Report - dsync.exe

NPKI Malicious Library Malicious Packer ASPack Antivirus Create Service Socket DNS PWS[m] Escalate priviledges AntiDebug AntiVM PE32 PE File
ScreenShot
Created 2023.04.13 09:14 Machine s1_win7_x6401
Filename dsync.exe
Type PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
10.2
ZERO API file : malware
VT API (file) 16 detected (unsafe, Save, malicious, confidence, ZexaF, @NW@a4GZB5hG, Attribute, HighConfidence, score, high, Sabsik, 16LR1WK, Static AI, Suspicious PE)
md5 cbffe8bea10e64e86ede27ab60f61038
sha256 37ea3eb3f0479bf9a5ba2dbc1a8b3acaa0352410e38da1885f6a04ddfe3febc2
ssdeep 98304:U/tnlBUrVP0xvFjtL8YQ5ohhPPzYZw+G6tcQLfeQIqfM0O2c:6l2rVP0xvFjqToh1cy+G6tcQfeqHc
imphash 76e44e43d1c5b3a5b77477dda19cfbb4
impfuzzy 48:ZfCCaGGVdLkBmXlNFJlPvm/GcaqN1fyGN6qL:ZfCCZG3QBYltlH2aqN1fyV4
  Network IP location

Signature (20cnts)

Level Description
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Appends a known multi-family ransomware file extension to files that have been encrypted
watch Creates an Alternate Data Stream (ADS)
watch Creates known Hkit Backdoor files
watch Detects the presence of Wine emulator
watch File has been identified by 16 AntiVirus engines on VirusTotal as malicious
watch Manipulates memory of a non-child process indicative of process injection
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
watch Uses Sysinternals tools in order to add additional command line functionality
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice One or more potentially interesting buffers were extracted
notice Potentially malicious URLs were found in the process memory dump
notice Searches running processes potentially to identify processes for sandbox evasion
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Command line console output was observed
info One or more processes crashed

Rules (22cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
notice Create_Service Create a windows service memory
notice Escalate_priviledges Escalate priviledges memory
notice Generic_PWS_Memory_Zero PWS Memory memory
notice Network_DNS Communications use DNS memory
notice Network_TCP_Socket Communications over RAW Socket memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__ConsoleCtrl (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x4ee280 CloseHandle
 0x4ee284 CreateDirectoryA
 0x4ee288 CreateMutexA
 0x4ee28c CreateSemaphoreW
 0x4ee290 DeleteCriticalSection
 0x4ee294 EnterCriticalSection
 0x4ee298 ExitProcess
 0x4ee29c FindClose
 0x4ee2a0 FindFirstFileA
 0x4ee2a4 FindNextFileA
 0x4ee2a8 FreeLibrary
 0x4ee2ac GetCommandLineA
 0x4ee2b0 GetCurrentProcess
 0x4ee2b4 GetCurrentThreadId
 0x4ee2b8 GetFileSize
 0x4ee2bc GetLastError
 0x4ee2c0 GetModuleFileNameA
 0x4ee2c4 GetModuleHandleA
 0x4ee2c8 GetProcAddress
 0x4ee2cc GetSystemDirectoryA
 0x4ee2d0 InitializeCriticalSection
 0x4ee2d4 InterlockedDecrement
 0x4ee2d8 InterlockedExchange
 0x4ee2dc InterlockedIncrement
 0x4ee2e0 IsDBCSLeadByteEx
 0x4ee2e4 LeaveCriticalSection
 0x4ee2e8 LoadLibraryA
 0x4ee2ec LoadResource
 0x4ee2f0 LocalAlloc
 0x4ee2f4 LockResource
 0x4ee2f8 MultiByteToWideChar
 0x4ee2fc Process32First
 0x4ee300 Process32Next
 0x4ee304 ReleaseSemaphore
 0x4ee308 SetFileAttributesA
 0x4ee30c SetLastError
 0x4ee310 SetUnhandledExceptionFilter
 0x4ee314 SizeofResource
 0x4ee318 Sleep
 0x4ee31c TlsAlloc
 0x4ee320 TlsFree
 0x4ee324 TlsGetValue
 0x4ee328 TlsSetValue
 0x4ee32c VirtualProtect
 0x4ee330 VirtualQuery
 0x4ee334 WaitForSingleObject
 0x4ee338 WideCharToMultiByte
 0x4ee33c lstrcatA
 0x4ee340 lstrcmpA
 0x4ee344 lstrcpyA
 0x4ee348 lstrlenA
msvcrt.dll
 0x4ee350 _fdopen
 0x4ee354 _fstat
 0x4ee358 _lseek
 0x4ee35c _read
 0x4ee360 _strdup
 0x4ee364 _stricoll
 0x4ee368 _write
msvcrt.dll
 0x4ee370 __getmainargs
 0x4ee374 __mb_cur_max
 0x4ee378 __p__environ
 0x4ee37c __p__fmode
 0x4ee380 __set_app_type
 0x4ee384 _cexit
 0x4ee388 _errno
 0x4ee38c _filbuf
 0x4ee390 _flsbuf
 0x4ee394 _fpreset
 0x4ee398 _fullpath
 0x4ee39c _iob
 0x4ee3a0 _isctype
 0x4ee3a4 _onexit
 0x4ee3a8 _pctype
 0x4ee3ac _setmode
 0x4ee3b0 abort
 0x4ee3b4 atexit
 0x4ee3b8 atoi
 0x4ee3bc calloc
 0x4ee3c0 exit
 0x4ee3c4 fclose
 0x4ee3c8 fflush
 0x4ee3cc fopen
 0x4ee3d0 fputc
 0x4ee3d4 fputs
 0x4ee3d8 fread
 0x4ee3dc free
 0x4ee3e0 fseek
 0x4ee3e4 ftell
 0x4ee3e8 fwrite
 0x4ee3ec getenv
 0x4ee3f0 getwc
 0x4ee3f4 iswctype
 0x4ee3f8 localeconv
 0x4ee3fc malloc
 0x4ee400 mbstowcs
 0x4ee404 memchr
 0x4ee408 memcmp
 0x4ee40c memcpy
 0x4ee410 memmove
 0x4ee414 memset
 0x4ee418 printf
 0x4ee41c putwc
 0x4ee420 realloc
 0x4ee424 setlocale
 0x4ee428 setvbuf
 0x4ee42c signal
 0x4ee430 sprintf
 0x4ee434 strchr
 0x4ee438 strcmp
 0x4ee43c strcoll
 0x4ee440 strerror
 0x4ee444 strftime
 0x4ee448 strlen
 0x4ee44c strstr
 0x4ee450 strtod
 0x4ee454 strtoul
 0x4ee458 strxfrm
 0x4ee45c tolower
 0x4ee460 towlower
 0x4ee464 towupper
 0x4ee468 ungetc
 0x4ee46c ungetwc
 0x4ee470 vfprintf
 0x4ee474 wcscoll
 0x4ee478 wcsftime
 0x4ee47c wcslen
 0x4ee480 wcstombs
 0x4ee484 wcsxfrm
OLE32.dll
 0x4ee48c CoCreateInstance
 0x4ee490 CoInitialize
 0x4ee494 CoUninitialize

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure