Report - rofl.exe

UPX Malicious Library ScreenShot AntiDebug AntiVM OS Processor Check PE File PE32
ScreenShot
Created 2023.07.18 07:23 Machine s1_win7_x6401
Filename rofl.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
3
Behavior Score
9.4
ZERO API
VT API (file) 38 detected (AIDetectMalware, Strab, @GW@I9114hei, Vvsj, malicious, Attribute, HighConfidence, high confidence, GenKryptik, GLWW, score, Generic@AI, RDML, l2PQivzRvxuRaZmmjyC57g, Nekark, wwrgd, Siggen3, Artemis, Sabsik, GenericRXVT, ai score=85, unsafe, Chgt, susgen, confidence)
md5 2ee4b1df29fe85c016c84d5855b0ec9f
sha256 686f9d8e29ba0fd3e4285ecd2f85716bea5be6c3b6571c955c9f6ea9274dc9cf
ssdeep 12288:aExUboCrf3E1zPXkbaEGJmtNjVu2q8OqdCB5GDdSUHrCAZWgAYhaoa6Wn4jfHh1:a3skbXG+NlOqFeA/BO6W4jp
imphash 1bc1c4b914e9ea42a3ab5d27158f0056
impfuzzy 48:DaxYWJcpH+zD9nsXtXOthWGzSpU63TuFZG/:DaxYWJcpH+X6XtXOthWGGpUfQ
  Network IP location

Signature (20cnts)

Level Description
danger Executed a process and injected code into it
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Detects Avast Antivirus through the presence of a library
watch One or more of the buffers contains an embedded PE file
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Executes one or more WMI queries
notice Executes one or more WMI queries which can be used to identify virtual machines
notice One or more potentially interesting buffers were extracted
notice Yara rule detected in process memory
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info This executable has a PDB path

Rules (14cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x475000 Sleep
 0x475004 LoadLibraryW
 0x475008 CloseHandle
 0x47500c WaitForSingleObjectEx
 0x475010 SwitchToThread
 0x475014 GetCurrentThreadId
 0x475018 GetExitCodeThread
 0x47501c GetNativeSystemInfo
 0x475020 QueryPerformanceCounter
 0x475024 QueryPerformanceFrequency
 0x475028 InitializeSRWLock
 0x47502c ReleaseSRWLockExclusive
 0x475030 AcquireSRWLockExclusive
 0x475034 EnterCriticalSection
 0x475038 LeaveCriticalSection
 0x47503c InitializeCriticalSectionEx
 0x475040 TryEnterCriticalSection
 0x475044 DeleteCriticalSection
 0x475048 InitializeConditionVariable
 0x47504c WakeConditionVariable
 0x475050 WakeAllConditionVariable
 0x475054 SleepConditionVariableCS
 0x475058 SleepConditionVariableSRW
 0x47505c FormatMessageA
 0x475060 SetFileInformationByHandle
 0x475064 FlsAlloc
 0x475068 FlsGetValue
 0x47506c FlsSetValue
 0x475070 FlsFree
 0x475074 InitOnceExecuteOnce
 0x475078 CreateEventExW
 0x47507c CreateSemaphoreExW
 0x475080 FlushProcessWriteBuffers
 0x475084 GetCurrentProcessorNumber
 0x475088 GetSystemTimeAsFileTime
 0x47508c GetTickCount64
 0x475090 FreeLibraryWhenCallbackReturns
 0x475094 CreateThreadpoolWork
 0x475098 SubmitThreadpoolWork
 0x47509c CloseThreadpoolWork
 0x4750a0 CreateThreadpoolTimer
 0x4750a4 SetThreadpoolTimer
 0x4750a8 WaitForThreadpoolTimerCallbacks
 0x4750ac CloseThreadpoolTimer
 0x4750b0 CreateThreadpoolWait
 0x4750b4 SetThreadpoolWait
 0x4750b8 CloseThreadpoolWait
 0x4750bc GetModuleHandleW
 0x4750c0 GetProcAddress
 0x4750c4 GetFileInformationByHandleEx
 0x4750c8 CreateSymbolicLinkW
 0x4750cc LocalFree
 0x4750d0 UnhandledExceptionFilter
 0x4750d4 SetUnhandledExceptionFilter
 0x4750d8 GetCurrentProcess
 0x4750dc TerminateProcess
 0x4750e0 IsProcessorFeaturePresent
 0x4750e4 GetCurrentProcessId
 0x4750e8 InitializeSListHead
 0x4750ec IsDebuggerPresent
 0x4750f0 GetStartupInfoW
 0x4750f4 WriteConsoleW
 0x4750f8 RaiseException
 0x4750fc RtlUnwind
 0x475100 InterlockedPushEntrySList
 0x475104 InterlockedFlushSList
 0x475108 GetLastError
 0x47510c SetLastError
 0x475110 EncodePointer
 0x475114 InitializeCriticalSectionAndSpinCount
 0x475118 TlsAlloc
 0x47511c TlsGetValue
 0x475120 TlsSetValue
 0x475124 TlsFree
 0x475128 FreeLibrary
 0x47512c LoadLibraryExW
 0x475130 CreateThread
 0x475134 ExitThread
 0x475138 ResumeThread
 0x47513c FreeLibraryAndExitThread
 0x475140 GetModuleHandleExW
 0x475144 GetStdHandle
 0x475148 WriteFile
 0x47514c GetModuleFileNameW
 0x475150 ExitProcess
 0x475154 GetCommandLineA
 0x475158 GetCommandLineW
 0x47515c GetCurrentThread
 0x475160 HeapAlloc
 0x475164 HeapFree
 0x475168 GetDateFormatW
 0x47516c GetTimeFormatW
 0x475170 CompareStringW
 0x475174 LCMapStringW
 0x475178 GetLocaleInfoW
 0x47517c IsValidLocale
 0x475180 GetUserDefaultLCID
 0x475184 EnumSystemLocalesW
 0x475188 GetFileType
 0x47518c SetConsoleCtrlHandler
 0x475190 GetFileSizeEx
 0x475194 SetFilePointerEx
 0x475198 OutputDebugStringW
 0x47519c FindClose
 0x4751a0 FindFirstFileExW
 0x4751a4 FindNextFileW
 0x4751a8 IsValidCodePage
 0x4751ac GetACP
 0x4751b0 GetOEMCP
 0x4751b4 GetCPInfo
 0x4751b8 MultiByteToWideChar
 0x4751bc WideCharToMultiByte
 0x4751c0 GetEnvironmentStringsW
 0x4751c4 FreeEnvironmentStringsW
 0x4751c8 SetEnvironmentVariableW
 0x4751cc SetStdHandle
 0x4751d0 GetStringTypeW
 0x4751d4 GetProcessHeap
 0x4751d8 FlushFileBuffers
 0x4751dc GetConsoleOutputCP
 0x4751e0 GetConsoleMode
 0x4751e4 HeapSize
 0x4751e8 HeapReAlloc
 0x4751ec ReadFile
 0x4751f0 ReadConsoleW
 0x4751f4 CreateFileW
 0x4751f8 DecodePointer

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure