Report - disableclr.exe

RAT Malicious Library PE32 PE File
ScreenShot
Created 2023.05.01 15:42 Machine s1_win7_x6401
Filename disableclr.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
7
Behavior Score
0.2
ZERO API file : clean
VT API (file)
md5 6f7ee6c7d8f302d4c292508696a6dedb
sha256 275716b9b3bfbea8ebc3cc06d8b36bf1d247457a3972fc3acb2106d15664667e
ssdeep 768:/7681I8d8pPbun2WrQZXOakSMVA7okqolospAM:/7ly3WUVktHsp
imphash c8b414c149a1d1bf4fd0150a574885bd
impfuzzy 48:Uw52BuOzQmCmQlKyUFZ80Jtn7y+qFGrTXg:Uw52BukDCmQlSmwp7PqFG3g
  Network IP location

Signature (1cnts)

Level Description
info The executable uses a known packer

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info Win_Backdoor_AsyncRAT_Zero Win Backdoor AsyncRAT binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x407074 GetFileSize
 0x407078 WriteFile
 0x40707c SetFilePointer
 0x407080 FlushViewOfFile
 0x407084 GetFileAttributesA
 0x407088 GetModuleFileNameA
 0x40708c GetSystemInfo
 0x407090 GlobalFree
 0x407094 GlobalAlloc
 0x407098 CopyFileA
 0x40709c LoadLibraryA
 0x4070a0 LocalFree
 0x4070a4 LocalAlloc
 0x4070a8 QueryDosDeviceA
 0x4070ac GetCurrentProcess
 0x4070b0 FindClose
 0x4070b4 FindFirstFileA
 0x4070b8 GetFileTime
 0x4070bc SetFileTime
 0x4070c0 TerminateProcess
 0x4070c4 GetTickCount
 0x4070c8 Sleep
 0x4070cc CreateFileA
 0x4070d0 CreateFileMappingA
 0x4070d4 MapViewOfFile
 0x4070d8 HeapFree
 0x4070dc IsBadReadPtr
 0x4070e0 UnmapViewOfFile
 0x4070e4 CreateToolhelp32Snapshot
 0x4070e8 Module32First
 0x4070ec Module32Next
 0x4070f0 GetModuleHandleA
 0x4070f4 GetProcAddress
 0x4070f8 OpenProcess
 0x4070fc CloseHandle
 0x407100 GetStdHandle
 0x407104 GetConsoleScreenBufferInfo
 0x407108 SetConsoleTextAttribute
 0x40710c SetFileAttributesA
 0x407110 DeleteFileA
 0x407114 GetLastError
 0x407118 MoveFileExA
 0x40711c GetProcessHeap
 0x407120 HeapAlloc
 0x407124 FreeLibrary
USER32.dll
 0x40719c GetUserObjectSecurity
ADVAPI32.dll
 0x407000 ControlService
 0x407004 GetAce
 0x407008 DeleteAce
 0x40700c GetSecurityDescriptorDacl
 0x407010 GetFileSecurityA
 0x407014 GetNamedSecurityInfoA
 0x407018 BuildExplicitAccessWithNameA
 0x40701c AllocateAndInitializeSid
 0x407020 SetEntriesInAclA
 0x407024 SetNamedSecurityInfoA
 0x407028 FreeSid
 0x40702c LookupPrivilegeValueA
 0x407030 AdjustTokenPrivileges
 0x407034 OpenProcessToken
 0x407038 GetTokenInformation
 0x40703c GetSecurityDescriptorOwner
 0x407040 IsValidSid
 0x407044 LookupAccountSidA
 0x407048 StartServiceA
 0x40704c EnumDependentServicesA
 0x407050 QueryServiceStatusEx
 0x407054 OpenServiceA
 0x407058 ChangeServiceConfig2A
 0x40705c OpenSCManagerA
 0x407060 EnumServicesStatusExA
 0x407064 CloseServiceHandle
 0x407068 CheckTokenMembership
 0x40706c GetAclInformation
imagehlp.dll
 0x4071a4 CheckSumMappedFile
MSVCRT.dll
 0x40712c _vsnprintf
 0x407130 _controlfp
 0x407134 atoi
 0x407138 _strcmpi
 0x40713c strlen
 0x407140 printf
 0x407144 memset
 0x407148 _strnicmp
 0x40714c _except_handler3
 0x407150 _local_unwind2
 0x407154 _splitpath
 0x407158 memcmp
 0x40715c memcpy
 0x407160 free
 0x407164 malloc
 0x407168 strncpy
 0x40716c _exit
 0x407170 _XcptFilter
 0x407174 exit
 0x407178 __p___initenv
 0x40717c __getmainargs
 0x407180 _initterm
 0x407184 __setusermatherr
 0x407188 _adjust_fdiv
 0x40718c __p__commode
 0x407190 __p__fmode
 0x407194 __set_app_type

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure