Report - 64.dll

Generic Malware DLL PE64 PE File
ScreenShot
Created 2023.06.14 20:02 Machine s1_win7_x6403
Filename 64.dll
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
AI Score
4
Behavior Score
2.2
ZERO API file : malware
VT API (file) 29 detected (Sybici, malicious, high confidence, GenericKD, unsafe, Gencbl, V4mj, confidence, ABTrojan, AWLW, Attribute, HighConfidence, Proxy, Artemis, high, score, Detected, ai score=83, Chgt, FalseSign, Qcnw)
md5 f40e1a15f93696510e5faef3a216f18f
sha256 f8d015ac4faff5d7a5da0e95f3cc9e9eb18417cd749b3b4625b5312910a25b7b
ssdeep 49152:T+y6I9edJ9qu8moH+xNSJJ1LKz+JsK47C:L69RyLqe
imphash 7e60c38086d25d57354ecdf04c4b17ba
impfuzzy 3:sUx2AEJtGRbQ6CioSEl8MpOA43KXPMKLJWjpDAiAdPJApLMLgn:nEJtGbQ6CiZBFAUKXPMKYpsiAjApGg
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Tries to unhook Windows functions monitored by Cuckoo
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x180008138 GetModuleHandleA
user32.dll
 0x180008148 wsprintfA
ws2_32.dll
 0x180008158 getaddrinfo
advapi32.dll
 0x180008168 GetTokenInformation
secur32.dll
 0x180008178 GetUserNameExA
ole32.dll
 0x180008188 CoUninitialize

EAT(Export Address Table) Library

0x180001020 rundll


Similarity measure (PE file only) - Checking for service failure