Report - cubalibre2

Malicious Library DLL PE32 PE File
ScreenShot
Created 2023.03.29 17:48 Machine s1_win7_x6403
Filename cubalibre2
Type PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
2
Behavior Score
3.4
ZERO API file : malware
VT API (file) 52 detected (CobaltStrike, Windows, Malicious, score, unsafe, Rozena, confidence, 100%, ABRisk, SAJV, Cobalt, Artifact, Countermeasure, LoaderWinGeneric, FochiBlz, jsnzvk, CLOUD, HIVE, SMYXBJR, Cometer, AGEN, ai score=83, Detected, R512891, ZedlaF, rK4@aug8n, BScope, Swrort, Gencirc, Static AI, Suspicious PE, GdSda)
md5 54a5f1bf56bb033fabafce49f03f6794
sha256 ba79214e7710368ac5a31fd31dd0ac3c06747dc19c8d2351e269f34d13e9525e
ssdeep 6144:kaRthwnolFjehLmM56GFivgnx6j5qDc4bf1cf:katXFjgiw6Mggnsqo4bfA
imphash 3de1be1af60a3342dbeeee7746f05e4a
impfuzzy 12:QB8wRJR+5TZnJ2cDkiiARZqRJh7jPXJNiXJGqYUtRC91KpJqifxiZn:Q2kfg1JlDdncJ9Leze91OqifQZn
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
info Checks if process is being debugged by a debugger
info Queries for the computername

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
212.193.30.14 RU Anton Mamaev 212.193.30.14 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x6bb0a0f0 CloseHandle
 0x6bb0a0f4 ConnectNamedPipe
 0x6bb0a0f8 CreateFileA
 0x6bb0a0fc CreateNamedPipeA
 0x6bb0a100 CreateThread
 0x6bb0a104 DeleteCriticalSection
 0x6bb0a108 EnterCriticalSection
 0x6bb0a10c GetCurrentProcess
 0x6bb0a110 GetCurrentProcessId
 0x6bb0a114 GetCurrentThreadId
 0x6bb0a118 GetLastError
 0x6bb0a11c GetModuleHandleA
 0x6bb0a120 GetProcAddress
 0x6bb0a124 GetSystemTimeAsFileTime
 0x6bb0a128 GetTickCount
 0x6bb0a12c InitializeCriticalSection
 0x6bb0a130 LeaveCriticalSection
 0x6bb0a134 QueryPerformanceCounter
 0x6bb0a138 ReadFile
 0x6bb0a13c SetUnhandledExceptionFilter
 0x6bb0a140 Sleep
 0x6bb0a144 TerminateProcess
 0x6bb0a148 TlsGetValue
 0x6bb0a14c UnhandledExceptionFilter
 0x6bb0a150 VirtualAlloc
 0x6bb0a154 VirtualProtect
 0x6bb0a158 VirtualQuery
 0x6bb0a15c WriteFile
msvcrt.dll
 0x6bb0a164 _amsg_exit
 0x6bb0a168 _initterm
 0x6bb0a16c _iob
 0x6bb0a170 _lock
 0x6bb0a174 _unlock
 0x6bb0a178 abort
 0x6bb0a17c calloc
 0x6bb0a180 free
 0x6bb0a184 fwrite
 0x6bb0a188 malloc
 0x6bb0a18c realloc
 0x6bb0a190 sprintf
 0x6bb0a194 strlen
 0x6bb0a198 strncmp
 0x6bb0a19c vfprintf

EAT(Export Address Table) Library

0x6bac1756 DllGetClassObject
0x6bac16fb DllMain
0x6bac1750 DllRegisterServer
0x6bac1753 DllUnregisterServer
0x6bac1763 StartW


Similarity measure (PE file only) - Checking for service failure