ScreenShot
Created | 2023.03.31 16:33 | Machine | s1_win7_x6401 |
Filename | white.exe | ||
Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 30 detected (GenericKD, Stealc, Attribute, HighConfidence, malicious, moderate confidence, Kryptik, HTEZ, score, Stealerc, PWSX, juiav, Artemis, Tnega, FPWUAG, Detected, ai score=85, CLOUD, AGen, ZexaF, PM2@a4wjBpYT) | ||
md5 | 89a133e7158e8bb6e2614a7c9bd7ff5d | ||
sha256 | b974225598477c7a4692e46cb12da74272a55f762f4e4b2539ce43ea5d502b61 | ||
ssdeep | 24576:IBHp0AVAyuFvrOaq7Dk17o3SFGAcRbNft7+xElgjRcDJLX2FmI7oyO:IBHSQkFSDk1E+GtJNft7WjjRcVLT | ||
imphash | 4f49b28f7be60d11310d563049d6e2ee | ||
impfuzzy | 48:lAofCCaFc5JOgXlhNOqdQGhETS5o30QlJEkJZZe:uofCCec5gil3OqdQIIEgZE |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
danger | File has been identified by 30 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Sends data using the HTTP POST Method |
info | Queries for the computername |
Rules (5cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | NPKI_Zero | File included NPKI | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
PE API
IAT(Import Address Table) Library
GDI32.dll
0x6a41d8 CreateFontIndirectA
0x6a41dc DeleteObject
0x6a41e0 GetObjectA
0x6a41e4 GetStockObject
0x6a41e8 SetBkMode
0x6a41ec SetPixel
0x6a41f0 SetTextColor
KERNEL32.dll
0x6a41f8 CloseHandle
0x6a41fc CreateWaitableTimerW
0x6a4200 DeleteCriticalSection
0x6a4204 EnterCriticalSection
0x6a4208 ExitProcess
0x6a420c FindClose
0x6a4210 FindFirstFileA
0x6a4214 FindNextFileA
0x6a4218 FreeLibrary
0x6a421c GetCommandLineA
0x6a4220 GetLastError
0x6a4224 GetModuleHandleA
0x6a4228 GetProcAddress
0x6a422c GetStdHandle
0x6a4230 GetSystemInfo
0x6a4234 GlobalAlloc
0x6a4238 GlobalFlags
0x6a423c HeapDestroy
0x6a4240 InitializeCriticalSection
0x6a4244 LeaveCriticalSection
0x6a4248 LoadLibraryA
0x6a424c SetUnhandledExceptionFilter
0x6a4250 SetWaitableTimer
0x6a4254 TlsGetValue
0x6a4258 VirtualProtect
0x6a425c VirtualQuery
0x6a4260 WaitForSingleObject
msvcrt.dll
0x6a4268 _strdup
0x6a426c _stricoll
msvcrt.dll
0x6a4274 __getmainargs
0x6a4278 __mb_cur_max
0x6a427c __p__environ
0x6a4280 __p__fmode
0x6a4284 __set_app_type
0x6a4288 _cexit
0x6a428c _errno
0x6a4290 _fpreset
0x6a4294 _fullpath
0x6a4298 _iob
0x6a429c _isctype
0x6a42a0 _onexit
0x6a42a4 _pctype
0x6a42a8 _setmode
0x6a42ac abort
0x6a42b0 atexit
0x6a42b4 calloc
0x6a42b8 free
0x6a42bc fwrite
0x6a42c0 malloc
0x6a42c4 mbstowcs
0x6a42c8 memcpy
0x6a42cc realloc
0x6a42d0 setlocale
0x6a42d4 signal
0x6a42d8 strcmp
0x6a42dc strcoll
0x6a42e0 strlen
0x6a42e4 tolower
0x6a42e8 vfprintf
0x6a42ec wcstombs
USER32.dll
0x6a42f4 BeginPaint
0x6a42f8 DispatchMessageA
0x6a42fc EndPaint
0x6a4300 GetClientRect
0x6a4304 GetMessageA
0x6a4308 RegisterClassA
0x6a430c TranslateMessage
USERENV.dll
0x6a4314 CreateEnvironmentBlock
0x6a4318 DestroyEnvironmentBlock
0x6a431c GetUserProfileDirectoryW
EAT(Export Address Table) is none
GDI32.dll
0x6a41d8 CreateFontIndirectA
0x6a41dc DeleteObject
0x6a41e0 GetObjectA
0x6a41e4 GetStockObject
0x6a41e8 SetBkMode
0x6a41ec SetPixel
0x6a41f0 SetTextColor
KERNEL32.dll
0x6a41f8 CloseHandle
0x6a41fc CreateWaitableTimerW
0x6a4200 DeleteCriticalSection
0x6a4204 EnterCriticalSection
0x6a4208 ExitProcess
0x6a420c FindClose
0x6a4210 FindFirstFileA
0x6a4214 FindNextFileA
0x6a4218 FreeLibrary
0x6a421c GetCommandLineA
0x6a4220 GetLastError
0x6a4224 GetModuleHandleA
0x6a4228 GetProcAddress
0x6a422c GetStdHandle
0x6a4230 GetSystemInfo
0x6a4234 GlobalAlloc
0x6a4238 GlobalFlags
0x6a423c HeapDestroy
0x6a4240 InitializeCriticalSection
0x6a4244 LeaveCriticalSection
0x6a4248 LoadLibraryA
0x6a424c SetUnhandledExceptionFilter
0x6a4250 SetWaitableTimer
0x6a4254 TlsGetValue
0x6a4258 VirtualProtect
0x6a425c VirtualQuery
0x6a4260 WaitForSingleObject
msvcrt.dll
0x6a4268 _strdup
0x6a426c _stricoll
msvcrt.dll
0x6a4274 __getmainargs
0x6a4278 __mb_cur_max
0x6a427c __p__environ
0x6a4280 __p__fmode
0x6a4284 __set_app_type
0x6a4288 _cexit
0x6a428c _errno
0x6a4290 _fpreset
0x6a4294 _fullpath
0x6a4298 _iob
0x6a429c _isctype
0x6a42a0 _onexit
0x6a42a4 _pctype
0x6a42a8 _setmode
0x6a42ac abort
0x6a42b0 atexit
0x6a42b4 calloc
0x6a42b8 free
0x6a42bc fwrite
0x6a42c0 malloc
0x6a42c4 mbstowcs
0x6a42c8 memcpy
0x6a42cc realloc
0x6a42d0 setlocale
0x6a42d4 signal
0x6a42d8 strcmp
0x6a42dc strcoll
0x6a42e0 strlen
0x6a42e4 tolower
0x6a42e8 vfprintf
0x6a42ec wcstombs
USER32.dll
0x6a42f4 BeginPaint
0x6a42f8 DispatchMessageA
0x6a42fc EndPaint
0x6a4300 GetClientRect
0x6a4304 GetMessageA
0x6a4308 RegisterClassA
0x6a430c TranslateMessage
USERENV.dll
0x6a4314 CreateEnvironmentBlock
0x6a4318 DestroyEnvironmentBlock
0x6a431c GetUserProfileDirectoryW
EAT(Export Address Table) is none