Report - 2

UPX Malicious Library AntiDebug AntiVM OS Processor Check DLL PE32 PE File
ScreenShot
Created 2023.04.26 07:43 Machine s1_win7_x6401
Filename 2
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
6.8
ZERO API file : clean
VT API (file)
md5 fca51c45c88a92f340faaca0a8e832c8
sha256 41770017c9f44ef476ba05e44fbd19b0df70a21156ff7fa9c9b5b7f4f07a3705
ssdeep 6144:GzsetYQi0K8xwAXr/fUT7td4HCp6hInogO5cJN2W3MnBJW2WraDOhTKnOF8QAZaR:FeaIfiP3O2sK2WraDOhel0WVvKX5H5N
imphash abbf45d53faf8e5020b1ed87d549651b
impfuzzy 24:Bcp0ZzuIzvfaS1jthbJBl3eDoroSATOovbOPZcjMC:Bcpi6wyS1jth7pXb3o
  Network IP location

Signature (16cnts)

Level Description
danger Executed a process and injected code into it
warning Generates some ICMP traffic
watch Allocates execute permission to another process indicative of possible code injection
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (14cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
yahoo.com US YAHOO-GQ1 98.137.11.164 clean
98.137.11.163 US YAHOO-GQ1 98.137.11.163 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x10010000 EnterCriticalSection
 0x10010004 LeaveCriticalSection
 0x10010008 InitializeCriticalSection
 0x1001000c CreateFileA
 0x10010010 CloseHandle
 0x10010014 GetLastError
 0x10010018 HeapWalk
 0x1001001c DeleteCriticalSection
 0x10010020 CreateThread
 0x10010024 SuspendThread
 0x10010028 FindFirstFileA
 0x1001002c FindNextFileA
 0x10010030 GetFileType
 0x10010034 VirtualAlloc
 0x10010038 CreateMutexA
 0x1001003c ReleaseMutex
 0x10010040 SetHandleInformation
 0x10010044 GetLocalTime
 0x10010048 QueryPerformanceCounter
 0x1001004c GetCurrentProcessId
 0x10010050 GetCurrentThreadId
 0x10010054 GetSystemTimeAsFileTime
 0x10010058 InitializeSListHead
 0x1001005c IsDebuggerPresent
 0x10010060 UnhandledExceptionFilter
 0x10010064 SetUnhandledExceptionFilter
 0x10010068 GetStartupInfoW
 0x1001006c IsProcessorFeaturePresent
 0x10010070 GetModuleHandleW
 0x10010074 GetCurrentProcess
 0x10010078 TerminateProcess
 0x1001007c InterlockedFlushSList
 0x10010080 RtlUnwind
 0x10010084 SetLastError
 0x10010088 InitializeCriticalSectionAndSpinCount
 0x1001008c TlsAlloc
 0x10010090 TlsGetValue
 0x10010094 TlsSetValue
 0x10010098 TlsFree
 0x1001009c FreeLibrary
 0x100100a0 GetProcAddress
 0x100100a4 LoadLibraryExW
 0x100100a8 ExitProcess
 0x100100ac GetModuleHandleExW
 0x100100b0 GetModuleFileNameA
 0x100100b4 MultiByteToWideChar
 0x100100b8 WideCharToMultiByte
 0x100100bc HeapFree
 0x100100c0 HeapAlloc
 0x100100c4 LCMapStringW
 0x100100c8 FindClose
 0x100100cc FindFirstFileExA
 0x100100d0 IsValidCodePage
 0x100100d4 GetACP
 0x100100d8 GetOEMCP
 0x100100dc GetCPInfo
 0x100100e0 GetCommandLineA
 0x100100e4 GetCommandLineW
 0x100100e8 GetEnvironmentStringsW
 0x100100ec FreeEnvironmentStringsW
 0x100100f0 GetProcessHeap
 0x100100f4 GetStdHandle
 0x100100f8 GetStringTypeW
 0x100100fc HeapSize
 0x10010100 HeapReAlloc
 0x10010104 SetStdHandle
 0x10010108 WriteFile
 0x1001010c FlushFileBuffers
 0x10010110 GetConsoleCP
 0x10010114 GetConsoleMode
 0x10010118 SetFilePointerEx
 0x1001011c WriteConsoleW
 0x10010120 DecodePointer
 0x10010124 CreateFileW
 0x10010128 RaiseException

EAT(Export Address Table) Library

0x1000e270 Motd


Similarity measure (PE file only) - Checking for service failure