0x4834b4 SetLastError
 0x4834bc SetThreadLocale
 0x4834c4 Sleep
 0x4834cc SleepEx
 0x4834d4 SystemTimeToFileTime
 0x4834dc TlsAlloc
 0x4834e4 TlsFree
 0x4834ec TlsGetValue
 0x4834f4 TlsSetValue
 0x4834fc VirtualAlloc
 0x483504 VirtualFree
 0x48350c VirtualQuery
 0x483514 WideCharToMultiByte
 0x48351c WriteFile
 0x483524 RtlRestoreContext
 0x48352c RtlUnwindEx
USER32
 0x48355c EnumThreadWindows
 0x483564 MessageBoxA
 0x48356c wsprintfA

EAT(Export Address Table) Library

0x402ab0 AJnzwdBqMvQICBAjnC
0x401da0 APQGYdJtrkXhXkwzKFBCTvI
0x402720 AQuPFhYruxzxA
0x402710 AbBwdZitlWefdERaOavJlIen
0x402620 AbPYWiwTVDHFpfYBJn
0x4022b0 AfvxTJEA
0x402660 AvxJWNrnX
0x402870 BUERlq
0x401c60 Bqptqdk
0x401f20 BslfqQGNXqTuUepvauCkQ
0x402010 CNsPbULXjYvkd
0x402150 CXSfiCTm
0x401d30 CfdextKrifuW
0x4029c0 CfsWcZWQVlifNwBDgGRZIqif
0x401e60 CgdlGBNRFRzTzmfguqz
0x401cc0 ClqIyzBkLjDFLJ
0x402a40 DCLGmuYl
0x401fc0 DCQZVUAVgMiARD
0x402920 DEaqEFNRtMCaaVnaAUQtMbKum
0x402180 DIXpgfZZxsBhi
0x402550 DJFaUyIipeGIfwlkpX
0x401c30 DVPdiFeTcDmXs
0x4028c0 DhYIKjxmGGYY
0x402a00 DiwnEUvduBkM
0x401bd0 DllRegisterServer
0x4024b0 DrgYCMNiVbrUGwRTpRdvxI
0x401fe0 EEjaFHKntpLIhbdTrDK
0x402670 EdTDhMMiYAFBShyYKs
0x402990 EkMGlO
0x4026e0 EnsJjCOccyCjAVZkRnVMDMVZ
0x402160 EpwzPNUZHdojuinzfIpfYQ
0x4022c0 EyuImeQbPHMFKzOFVqc
0x4023d0 FJAVswpuwGKsMXPsiiQRYv
0x402520 FOWbUDfELrAQAEKqJf
0x402b70 FQLPnQNLD
0x402630 FQbFKHXX
0x402570 FWSKyRQMOuWSm
0x401e40 FWVdsLrtEVBzLaCmZNEpx
0x401d40 FeGqog
0x402370 FkcAXdH
0x401d90 FqDNSXzugPznspUD
0x402970 GQAlasmiaEy
0x402330 GQjtxdyXvtsqdfVrQBqm
0x402a70 GdiMTODVmsR
0x402300 GxxJJdRIqTBJAMnBIcxq
0x401ec0 HOnlfLBWkQCooC
0x402640 HWTqOVHRABB
0x402590 IOMcKFaJXihdqDAogVN
0x402b10 IpoojIRy
0x401f00 IvvQFcaABzyyLhduvbY
0x4026f0 JFrkuFzJMrWvkaYOQlJ
0x402ad0 JUBJYfmZGotuEKSafNPlGEAMy
0x4023f0 JheZxhw
0x402510 JkoaHQBWgZLoeIqdRFVkMlq
0x402060 JlscSxwnKrxRmaJ
0x4020d0 JpqPCRXJWOy
0x402740 JvcfiztFAuNa
0x402730 KStKTzwWJbprlqO
0x401ed0 KWLauUGkNHofayeYLCFSpOfuXl
0x4028a0 KYEVLHhbRMHw
0x4027e0 KZwwxlBTSHOg
0x402750 KnTTKeu
0x401e20 KrldazbljxeAJoh
0x4025c0 KvQcPVBCIwQMISVMmy
0x401e30 KwTVqLAsKCaCz
0x4025e0 KyLhcvzfifBtOE
0x4021b0 KzpAtJXTRJRN
0x4020c0 LDldVNlhAieNMMtCa
0x402930 LXxoKBfNdArZYQncLEi
0x401f30 LbGmmSnPyxEOeYshUChQLjrUg
0x402410 LjYfYsPmJSQelB
0x4028f0 LmWCjcoahmWddnrJDCdVjMCP
0x4029e0 LsRdEHOPPdahSbSInABkwrMNTG
0x401ef0 LyVkxcsxNAO
0x401f60 MGqpEIkKUqfuIIRGJf
0x402b90 MhQzjcZQZGKJujrtxnsjvOac
0x4026d0 MmEjplkckpWrpOf
0x401d80 NIKNvsLIWHCElYtcPVqWMgP
0x402ac0 NRMKBIH
0x4024e0 NePIeZGONkQjUvXNTYvpeXYQb
0x4028e0 NgzABGvEESdUfiZWe
0x402610 NosHdaw
0x402950 NwCuOMJGpb
0x401e70 OHaEUpdkkaBsGWFrglzCKs
0x401ea0 OKeSJkGvyrmApuQLkKPpIqTOSC
0x402a60 OXUuTvhY
0x402360 OkETKe
0x4025b0 OpkiztjhLCVqnzyZAbVwNk
0x402080 PZuIoYMkINUQLlKPlmdF
0x401c50 PhpnSepE
0x402350 PmSnkwX
0x402b00 PpWgDHAeXILHiCygAcfdxRJbP
0x402a80 PqHtVBMURxczujoUKke
0x402690 PsyROYrnfJDpwoGRDaJxAE
0x402260 QPHbrPddtRYCveIyNrsOqVm
0x401e90 QPwNYoqkBabxMQwMGzissfXlHv
0x4026b0 QUkwLPNCmZS
0x402600 QVjMnqKKeFqiftMeC
0x401f10 QYBYuVdz
0x401d70 QkLLajfyCzZoWjmMbQldzVE
0x4021d0 QlpPhv
0x401c10 QxOcSPqBF
0x402440 QyVUmZZObsTkQXqXuVfJlFfwm
0x402430 RDFzlwKz
0x401fa0 RdwgWDYqEPKBezGmIkchzgkJ
0x402560 RgXZlcb
0x402200 RhKyShmDIEu
0x401e00 RrZLbYnRmLlOBgTNlJvBwJ
0x402320 RuKUQwCvvlVTBu
0x402540 SGGVzpmKSOzmCaZCxrGFJ
0x4024c0 SfksSUIfdENQGLog
0x4020f0 SfrUZPkIvHdeahJHdDQcIVOCn
0x4027a0 SiIsTUGJvWCXYCsvWzks
0x402100 StRbaMQcgaoFqFggirqzxSnXSq
0x4022a0 TDNrlXdyCZ
0x402900 TIgcLAeEBwATdpbXDAmpAH
0x402580 TJOEoNDMxCzrBbOzwuHQqd
0x402400 TLFJWdWmHRZ
0x4024d0 ThCGtkkZwxuMjDYELaHlUmqKb
0x402650 TtSFvwemoFmMsVfdYbKeGwwh
0x401fd0 TwfIxQvQlwnLdvyU
0x401fb0 UKwiQweYnURb
0x402860 UtUuRYnV
0x402390 WcgTHvUmcWfSzivUFb
0x402230 WsSAfPmGdHtHyUgGGWiQI
0x4021f0 XVFIYNrPgOSRkjDtJtPeVoA
0x402470 XYbiVVefjYKdkkod
0x402810 XZYSdDSyojdYRSWPzlx
0x401de0 XcmMbCtnpxbZvYnaTLJbjH
0x4023c0 XyYNsSUwyJKaPYIlhGgKHruIC
0x402170 YZRjjKsCGXHRCRAbJt
0x401e10 YdkQNRUSJNEYyt
0x4022d0 ZRFUliCTbEoxaAHUlMEt
0x402490 ZaXMRhn
0x402a20 ZglxxBbO
0x401ce0 ZtPOwyggsjmULkxAh
0x475aa0 __CPPdebugHook
0x4026c0 aHqSyyBCczjr
0x4023b0 aLLJUdCR
0x402290 aPALmAJPUnxqENrTtKT
0x401d50 aQqqVVKQnfCQXUzx
0x401cd0 aYqpVXoiWiQFljpTXB
0x401cf0 asuILd
0x4021e0 axBWLoMOyPwrMKQiCQvbaxNJi
0x4025d0 bEtkbvcRAtSwuBJao
0x4027b0 bJBiOailghbjXltnxmqfvZB
0x4023e0 bJkNTIWMTdK
0x402530 bOBZmyiQ
0x402460 bVAnfZEiFwiJcStuMocfe
0x402130 bbxIUdkkMxtIJ
0x402840 bfJyvMjtLvzPAx
0x4024f0 bsbndIzEdDjKCIRwqZ
0x402b40 cNuctyEqWkaRHVokRI
0x4027d0 cUkHDcmLZZxzyW
0x4020e0 cbRKXoIDRrnlORpqqKSjHqn
0x401f40 cgzJwkNJEqOFpNRKSFBvYp
0x402380 dihuhx
0x402800 dwolhkMuzZhLlDIJtKSAswiBbf
0x402b60 egoJLXzT
0x4021a0 eweZayoaolvwWCnq
0x402340 fEJBMEUixoQKLf
0x402ae0 fPXvjnsLMhLsdHeYuB
0x402770 fhDJMyKvTjVldTemWuzfZkYGNi
0x402050 fzzuObpfVcsdduHrFJLDp
0x401c90 gMAtohygPzzEOfz
0x402140 gZaIjywAcVvXYETDpBc
0x402280 gvxQacFHDhbRFRkPLlZUgxe
0x401d00 hDfHTm
0x4020b0 hFQaUdDIHpqDbH
0x401c80 hIIVIsqca
0x402000 hSWMIwkbnjCLRffi
0x4023a0 hpKIVIMfqgulzOixWN
0x402030 iOFhNHqtmwdUzoOAR
0x402980 iZhkiLLME
0x401d60 iadAvSbbVmbSDCJxVvnvI
0x402aa0 jBjZPBUdbXdbRDXBC
0x4027f0 jCglBkSSNUyaNxSpdGfYfH
0x402910 jDqCGSKskukTfSy
0x402420 jPsztVHfDUSvwDrYbhwCzSn
0x402480 jXORpeTJxJkWOkjGzmkaU
0x401f70 kDVZBp
0x402760 kKjdhXAKDZlTOCqMTgeN
0x402700 kQqXdABvGBzFbXWUMUlntkB
0x4029f0 kSqwFkyOpHTUryvMZvwiuJMhPd
0x402040 kjIrLoztGBotqEFc
0x401c70 knxSTS
0x402b20 lIuoCrbQvPFPkmhdUEWBwtSoN
0x402090 lKbHnztSwTlRnMlTcugfGGHYtN
0x4022f0 lLvcHiTiCksjKsHnzPCIw
0x402020 lXtYCQOVHlGyWcNsEDBdkYH
0x402110 lhjqquNDOVLUeebdqhzXB
0x402890 lumEaWYgu
0x402960 luzEwht
0x4027c0 lxxlVkfjgaTC
0x402500 mNeoRfND
0x401d10 mRWxUaMhcBTRhTDlr
0x401df0 mZVRwkIqXuPXlWndwCAj
0x402a10 mpLQUkC
0x4029a0 mvosOqVmtCcjSLSXEvSBXz
0x402af0 nAHXpojGOndMX
0x402240 nBLkNEachGpAXQlbfJiInl
0x402450 nTlpZjrWkCLiXNwwAhZpOxk
0x4025f0 ncmXqHgOebKARTOjkrUw
0x402270 nrCtbLxItjzViyyCvBmr
0x4028d0 nwCUOYvZpelNktzlFqiJgQcxO
0x4025a0 oJqZNcjCWtT
0x402780 ofaQOA
0x402ba0 okDiBHaBnPJXeNRMVWwCH
0x401ee0 okRDPPCCBRNSGCEiPQOkzrZB
0x402830 pCZoxeLinpeufdWEiDDiiIy
0x402310 pFQhqTXuVdix
0x4020a0 pymgUCZ
0x402a50 qTuAeA
0x402a30 qUdQkOn
0x401d20 qZdoBugJCUZtRZcdE
0x401c20 rmIxqjojFhuFZLXxHiteMuOkVL
0x402820 sNDTiuW
0x401f90 slMJaxiCcIThgQA
0x4022e0 spgLgyzgkQYeto
0x402220 sshbcwqurPCAKMQ
0x401dc0 szfgevVIcioSohOWrpinUHnfh
0x402b80 tJFfrAAcsVHwTDRhAtonI
0x4029b0 tZcVFZKmQrQhCMkmciFJDUuO
0x402a90 tjnixTitrIHuvdTzVlMZySCQ
0x402b50 tnaAJa
0x401f50 uMNXLG
0x401e80 uMXbdxS
0x402b30 uRdrnUDf
0x402250 uXmpqanhmvL
0x402940 ujCZbHCZXY
0x4021c0 vHDfRjlcmgBnKxvgJCTAei
0x401eb0 vHzzLqLMgeXnooDSttqLgETGzM
0x402880 vUaKcfShuz
0x402190 vcuEhCyMBctZLfs
0x401e50 vqSSYUGZkxO
0x402070 wBQkMlcY
0x4026a0 wfDKSZnAwYvN
0x401dd0 wfserVKKZPwicQlBVg
0x4028b0 wiRhtGKiduXVGl
0x402680 wjWEmnMAdSRtxvYx
0x401f80 xXMGTlBJRZVlReQpmLElglM
0x4029d0 xfZyPSfMFRFJoRVZsu
0x402850 xjfncDStWLmzgW
0x401c40 xslwsTCXApGTE
0x401ff0 xuxFPElTWtIFU
0x402120 xxnFTJffTJFAkZ
0x401db0 yqnbQfcUHVCkRBtMc
0x402210 yxmCvjLxAkQRVBsxAGNXA
0x401cb0 zAFYizUk
0x4024a0 zEZCKKqcxxzbRybKZOVxkhDn
0x402790 zQwXqbHusmB
0x401ca0 zrVfblTwHHQuPiHmiDfK


Similarity measure (PE file only) - Checking for service failure