Report - dd4add6r.s6xlt.exe

UPX Malicious Library OS Processor Check PE File PE32
ScreenShot
Created 2023.05.28 14:14 Machine s1_win7_x6401
Filename dd4add6r.s6xlt.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
5
Behavior Score
1.8
ZERO API file : malware
VT API (file) 23 detected (AIDetectMalware, malicious, high confidence, Artemis, confidence, Kryptik, HTQK, score, FileRepMalware, high, Generic ML PUA, Static AI, Suspicious PE, Sabsik, Detected, BScope, TrojanPSW, RedLine, unsafe)
md5 63d2ab075242a38f5c6240cb7eafbd35
sha256 87513157828305d4d09ff58df2a39eb9e2bdcaa72bd01f11bb86dc56dc164fb2
ssdeep 12288:vV38R0oK/pYZ5ptdxOSGd4+A9UfzAddKwlyrq+tZ5mX6h:vV38R0c5HCSGd4+iUfzKsLT5mKh
imphash f785b0c64982fe4ad638456ea1aec30d
impfuzzy 48:O+ZWlSXedZ+fcM1t0YtjGLkbi2IrQ8WtI6/nBoiryEt6Rkv4z0QSvpKzZlyGwtJ9:OmWlQCZ+fcM1t0GjOg6g+EKWf1F
  Network IP location

Signature (4cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x424020 GetLocaleInfoW
 0x424024 SetStdHandle
 0x424028 WriteConsoleW
 0x42402c GetConsoleOutputCP
 0x424030 WriteConsoleA
 0x424034 LoadLibraryA
 0x424038 InitializeCriticalSectionAndSpinCount
 0x42403c GetStringTypeW
 0x424040 GetStringTypeA
 0x424044 IsValidLocale
 0x424048 EnumSystemLocalesA
 0x42404c GetLocaleInfoA
 0x424050 GetUserDefaultLCID
 0x424054 IsValidCodePage
 0x424058 GetOEMCP
 0x42405c GetACP
 0x424060 HeapSize
 0x424064 CloseHandle
 0x424068 CreateFileA
 0x42406c ReadFile
 0x424070 FlushFileBuffers
 0x424074 GetConsoleMode
 0x424078 GetConsoleCP
 0x42407c GetSystemTimeAsFileTime
 0x424080 GetCurrentProcessId
 0x424084 GetTickCount
 0x424088 QueryPerformanceCounter
 0x42408c GetStartupInfoA
 0x424090 GetFileType
 0x424094 SetHandleCount
 0x424098 FreeEnvironmentStringsW
 0x42409c GetEnvironmentStrings
 0x4240a0 FreeEnvironmentStringsA
 0x4240a4 GetModuleFileNameA
 0x4240a8 GetStdHandle
 0x4240ac WriteFile
 0x4240b0 ExitProcess
 0x4240b4 HeapReAlloc
 0x4240b8 VirtualAlloc
 0x4240bc VirtualFree
 0x4240c0 HeapCreate
 0x4240c4 GetEnvironmentStringsW
 0x4240c8 MultiByteToWideChar
 0x4240cc GetModuleHandleA
 0x4240d0 SetFilePointer
 0x4240d4 GetProcAddress
 0x4240d8 InterlockedIncrement
 0x4240dc InterlockedDecrement
 0x4240e0 WideCharToMultiByte
 0x4240e4 Sleep
 0x4240e8 InterlockedExchange
 0x4240ec InitializeCriticalSection
 0x4240f0 DeleteCriticalSection
 0x4240f4 EnterCriticalSection
 0x4240f8 LeaveCriticalSection
 0x4240fc RtlUnwind
 0x424100 TerminateProcess
 0x424104 GetCurrentProcess
 0x424108 UnhandledExceptionFilter
 0x42410c SetUnhandledExceptionFilter
 0x424110 IsDebuggerPresent
 0x424114 RaiseException
 0x424118 GetLastError
 0x42411c HeapFree
 0x424120 GetCommandLineA
 0x424124 LCMapStringA
 0x424128 LCMapStringW
 0x42412c GetCPInfo
 0x424130 GetModuleHandleW
 0x424134 TlsGetValue
 0x424138 TlsAlloc
 0x42413c TlsSetValue
 0x424140 TlsFree
 0x424144 SetLastError
 0x424148 GetCurrentThreadId
 0x42414c HeapAlloc
USER32.dll
 0x424154 GetWindowRect
 0x424158 IsMenu
 0x42415c GetSubMenu
 0x424160 SetDlgItemInt
 0x424164 GetWindowPlacement
 0x424168 CharLowerBuffA
 0x42416c EnableMenuItem
 0x424170 CheckMenuRadioItem
 0x424174 GetSysColor
 0x424178 KillTimer
 0x42417c DestroyIcon
 0x424180 DestroyWindow
 0x424184 PostQuitMessage
 0x424188 GetClientRect
 0x42418c MoveWindow
 0x424190 GetSystemMenu
 0x424194 SetTimer
 0x424198 SetWindowPlacement
 0x42419c InsertMenuItemA
 0x4241a0 GetMenu
 0x4241a4 CheckMenuItem
 0x4241a8 SetMenuItemInfoA
 0x4241ac SetActiveWindow
 0x4241b0 DefDlgProcA
 0x4241b4 RegisterClassA
 0x4241b8 EndDialog
 0x4241bc SetDlgItemTextA
 0x4241c0 EnumClipboardFormats
 0x4241c4 GetClipboardData
 0x4241c8 CloseClipboard
 0x4241cc GetClassInfoA
 0x4241d0 CallWindowProcA
 0x4241d4 SetWindowLongA
 0x4241d8 IsDlgButtonChecked
 0x4241dc SetWindowTextA
 0x4241e0 CheckDlgButton
 0x4241e4 GetActiveWindow
 0x4241e8 LoadCursorA
 0x4241ec MessageBoxA
 0x4241f0 wsprintfA
 0x4241f4 GetDlgItemTextA
 0x4241f8 SendMessageA
 0x4241fc GetCursorPos
 0x424200 TrackPopupMenu
 0x424204 ClientToScreen
 0x424208 DestroyMenu
 0x42420c CreatePopupMenu
 0x424210 AppendMenuA
 0x424214 SendDlgItemMessageA
 0x424218 GetDlgItem
GDI32.dll
 0x424000 GetStockObject
 0x424004 DeleteObject
 0x424008 SetBkMode
 0x42400c SetTextColor
 0x424010 CreateFontIndirectA
 0x424014 SelectObject
 0x424018 GetObjectA
kernel32.dll
 0x49ea9c ReadThread
 0x49eaa0 ReadHandle
 0x49eaa4 QueryStyle
 0x49eaa8 OpenBrush
user32.dll
 0x49eab0 UnregisterProcess
 0x49eab4 ReadCursor
 0x49eab8 CreateThread
 0x49eabc GetStyle
 0x49eac0 DestroyProcess
advapi32.dll
 0x49eac8 TerminateClass
 0x49eacc AllocateMessage
 0x49ead0 RegisterEvent
 0x49ead4 AllocateBitmap
 0x49ead8 SetWindow
 0x49eadc TerminateTimer

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure