ScreenShot
Created | 2023.05.30 17:21 | Machine | s1_win7_x6403 |
Filename | trust.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 33 detected (AIDetectMalware, Artemis, Save, malicious, Attribute, HighConfidence, high confidence, score, DropperX, Lockbit, moderate, Static AI, Suspicious PE, STOP, StopCrypt, Detected, unsafe, Generic@AI, RDML, G9P1wnYposaofFJ4p8r26Q, susgen, confidence, 100%) | ||
md5 | 1f95b8c2dc09a84f6a9fe6f74dbf7d96 | ||
sha256 | 9892c10b94bbb90688cdc3dd6d51f3343b9cc19069fa4c1fe3594600a3d03330 | ||
ssdeep | 3072:pD8qOVO6HzqC1fCwNQrRLwY8xzIbbTDnxG5JU1DAY2L0a5M6:F8qOVOjtwNQrRLwY8x8bbTD0Oa5 | ||
imphash | 9514ea1f6b76796d84439e43008aa7f1 | ||
impfuzzy | 24:6bXV4WpV4WancvuUbD8krkR9EdQBmvyv1eo91IHoqpsOUtOovEG1tmpVFQ8REh/T:IdDdRy7JODVG1t4wKcRfNIKD |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
danger | File has been identified by 33 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | This executable has a PDB path |
Rules (5cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x401018 GetDateFormatA
0x40101c WaitForMultipleObjectsEx
0x401020 FreeConsole
0x401024 GetCalendarInfoA
0x401028 WritePrivateProfileStructW
0x40102c IsProcessorFeaturePresent
0x401030 GetModuleFileNameW
0x401034 CreateActCtxA
0x401038 WritePrivateProfileStringW
0x40103c ReplaceFileA
0x401040 GetStringTypeExA
0x401044 DeactivateActCtx
0x401048 GetStdHandle
0x40104c GetLogicalDriveStringsA
0x401050 OpenMutexW
0x401054 GetLastError
0x401058 ReadConsoleOutputCharacterA
0x40105c GetProcAddress
0x401060 AttachConsole
0x401064 VirtualAlloc
0x401068 GetConsoleAliasesLengthA
0x40106c LoadLibraryA
0x401070 InterlockedExchangeAdd
0x401074 LocalAlloc
0x401078 GetFileType
0x40107c CreateFileMappingW
0x401080 FindFirstVolumeMountPointW
0x401084 GetNumberFormatW
0x401088 CreateEventW
0x40108c GetModuleFileNameA
0x401090 lstrcmpiW
0x401094 GetModuleHandleA
0x401098 CreateMutexA
0x40109c CancelTimerQueueTimer
0x4010a0 GetFileAttributesExW
0x4010a4 GetConsoleCursorInfo
0x4010a8 ScrollConsoleScreenBufferA
0x4010ac GetCurrentThreadId
0x4010b0 GetVersionExA
0x4010b4 FindAtomW
0x4010b8 AddConsoleAliasA
0x4010bc DebugBreak
0x4010c0 FindNextVolumeA
0x4010c4 IsBadReadPtr
0x4010c8 VirtualFree
0x4010cc GetCommState
0x4010d0 GetModuleHandleW
0x4010d4 CreateTimerQueueTimer
0x4010d8 GetCommandLineA
0x4010dc GetStartupInfoA
0x4010e0 RaiseException
0x4010e4 RtlUnwind
0x4010e8 TerminateProcess
0x4010ec GetCurrentProcess
0x4010f0 UnhandledExceptionFilter
0x4010f4 SetUnhandledExceptionFilter
0x4010f8 IsDebuggerPresent
0x4010fc HeapAlloc
0x401100 HeapFree
0x401104 Sleep
0x401108 ExitProcess
0x40110c WriteFile
0x401110 FreeEnvironmentStringsA
0x401114 GetEnvironmentStrings
0x401118 FreeEnvironmentStringsW
0x40111c WideCharToMultiByte
0x401120 GetEnvironmentStringsW
0x401124 SetHandleCount
0x401128 DeleteCriticalSection
0x40112c TlsGetValue
0x401130 TlsAlloc
0x401134 TlsSetValue
0x401138 TlsFree
0x40113c InterlockedIncrement
0x401140 SetLastError
0x401144 InterlockedDecrement
0x401148 HeapCreate
0x40114c QueryPerformanceCounter
0x401150 GetTickCount
0x401154 GetCurrentProcessId
0x401158 GetSystemTimeAsFileTime
0x40115c LeaveCriticalSection
0x401160 EnterCriticalSection
0x401164 HeapReAlloc
0x401168 GetCPInfo
0x40116c GetACP
0x401170 GetOEMCP
0x401174 IsValidCodePage
0x401178 HeapSize
0x40117c InitializeCriticalSectionAndSpinCount
0x401180 LCMapStringA
0x401184 MultiByteToWideChar
0x401188 LCMapStringW
0x40118c GetStringTypeA
0x401190 GetStringTypeW
0x401194 GetLocaleInfoA
USER32.dll
0x40119c CharLowerBuffA
GDI32.dll
0x401008 EnumFontsW
0x40100c GetCharABCWidthsFloatA
0x401010 GetCharWidthW
ADVAPI32.dll
0x401000 MapGenericMask
EAT(Export Address Table) is none
KERNEL32.dll
0x401018 GetDateFormatA
0x40101c WaitForMultipleObjectsEx
0x401020 FreeConsole
0x401024 GetCalendarInfoA
0x401028 WritePrivateProfileStructW
0x40102c IsProcessorFeaturePresent
0x401030 GetModuleFileNameW
0x401034 CreateActCtxA
0x401038 WritePrivateProfileStringW
0x40103c ReplaceFileA
0x401040 GetStringTypeExA
0x401044 DeactivateActCtx
0x401048 GetStdHandle
0x40104c GetLogicalDriveStringsA
0x401050 OpenMutexW
0x401054 GetLastError
0x401058 ReadConsoleOutputCharacterA
0x40105c GetProcAddress
0x401060 AttachConsole
0x401064 VirtualAlloc
0x401068 GetConsoleAliasesLengthA
0x40106c LoadLibraryA
0x401070 InterlockedExchangeAdd
0x401074 LocalAlloc
0x401078 GetFileType
0x40107c CreateFileMappingW
0x401080 FindFirstVolumeMountPointW
0x401084 GetNumberFormatW
0x401088 CreateEventW
0x40108c GetModuleFileNameA
0x401090 lstrcmpiW
0x401094 GetModuleHandleA
0x401098 CreateMutexA
0x40109c CancelTimerQueueTimer
0x4010a0 GetFileAttributesExW
0x4010a4 GetConsoleCursorInfo
0x4010a8 ScrollConsoleScreenBufferA
0x4010ac GetCurrentThreadId
0x4010b0 GetVersionExA
0x4010b4 FindAtomW
0x4010b8 AddConsoleAliasA
0x4010bc DebugBreak
0x4010c0 FindNextVolumeA
0x4010c4 IsBadReadPtr
0x4010c8 VirtualFree
0x4010cc GetCommState
0x4010d0 GetModuleHandleW
0x4010d4 CreateTimerQueueTimer
0x4010d8 GetCommandLineA
0x4010dc GetStartupInfoA
0x4010e0 RaiseException
0x4010e4 RtlUnwind
0x4010e8 TerminateProcess
0x4010ec GetCurrentProcess
0x4010f0 UnhandledExceptionFilter
0x4010f4 SetUnhandledExceptionFilter
0x4010f8 IsDebuggerPresent
0x4010fc HeapAlloc
0x401100 HeapFree
0x401104 Sleep
0x401108 ExitProcess
0x40110c WriteFile
0x401110 FreeEnvironmentStringsA
0x401114 GetEnvironmentStrings
0x401118 FreeEnvironmentStringsW
0x40111c WideCharToMultiByte
0x401120 GetEnvironmentStringsW
0x401124 SetHandleCount
0x401128 DeleteCriticalSection
0x40112c TlsGetValue
0x401130 TlsAlloc
0x401134 TlsSetValue
0x401138 TlsFree
0x40113c InterlockedIncrement
0x401140 SetLastError
0x401144 InterlockedDecrement
0x401148 HeapCreate
0x40114c QueryPerformanceCounter
0x401150 GetTickCount
0x401154 GetCurrentProcessId
0x401158 GetSystemTimeAsFileTime
0x40115c LeaveCriticalSection
0x401160 EnterCriticalSection
0x401164 HeapReAlloc
0x401168 GetCPInfo
0x40116c GetACP
0x401170 GetOEMCP
0x401174 IsValidCodePage
0x401178 HeapSize
0x40117c InitializeCriticalSectionAndSpinCount
0x401180 LCMapStringA
0x401184 MultiByteToWideChar
0x401188 LCMapStringW
0x40118c GetStringTypeA
0x401190 GetStringTypeW
0x401194 GetLocaleInfoA
USER32.dll
0x40119c CharLowerBuffA
GDI32.dll
0x401008 EnumFontsW
0x40100c GetCharABCWidthsFloatA
0x401010 GetCharWidthW
ADVAPI32.dll
0x401000 MapGenericMask
EAT(Export Address Table) is none