Report - llaa25.exe

Malicious Library Malicious Packer PE64 PE File
ScreenShot
Created 2023.05.23 09:44 Machine s1_win7_x6401
Filename llaa25.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
1
Behavior Score
1.0
ZERO API file : clean
VT API (file) 11 detected (GenericKD, Artemis, Malicious, xyatyd, Casdet, CLOUD)
md5 b44b3fd2f45d55238c7e11df70148a9f
sha256 0fbeaa3d0492f83c2351aa8f91c429f063700d1fee4aa355e439c0862f6bb41f
ssdeep 3072:OPVosEAHkKqUa9antF5hvvJkeXp2QhHkKqUa9antF5hvvJkeXpx:uHEKq99UF5hvvfjhEKq99UF5hvvf
imphash b5bfd9f5c740d22e228bf934c6651a65
impfuzzy 48:4/diO9GQCWr71v9k/gKvlRSv6Uy/1bfjSYwEkFEoz/JG4toEkJ6HBhn6gpKC/4nZ:cdiO8QCC71v98oidnGe5a7+t
  Network IP location

Signature (3cnts)

Level Description
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x100001000 RegOpenKeyExW
 0x100001008 RegEnumKeyW
 0x100001010 RegCloseKey
 0x100001018 RegQueryValueExW
 0x100001020 RegSetValueExW
KERNEL32.dll
 0x1000010a0 Sleep
 0x1000010a8 SetEvent
 0x1000010b0 GetDriveTypeW
 0x1000010b8 FormatMessageW
 0x1000010c0 GetWindowsDirectoryW
 0x1000010c8 CreateThread
 0x1000010d0 GetDiskFreeSpaceW
 0x1000010d8 GetVolumeInformationW
 0x1000010e0 FreeLibrary
 0x1000010e8 LoadLibraryExW
 0x1000010f0 GetProcessHeap
 0x1000010f8 HeapFree
 0x100001100 lstrlenW
 0x100001108 GetTickCount
 0x100001110 CheckElevationEnabled
 0x100001118 GetModuleFileNameW
 0x100001120 GetLastError
 0x100001128 LocalFree
 0x100001130 HeapSetInformation
 0x100001138 CreateEventW
 0x100001140 CloseHandle
 0x100001148 WaitForSingleObject
 0x100001150 GetDiskFreeSpaceExW
 0x100001158 GetCommandLineW
 0x100001160 SetErrorMode
 0x100001168 GetStartupInfoA
 0x100001170 GetModuleHandleW
 0x100001178 MulDiv
 0x100001180 WideCharToMultiByte
 0x100001188 LocalAlloc
 0x100001190 RtlCaptureContext
 0x100001198 RtlLookupFunctionEntry
 0x1000011a0 RtlVirtualUnwind
 0x1000011a8 UnhandledExceptionFilter
 0x1000011b0 GetCurrentProcess
 0x1000011b8 TerminateProcess
 0x1000011c0 GetSystemTimeAsFileTime
 0x1000011c8 GetCurrentProcessId
 0x1000011d0 GetCurrentThreadId
 0x1000011d8 QueryPerformanceCounter
 0x1000011e0 SetUnhandledExceptionFilter
 0x1000011e8 HeapAlloc
 0x1000011f0 GetVolumeNameForVolumeMountPointW
GDI32.dll
 0x100001068 GetLayout
 0x100001070 ExtTextOutW
 0x100001078 SetBkMode
 0x100001080 SetTextColor
 0x100001088 SetBkColor
 0x100001090 GetTextExtentPoint32W
USER32.dll
 0x100001298 MessageBoxW
 0x1000012a0 ShowWindow
 0x1000012a8 SetFocus
 0x1000012b0 SendMessageW
 0x1000012b8 GetDlgItem
 0x1000012c0 EndDialog
 0x1000012c8 DialogBoxParamW
 0x1000012d0 DestroyWindow
 0x1000012d8 CreateDialogParamW
 0x1000012e0 IsDialogMessageW
 0x1000012e8 LoadStringW
 0x1000012f0 LoadIconW
 0x1000012f8 GetWindowLongPtrW
 0x100001300 EnableWindow
 0x100001308 GetWindowLongW
 0x100001310 GetSystemMetrics
 0x100001318 SetWindowLongPtrW
 0x100001320 GetClientRect
 0x100001328 SetDlgItemTextW
 0x100001330 EnumWindows
 0x100001338 DispatchMessageW
 0x100001340 TranslateMessage
 0x100001348 PeekMessageW
 0x100001350 GetSysColor
 0x100001358 SetForegroundWindow
 0x100001360 GetWindowTextW
 0x100001368 DrawFocusRect
 0x100001370 DestroyIcon
 0x100001378 DrawIconEx
 0x100001380 GetParent
 0x100001388 PostMessageW
 0x100001390 SendDlgItemMessageW
msvcrt.dll
 0x1000013b8 __set_app_type
 0x1000013c0 _fmode
 0x1000013c8 _commode
 0x1000013d0 ?terminate@@YAXXZ
 0x1000013d8 memset
 0x1000013e0 __setusermatherr
 0x1000013e8 _amsg_exit
 0x1000013f0 _initterm
 0x1000013f8 exit
 0x100001400 _cexit
 0x100001408 _exit
 0x100001410 _XcptFilter
 0x100001418 __C_specific_handler
 0x100001420 __getmainargs
 0x100001428 _vsnwprintf
 0x100001430 toupper
 0x100001438 _wcsicmp
ntdll.dll
 0x100001448 NtOpenProcessToken
 0x100001450 NtClose
 0x100001458 NtOpenThreadToken
 0x100001460 RtlNtStatusToDosError
 0x100001468 WinSqmAddToStream
 0x100001470 NtQueryInformationToken
ole32.dll
 0x100001480 CoTaskMemAlloc
 0x100001488 CoInitialize
 0x100001490 CoUninitialize
 0x100001498 CLSIDFromString
 0x1000014a0 CoTaskMemFree
 0x1000014a8 CoCreateInstance
 0x1000014b0 CoInitializeEx
SHLWAPI.dll
 0x100001248 StrStrIW
 0x100001250 StrToIntW
 0x100001258 StrCmpW
 0x100001260 StrCmpNW
 0x100001268 PathStripToRootW
 0x100001270 None
 0x100001278 StrFormatByteSizeW
 0x100001280 None
 0x100001288 SHDeleteKeyW
SHELL32.dll
 0x100001220 ShellExecuteExW
 0x100001228 SHGetFileInfoW
 0x100001230 ExtractIconExW
 0x100001238 None
VSSAPI.DLL
 0x1000013a0 CreateVssBackupComponentsInternal
 0x1000013a8 VssFreeSnapshotPropertiesInternal

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure