Report - aa.xll

Generic Malware PE File DLL PE64
ScreenShot
Created 2023.09.23 19:18 Machine s1_win7_x6401
Filename aa.xll
Type PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
1.0
ZERO API file : malware
VT API (file) 33 detected (Alien, GenericKD, DarkGate, Malicious, score, MalwareX, YXDIVZ, Infected, jznzg, ai score=89, Tedy, Detected, R606770, Artemis, unsafe, Chgt, OmxMTTXvMrN)
md5 a2fb0b0d34d71073cd037e872d40ea14
sha256 091b7c16791cf976e684fe22ee18a4099a4e26ec75fa145b85dd14603b466b00
ssdeep 1536:5UK23Jsm6Nh5wF3s8KjrtN/5TqRGiNwmU2x0XZY:bCsNh5wF3s8KXHRTviNnApY
imphash eb3f1099640d7d708a3042408447c005
impfuzzy 12:jYRJRJJoAR+hqR2qBrKHlJYasTqa91KddFQJqc6aGXZzwD3:j8fjB+kTYliHx91SDcqcfGXZzwL
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious

Rules (4cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x24e4e11c8 CopyFileW
 0x24e4e11d0 DeleteCriticalSection
 0x24e4e11d8 EnterCriticalSection
 0x24e4e11e0 GetLastError
 0x24e4e11e8 InitializeCriticalSection
 0x24e4e11f0 IsDBCSLeadByteEx
 0x24e4e11f8 LeaveCriticalSection
 0x24e4e1200 MultiByteToWideChar
 0x24e4e1208 Sleep
 0x24e4e1210 TlsGetValue
 0x24e4e1218 VirtualProtect
 0x24e4e1220 VirtualQuery
 0x24e4e1228 WinExec
msvcrt.dll
 0x24e4e1238 ___lc_codepage_func
 0x24e4e1240 ___mb_cur_max_func
 0x24e4e1248 __iob_func
 0x24e4e1250 _amsg_exit
 0x24e4e1258 _errno
 0x24e4e1260 _initterm
 0x24e4e1268 _lock
 0x24e4e1270 _unlock
 0x24e4e1278 abort
 0x24e4e1280 calloc
 0x24e4e1288 free
 0x24e4e1290 fwrite
 0x24e4e1298 getc
 0x24e4e12a0 islower
 0x24e4e12a8 isspace
 0x24e4e12b0 isupper
 0x24e4e12b8 isxdigit
 0x24e4e12c0 localeconv
 0x24e4e12c8 malloc
 0x24e4e12d0 memcpy
 0x24e4e12d8 memset
 0x24e4e12e0 realloc
 0x24e4e12e8 strcpy
 0x24e4e12f0 strlen
 0x24e4e12f8 strncmp
 0x24e4e1300 strtol
 0x24e4e1308 strtoul
 0x24e4e1310 tolower
 0x24e4e1318 ungetc
 0x24e4e1320 vfprintf
USER32.dll
 0x24e4e1330 MessageBoxA

EAT(Export Address Table) Library

0x24e4d1450 xlAutoOpen
0x24e4d13d0 xor_decrypt


Similarity measure (PE file only) - Checking for service failure