Report - Ahdlcrjjdjdlgf.exe

Hide_EXE UPX Malicious Library Malicious Packer MZP Format PE File PE32
ScreenShot
Created 2023.08.09 09:26 Machine s1_win7_x6403
Filename Ahdlcrjjdjdlgf.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.4
ZERO API file : mailcious
VT API (file) 40 detected (AIDetectMalware, DownLoader45, Strictor, Artemis, Modiloader, Vymj, LTUI, Attribute, HighConfidence, malicious, high confidence, score, Noon, FileRepMalware, Misc, Infected, Nekark, tmizu, ai score=84, Casdet, Detected, unsafe, RnkBend, R002H0CH823, eRvlSPVyf1, susgen, confidence, 100%)
md5 053052690586782a411f46ec2bf255fb
sha256 2f1ca9ea9c439cddf83672896fe9810ce3d3aa2218f3718f121e90a19e3a25e6
ssdeep 24576:O+wrBX18XhVRGTbabra2OYSRf9PhHt8AE:OrnHXKD
imphash a4dea6841158221e1f9d51cae1534166
impfuzzy 192:o13MDbuuaxSUvK9ksoHXEJeWzFwg1QwPOQP:C3maq9uY11POQP
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer

Rules (7cnts)

Level Name Description Collection
warning hide_executable_file Hide executable file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x515858 SysFreeString
 0x51585c SysReAllocStringLen
 0x515860 SysAllocStringLen
advapi32.dll
 0x515868 RegQueryValueExA
 0x51586c RegOpenKeyExA
 0x515870 RegCloseKey
user32.dll
 0x515878 GetKeyboardType
 0x51587c DestroyWindow
 0x515880 LoadStringA
 0x515884 MessageBoxA
 0x515888 CharNextA
kernel32.dll
 0x515890 GetACP
 0x515894 Sleep
 0x515898 VirtualFree
 0x51589c VirtualAlloc
 0x5158a0 GetCurrentThreadId
 0x5158a4 InterlockedDecrement
 0x5158a8 InterlockedIncrement
 0x5158ac VirtualQuery
 0x5158b0 WideCharToMultiByte
 0x5158b4 MultiByteToWideChar
 0x5158b8 lstrlenA
 0x5158bc lstrcpynA
 0x5158c0 LoadLibraryExA
 0x5158c4 GetThreadLocale
 0x5158c8 GetStartupInfoA
 0x5158cc GetProcAddress
 0x5158d0 GetModuleHandleA
 0x5158d4 GetModuleFileNameA
 0x5158d8 GetLocaleInfoA
 0x5158dc GetCommandLineA
 0x5158e0 FreeLibrary
 0x5158e4 FindFirstFileA
 0x5158e8 FindClose
 0x5158ec ExitProcess
 0x5158f0 CompareStringA
 0x5158f4 WriteFile
 0x5158f8 UnhandledExceptionFilter
 0x5158fc RtlUnwind
 0x515900 RaiseException
 0x515904 GetStdHandle
kernel32.dll
 0x51590c TlsSetValue
 0x515910 TlsGetValue
 0x515914 LocalAlloc
 0x515918 GetModuleHandleA
user32.dll
 0x515920 CreateWindowExA
 0x515924 WindowFromPoint
 0x515928 WaitMessage
 0x51592c UpdateWindow
 0x515930 UnregisterClassA
 0x515934 UnhookWindowsHookEx
 0x515938 TranslateMessage
 0x51593c TranslateMDISysAccel
 0x515940 TrackPopupMenu
 0x515944 SystemParametersInfoA
 0x515948 ShowWindow
 0x51594c ShowScrollBar
 0x515950 ShowOwnedPopups
 0x515954 SetWindowsHookExA
 0x515958 SetWindowTextA
 0x51595c SetWindowPos
 0x515960 SetWindowPlacement
 0x515964 SetWindowLongW
 0x515968 SetWindowLongA
 0x51596c SetTimer
 0x515970 SetScrollRange
 0x515974 SetScrollPos
 0x515978 SetScrollInfo
 0x51597c SetRect
 0x515980 SetPropA
 0x515984 SetParent
 0x515988 SetMenuItemInfoA
 0x51598c SetMenu
 0x515990 SetForegroundWindow
 0x515994 SetFocus
 0x515998 SetCursor
 0x51599c SetClassLongA
 0x5159a0 SetCapture
 0x5159a4 SetActiveWindow
 0x5159a8 SendMessageW
 0x5159ac SendMessageA
 0x5159b0 ScrollWindow
 0x5159b4 ScreenToClient
 0x5159b8 RemovePropA
 0x5159bc RemoveMenu
 0x5159c0 ReleaseDC
 0x5159c4 ReleaseCapture
 0x5159c8 RegisterWindowMessageA
 0x5159cc RegisterClipboardFormatA
 0x5159d0 RegisterClassA
 0x5159d4 RedrawWindow
 0x5159d8 PtInRect
 0x5159dc PostQuitMessage
 0x5159e0 PostMessageA
 0x5159e4 PeekMessageW
 0x5159e8 PeekMessageA
 0x5159ec OffsetRect
 0x5159f0 OemToCharA
 0x5159f4 MessageBoxA
 0x5159f8 MapWindowPoints
 0x5159fc MapVirtualKeyA
 0x515a00 LoadStringA
 0x515a04 LoadKeyboardLayoutA
 0x515a08 LoadIconA
 0x515a0c LoadCursorA
 0x515a10 LoadBitmapA
 0x515a14 KillTimer
 0x515a18 IsZoomed
 0x515a1c IsWindowVisible
 0x515a20 IsWindowUnicode
 0x515a24 IsWindowEnabled
 0x515a28 IsWindow
 0x515a2c IsRectEmpty
 0x515a30 IsIconic
 0x515a34 IsDialogMessageW
 0x515a38 IsDialogMessageA
 0x515a3c IsChild
 0x515a40 InvalidateRect
 0x515a44 IntersectRect
 0x515a48 InsertMenuItemA
 0x515a4c InsertMenuA
 0x515a50 InflateRect
 0x515a54 GetWindowThreadProcessId
 0x515a58 GetWindowTextA
 0x515a5c GetWindowRect
 0x515a60 GetWindowPlacement
 0x515a64 GetWindowLongW
 0x515a68 GetWindowLongA
 0x515a6c GetWindowDC
 0x515a70 GetTopWindow
 0x515a74 GetSystemMetrics
 0x515a78 GetSystemMenu
 0x515a7c GetSysColorBrush
 0x515a80 GetSysColor
 0x515a84 GetSubMenu
 0x515a88 GetScrollRange
 0x515a8c GetScrollPos
 0x515a90 GetScrollInfo
 0x515a94 GetPropA
 0x515a98 GetParent
 0x515a9c GetWindow
 0x515aa0 GetMessageTime
 0x515aa4 GetMessagePos
 0x515aa8 GetMenuStringA
 0x515aac GetMenuState
 0x515ab0 GetMenuItemInfoA
 0x515ab4 GetMenuItemID
 0x515ab8 GetMenuItemCount
 0x515abc GetMenu
 0x515ac0 GetLastActivePopup
 0x515ac4 GetKeyboardState
 0x515ac8 GetKeyboardLayoutNameA
 0x515acc GetKeyboardLayoutList
 0x515ad0 GetKeyboardLayout
 0x515ad4 GetKeyState
 0x515ad8 GetKeyNameTextA
 0x515adc GetIconInfo
 0x515ae0 GetForegroundWindow
 0x515ae4 GetFocus
 0x515ae8 GetDesktopWindow
 0x515aec GetDCEx
 0x515af0 GetDC
 0x515af4 GetCursorPos
 0x515af8 GetCursor
 0x515afc GetClipboardData
 0x515b00 GetClientRect
 0x515b04 GetClassLongA
 0x515b08 GetClassInfoA
 0x515b0c GetCapture
 0x515b10 GetActiveWindow
 0x515b14 FrameRect
 0x515b18 FindWindowA
 0x515b1c FillRect
 0x515b20 EqualRect
 0x515b24 EnumWindows
 0x515b28 EnumThreadWindows
 0x515b2c EnumChildWindows
 0x515b30 EndPaint
 0x515b34 EnableWindow
 0x515b38 EnableScrollBar
 0x515b3c EnableMenuItem
 0x515b40 DrawTextA
 0x515b44 DrawMenuBar
 0x515b48 DrawIconEx
 0x515b4c DrawIcon
 0x515b50 DrawFrameControl
 0x515b54 DrawFocusRect
 0x515b58 DrawEdge
 0x515b5c DispatchMessageW
 0x515b60 DispatchMessageA
 0x515b64 DestroyWindow
 0x515b68 DestroyMenu
 0x515b6c DestroyIcon
 0x515b70 DestroyCursor
 0x515b74 DeleteMenu
 0x515b78 DefWindowProcA
 0x515b7c DefMDIChildProcA
 0x515b80 DefFrameProcA
 0x515b84 CreatePopupMenu
 0x515b88 CreateMenu
 0x515b8c CreateIcon
 0x515b90 ClientToScreen
 0x515b94 CheckMenuItem
 0x515b98 CallWindowProcA
 0x515b9c CallNextHookEx
 0x515ba0 BeginPaint
 0x515ba4 CharNextA
 0x515ba8 CharLowerBuffA
 0x515bac CharLowerA
 0x515bb0 CharToOemA
 0x515bb4 AdjustWindowRectEx
 0x515bb8 ActivateKeyboardLayout
gdi32.dll
 0x515bc0 UnrealizeObject
 0x515bc4 StretchBlt
 0x515bc8 SetWindowOrgEx
 0x515bcc SetWinMetaFileBits
 0x515bd0 SetViewportOrgEx
 0x515bd4 SetTextColor
 0x515bd8 SetStretchBltMode
 0x515bdc SetROP2
 0x515be0 SetPixel
 0x515be4 SetMapMode
 0x515be8 SetEnhMetaFileBits
 0x515bec SetDIBColorTable
 0x515bf0 SetBrushOrgEx
 0x515bf4 SetBkMode
 0x515bf8 SetBkColor
 0x515bfc SelectPalette
 0x515c00 SelectObject
 0x515c04 SelectClipRgn
 0x515c08 SaveDC
 0x515c0c RestoreDC
 0x515c10 RectVisible
 0x515c14 RealizePalette
 0x515c18 Polyline
 0x515c1c PlayEnhMetaFile
 0x515c20 PatBlt
 0x515c24 MoveToEx
 0x515c28 MaskBlt
 0x515c2c LineTo
 0x515c30 LPtoDP
 0x515c34 IntersectClipRect
 0x515c38 GetWindowOrgEx
 0x515c3c GetWinMetaFileBits
 0x515c40 GetTextMetricsA
 0x515c44 GetTextExtentPoint32A
 0x515c48 GetSystemPaletteEntries
 0x515c4c GetStockObject
 0x515c50 GetRgnBox
 0x515c54 GetPixel
 0x515c58 GetPaletteEntries
 0x515c5c GetObjectA
 0x515c60 GetFontData
 0x515c64 GetEnhMetaFilePaletteEntries
 0x515c68 GetEnhMetaFileHeader
 0x515c6c GetEnhMetaFileDescriptionA
 0x515c70 GetEnhMetaFileBits
 0x515c74 GetDeviceCaps
 0x515c78 GetDIBits
 0x515c7c GetDIBColorTable
 0x515c80 GetDCOrgEx
 0x515c84 GetCurrentPositionEx
 0x515c88 GetClipBox
 0x515c8c GetBrushOrgEx
 0x515c90 GetBitmapBits
 0x515c94 ExtTextOutA
 0x515c98 ExcludeClipRect
 0x515c9c DeleteObject
 0x515ca0 DeleteEnhMetaFile
 0x515ca4 DeleteDC
 0x515ca8 CreateSolidBrush
 0x515cac CreatePenIndirect
 0x515cb0 CreatePalette
 0x515cb4 CreateHalftonePalette
 0x515cb8 CreateFontIndirectA
 0x515cbc CreateEnhMetaFileA
 0x515cc0 CreateDIBitmap
 0x515cc4 CreateDIBSection
 0x515cc8 CreateCompatibleDC
 0x515ccc CreateCompatibleBitmap
 0x515cd0 CreateBrushIndirect
 0x515cd4 CreateBitmap
 0x515cd8 CopyEnhMetaFileA
 0x515cdc CloseEnhMetaFile
 0x515ce0 BitBlt
version.dll
 0x515ce8 VerQueryValueA
 0x515cec GetFileVersionInfoSizeA
 0x515cf0 GetFileVersionInfoA
kernel32.dll
 0x515cf8 lstrcpyA
 0x515cfc WriteProcessMemory
 0x515d00 WriteFile
 0x515d04 WaitForSingleObject
 0x515d08 VirtualQueryEx
 0x515d0c VirtualQuery
 0x515d10 VirtualProtectEx
 0x515d14 VirtualProtect
 0x515d18 VirtualAlloc
 0x515d1c SizeofResource
 0x515d20 SetThreadLocale
 0x515d24 SetFilePointer
 0x515d28 SetEvent
 0x515d2c SetErrorMode
 0x515d30 SetEndOfFile
 0x515d34 ResetEvent
 0x515d38 ReadProcessMemory
 0x515d3c ReadFile
 0x515d40 OpenProcess
 0x515d44 MultiByteToWideChar
 0x515d48 MulDiv
 0x515d4c LockResource
 0x515d50 LoadResource
 0x515d54 LoadLibraryExA
 0x515d58 LoadLibraryA
 0x515d5c LeaveCriticalSection
 0x515d60 InitializeCriticalSection
 0x515d64 GlobalUnlock
 0x515d68 GlobalSize
 0x515d6c GlobalLock
 0x515d70 GlobalFree
 0x515d74 GlobalFindAtomA
 0x515d78 GlobalDeleteAtom
 0x515d7c GlobalAlloc
 0x515d80 GlobalAddAtomA
 0x515d84 GetVersionExA
 0x515d88 GetVersion
 0x515d8c GetUserDefaultLCID
 0x515d90 GetTickCount
 0x515d94 GetThreadLocale
 0x515d98 GetStdHandle
 0x515d9c GetProcAddress
 0x515da0 GetModuleHandleW
 0x515da4 GetModuleHandleA
 0x515da8 GetModuleFileNameA
 0x515dac GetLocaleInfoA
 0x515db0 GetLocalTime
 0x515db4 GetLastError
 0x515db8 GetFullPathNameA
 0x515dbc GetDiskFreeSpaceA
 0x515dc0 GetDateFormatA
 0x515dc4 GetCurrentThreadId
 0x515dc8 GetCurrentProcessId
 0x515dcc GetCurrentProcess
 0x515dd0 GetCPInfo
 0x515dd4 FreeResource
 0x515dd8 InterlockedExchange
 0x515ddc FreeLibrary
 0x515de0 FormatMessageA
 0x515de4 FindResourceA
 0x515de8 EnumCalendarInfoA
 0x515dec EnterCriticalSection
 0x515df0 DeleteCriticalSection
 0x515df4 CreateThread
 0x515df8 CreateFileA
 0x515dfc CreateEventA
 0x515e00 CompareStringA
 0x515e04 CloseHandle
advapi32.dll
 0x515e0c RegQueryValueExA
 0x515e10 RegOpenKeyExA
 0x515e14 RegFlushKey
 0x515e18 RegCloseKey
oleaut32.dll
 0x515e20 GetErrorInfo
 0x515e24 SysFreeString
ole32.dll
 0x515e2c CreateStreamOnHGlobal
 0x515e30 IsAccelerator
 0x515e34 OleDraw
 0x515e38 OleSetMenuDescriptor
 0x515e3c CoCreateInstance
 0x515e40 CoGetClassObject
 0x515e44 CoUninitialize
 0x515e48 CoInitialize
 0x515e4c IsEqualGUID
kernel32.dll
 0x515e54 Sleep
oleaut32.dll
 0x515e5c SafeArrayPtrOfIndex
 0x515e60 SafeArrayGetUBound
 0x515e64 SafeArrayGetLBound
 0x515e68 SafeArrayCreate
 0x515e6c VariantChangeType
 0x515e70 VariantCopy
 0x515e74 VariantClear
 0x515e78 VariantInit
comctl32.dll
 0x515e80 _TrackMouseEvent
 0x515e84 ImageList_SetIconSize
 0x515e88 ImageList_GetIconSize
 0x515e8c ImageList_Write
 0x515e90 ImageList_Read
 0x515e94 ImageList_DragShowNolock
 0x515e98 ImageList_DragMove
 0x515e9c ImageList_DragLeave
 0x515ea0 ImageList_DragEnter
 0x515ea4 ImageList_EndDrag
 0x515ea8 ImageList_BeginDrag
 0x515eac ImageList_Remove
 0x515eb0 ImageList_DrawEx
 0x515eb4 ImageList_Draw
 0x515eb8 ImageList_GetBkColor
 0x515ebc ImageList_SetBkColor
 0x515ec0 ImageList_Add
 0x515ec4 ImageList_GetImageCount
 0x515ec8 ImageList_Destroy
 0x515ecc ImageList_Create
 0x515ed0 InitCommonControls
*invalid*
 0x515ed8 ZwWriteVirtualMemory
*invalid*
 0x515ee0 GetProcAddress
uRL
 0x515ee8 AutodialHookCallback
ntdll
 0x515ef0 NtQueryInformationFile
 0x515ef4 NtOpenFile
 0x515ef8 NtClose
 0x515efc NtReadFile
ntdll
 0x515f04 RtlDosPathNameToNtPathName_U

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure