ScreenShot
Created | 2023.03.21 10:18 | Machine | s1_win7_x6401 |
Filename | rw001ext.exe | ||
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 8 detected (malicious, confidence, ESUM, FileRepMalware, Artemis, Casdet) | ||
md5 | 0ad8d4cffac5f713a2ef3b2c72a84e29 | ||
sha256 | d1bd5a14d886e71aa5855ce74c84aa7cefa1f782e32cd2140c3a10d91084105d | ||
ssdeep | 196608:HUNWu+zM+o+OVv8ZTN4OPF4pzR1X7/kBV5DEp:0gOiZT1F4/1/si | ||
imphash | 85a54fad2bd6b77afdc3a0e3e1364550 | ||
impfuzzy | 96:NN+9W5W6ttFWA55nH6buxKcXHdbxofPDRufI9yXiX1SjwJGdN17qtj5:L+9W5W6ttFWA5nt2wWySFGd3mtj5 |
Network IP location
Signature (3cnts)
Level | Description |
---|---|
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | File has been identified by 8 AntiVirus engines on VirusTotal as malicious |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
Rules (14cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | Win32_Trojan_Gen_2_0904B0_Zero | Win32 Trojan Gen | binaries (download) |
info | Win32_Trojan_Gen_2_0904B0_Zero | Win32 Trojan Gen | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
advapi32.dll
0xad2440 OpenProcessToken
crypt.dll
0xad2448 BCryptCloseAlgorithmProvider
0xad244c BCryptGenRandom
0xad2450 BCryptOpenAlgorithmProvider
kernel32.dll
0xad2458 AcquireSRWLockExclusive
0xad245c AcquireSRWLockShared
0xad2460 AddVectoredExceptionHandler
0xad2464 CancelIo
0xad2468 CloseHandle
0xad246c CompareStringOrdinal
0xad2470 CopyFileExW
0xad2474 CreateDirectoryW
0xad2478 CreateEventW
0xad247c CreateFileMappingA
0xad2480 CreateFileW
0xad2484 CreateHardLinkW
0xad2488 CreateMutexA
0xad248c CreateNamedPipeW
0xad2490 CreateProcessW
0xad2494 CreateSymbolicLinkW
0xad2498 CreateThread
0xad249c CreateToolhelp32Snapshot
0xad24a0 DeleteFileW
0xad24a4 DeviceIoControl
0xad24a8 DuplicateHandle
0xad24ac ExitProcess
0xad24b0 FindClose
0xad24b4 FindFirstFileW
0xad24b8 FindNextFileW
0xad24bc FlushFileBuffers
0xad24c0 FormatMessageW
0xad24c4 FreeEnvironmentStringsW
0xad24c8 FreeLibrary
0xad24cc GetCommandLineW
0xad24d0 GetConsoleMode
0xad24d4 GetCurrentDirectoryW
0xad24d8 GetCurrentProcess
0xad24dc GetCurrentProcessId
0xad24e0 GetCurrentThread
0xad24e4 GetEnvironmentStringsW
0xad24e8 GetEnvironmentVariableW
0xad24ec GetExitCodeProcess
0xad24f0 GetFileAttributesW
0xad24f4 GetFileInformationByHandle
0xad24f8 GetFileInformationByHandleEx
0xad24fc GetFileType
0xad2500 GetFinalPathNameByHandleW
0xad2504 GetFullPathNameW
0xad2508 GetLastError
0xad250c GetModuleFileNameW
0xad2510 GetModuleHandleA
0xad2514 GetModuleHandleW
0xad2518 GetOverlappedResult
0xad251c GetProcAddress
0xad2520 GetProcessHeap
0xad2524 GetProcessId
0xad2528 GetStartupInfoA
0xad252c GetStdHandle
0xad2530 GetSystemDirectoryW
0xad2534 GetSystemInfo
0xad2538 GetSystemTimeAsFileTime
0xad253c GetTempPathW
0xad2540 GetWindowsDirectoryW
0xad2544 GlobalAlloc
0xad2548 HeapAlloc
0xad254c HeapFree
0xad2550 HeapReAlloc
0xad2554 InitOnceBeginInitialize
0xad2558 InitOnceComplete
0xad255c LoadLibraryA
0xad2560 LoadLibraryW
0xad2564 MapViewOfFile
0xad2568 Module32FirstW
0xad256c Module32NextW
0xad2570 MoveFileExW
0xad2574 QueryPerformanceCounter
0xad2578 QueryPerformanceFrequency
0xad257c ReadConsoleW
0xad2580 ReadFile
0xad2584 ReadFileEx
0xad2588 ReleaseMutex
0xad258c ReleaseSRWLockExclusive
0xad2590 ReleaseSRWLockShared
0xad2594 RemoveDirectoryW
0xad2598 RtlCaptureContext
0xad259c SetCurrentDirectoryW
0xad25a0 SetEnvironmentVariableW
0xad25a4 SetEvent
0xad25a8 SetFileAttributesW
0xad25ac SetFileInformationByHandle
0xad25b0 SetFilePointerEx
0xad25b4 SetFileTime
0xad25b8 SetHandleInformation
0xad25bc SetLastError
0xad25c0 SetThreadStackGuarantee
0xad25c4 SetUnhandledExceptionFilter
0xad25c8 Sleep
0xad25cc SleepConditionVariableSRW
0xad25d0 SleepEx
0xad25d4 SwitchToThread
0xad25d8 TerminateProcess
0xad25dc TlsAlloc
0xad25e0 TlsFree
0xad25e4 TlsGetValue
0xad25e8 TlsSetValue
0xad25ec TryAcquireSRWLockExclusive
0xad25f0 UnmapViewOfFile
0xad25f4 VirtualProtect
0xad25f8 WaitForMultipleObjects
0xad25fc WaitForSingleObject
0xad2600 WaitForSingleObjectEx
0xad2604 WakeAllConditionVariable
0xad2608 WakeConditionVariable
0xad260c WriteConsoleW
0xad2610 WriteFileEx
ole32.dll
0xad2618 CoCreateGuid
oleaut32.dll
0xad2620 GetErrorInfo
0xad2624 SetErrorInfo
0xad2628 SysAllocStringLen
0xad262c SysFreeString
0xad2630 SysStringLen
userenv.dll
0xad2638 GetUserProfileDirectoryW
ws2_32.dll
0xad2640 WSACleanup
0xad2644 WSADuplicateSocketW
0xad2648 WSAGetLastError
0xad264c WSARecv
0xad2650 WSASend
0xad2654 WSASocketW
0xad2658 WSAStartup
0xad265c accept
0xad2660 ind
0xad2664 closesocket
0xad2668 connect
0xad266c freeaddrinfo
0xad2670 getaddrinfo
0xad2674 getpeername
0xad2678 getsockname
0xad267c getsockopt
0xad2680 ioctlsocket
0xad2684 listen
0xad2688 recv
0xad268c recvfrom
0xad2690 select
0xad2694 send
0xad2698 sendto
0xad269c setsockopt
0xad26a0 shutdown
KERNEL32.dll
0xad26a8 CreateEventA
0xad26ac CreateSemaphoreA
0xad26b0 DeleteCriticalSection
0xad26b4 EnterCriticalSection
0xad26b8 GetCurrentThreadId
0xad26bc GetHandleInformation
0xad26c0 GetProcessAffinityMask
0xad26c4 GetThreadContext
0xad26c8 GetThreadPriority
0xad26cc GetTickCount
0xad26d0 InitializeCriticalSection
0xad26d4 IsDebuggerPresent
0xad26d8 LeaveCriticalSection
0xad26dc OutputDebugStringA
0xad26e0 RaiseException
0xad26e4 ReleaseSemaphore
0xad26e8 RemoveVectoredExceptionHandler
0xad26ec ResetEvent
0xad26f0 ResumeThread
0xad26f4 SetProcessAffinityMask
0xad26f8 SetThreadContext
0xad26fc SetThreadPriority
0xad2700 SuspendThread
0xad2704 TryEnterCriticalSection
0xad2708 UnhandledExceptionFilter
0xad270c VirtualQuery
msvcrt.dll
0xad2714 __dllonexit
0xad2718 __getmainargs
0xad271c __initenv
0xad2720 __lconv_init
0xad2724 __set_app_type
0xad2728 __setusermatherr
0xad272c _acmdln
0xad2730 _amsg_exit
0xad2734 _beginthreadex
0xad2738 _cexit
0xad273c _endthreadex
0xad2740 _fmode
0xad2744 _fpreset
0xad2748 _initterm
0xad274c _iob
0xad2750 _lock
0xad2754 _onexit
0xad2758 _setjmp3
0xad275c _strdup
0xad2760 _ultoa
0xad2764 _unlock
0xad2768 abort
0xad276c calloc
0xad2770 exit
0xad2774 fprintf
0xad2778 free
0xad277c fwrite
0xad2780 longjmp
0xad2784 malloc
0xad2788 memcmp
0xad278c memcpy
0xad2790 memmove
0xad2794 memset
0xad2798 printf
0xad279c realloc
0xad27a0 signal
0xad27a4 strlen
0xad27a8 strncmp
0xad27ac vfprintf
0xad27b0 wcslen
EAT(Export Address Table) is none
advapi32.dll
0xad2440 OpenProcessToken
crypt.dll
0xad2448 BCryptCloseAlgorithmProvider
0xad244c BCryptGenRandom
0xad2450 BCryptOpenAlgorithmProvider
kernel32.dll
0xad2458 AcquireSRWLockExclusive
0xad245c AcquireSRWLockShared
0xad2460 AddVectoredExceptionHandler
0xad2464 CancelIo
0xad2468 CloseHandle
0xad246c CompareStringOrdinal
0xad2470 CopyFileExW
0xad2474 CreateDirectoryW
0xad2478 CreateEventW
0xad247c CreateFileMappingA
0xad2480 CreateFileW
0xad2484 CreateHardLinkW
0xad2488 CreateMutexA
0xad248c CreateNamedPipeW
0xad2490 CreateProcessW
0xad2494 CreateSymbolicLinkW
0xad2498 CreateThread
0xad249c CreateToolhelp32Snapshot
0xad24a0 DeleteFileW
0xad24a4 DeviceIoControl
0xad24a8 DuplicateHandle
0xad24ac ExitProcess
0xad24b0 FindClose
0xad24b4 FindFirstFileW
0xad24b8 FindNextFileW
0xad24bc FlushFileBuffers
0xad24c0 FormatMessageW
0xad24c4 FreeEnvironmentStringsW
0xad24c8 FreeLibrary
0xad24cc GetCommandLineW
0xad24d0 GetConsoleMode
0xad24d4 GetCurrentDirectoryW
0xad24d8 GetCurrentProcess
0xad24dc GetCurrentProcessId
0xad24e0 GetCurrentThread
0xad24e4 GetEnvironmentStringsW
0xad24e8 GetEnvironmentVariableW
0xad24ec GetExitCodeProcess
0xad24f0 GetFileAttributesW
0xad24f4 GetFileInformationByHandle
0xad24f8 GetFileInformationByHandleEx
0xad24fc GetFileType
0xad2500 GetFinalPathNameByHandleW
0xad2504 GetFullPathNameW
0xad2508 GetLastError
0xad250c GetModuleFileNameW
0xad2510 GetModuleHandleA
0xad2514 GetModuleHandleW
0xad2518 GetOverlappedResult
0xad251c GetProcAddress
0xad2520 GetProcessHeap
0xad2524 GetProcessId
0xad2528 GetStartupInfoA
0xad252c GetStdHandle
0xad2530 GetSystemDirectoryW
0xad2534 GetSystemInfo
0xad2538 GetSystemTimeAsFileTime
0xad253c GetTempPathW
0xad2540 GetWindowsDirectoryW
0xad2544 GlobalAlloc
0xad2548 HeapAlloc
0xad254c HeapFree
0xad2550 HeapReAlloc
0xad2554 InitOnceBeginInitialize
0xad2558 InitOnceComplete
0xad255c LoadLibraryA
0xad2560 LoadLibraryW
0xad2564 MapViewOfFile
0xad2568 Module32FirstW
0xad256c Module32NextW
0xad2570 MoveFileExW
0xad2574 QueryPerformanceCounter
0xad2578 QueryPerformanceFrequency
0xad257c ReadConsoleW
0xad2580 ReadFile
0xad2584 ReadFileEx
0xad2588 ReleaseMutex
0xad258c ReleaseSRWLockExclusive
0xad2590 ReleaseSRWLockShared
0xad2594 RemoveDirectoryW
0xad2598 RtlCaptureContext
0xad259c SetCurrentDirectoryW
0xad25a0 SetEnvironmentVariableW
0xad25a4 SetEvent
0xad25a8 SetFileAttributesW
0xad25ac SetFileInformationByHandle
0xad25b0 SetFilePointerEx
0xad25b4 SetFileTime
0xad25b8 SetHandleInformation
0xad25bc SetLastError
0xad25c0 SetThreadStackGuarantee
0xad25c4 SetUnhandledExceptionFilter
0xad25c8 Sleep
0xad25cc SleepConditionVariableSRW
0xad25d0 SleepEx
0xad25d4 SwitchToThread
0xad25d8 TerminateProcess
0xad25dc TlsAlloc
0xad25e0 TlsFree
0xad25e4 TlsGetValue
0xad25e8 TlsSetValue
0xad25ec TryAcquireSRWLockExclusive
0xad25f0 UnmapViewOfFile
0xad25f4 VirtualProtect
0xad25f8 WaitForMultipleObjects
0xad25fc WaitForSingleObject
0xad2600 WaitForSingleObjectEx
0xad2604 WakeAllConditionVariable
0xad2608 WakeConditionVariable
0xad260c WriteConsoleW
0xad2610 WriteFileEx
ole32.dll
0xad2618 CoCreateGuid
oleaut32.dll
0xad2620 GetErrorInfo
0xad2624 SetErrorInfo
0xad2628 SysAllocStringLen
0xad262c SysFreeString
0xad2630 SysStringLen
userenv.dll
0xad2638 GetUserProfileDirectoryW
ws2_32.dll
0xad2640 WSACleanup
0xad2644 WSADuplicateSocketW
0xad2648 WSAGetLastError
0xad264c WSARecv
0xad2650 WSASend
0xad2654 WSASocketW
0xad2658 WSAStartup
0xad265c accept
0xad2660 ind
0xad2664 closesocket
0xad2668 connect
0xad266c freeaddrinfo
0xad2670 getaddrinfo
0xad2674 getpeername
0xad2678 getsockname
0xad267c getsockopt
0xad2680 ioctlsocket
0xad2684 listen
0xad2688 recv
0xad268c recvfrom
0xad2690 select
0xad2694 send
0xad2698 sendto
0xad269c setsockopt
0xad26a0 shutdown
KERNEL32.dll
0xad26a8 CreateEventA
0xad26ac CreateSemaphoreA
0xad26b0 DeleteCriticalSection
0xad26b4 EnterCriticalSection
0xad26b8 GetCurrentThreadId
0xad26bc GetHandleInformation
0xad26c0 GetProcessAffinityMask
0xad26c4 GetThreadContext
0xad26c8 GetThreadPriority
0xad26cc GetTickCount
0xad26d0 InitializeCriticalSection
0xad26d4 IsDebuggerPresent
0xad26d8 LeaveCriticalSection
0xad26dc OutputDebugStringA
0xad26e0 RaiseException
0xad26e4 ReleaseSemaphore
0xad26e8 RemoveVectoredExceptionHandler
0xad26ec ResetEvent
0xad26f0 ResumeThread
0xad26f4 SetProcessAffinityMask
0xad26f8 SetThreadContext
0xad26fc SetThreadPriority
0xad2700 SuspendThread
0xad2704 TryEnterCriticalSection
0xad2708 UnhandledExceptionFilter
0xad270c VirtualQuery
msvcrt.dll
0xad2714 __dllonexit
0xad2718 __getmainargs
0xad271c __initenv
0xad2720 __lconv_init
0xad2724 __set_app_type
0xad2728 __setusermatherr
0xad272c _acmdln
0xad2730 _amsg_exit
0xad2734 _beginthreadex
0xad2738 _cexit
0xad273c _endthreadex
0xad2740 _fmode
0xad2744 _fpreset
0xad2748 _initterm
0xad274c _iob
0xad2750 _lock
0xad2754 _onexit
0xad2758 _setjmp3
0xad275c _strdup
0xad2760 _ultoa
0xad2764 _unlock
0xad2768 abort
0xad276c calloc
0xad2770 exit
0xad2774 fprintf
0xad2778 free
0xad277c fwrite
0xad2780 longjmp
0xad2784 malloc
0xad2788 memcmp
0xad278c memcpy
0xad2790 memmove
0xad2794 memset
0xad2798 printf
0xad279c realloc
0xad27a0 signal
0xad27a4 strlen
0xad27a8 strncmp
0xad27ac vfprintf
0xad27b0 wcslen
EAT(Export Address Table) is none