ScreenShot
Created | 2023.06.11 22:28 | Machine | s1_win7_x6401 |
Filename | cleanmgr.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 45 detected (AIDetectMalware, Makoob, malicious, high confidence, score, GuLoader, NSIS, Vr4e, confidence, ABRisk, SQIH, DropperX, Redcap, dcsii, Loader, YXDFHZ, Artemis, Wacatac, Casdet, Detected, ai score=85, unsafe, Chgt, FalseSign, Pcnw) | ||
md5 | 21d050c21197079204d5b24526522bb2 | ||
sha256 | f77c51eef33beedfd0b41c1f02ce5b5bab6499b9242831031906c9d66d331c73 | ||
ssdeep | 6144:N6dANzV+OT7cpZWsomsyMI5sPkuVdjfHLScxwGvG8G8WQ:bP+OTQ7a0OkuT/LSSvOvQ | ||
imphash | e9c0657252137ac61c1eeeba4c021000 | ||
impfuzzy | 48:T1SKmvYO1wQ2nr+t8Alt8tz4eOGLlla/5LRFpV74dT+45EQX/1EowSv0Qxly6U0D:TMKeY0wQ2i42fw4rtu |
Network IP location
Signature (6cnts)
Level | Description |
---|---|
danger | File has been identified by 45 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Creates executable files on the filesystem |
notice | Drops an executable to the user AppData folder |
info | Checks amount of memory in system |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
Rules (8cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | PNG_Format_Zero | PNG Format | binaries (download) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x407070 GetTempPathA
0x407074 GetFileSize
0x407078 GetModuleFileNameA
0x40707c GetCurrentProcess
0x407080 CopyFileA
0x407084 ExitProcess
0x407088 SetEnvironmentVariableA
0x40708c Sleep
0x407090 GetTickCount
0x407094 GetCommandLineA
0x407098 lstrlenA
0x40709c GetVersion
0x4070a0 SetErrorMode
0x4070a4 lstrcpynA
0x4070a8 GetDiskFreeSpaceA
0x4070ac GlobalUnlock
0x4070b0 GetWindowsDirectoryA
0x4070b4 SetFileAttributesA
0x4070b8 GetLastError
0x4070bc CreateDirectoryA
0x4070c0 CreateProcessA
0x4070c4 RemoveDirectoryA
0x4070c8 CreateFileA
0x4070cc GetTempFileNameA
0x4070d0 ReadFile
0x4070d4 WriteFile
0x4070d8 lstrcpyA
0x4070dc MoveFileExA
0x4070e0 lstrcatA
0x4070e4 GetSystemDirectoryA
0x4070e8 GetProcAddress
0x4070ec GetExitCodeProcess
0x4070f0 WaitForSingleObject
0x4070f4 CompareFileTime
0x4070f8 SetFileTime
0x4070fc GetFileAttributesA
0x407100 SetCurrentDirectoryA
0x407104 MoveFileA
0x407108 GetFullPathNameA
0x40710c GetShortPathNameA
0x407110 SearchPathA
0x407114 CloseHandle
0x407118 lstrcmpiA
0x40711c CreateThread
0x407120 GlobalLock
0x407124 lstrcmpA
0x407128 DeleteFileA
0x40712c FindFirstFileA
0x407130 FindNextFileA
0x407134 FindClose
0x407138 SetFilePointer
0x40713c GetPrivateProfileStringA
0x407140 WritePrivateProfileStringA
0x407144 MulDiv
0x407148 MultiByteToWideChar
0x40714c FreeLibrary
0x407150 LoadLibraryExA
0x407154 GetModuleHandleA
0x407158 GlobalAlloc
0x40715c GlobalFree
0x407160 ExpandEnvironmentStringsA
USER32.dll
0x407184 GetSystemMenu
0x407188 SetClassLongA
0x40718c EnableMenuItem
0x407190 IsWindowEnabled
0x407194 SetWindowPos
0x407198 GetSysColor
0x40719c GetWindowLongA
0x4071a0 SetCursor
0x4071a4 LoadCursorA
0x4071a8 CheckDlgButton
0x4071ac GetMessagePos
0x4071b0 CallWindowProcA
0x4071b4 IsWindowVisible
0x4071b8 CloseClipboard
0x4071bc SetClipboardData
0x4071c0 EmptyClipboard
0x4071c4 OpenClipboard
0x4071c8 ScreenToClient
0x4071cc GetWindowRect
0x4071d0 GetDlgItem
0x4071d4 GetSystemMetrics
0x4071d8 SetDlgItemTextA
0x4071dc GetDlgItemTextA
0x4071e0 MessageBoxIndirectA
0x4071e4 CharPrevA
0x4071e8 DispatchMessageA
0x4071ec PeekMessageA
0x4071f0 GetDC
0x4071f4 ReleaseDC
0x4071f8 EnableWindow
0x4071fc InvalidateRect
0x407200 SendMessageA
0x407204 DefWindowProcA
0x407208 BeginPaint
0x40720c GetClientRect
0x407210 FillRect
0x407214 EndDialog
0x407218 RegisterClassA
0x40721c SystemParametersInfoA
0x407220 CreateWindowExA
0x407224 GetClassInfoA
0x407228 DialogBoxParamA
0x40722c CharNextA
0x407230 ExitWindowsEx
0x407234 LoadImageA
0x407238 CreateDialogParamA
0x40723c SetTimer
0x407240 SetWindowTextA
0x407244 SetForegroundWindow
0x407248 ShowWindow
0x40724c SetWindowLongA
0x407250 SendMessageTimeoutA
0x407254 FindWindowExA
0x407258 IsWindow
0x40725c AppendMenuA
0x407260 TrackPopupMenu
0x407264 CreatePopupMenu
0x407268 DrawTextA
0x40726c EndPaint
0x407270 DestroyWindow
0x407274 wsprintfA
0x407278 PostQuitMessage
GDI32.dll
0x40704c SelectObject
0x407050 SetTextColor
0x407054 SetBkMode
0x407058 CreateFontIndirectA
0x40705c CreateBrushIndirect
0x407060 DeleteObject
0x407064 GetDeviceCaps
0x407068 SetBkColor
SHELL32.dll
0x407168 SHGetSpecialFolderLocation
0x40716c ShellExecuteExA
0x407170 SHGetPathFromIDListA
0x407174 SHBrowseForFolderA
0x407178 SHGetFileInfoA
0x40717c SHFileOperationA
ADVAPI32.dll
0x407000 AdjustTokenPrivileges
0x407004 RegCreateKeyExA
0x407008 RegOpenKeyExA
0x40700c SetFileSecurityA
0x407010 OpenProcessToken
0x407014 LookupPrivilegeValueA
0x407018 RegEnumValueA
0x40701c RegDeleteKeyA
0x407020 RegDeleteValueA
0x407024 RegCloseKey
0x407028 RegSetValueExA
0x40702c RegQueryValueExA
0x407030 RegEnumKeyA
COMCTL32.dll
0x407038 ImageList_Create
0x40703c ImageList_AddMasked
0x407040 None
0x407044 ImageList_Destroy
ole32.dll
0x407280 OleUninitialize
0x407284 OleInitialize
0x407288 CoTaskMemFree
0x40728c CoCreateInstance
EAT(Export Address Table) is none
KERNEL32.dll
0x407070 GetTempPathA
0x407074 GetFileSize
0x407078 GetModuleFileNameA
0x40707c GetCurrentProcess
0x407080 CopyFileA
0x407084 ExitProcess
0x407088 SetEnvironmentVariableA
0x40708c Sleep
0x407090 GetTickCount
0x407094 GetCommandLineA
0x407098 lstrlenA
0x40709c GetVersion
0x4070a0 SetErrorMode
0x4070a4 lstrcpynA
0x4070a8 GetDiskFreeSpaceA
0x4070ac GlobalUnlock
0x4070b0 GetWindowsDirectoryA
0x4070b4 SetFileAttributesA
0x4070b8 GetLastError
0x4070bc CreateDirectoryA
0x4070c0 CreateProcessA
0x4070c4 RemoveDirectoryA
0x4070c8 CreateFileA
0x4070cc GetTempFileNameA
0x4070d0 ReadFile
0x4070d4 WriteFile
0x4070d8 lstrcpyA
0x4070dc MoveFileExA
0x4070e0 lstrcatA
0x4070e4 GetSystemDirectoryA
0x4070e8 GetProcAddress
0x4070ec GetExitCodeProcess
0x4070f0 WaitForSingleObject
0x4070f4 CompareFileTime
0x4070f8 SetFileTime
0x4070fc GetFileAttributesA
