ScreenShot
Created | 2023.06.17 18:07 | Machine | s1_win7_x6401 |
Filename | build.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 44 detected (AIDetectMalware, Tofsee, malicious, high confidence, Cerbu, Stop, Artemis, Save, Chapak, Eldorado, Attribute, HighConfidence, score, PWSX, Obfuscated, moderate, Krypt, Static AI, Malicious PE, Wacatac, Detected, Grygoryi, ai score=85, unsafe, Chgt, R002C0WFH23, Generic@AI, RDML, NoQWVijvyVN3jmqHpvzWAA, susgen, GenKryptik, ERHN, confidence, 100%) | ||
md5 | dc3352babcf165a455d86f015a26b742 | ||
sha256 | 5f4de2701910791472fa25d6782de8cbe53e39e1cdfa3908413d01d82c2e62cb | ||
ssdeep | 6144:YYeNUWL37Z8OECYnGl3f5CgJPmubuC1SdOR2T3rlBU+1:YYeNprKOEC0GfYgQ+MU8 | ||
imphash | f719d133eb0a7f30a0b9bd8ad8b269ee | ||
impfuzzy | 48:V5CE9klsuCFXW+fc7thvM+4Rm0EAQkCQloyZ2:pKlsuUm+fc7tpM+4RzbKeZ2 |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
danger | File has been identified by 44 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | This executable has a PDB path |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x401014 ReadConsoleA
0x401018 GetConsoleAliasA
0x40101c InterlockedDecrement
0x401020 GetCurrentProcess
0x401024 AddConsoleAliasW
0x401028 GetComputerNameW
0x40102c GetTickCount
0x401030 GetConsoleAliasesA
0x401034 GetConsoleTitleA
0x401038 GetWindowsDirectoryA
0x40103c CreateActCtxW
0x401040 CreateDirectoryExW
0x401044 SetProcessPriorityBoost
0x401048 GetCalendarInfoA
0x40104c FormatMessageW
0x401050 WriteConsoleOutputA
0x401054 FindNextVolumeW
0x401058 ReadFile
0x40105c GetModuleFileNameW
0x401060 GetStringTypeExA
0x401064 SetCurrentDirectoryA
0x401068 GetLogicalDriveStringsA
0x40106c GetLastError
0x401070 SetLastError
0x401074 FindResourceExW
0x401078 GetProcAddress
0x40107c VirtualAlloc
0x401080 BeginUpdateResourceW
0x401084 IsValidCodePage
0x401088 LoadLibraryA
0x40108c WriteConsoleA
0x401090 CreateEventW
0x401094 GlobalHandle
0x401098 WaitForMultipleObjects
0x40109c GetOEMCP
0x4010a0 QueryMemoryResourceNotification
0x4010a4 VirtualProtect
0x4010a8 GetCurrentDirectoryA
0x4010ac GetVersionExA
0x4010b0 FindAtomW
0x4010b4 FindFirstVolumeW
0x4010b8 GetCurrentProcessId
0x4010bc OpenFileMappingA
0x4010c0 CommConfigDialogW
0x4010c4 CreateThread
0x4010c8 InitializeCriticalSectionAndSpinCount
0x4010cc GetLocaleInfoA
0x4010d0 GetConsoleAliasExesA
0x4010d4 CreateTimerQueue
0x4010d8 ReadConsoleOutputCharacterA
0x4010dc LocalUnlock
0x4010e0 GetStringTypeW
0x4010e4 GetStringTypeA
0x4010e8 InterlockedIncrement
0x4010ec Sleep
0x4010f0 InitializeCriticalSection
0x4010f4 DeleteCriticalSection
0x4010f8 EnterCriticalSection
0x4010fc LeaveCriticalSection
0x401100 HeapFree
0x401104 TerminateProcess
0x401108 UnhandledExceptionFilter
0x40110c SetUnhandledExceptionFilter
0x401110 IsDebuggerPresent
0x401114 MultiByteToWideChar
0x401118 GetCommandLineA
0x40111c GetStartupInfoA
0x401120 RtlUnwind
0x401124 RaiseException
0x401128 LCMapStringA
0x40112c WideCharToMultiByte
0x401130 LCMapStringW
0x401134 GetCPInfo
0x401138 HeapAlloc
0x40113c HeapCreate
0x401140 VirtualFree
0x401144 HeapReAlloc
0x401148 GetModuleHandleW
0x40114c TlsGetValue
0x401150 TlsAlloc
0x401154 TlsSetValue
0x401158 TlsFree
0x40115c GetCurrentThreadId
0x401160 HeapSize
0x401164 ExitProcess
0x401168 GetACP
0x40116c WriteFile
0x401170 GetStdHandle
0x401174 GetModuleFileNameA
0x401178 FreeEnvironmentStringsA
0x40117c GetEnvironmentStrings
0x401180 FreeEnvironmentStringsW
0x401184 GetEnvironmentStringsW
0x401188 SetHandleCount
0x40118c GetFileType
0x401190 QueryPerformanceCounter
0x401194 GetSystemTimeAsFileTime
USER32.dll
0x4011a4 CharUpperBuffA
0x4011a8 GetWindowLongW
0x4011ac LoadMenuW
0x4011b0 CharToOemBuffW
0x4011b4 GetCaretPos
GDI32.dll
0x40100c GetTextExtentPointW
ADVAPI32.dll
0x401000 ReportEventA
0x401004 ReadEventLogW
ole32.dll
0x4011cc CoGetPSClsid
WINHTTP.dll
0x4011bc WinHttpOpen
0x4011c0 WinHttpSetDefaultProxyConfiguration
0x4011c4 WinHttpCheckPlatform
MSIMG32.dll
0x40119c TransparentBlt
EAT(Export Address Table) is none
KERNEL32.dll
0x401014 ReadConsoleA
0x401018 GetConsoleAliasA
0x40101c InterlockedDecrement
0x401020 GetCurrentProcess
0x401024 AddConsoleAliasW
0x401028 GetComputerNameW
0x40102c GetTickCount
0x401030 GetConsoleAliasesA
0x401034 GetConsoleTitleA
0x401038 GetWindowsDirectoryA
0x40103c CreateActCtxW
0x401040 CreateDirectoryExW
0x401044 SetProcessPriorityBoost
0x401048 GetCalendarInfoA
0x40104c FormatMessageW
0x401050 WriteConsoleOutputA
0x401054 FindNextVolumeW
0x401058 ReadFile
0x40105c GetModuleFileNameW
0x401060 GetStringTypeExA
0x401064 SetCurrentDirectoryA
0x401068 GetLogicalDriveStringsA
0x40106c GetLastError
0x401070 SetLastError
0x401074 FindResourceExW
0x401078 GetProcAddress
0x40107c VirtualAlloc
0x401080 BeginUpdateResourceW
0x401084 IsValidCodePage
0x401088 LoadLibraryA
0x40108c WriteConsoleA
0x401090 CreateEventW
0x401094 GlobalHandle
0x401098 WaitForMultipleObjects
0x40109c GetOEMCP
0x4010a0 QueryMemoryResourceNotification
0x4010a4 VirtualProtect
0x4010a8 GetCurrentDirectoryA
0x4010ac GetVersionExA
0x4010b0 FindAtomW
0x4010b4 FindFirstVolumeW
0x4010b8 GetCurrentProcessId
0x4010bc OpenFileMappingA
0x4010c0 CommConfigDialogW
0x4010c4 CreateThread
0x4010c8 InitializeCriticalSectionAndSpinCount
0x4010cc GetLocaleInfoA
0x4010d0 GetConsoleAliasExesA
0x4010d4 CreateTimerQueue
0x4010d8 ReadConsoleOutputCharacterA
0x4010dc LocalUnlock
0x4010e0 GetStringTypeW
0x4010e4 GetStringTypeA
0x4010e8 InterlockedIncrement
0x4010ec Sleep
0x4010f0 InitializeCriticalSection
0x4010f4 DeleteCriticalSection
0x4010f8 EnterCriticalSection
0x4010fc LeaveCriticalSection
0x401100 HeapFree
0x401104 TerminateProcess
0x401108 UnhandledExceptionFilter
0x40110c SetUnhandledExceptionFilter
0x401110 IsDebuggerPresent
0x401114 MultiByteToWideChar
0x401118 GetCommandLineA
0x40111c GetStartupInfoA
0x401120 RtlUnwind
0x401124 RaiseException
0x401128 LCMapStringA
0x40112c WideCharToMultiByte
0x401130 LCMapStringW
0x401134 GetCPInfo
0x401138 HeapAlloc
0x40113c HeapCreate
0x401140 VirtualFree
0x401144 HeapReAlloc
0x401148 GetModuleHandleW
0x40114c TlsGetValue
0x401150 TlsAlloc
0x401154 TlsSetValue
0x401158 TlsFree
0x40115c GetCurrentThreadId
0x401160 HeapSize
0x401164 ExitProcess
0x401168 GetACP
0x40116c WriteFile
0x401170 GetStdHandle
0x401174 GetModuleFileNameA
0x401178 FreeEnvironmentStringsA
0x40117c GetEnvironmentStrings
0x401180 FreeEnvironmentStringsW
0x401184 GetEnvironmentStringsW
0x401188 SetHandleCount
0x40118c GetFileType
0x401190 QueryPerformanceCounter
0x401194 GetSystemTimeAsFileTime
USER32.dll
0x4011a4 CharUpperBuffA
0x4011a8 GetWindowLongW
0x4011ac LoadMenuW
0x4011b0 CharToOemBuffW
0x4011b4 GetCaretPos
GDI32.dll
0x40100c GetTextExtentPointW
ADVAPI32.dll
0x401000 ReportEventA
0x401004 ReadEventLogW
ole32.dll
0x4011cc CoGetPSClsid
WINHTTP.dll
0x4011bc WinHttpOpen
0x4011c0 WinHttpSetDefaultProxyConfiguration
0x4011c4 WinHttpCheckPlatform
MSIMG32.dll
0x40119c TransparentBlt
EAT(Export Address Table) is none