Report - DVolPro.dll

UPX Malicious Library DLL PE File PE32
ScreenShot
Created 2023.06.05 16:43 Machine s1_win7_x6402
Filename DVolPro.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.8
ZERO API file : clean
VT API (file) 36 detected (malicious, high confidence, GenericKD, Artemis, Vku9, VMProtect, ZedlaF, @aW8tn2pi, ABRisk, BJTL, Attribute, HighConfidence, Generic@AI, RDML, 8DA6E998ht54ldGUo3Pn6g, ai score=84, Detected, unsafe, RnkBend, R002H09EH23, susgen)
md5 30e1d0c1941167612a1da0bb79a03be8
sha256 01fd9d0fefc8a123f59347eb48de14336d641b22440ba20b6724f506b0a892ad
ssdeep 196608:MqwXvaXu8N9GEFH20R85wLIhiNz6aWSzJUovW:6AH2I8czN+tSzJxW
imphash 6b3259bfd5a1809cf0bcb645c8a4a5f7
impfuzzy 12:v8FjQ5kBZGoQtXJxZGb9AJcDfA5kLfP9m:voQ58QtXJHc9NDI5Q8
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x107ae000 GetVersionExW
USER32.dll
 0x107ae008 CharUpperW
ADVAPI32.dll
 0x107ae010 SetFileSecurityW
WTSAPI32.dll
 0x107ae018 WTSSendMessageW
KERNEL32.dll
 0x107ae020 VirtualQuery
USER32.dll
 0x107ae028 GetProcessWindowStation
KERNEL32.dll
 0x107ae030 LocalAlloc
 0x107ae034 LocalFree
 0x107ae038 GetModuleFileNameW
 0x107ae03c GetProcessAffinityMask
 0x107ae040 SetProcessAffinityMask
 0x107ae044 SetThreadAffinityMask
 0x107ae048 Sleep
 0x107ae04c ExitProcess
 0x107ae050 FreeLibrary
 0x107ae054 LoadLibraryA
 0x107ae058 GetModuleHandleA
 0x107ae05c GetProcAddress
USER32.dll
 0x107ae064 GetProcessWindowStation
 0x107ae068 GetUserObjectInformationW

EAT(Export Address Table) Library

0x10009350 RARGetDllVersion
0x1000a110 RAROpenArchive
0x10009d60 RAROpenArchiveEx
0x100096c0 RARProcessFile
0x100096e0 RARProcessFileW
0x10009c40 RARReadHeader
0x100097e0 RARReadHeaderEx
0x10009290 RARSetCallback
0x10009270 RARSetChangeVolProc
0x100092d0 RARSetPassword
0x100092b0 RARSetProcessDataProc
0x10009bf0 VolPro


Similarity measure (PE file only) - Checking for service failure