0x407100 SetCurrentDirectoryA
0x407104 MoveFileA
0x407108 GetFullPathNameA
0x40710c GetShortPathNameA
0x407110 SearchPathA
0x407114 CloseHandle
0x407118 lstrcmpiA
0x40711c CreateThread
0x407120 GlobalLock
0x407124 lstrcmpA
0x407128 DeleteFileA
0x40712c FindFirstFileA
0x407130 FindNextFileA
0x407134 FindClose
0x407138 SetFilePointer
0x40713c GetPrivateProfileStringA
0x407140 WritePrivateProfileStringA
0x407144 MulDiv
0x407148 MultiByteToWideChar
0x40714c FreeLibrary
0x407150 LoadLibraryExA
0x407154 GetModuleHandleA
0x407158 GlobalAlloc
0x40715c GlobalFree
0x407160 ExpandEnvironmentStringsA
USER32.dll
0x407184 GetSystemMenu
0x407188 SetClassLongA
0x40718c EnableMenuItem
0x407190 IsWindowEnabled
0x407194 SetWindowPos
0x407198 GetSysColor
0x40719c GetWindowLongA
0x4071a0 SetCursor
0x4071a4 LoadCursorA
0x4071a8 CheckDlgButton
0x4071ac GetMessagePos
0x4071b0 CallWindowProcA
0x4071b4 IsWindowVisible
0x4071b8 CloseClipboard
0x4071bc SetClipboardData
0x4071c0 EmptyClipboard
0x4071c4 OpenClipboard
0x4071c8 ScreenToClient
0x4071cc GetWindowRect
0x4071d0 GetDlgItem
0x4071d4 GetSystemMetrics
0x4071d8 SetDlgItemTextA
0x4071dc GetDlgItemTextA
0x4071e0 MessageBoxIndirectA
0x4071e4 CharPrevA
0x4071e8 DispatchMessageA
0x4071ec PeekMessageA
0x4071f0 GetDC
0x4071f4 ReleaseDC
0x4071f8 EnableWindow
0x4071fc InvalidateRect
0x407200 SendMessageA
0x407204 DefWindowProcA
0x407208 BeginPaint
0x40720c GetClientRect
0x407210 FillRect
0x407214 EndDialog
0x407218 RegisterClassA
0x40721c SystemParametersInfoA
0x407220 CreateWindowExA
0x407224 GetClassInfoA
0x407228 DialogBoxParamA
0x40722c CharNextA
0x407230 ExitWindowsEx
0x407234 LoadImageA
0x407238 CreateDialogParamA
0x40723c SetTimer
0x407240 SetWindowTextA
0x407244 SetForegroundWindow
0x407248 ShowWindow
0x40724c SetWindowLongA
0x407250 SendMessageTimeoutA
0x407254 FindWindowExA
0x407258 IsWindow
0x40725c AppendMenuA
0x407260 TrackPopupMenu
0x407264 CreatePopupMenu
0x407268 DrawTextA
0x40726c EndPaint
0x407270 DestroyWindow
0x407274 wsprintfA
0x407278 PostQuitMessage
GDI32.dll
0x40704c SelectObject
0x407050 SetTextColor
0x407054 SetBkMode
0x407058 CreateFontIndirectA
0x40705c CreateBrushIndirect
0x407060 DeleteObject
0x407064 GetDeviceCaps
0x407068 SetBkColor
SHELL32.dll
0x407168 SHGetSpecialFolderLocation
0x40716c ShellExecuteExA
0x407170 SHGetPathFromIDListA
0x407174 SHBrowseForFolderA
0x407178 SHGetFileInfoA
0x40717c SHFileOperationA
ADVAPI32.dll
0x407000 AdjustTokenPrivileges
0x407004 RegCreateKeyExA
0x407008 RegOpenKeyExA
0x40700c SetFileSecurityA
0x407010 OpenProcessToken
0x407014 LookupPrivilegeValueA
0x407018 RegEnumValueA
0x40701c RegDeleteKeyA
0x407020 RegDeleteValueA
0x407024 RegCloseKey
0x407028 RegSetValueExA
0x40702c RegQueryValueExA
0x407030 RegEnumKeyA
COMCTL32.dll
0x407038 ImageList_Create
0x40703c ImageList_AddMasked
0x407040 None
0x407044 ImageList_Destroy
ole32.dll
0x407280 OleUninitialize
0x407284 OleInitialize
0x407288 CoTaskMemFree
0x40728c CoCreateInstance
EAT(Export Address Table) is none