ScreenShot
Created | 2023.07.03 17:58 | Machine | s1_win7_x6401 |
Filename | 73727282.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 38 detected (AIDetectMalware, Zusy, RedLineStealer, Save, malicious, Kryptik, Eldorado, Attribute, HighConfidence, high confidence, ETBS, score, PWSX, Siggen3, high, Generic ML PUA, Static AI, Suspicious PE, ai score=86, RedLine, MBCA, Detected, Artemis, BScope, TrojanPSW, 5USf6Jo8vzK, ESYR, ZexaF, qzZ@aa67Rnoi, confidence, 100%) | ||
md5 | abc8ad6946808c33d794bd553b7e1657 | ||
sha256 | 58a7d4f557e04cf695287a1521069f4008c0f451d524037e6ae20b3089d2be74 | ||
ssdeep | 6144:sywKlkwrO7P+UMrwgz5CAOjMp5FxZjs6igVc/Wj6JrbgRK76O:sjGkwrO7PUNCxYv1/6dys | ||
imphash | 9b8bc88ec2effd02d5a41d9eb86ed569 | ||
impfuzzy | 24:hozdqd75ikbZETKAWJjGHcpVWZLD/l9dtWObJh9r9OovbO3kFZMv5GMA+EZHu91:Kch5BOWoHcpVefptWODZo30FZGb |
Network IP location
Signature (25cnts)
Level | Description |
---|---|
danger | Executed a process and injected code into it |
danger | File has been identified by 38 AntiVirus engines on VirusTotal as malicious |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Collects information about installed applications |
watch | Communicates with host for which no DNS query was performed |
watch | Harvests credentials from local FTP client softwares |
watch | Manipulates memory of a non-child process indicative of process injection |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | One or more potentially interesting buffers were extracted |
notice | Queries for potentially installed applications |
notice | Steals private information from local Internet browsers |
notice | Terminates another process |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | Tries to locate where the browsers are installed |
info | Uses Windows APIs to generate a cryptographic key |
Rules (15cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | RedLine_Stealer_m_Zero | RedLine stealer | memory |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | anti_dbg | Checks if being debugged | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
PE API
IAT(Import Address Table) Library
GDI32.dll
0x42b000 Rectangle
0x42b004 GetDCBrushColor
0x42b008 GetViewportExtEx
ole32.dll
0x42b190 CoGetApartmentType
0x42b194 CoGetObjectContext
KERNEL32.dll
0x42b010 CreateFileW
0x42b014 HeapSize
0x42b018 ReadConsoleW
0x42b01c GetModuleHandleA
0x42b020 FreeConsole
0x42b024 GetModuleHandleW
0x42b028 RaiseException
0x42b02c GetCurrentThreadId
0x42b030 IsProcessorFeaturePresent
0x42b034 GetLastError
0x42b038 FreeLibraryWhenCallbackReturns
0x42b03c CreateThreadpoolWork
0x42b040 SubmitThreadpoolWork
0x42b044 CloseThreadpoolWork
0x42b048 GetModuleHandleExW
0x42b04c MultiByteToWideChar
0x42b050 InitializeConditionVariable
0x42b054 WakeConditionVariable
0x42b058 WakeAllConditionVariable
0x42b05c SleepConditionVariableSRW
0x42b060 InitOnceComplete
0x42b064 InitOnceBeginInitialize
0x42b068 GetStringTypeW
0x42b06c InitializeSRWLock
0x42b070 ReleaseSRWLockExclusive
0x42b074 AcquireSRWLockExclusive
0x42b078 TryAcquireSRWLockExclusive
0x42b07c WideCharToMultiByte
0x42b080 CloseHandle
0x42b084 WaitForSingleObjectEx
0x42b088 QueryPerformanceCounter
0x42b08c EnterCriticalSection
0x42b090 LeaveCriticalSection
0x42b094 InitializeCriticalSectionEx
0x42b098 DeleteCriticalSection
0x42b09c EncodePointer
0x42b0a0 DecodePointer
0x42b0a4 LCMapStringEx
0x42b0a8 GetSystemTimeAsFileTime
0x42b0ac GetProcAddress
0x42b0b0 GetCPInfo
0x42b0b4 InitializeCriticalSectionAndSpinCount
0x42b0b8 SetEvent
0x42b0bc ResetEvent
0x42b0c0 CreateEventW
0x42b0c4 UnhandledExceptionFilter
0x42b0c8 SetUnhandledExceptionFilter
0x42b0cc GetCurrentProcess
0x42b0d0 TerminateProcess
0x42b0d4 IsDebuggerPresent
0x42b0d8 GetStartupInfoW
