ScreenShot
Created | 2023.10.04 10:19 | Machine | s1_win7_x6401 |
Filename | tvnc | ||
Type | PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | |||
md5 | 279e80bab42a9971336f59d05e281f96 | ||
sha256 | eef2098383e9942b9ca54fc45163bb8b2404b1d176020ebe0ee724d66be1a68c | ||
ssdeep | 1536:F7pxSJsy6Nh5wFHssKjrtN/5jqzyCNwGXGhric45gwN:/YwNh5wFHssKXnxjNCNHGFwN | ||
imphash | f599f6d6eed879ac9612841c28ee3418 | ||
impfuzzy | 12:jYRJRJJoAR+hqR2qBrKHlJYasTqa91KddFQJqcsaGXZn:j8fjB+kTYliHx91SDcqcFGXZn |
Network IP location
Signature (9cnts)
Level | Description |
---|---|
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Creates a suspicious process |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Collects information to fingerprint the system (MachineGuid |
info | Command line console output was observed |
info | One or more processes crashed |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | IsDLL | (no description) | binaries (upload) |
info | IsPE64 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|
Suricata ids
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x3a02711a4 CopyFileW
0x3a02711ac DeleteCriticalSection
0x3a02711b4 EnterCriticalSection
0x3a02711bc GetLastError
0x3a02711c4 InitializeCriticalSection
0x3a02711cc IsDBCSLeadByteEx
0x3a02711d4 LeaveCriticalSection
0x3a02711dc MultiByteToWideChar
0x3a02711e4 Sleep
0x3a02711ec TlsGetValue
0x3a02711f4 VirtualProtect
0x3a02711fc VirtualQuery
0x3a0271204 WinExec
msvcrt.dll
0x3a0271214 ___lc_codepage_func
0x3a027121c ___mb_cur_max_func
0x3a0271224 __iob_func
0x3a027122c _amsg_exit
0x3a0271234 _errno
0x3a027123c _initterm
0x3a0271244 _lock
0x3a027124c _unlock
0x3a0271254 abort
0x3a027125c calloc
0x3a0271264 free
0x3a027126c fwrite
0x3a0271274 getc
0x3a027127c islower
0x3a0271284 isspace
0x3a027128c isupper
0x3a0271294 isxdigit
0x3a027129c localeconv
0x3a02712a4 malloc
0x3a02712ac memcpy
0x3a02712b4 memset
0x3a02712bc realloc
0x3a02712c4 strcat
0x3a02712cc strlen
0x3a02712d4 strncmp
0x3a02712dc strtol
0x3a02712e4 strtoul
0x3a02712ec tolower
0x3a02712f4 ungetc
0x3a02712fc vfprintf
EAT(Export Address Table) Library
0x3a026b000 hash
0x3a0261470 xlAutoOpen
0x3a02613d0 xor_decrypt
KERNEL32.dll
0x3a02711a4 CopyFileW
0x3a02711ac DeleteCriticalSection
0x3a02711b4 EnterCriticalSection
0x3a02711bc GetLastError
0x3a02711c4 InitializeCriticalSection
0x3a02711cc IsDBCSLeadByteEx
0x3a02711d4 LeaveCriticalSection
0x3a02711dc MultiByteToWideChar
0x3a02711e4 Sleep
0x3a02711ec TlsGetValue
0x3a02711f4 VirtualProtect
0x3a02711fc VirtualQuery
0x3a0271204 WinExec
msvcrt.dll
0x3a0271214 ___lc_codepage_func
0x3a027121c ___mb_cur_max_func
0x3a0271224 __iob_func
0x3a027122c _amsg_exit
0x3a0271234 _errno
0x3a027123c _initterm
0x3a0271244 _lock
0x3a027124c _unlock
0x3a0271254 abort
0x3a027125c calloc
0x3a0271264 free
0x3a027126c fwrite
0x3a0271274 getc
0x3a027127c islower
0x3a0271284 isspace
0x3a027128c isupper
0x3a0271294 isxdigit
0x3a027129c localeconv
0x3a02712a4 malloc
0x3a02712ac memcpy
0x3a02712b4 memset
0x3a02712bc realloc
0x3a02712c4 strcat
0x3a02712cc strlen
0x3a02712d4 strncmp
0x3a02712dc strtol
0x3a02712e4 strtoul
0x3a02712ec tolower
0x3a02712f4 ungetc
0x3a02712fc vfprintf
EAT(Export Address Table) Library
0x3a026b000 hash
0x3a0261470 xlAutoOpen
0x3a02613d0 xor_decrypt