ScreenShot
Created | 2023.07.14 17:05 | Machine | s1_win7_x6403 |
Filename | dwmnj.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 33 detected (AIDetectMalware, Stop, Save, malicious, confidence, 100%, Attribute, HighConfidence, high confidence, score, DropperX, Obfuscated, Static AI, Malicious PE, Sabsik, Detected, GDV10, BScope, Convagent, unsafe, Chgt, Kryptik, CLASSIC, susgen, GenKryptik, ERHN) | ||
md5 | f8cfc631cdbba89be07229acfa3bc367 | ||
sha256 | 8b6f6b5068cfe8c9563ba3866d0f638b5e05aec677e3d30e2a2dc0187d6bd0e3 | ||
ssdeep | 3072:yPrXrLfweII8GCAkWNT9oN7qe48LAXBnemzFN17dOYt72cQW5XH6:yjbLczANTCZqKkXB1zFjdOkicQ8H | ||
imphash | 3129b82d0a2746cb6ab1a7613afd0e3c | ||
impfuzzy | 48:ERg3YYi+fcjtjmMyH70ZSe+cQURfUSAQCQuh:EZL+fcjtjmMo7sSedSrt |
Network IP location
Signature (4cnts)
Level | Description |
---|---|
danger | File has been identified by 33 AntiVirus engines on VirusTotal as malicious |
notice | Foreign language identified in PE resource |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | This executable has a PDB path |
Rules (5cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x401008 FindResourceA
0x40100c EnumCalendarInfoA
0x401010 EnumDateFormatsExW
0x401014 FindResourceW
0x401018 CreateHardLinkA
0x40101c SetTapeParameters
0x401020 GetModuleHandleW
0x401024 GetTickCount
0x401028 GetConsoleAliasesA
0x40102c GetWindowsDirectoryA
0x401030 GetVolumePathNameW
0x401034 GlobalAlloc
0x401038 LoadLibraryW
0x40103c ReadConsoleInputA
0x401040 CopyFileW
0x401044 EnumSystemCodePagesA
0x401048 DisconnectNamedPipe
0x40104c FlushFileBuffers
0x401050 GetProfileIntA
0x401054 SetCurrentDirectoryA
0x401058 GetLastError
0x40105c CreateMutexW
0x401060 GetProcAddress
0x401064 BeginUpdateResourceW
0x401068 LoadLibraryA
0x40106c OpenMutexA
0x401070 lstrcmpiW
0x401074 SetLocaleInfoW
0x401078 CreateMutexA
0x40107c VirtualProtect
0x401080 GetVersionExA
0x401084 FileTimeToLocalFileTime
0x401088 lstrcpyA
0x40108c CreateFileA
0x401090 CloseHandle
0x401094 WriteConsoleW
0x401098 GetConsoleOutputCP
0x40109c WriteConsoleA
0x4010a0 SetStdHandle
0x4010a4 GetModuleHandleA
0x4010a8 SetLastError
0x4010ac GetComputerNameA
0x4010b0 InterlockedIncrement
0x4010b4 InterlockedDecrement
0x4010b8 Sleep
0x4010bc InitializeCriticalSection
0x4010c0 DeleteCriticalSection
0x4010c4 EnterCriticalSection
0x4010c8 LeaveCriticalSection
0x4010cc UnhandledExceptionFilter
0x4010d0 SetUnhandledExceptionFilter
0x4010d4 MultiByteToWideChar
0x4010d8 ExitProcess
0x4010dc GetStartupInfoW
0x4010e0 HeapFree
0x4010e4 RtlUnwind
0x4010e8 RaiseException
0x4010ec WriteFile
0x4010f0 GetStdHandle
0x4010f4 GetModuleFileNameA
0x4010f8 HeapAlloc
0x4010fc SetHandleCount
0x401100 GetFileType
0x401104 GetStartupInfoA
0x401108 TerminateProcess
0x40110c GetCurrentProcess
0x401110 IsDebuggerPresent
0x401114 TlsGetValue
0x401118 TlsAlloc
0x40111c TlsSetValue
0x401120 TlsFree
0x401124 GetCurrentThreadId
0x401128 HeapSize
0x40112c GetCPInfo
0x401130 GetACP
0x401134 GetOEMCP
0x401138 IsValidCodePage
0x40113c InitializeCriticalSectionAndSpinCount
0x401140 GetModuleFileNameW
0x401144 FreeEnvironmentStringsW
0x401148 GetEnvironmentStringsW
0x40114c GetCommandLineW
0x401150 HeapCreate
0x401154 VirtualFree
0x401158 QueryPerformanceCounter
0x40115c GetCurrentProcessId
0x401160 GetSystemTimeAsFileTime
0x401164 VirtualAlloc
0x401168 HeapReAlloc
0x40116c GetLocaleInfoA
0x401170 GetStringTypeA
0x401174 GetStringTypeW
0x401178 SetFilePointer
0x40117c WideCharToMultiByte
0x401180 GetConsoleCP
0x401184 GetConsoleMode
0x401188 LCMapStringA
0x40118c LCMapStringW
USER32.dll
0x401194 CharToOemBuffA
0x401198 RealGetWindowClassW
0x40119c CharUpperBuffW
0x4011a0 GetMenuBarInfo
0x4011a4 CharUpperA
0x4011a8 CharLowerBuffW
0x4011ac CharUpperBuffA
0x4011b0 LoadMenuW
0x4011b4 DdeQueryStringA
0x4011b8 GetClipboardOwner
ADVAPI32.dll
0x401000 LogonUserW
EAT(Export Address Table) is none
KERNEL32.dll
0x401008 FindResourceA
0x40100c EnumCalendarInfoA
0x401010 EnumDateFormatsExW
0x401014 FindResourceW
0x401018 CreateHardLinkA
0x40101c SetTapeParameters
0x401020 GetModuleHandleW
0x401024 GetTickCount
0x401028 GetConsoleAliasesA
0x40102c GetWindowsDirectoryA
0x401030 GetVolumePathNameW
0x401034 GlobalAlloc
0x401038 LoadLibraryW
0x40103c ReadConsoleInputA
0x401040 CopyFileW
0x401044 EnumSystemCodePagesA
0x401048 DisconnectNamedPipe
0x40104c FlushFileBuffers
0x401050 GetProfileIntA
0x401054 SetCurrentDirectoryA
0x401058 GetLastError
0x40105c CreateMutexW
0x401060 GetProcAddress
0x401064 BeginUpdateResourceW
0x401068 LoadLibraryA
0x40106c OpenMutexA
0x401070 lstrcmpiW
0x401074 SetLocaleInfoW
0x401078 CreateMutexA
0x40107c VirtualProtect
0x401080 GetVersionExA
0x401084 FileTimeToLocalFileTime
0x401088 lstrcpyA
0x40108c CreateFileA
0x401090 CloseHandle
0x401094 WriteConsoleW
0x401098 GetConsoleOutputCP
0x40109c WriteConsoleA
0x4010a0 SetStdHandle
0x4010a4 GetModuleHandleA
0x4010a8 SetLastError
0x4010ac GetComputerNameA
0x4010b0 InterlockedIncrement
0x4010b4 InterlockedDecrement
0x4010b8 Sleep
0x4010bc InitializeCriticalSection
0x4010c0 DeleteCriticalSection
0x4010c4 EnterCriticalSection
0x4010c8 LeaveCriticalSection
0x4010cc UnhandledExceptionFilter
0x4010d0 SetUnhandledExceptionFilter
0x4010d4 MultiByteToWideChar
0x4010d8 ExitProcess
0x4010dc GetStartupInfoW
0x4010e0 HeapFree
0x4010e4 RtlUnwind
0x4010e8 RaiseException
0x4010ec WriteFile
0x4010f0 GetStdHandle
0x4010f4 GetModuleFileNameA
0x4010f8 HeapAlloc
0x4010fc SetHandleCount
0x401100 GetFileType
0x401104 GetStartupInfoA
0x401108 TerminateProcess
0x40110c GetCurrentProcess
0x401110 IsDebuggerPresent
0x401114 TlsGetValue
0x401118 TlsAlloc
0x40111c TlsSetValue
0x401120 TlsFree
0x401124 GetCurrentThreadId
0x401128 HeapSize
0x40112c GetCPInfo
0x401130 GetACP
0x401134 GetOEMCP
0x401138 IsValidCodePage
0x40113c InitializeCriticalSectionAndSpinCount
0x401140 GetModuleFileNameW
0x401144 FreeEnvironmentStringsW
0x401148 GetEnvironmentStringsW
0x40114c GetCommandLineW
0x401150 HeapCreate
0x401154 VirtualFree
0x401158 QueryPerformanceCounter
0x40115c GetCurrentProcessId
0x401160 GetSystemTimeAsFileTime
0x401164 VirtualAlloc
0x401168 HeapReAlloc
0x40116c GetLocaleInfoA
0x401170 GetStringTypeA
0x401174 GetStringTypeW
0x401178 SetFilePointer
0x40117c WideCharToMultiByte
0x401180 GetConsoleCP
0x401184 GetConsoleMode
0x401188 LCMapStringA
0x40118c LCMapStringW
USER32.dll
0x401194 CharToOemBuffA
0x401198 RealGetWindowClassW
0x40119c CharUpperBuffW
0x4011a0 GetMenuBarInfo
0x4011a4 CharUpperA
0x4011a8 CharLowerBuffW
0x4011ac CharUpperBuffA
0x4011b0 LoadMenuW
0x4011b4 DdeQueryStringA
0x4011b8 GetClipboardOwner
ADVAPI32.dll
0x401000 LogonUserW
EAT(Export Address Table) is none