0x42b0dc GetCurrentProcessId
0x42b0e0 InitializeSListHead
0x42b0e4 SetStdHandle
0x42b0e8 RtlUnwind
0x42b0ec SetLastError
0x42b0f0 TlsAlloc
0x42b0f4 TlsGetValue
0x42b0f8 TlsSetValue
0x42b0fc TlsFree
0x42b100 FreeLibrary
0x42b104 LoadLibraryExW
0x42b108 ExitProcess
0x42b10c GetModuleFileNameW
0x42b110 GetStdHandle
0x42b114 WriteFile
0x42b118 GetCommandLineA
0x42b11c GetCommandLineW
0x42b120 HeapAlloc
0x42b124 HeapFree
0x42b128 CompareStringW
0x42b12c LCMapStringW
0x42b130 GetLocaleInfoW
0x42b134 IsValidLocale
0x42b138 GetUserDefaultLCID
0x42b13c EnumSystemLocalesW
0x42b140 GetFileType
0x42b144 GetFileSizeEx
0x42b148 SetFilePointerEx
0x42b14c FlushFileBuffers
0x42b150 GetConsoleOutputCP
0x42b154 GetConsoleMode
0x42b158 ReadFile
0x42b15c HeapReAlloc
0x42b160 FindClose
0x42b164 FindFirstFileExW
0x42b168 FindNextFileW
0x42b16c IsValidCodePage
0x42b170 GetACP
0x42b174 GetOEMCP
0x42b178 GetEnvironmentStringsW
0x42b17c FreeEnvironmentStringsW
0x42b180 SetEnvironmentVariableW
0x42b184 GetProcessHeap
0x42b188 WriteConsoleW
EAT(Export Address Table) is none
GDI32.dll
0x42b000 Rectangle
0x42b004 GetDCBrushColor
0x42b008 GetViewportExtEx
ole32.dll
0x42b190 CoGetApartmentType
0x42b194 CoGetObjectContext
KERNEL32.dll
0x42b010 CreateFileW
0x42b014 HeapSize
0x42b018 ReadConsoleW
0x42b01c GetModuleHandleA
0x42b020 FreeConsole
0x42b024 GetModuleHandleW
0x42b028 RaiseException
0x42b02c GetCurrentThreadId
0x42b030 IsProcessorFeaturePresent
0x42b034 GetLastError
0x42b038 FreeLibraryWhenCallbackReturns
0x42b03c CreateThreadpoolWork
0x42b040 SubmitThreadpoolWork
0x42b044 CloseThreadpoolWork
0x42b048 GetModuleHandleExW
0x42b04c MultiByteToWideChar
0x42b050 InitializeConditionVariable
0x42b054 WakeConditionVariable
0x42b058 WakeAllConditionVariable
0x42b05c SleepConditionVariableSRW
0x42b060 InitOnceComplete
0x42b064 InitOnceBeginInitialize
0x42b068 GetStringTypeW
0x42b06c InitializeSRWLock
0x42b070 ReleaseSRWLockExclusive
0x42b074 AcquireSRWLockExclusive
0x42b078 TryAcquireSRWLockExclusive
0x42b07c WideCharToMultiByte
0x42b080 CloseHandle
0x42b084 WaitForSingleObjectEx
0x42b088 QueryPerformanceCounter
0x42b08c EnterCriticalSection
0x42b090 LeaveCriticalSection
0x42b094 InitializeCriticalSectionEx
0x42b098 DeleteCriticalSection
0x42b09c EncodePointer
0x42b0a0 DecodePointer
0x42b0a4 LCMapStringEx
0x42b0a8 GetSystemTimeAsFileTime
0x42b0ac GetProcAddress
0x42b0b0 GetCPInfo
0x42b0b4 InitializeCriticalSectionAndSpinCount
0x42b0b8 SetEvent
0x42b0bc ResetEvent
0x42b0c0 CreateEventW
0x42b0c4 UnhandledExceptionFilter
0x42b0c8 SetUnhandledExceptionFilter
0x42b0cc GetCurrentProcess
0x42b0d0 TerminateProcess
0x42b0d4 IsDebuggerPresent
0x42b0d8 GetStartupInfoW
0x42b0dc GetCurrentProcessId
0x42b0e0 InitializeSListHead
0x42b0e4 SetStdHandle
0x42b0e8 RtlUnwind
0x42b0ec SetLastError
0x42b0f0 TlsAlloc
0x42b0f4 TlsGetValue
0x42b0f8 TlsSetValue
0x42b0fc TlsFree
0x42b100 FreeLibrary
0x42b104 LoadLibraryExW
0x42b108 ExitProcess
0x42b10c GetModuleFileNameW
0x42b110 GetStdHandle
0x42b114 WriteFile
0x42b118 GetCommandLineA
0x42b11c GetCommandLineW
0x42b120 HeapAlloc
0x42b124 HeapFree
0x42b128 CompareStringW
0x42b12c LCMapStringW
0x42b130 GetLocaleInfoW
0x42b134 IsValidLocale
0x42b138 GetUserDefaultLCID
0x42b13c EnumSystemLocalesW
0x42b140 GetFileType
0x42b144 GetFileSizeEx
0x42b148 SetFilePointerEx
0x42b14c FlushFileBuffers
0x42b150 GetConsoleOutputCP
0x42b154 GetConsoleMode
0x42b158 ReadFile
0x42b15c HeapReAlloc
0x42b160 FindClose
0x42b164 FindFirstFileExW
0x42b168 FindNextFileW
0x42b16c IsValidCodePage
0x42b170 GetACP
0x42b174 GetOEMCP
0x42b178 GetEnvironmentStringsW
0x42b17c FreeEnvironmentStringsW
0x42b180 SetEnvironmentVariableW
0x42b184 GetProcessHeap
0x42b188 WriteConsoleW
EAT(Export Address Table) is none