Report - cred64.dll

Malicious Library UPX PE File DLL PE64 OS Processor Check
ScreenShot
Created 2023.11.05 12:48 Machine s1_win7_x6403
Filename cred64.dll
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
6.8
ZERO API file : clean
VT API (file)
md5 d4d558b12d16080148ba9fb0079810d2
sha256 3ea66f0b4f6984f03c4dd4dbe91a26d3de64bbdae085ad927297fc2bd46122d7
ssdeep 24576:sAwtSMdHL4+3MQL+RoZk9LZ/zedfjMTUmXbc5Pf8VqZzrsx:sc+3MQLQoZyZ/zEfc6P0S
imphash 8f6370a79dbfb20620081d91ded2b029
impfuzzy 96:ZZtu7Ze6BF1V5g4uAc0aR6x5DtQ8Bg99tFzOoQTk:Ttu7Z3F5a8+7gTk
  Network IP location

Signature (17cnts)

Level Description
watch Attempts to access Bitcoin/ALTCoin wallets
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local email clients
watch Harvests credentials from local FTP client softwares
watch Harvests information related to installed instant messenger clients
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Searches running processes potentially to identify processes for sandbox evasion
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice Uses Windows utilities for basic Windows functionality
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path
info Tries to locate where the browsers are installed

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.196.8.176/u8v5zeQ/index.php US Simple Carrier LLC 185.196.8.176 clean
185.196.8.176 US Simple Carrier LLC 185.196.8.176 malware

Suricata ids

PE API

IAT(Import Address Table) Library

CRYPT32.dll
 0x1800f8070 CryptUnprotectData
KERNEL32.dll
 0x1800f8080 GetFullPathNameA
 0x1800f8088 SetEndOfFile
 0x1800f8090 UnlockFileEx
 0x1800f8098 GetTempPathW
 0x1800f80a0 CreateMutexW
 0x1800f80a8 WaitForSingleObject
 0x1800f80b0 CreateFileW
 0x1800f80b8 GetFileAttributesW
 0x1800f80c0 GetCurrentThreadId
 0x1800f80c8 UnmapViewOfFile
 0x1800f80d0 HeapValidate
 0x1800f80d8 HeapSize
 0x1800f80e0 MultiByteToWideChar
 0x1800f80e8 Sleep
 0x1800f80f0 GetTempPathA
 0x1800f80f8 FormatMessageW
 0x1800f8100 GetDiskFreeSpaceA
 0x1800f8108 GetLastError
 0x1800f8110 GetFileAttributesA
 0x1800f8118 GetFileAttributesExW
 0x1800f8120 OutputDebugStringW
 0x1800f8128 CreateFileA
 0x1800f8130 LoadLibraryA
 0x1800f8138 WaitForSingleObjectEx
 0x1800f8140 DeleteFileA
 0x1800f8148 DeleteFileW
 0x1800f8150 HeapReAlloc
 0x1800f8158 CloseHandle
 0x1800f8160 GetSystemInfo
 0x1800f8168 LoadLibraryW
 0x1800f8170 HeapAlloc
 0x1800f8178 HeapCompact
 0x1800f8180 HeapDestroy
 0x1800f8188 UnlockFile
 0x1800f8190 GetProcAddress
 0x1800f8198 CreateFileMappingA
 0x1800f81a0 LocalFree
 0x1800f81a8 LockFileEx
 0x1800f81b0 GetFileSize
 0x1800f81b8 DeleteCriticalSection
 0x1800f81c0 GetCurrentProcessId
 0x1800f81c8 GetProcessHeap
 0x1800f81d0 SystemTimeToFileTime
 0x1800f81d8 FreeLibrary
 0x1800f81e0 WideCharToMultiByte
 0x1800f81e8 GetSystemTimeAsFileTime
 0x1800f81f0 GetSystemTime
 0x1800f81f8 FormatMessageA
 0x1800f8200 CreateFileMappingW
 0x1800f8208 MapViewOfFile
 0x1800f8210 QueryPerformanceCounter
 0x1800f8218 GetTickCount
 0x1800f8220 FlushFileBuffers
 0x1800f8228 SetHandleInformation
 0x1800f8230 FindFirstFileA
 0x1800f8238 Wow64DisableWow64FsRedirection
 0x1800f8240 K32GetModuleFileNameExW
 0x1800f8248 FindNextFileA
 0x1800f8250 CreatePipe
 0x1800f8258 PeekNamedPipe
 0x1800f8260 lstrlenA
 0x1800f8268 FindClose
 0x1800f8270 GetCurrentDirectoryA
 0x1800f8278 lstrcatA
 0x1800f8280 OpenProcess
 0x1800f8288 SetCurrentDirectoryA
 0x1800f8290 CreateToolhelp32Snapshot
 0x1800f8298 ProcessIdToSessionId
 0x1800f82a0 CopyFileA
 0x1800f82a8 Wow64RevertWow64FsRedirection
 0x1800f82b0 Process32NextW
 0x1800f82b8 Process32FirstW
 0x1800f82c0 CreateThread
 0x1800f82c8 CreateProcessA
 0x1800f82d0 CreateDirectoryA
 0x1800f82d8 WriteConsoleW
 0x1800f82e0 InitializeCriticalSection
 0x1800f82e8 LeaveCriticalSection
 0x1800f82f0 LockFile
 0x1800f82f8 OutputDebugStringA
 0x1800f8300 GetDiskFreeSpaceW
 0x1800f8308 WriteFile
 0x1800f8310 GetFullPathNameW
 0x1800f8318 EnterCriticalSection
 0x1800f8320 HeapFree
 0x1800f8328 HeapCreate
 0x1800f8330 TryEnterCriticalSection
 0x1800f8338 ReadFile
 0x1800f8340 AreFileApisANSI
 0x1800f8348 SetFilePointer
 0x1800f8350 ReadConsoleW
 0x1800f8358 SetFilePointerEx
 0x1800f8360 GetConsoleMode
 0x1800f8368 GetConsoleCP
 0x1800f8370 SetEnvironmentVariableW
 0x1800f8378 FreeEnvironmentStringsW
 0x1800f8380 GetEnvironmentStringsW
 0x1800f8388 GetCommandLineW
 0x1800f8390 GetCommandLineA
 0x1800f8398 GetOEMCP
 0x1800f83a0 GetACP
 0x1800f83a8 IsValidCodePage
 0x1800f83b0 FindNextFileW
 0x1800f83b8 FindFirstFileExW
 0x1800f83c0 SetStdHandle
 0x1800f83c8 GetCurrentDirectoryW
 0x1800f83d0 RtlCaptureContext
 0x1800f83d8 RtlLookupFunctionEntry
 0x1800f83e0 RtlVirtualUnwind
 0x1800f83e8 IsDebuggerPresent
 0x1800f83f0 UnhandledExceptionFilter
 0x1800f83f8 SetUnhandledExceptionFilter
 0x1800f8400 GetStartupInfoW
 0x1800f8408 IsProcessorFeaturePresent
 0x1800f8410 GetModuleHandleW
 0x1800f8418 InitializeSListHead
 0x1800f8420 SetLastError
 0x1800f8428 InitializeCriticalSectionAndSpinCount
 0x1800f8430 SwitchToThread
 0x1800f8438 TlsAlloc
 0x1800f8440 TlsGetValue
 0x1800f8448 TlsSetValue
 0x1800f8450 TlsFree
 0x1800f8458 EncodePointer
 0x1800f8460 DecodePointer
 0x1800f8468 GetCPInfo
 0x1800f8470 CompareStringW
 0x1800f8478 LCMapStringW
 0x1800f8480 GetLocaleInfoW
 0x1800f8488 GetStringTypeW
 0x1800f8490 RtlUnwindEx
 0x1800f8498 RtlPcToFileHeader
 0x1800f84a0 RaiseException
 0x1800f84a8 InterlockedFlushSList
 0x1800f84b0 LoadLibraryExW
 0x1800f84b8 ExitThread
 0x1800f84c0 FreeLibraryAndExitThread
 0x1800f84c8 GetModuleHandleExW
 0x1800f84d0 GetDriveTypeW
 0x1800f84d8 GetFileInformationByHandle
 0x1800f84e0 GetFileType
 0x1800f84e8 SystemTimeToTzSpecificLocalTime
 0x1800f84f0 FileTimeToSystemTime
 0x1800f84f8 GetCurrentProcess
 0x1800f8500 TerminateProcess
 0x1800f8508 ExitProcess
 0x1800f8510 GetModuleFileNameW
 0x1800f8518 IsValidLocale
 0x1800f8520 GetUserDefaultLCID
 0x1800f8528 EnumSystemLocalesW
 0x1800f8530 GetTimeZoneInformation
 0x1800f8538 GetStdHandle
ADVAPI32.dll
 0x1800f8000 GetSidSubAuthorityCount
 0x1800f8008 RegEnumValueW
 0x1800f8010 RegEnumKeyA
 0x1800f8018 RegCloseKey
 0x1800f8020 RegQueryInfoKeyW
 0x1800f8028 RegOpenKeyA
 0x1800f8030 RegQueryValueExA
 0x1800f8038 GetSidIdentifierAuthority
 0x1800f8040 GetSidSubAuthority
 0x1800f8048 GetUserNameA
 0x1800f8050 RegEnumKeyExW
 0x1800f8058 LookupAccountNameA
 0x1800f8060 RegOpenKeyExA
SHELL32.dll
 0x1800f8548 SHGetFolderPathA
 0x1800f8550 SHFileOperationA
WININET.dll
 0x1800f8560 HttpOpenRequestA
 0x1800f8568 InternetWriteFile
 0x1800f8570 InternetReadFile
 0x1800f8578 InternetConnectA
 0x1800f8580 HttpSendRequestA
 0x1800f8588 InternetCloseHandle
 0x1800f8590 InternetOpenA
 0x1800f8598 HttpAddRequestHeadersA
 0x1800f85a0 HttpSendRequestExW
 0x1800f85a8 HttpEndRequestA
 0x1800f85b0 InternetOpenW
crypt.dll
 0x1800f85c0 BCryptOpenAlgorithmProvider
 0x1800f85c8 BCryptSetProperty
 0x1800f85d0 BCryptGenerateSymmetricKey
 0x1800f85d8 BCryptDecrypt

EAT(Export Address Table) Library

0x1800bd600 Main
0x180004d30 Save


Similarity measure (PE file only) - Checking for service failure