Report - 009.jpg

Malicious Library PE32 PE File
ScreenShot
Created 2023.05.09 09:05 Machine s1_win7_x6403
Filename 009.jpg
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
7
Behavior Score
3.4
ZERO API file : clean
VT API (file) 59 detected (MoywakA, Yakes, malicious, high confidence, Zepto, Sirefef, Unsafe, CoinMiner, Kraziomel, ZexaF, tuW@aCI8f4c, JNGX, Attribute, HighConfidence, dahmou, Phzx, Malware@#2j8aj70gyakn9, AGEN, BtcMine, ai score=80, score, BitCoinMiner, R102015, RogueMiner, Kryptik, CLOUD, BHFyySM93QQ, Malicious PE, BCRZ, FileRepMetagen, Genetic, confidence, 100%, QVM20)
md5 baa51dc77e43c436c429a9131ce4b152
sha256 3a730aa52628321eea3dc14017a82e0da0ffbd72404de098f6c3e3809466af21
ssdeep 6144:XxgO8BdlEW0hpTunf3ll2RVdLXbn1pLaAow0G:iOWFo0nfVq1p3oV
imphash d3c395c79a26c436198307a9acf41f30
impfuzzy 24:v1mRyrreOdLv4XJfsOV1+NsZZZj8TccurPOovZ2cbkV4+ee1ChkmFsuY:ZdwXeO3ZZZdmk2c6Tee1CjFK
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 59 AntiVirus engines on VirusTotal as malicious
watch Disables proxy possibly for traffic interception
notice Allocates read-write-execute memory (usually to unpack itself)
notice Resolves a suspicious Top Level Domain (TLD)
info Checks amount of memory in system
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
drucherblo.ru Unknown clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x40147a UpdateResourceA
 0x40147e SetConsoleTitleA
 0x401482 OpenProfileUserMapping
 0x401486 FileTimeToSystemTime
 0x40148a GetSystemWindowsDirectoryA
 0x40148e EnumCalendarInfoExA
 0x401492 Process32Next
 0x401496 IsValidLocale
 0x40149a ReleaseSemaphore
 0x40149e GetCommModemStatus
 0x4014a2 ExitVDM
 0x4014a6 GetFileSize
 0x4014aa GetProfileIntA
 0x4014ae GetCurrentDirectoryA
 0x4014b2 VirtualAlloc
 0x4014b6 SetThreadAffinityMask
 0x4014ba SetCommState
 0x4014be GetCPInfo
 0x4014c2 GetConsoleTitleA
 0x4014c6 RequestWakeupLatency
 0x4014ca ReadConsoleInputA
 0x4014ce GetSystemDefaultLCID
 0x4014d2 GetSystemDefaultLCID
 0x4014d6 GetStartupInfoA
 0x4014da GetConsoleCommandHistoryLengthA
 0x4014de EnumCalendarInfoA
 0x4014e2 WriteConsoleInputA
 0x4014e6 GetSystemTime
 0x4014ea MultiByteToWideChar
 0x4014ee ConnectNamedPipe
KERNEL32.DLL
 0x4014f6 GetEnvironmentVariableA
 0x4014fa GetModuleFileNameA
 0x4014fe EnumSystemGeoID
 0x401502 GetCommandLineA
 0x401506 UnregisterWait
 0x40150a GetProcessId
 0x40150e Heap32ListNext
 0x401512 OpenSemaphoreA
 0x401516 GetConsoleAliasExesA
 0x40151a FileTimeToLocalFileTime
 0x40151e SetLocalTime
 0x401522 SystemTimeToTzSpecificLocalTime
 0x401526 GetWindowsDirectoryA
 0x40152a GetProcessId
 0x40152e GetDiskFreeSpaceExA
 0x401532 OpenWaitableTimerA
 0x401536 LocalFileTimeToFileTime
 0x40153a SetVDMCurrentDirectories
 0x40153e GetConsoleAliasA
 0x401542 GetThreadPriority
 0x401546 FlushFileBuffers
 0x40154a HeapCompact
 0x40154e GetEnvironmentVariableA
 0x401552 QueryInformationJobObject
 0x401556 GlobalDeleteAtom
MPR
 0x40155e WNetCancelConnectionW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure