Report - RaiDrive_2023.9.0_x64.exe

Gen1 Generic Malware Malicious Library UPX Admin Tool (Sysinternals etc ...) Antivirus Malicious Packer ASPack CAB PE File PE32 OS Processor Check JPEG Format PE64 DLL BMP Format icon DllRegisterServer dll MSOffice File
ScreenShot
Created 2023.09.11 18:02 Machine s1_win7_x6401
Filename RaiDrive_2023.9.0_x64.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score Not founds Behavior Score
4.2
ZERO API file : mailcious
VT API (file) 15 detected (Common, Artemis, Genus, ABRisk, GKZB, Banload, eqdq, Detected, Agentb, Generic@AI, RDML, K0sMetBopRYQVTP4fhFtQ, PossibleThreat, MALICIOUS)
md5 a523a20f9993d562a1e2761d930cc243
sha256 e8c944b9a94b79f2d5a2783d1c20a555d66e6912c077a8a47617da5f0c5caa78
ssdeep 196608:0fl0kYa0SgYavcpMFYeBL/pbtc+swO+7moMVzMvWHpxh7HxMSKoTXKsKIwiTs1v1:mRY/0GrKI7moMV4vWMSKUCsog+wx+w23
imphash 21314122cd4542a6b9b297f52a87acbe
impfuzzy 48:JOUcSpvEdTsQYbbqoH9swUwrkrha9xvCrwYUrUvZk78:JHcSpvEdTsQYCMSPwrkrGxvo7UrWt
  Network IP location

Signature (11cnts)

Level Description
watch File has been identified by 15 AntiVirus engines on VirusTotal as malicious
watch One or more of the buffers contains an embedded PE file
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
info Checks amount of memory in system
info Queries for the computername
info This executable has a PDB path

Rules (28cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (download)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch ASPack_Zero ASPack packed file binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info bmp_file_format bmp file format binaries (download)
info CAB_file_format CAB archive file binaries (download)
info CAB_file_format CAB archive file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (download)
info icon_file_format icon file format binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info JPEG_Format_Zero JPEG Format binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x66c000 CreateFileW
 0x66c004 CloseHandle
 0x66c008 WriteFile
 0x66c00c DeleteFileW
 0x66c010 HeapDestroy
 0x66c014 HeapSize
 0x66c018 HeapReAlloc
 0x66c01c HeapFree
 0x66c020 HeapAlloc
 0x66c024 GetProcessHeap
 0x66c028 SizeofResource
 0x66c02c LockResource
 0x66c030 LoadResource
 0x66c034 FindResourceW
 0x66c038 FindResourceExW
 0x66c03c CreateEventExW
 0x66c040 WaitForSingleObject
 0x66c044 CreateProcessW
 0x66c048 GetLastError
 0x66c04c GetExitCodeProcess
 0x66c050 SetEvent
 0x66c054 RemoveDirectoryW
 0x66c058 GetProcAddress
 0x66c05c GetModuleHandleW
 0x66c060 GetWindowsDirectoryW
 0x66c064 CreateDirectoryW
 0x66c068 GetTempPathW
 0x66c06c GetTempFileNameW
 0x66c070 MoveFileW
 0x66c074 EnterCriticalSection
 0x66c078 LeaveCriticalSection
 0x66c07c GetModuleFileNameW
 0x66c080 DeleteCriticalSection
 0x66c084 InitializeCriticalSectionAndSpinCount
 0x66c088 GetCurrentThreadId
 0x66c08c RaiseException
 0x66c090 SetLastError
 0x66c094 GlobalUnlock
 0x66c098 GlobalLock
 0x66c09c GlobalAlloc
 0x66c0a0 MulDiv
 0x66c0a4 lstrcmpW
 0x66c0a8 CreateEventW
 0x66c0ac FindClose
 0x66c0b0 FindFirstFileW
 0x66c0b4 GetFullPathNameW
 0x66c0b8 InitializeCriticalSection
 0x66c0bc lstrcpynW
 0x66c0c0 CreateThread
 0x66c0c4 LoadLibraryExW
 0x66c0c8 GetCurrentProcess
 0x66c0cc Sleep
 0x66c0d0 WideCharToMultiByte
 0x66c0d4 GetDiskFreeSpaceExW
 0x66c0d8 DecodePointer
 0x66c0dc GetExitCodeThread
 0x66c0e0 GetCurrentProcessId
 0x66c0e4 FreeLibrary
 0x66c0e8 GetSystemDirectoryW
 0x66c0ec lstrlenW
 0x66c0f0 VerifyVersionInfoW
 0x66c0f4 VerSetConditionMask
 0x66c0f8 lstrcmpiW
 0x66c0fc LoadLibraryW
 0x66c100 GetDriveTypeW
 0x66c104 CompareStringW
 0x66c108 FindNextFileW
 0x66c10c GetLogicalDriveStringsW
 0x66c110 GetFileSize
 0x66c114 GetFileAttributesW
 0x66c118 GetShortPathNameW
 0x66c11c GetFinalPathNameByHandleW
 0x66c120 SetFileAttributesW
 0x66c124 GetFileTime
 0x66c128 CopyFileW
 0x66c12c ReadFile
 0x66c130 SetFilePointer
 0x66c134 SetFileTime
 0x66c138 SystemTimeToFileTime
 0x66c13c MultiByteToWideChar
 0x66c140 GetSystemInfo
 0x66c144 WaitForMultipleObjects
 0x66c148 GetVersionExW
 0x66c14c VirtualProtect
 0x66c150 VirtualQuery
 0x66c154 LoadLibraryExA
 0x66c158 GetStringTypeW
 0x66c15c LocalFree
 0x66c160 LocalAlloc
 0x66c164 SetUnhandledExceptionFilter
 0x66c168 FileTimeToSystemTime
 0x66c16c GetEnvironmentVariableW
 0x66c170 GetSystemTime
 0x66c174 GetDateFormatW
 0x66c178 GetTimeFormatW
 0x66c17c GetLocaleInfoW
 0x66c180 CreateToolhelp32Snapshot
 0x66c184 Process32FirstW
 0x66c188 Process32NextW
 0x66c18c FormatMessageW
 0x66c190 GetEnvironmentStringsW
 0x66c194 InitializeCriticalSectionEx
 0x66c198 LoadLibraryA
 0x66c19c GetModuleFileNameA
 0x66c1a0 GetCurrentThread
 0x66c1a4 GetConsoleOutputCP
 0x66c1a8 FlushFileBuffers
 0x66c1ac Wow64DisableWow64FsRedirection
 0x66c1b0 Wow64RevertWow64FsRedirection
 0x66c1b4 IsWow64Process
 0x66c1b8 SetConsoleTextAttribute
 0x66c1bc GetStdHandle
 0x66c1c0 GetConsoleScreenBufferInfo
 0x66c1c4 OutputDebugStringW
 0x66c1c8 GetTickCount
 0x66c1cc GetCommandLineW
 0x66c1d0 SetCurrentDirectoryW
 0x66c1d4 SetEndOfFile
 0x66c1d8 EnumResourceLanguagesW
 0x66c1dc GetSystemDefaultLangID
 0x66c1e0 GetUserDefaultLangID
 0x66c1e4 GetLocalTime
 0x66c1e8 ResetEvent
 0x66c1ec GlobalFree
 0x66c1f0 GetPrivateProfileStringW
 0x66c1f4 GetPrivateProfileSectionNamesW
 0x66c1f8 WritePrivateProfileStringW
 0x66c1fc CreateNamedPipeW
 0x66c200 ConnectNamedPipe
 0x66c204 TerminateThread
 0x66c208 CompareFileTime
 0x66c20c CopyFileExW
 0x66c210 OpenEventW
 0x66c214 PeekNamedPipe
 0x66c218 WaitForSingleObjectEx
 0x66c21c QueryPerformanceCounter
 0x66c220 QueryPerformanceFrequency
 0x66c224 EncodePointer
 0x66c228 LCMapStringEx
 0x66c22c CompareStringEx
 0x66c230 GetCPInfo
 0x66c234 GetSystemTimeAsFileTime
 0x66c238 IsDebuggerPresent
 0x66c23c InitializeSListHead
 0x66c240 InterlockedPopEntrySList
 0x66c244 InterlockedPushEntrySList
 0x66c248 FlushInstructionCache
 0x66c24c IsProcessorFeaturePresent
 0x66c250 VirtualAlloc
 0x66c254 VirtualFree
 0x66c258 UnhandledExceptionFilter
 0x66c25c TerminateProcess
 0x66c260 GetStartupInfoW
 0x66c264 RtlUnwind
 0x66c268 TlsAlloc
 0x66c26c TlsGetValue
 0x66c270 TlsSetValue
 0x66c274 TlsFree
 0x66c278 ExitThread
 0x66c27c FreeLibraryAndExitThread
 0x66c280 GetModuleHandleExW
 0x66c284 ExitProcess
 0x66c288 GetFileType
 0x66c28c LCMapStringW
 0x66c290 IsValidLocale
 0x66c294 GetUserDefaultLCID
 0x66c298 EnumSystemLocalesW
 0x66c29c GetTimeZoneInformation
 0x66c2a0 GetConsoleMode
 0x66c2a4 GetFileSizeEx
 0x66c2a8 SetFilePointerEx
 0x66c2ac FindFirstFileExW
 0x66c2b0 IsValidCodePage
 0x66c2b4 GetACP
 0x66c2b8 GetOEMCP
 0x66c2bc GetCommandLineA
 0x66c2c0 FreeEnvironmentStringsW
 0x66c2c4 SetEnvironmentVariableW
 0x66c2c8 SetStdHandle
 0x66c2cc ReadConsoleW
 0x66c2d0 WriteConsoleW
 0x66c2d4 GetProcessAffinityMask
 0x66c2d8 GetModuleHandleA
 0x66c2dc GlobalMemoryStatus
 0x66c2e0 ReleaseSemaphore
 0x66c2e4 CreateSemaphoreW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure