Report - staticlittlesource.exe

UPX Malicious Library Malicious Packer ScreenShot AntiDebug AntiVM OS Processor Check PE File PE32
ScreenShot
Created 2023.06.26 10:10 Machine s1_win7_x6403
Filename staticlittlesource.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
9
Behavior Score
8.0
ZERO API file : malware
VT API (file)
md5 ae9991a02aa20ebbc2cc3c0f40924442
sha256 5c38a5dd3703b1c4b8c2466b18ce9f4c45ef4c9bf6c3096bee8b24d20ecd247a
ssdeep 12288:PVon2T2h6bhdoDJdZuQU574H0HNfusW2wvpwSIDMUF3cTOq1Ni:PVT2oPaJfCAKfu1DBwjPcT51s
imphash 1e5efd483892326cc4eeb97bc14a6266
impfuzzy 24:q4g+UcpVWZttlS1xGhlJBlCDoLoEOovbO3kFZMv5GMAkEZHu9n:FUcpVettlS1xGnVc30FZGp
  Network IP location

Signature (18cnts)

Level Description
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Detects Avast Antivirus through the presence of a library
watch One or more of the buffers contains an embedded PE file
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Executes one or more WMI queries
notice Executes one or more WMI queries which can be used to identify virtual machines
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (15cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x428144 UnloadKeyboardLayout
GDI32.dll
 0x428000 GetAspectRatioFilterEx
 0x428004 Ellipse
KERNEL32.dll
 0x42800c CreateFileW
 0x428010 FreeLibrary
 0x428014 GetModuleHandleA
 0x428018 FreeConsole
 0x42801c GetModuleHandleW
 0x428020 MultiByteToWideChar
 0x428024 GetStringTypeW
 0x428028 WideCharToMultiByte
 0x42802c EnterCriticalSection
 0x428030 LeaveCriticalSection
 0x428034 InitializeCriticalSectionEx
 0x428038 DeleteCriticalSection
 0x42803c EncodePointer
 0x428040 DecodePointer
 0x428044 LCMapStringEx
 0x428048 GetCPInfo
 0x42804c IsProcessorFeaturePresent
 0x428050 UnhandledExceptionFilter
 0x428054 SetUnhandledExceptionFilter
 0x428058 GetCurrentProcess
 0x42805c TerminateProcess
 0x428060 QueryPerformanceCounter
 0x428064 GetCurrentProcessId
 0x428068 GetCurrentThreadId
 0x42806c GetSystemTimeAsFileTime
 0x428070 InitializeSListHead
 0x428074 IsDebuggerPresent
 0x428078 GetStartupInfoW
 0x42807c HeapSize
 0x428080 RaiseException
 0x428084 RtlUnwind
 0x428088 GetLastError
 0x42808c SetLastError
 0x428090 InitializeCriticalSectionAndSpinCount
 0x428094 TlsAlloc
 0x428098 TlsGetValue
 0x42809c TlsSetValue
 0x4280a0 TlsFree
 0x4280a4 WriteConsoleW
 0x4280a8 GetProcAddress
 0x4280ac LoadLibraryExW
 0x4280b0 GetStdHandle
 0x4280b4 WriteFile
 0x4280b8 GetModuleFileNameW
 0x4280bc ExitProcess
 0x4280c0 GetModuleHandleExW
 0x4280c4 GetCommandLineA
 0x4280c8 GetCommandLineW
 0x4280cc HeapAlloc
 0x4280d0 HeapFree
 0x4280d4 CompareStringW
 0x4280d8 LCMapStringW
 0x4280dc GetLocaleInfoW
 0x4280e0 IsValidLocale
 0x4280e4 GetUserDefaultLCID
 0x4280e8 EnumSystemLocalesW
 0x4280ec GetFileType
 0x4280f0 CloseHandle
 0x4280f4 FlushFileBuffers
 0x4280f8 GetConsoleOutputCP
 0x4280fc GetConsoleMode
 0x428100 ReadFile
 0x428104 GetFileSizeEx
 0x428108 SetFilePointerEx
 0x42810c ReadConsoleW
 0x428110 HeapReAlloc
 0x428114 FindClose
 0x428118 FindFirstFileExW
 0x42811c FindNextFileW
 0x428120 IsValidCodePage
 0x428124 GetACP
 0x428128 GetOEMCP
 0x42812c GetEnvironmentStringsW
 0x428130 FreeEnvironmentStringsW
 0x428134 SetEnvironmentVariableW
 0x428138 SetStdHandle
 0x42813c GetProcessHeap

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure