Report - toolspub2.exe

Malicious Library AntiDebug AntiVM PE32 PE File
ScreenShot
Created 2023.12.12 08:02 Machine s1_win7_x6401
Filename toolspub2.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
6.0
ZERO API file : malware
VT API (file)
md5 05193c12562beb5de5f05ae6816c976f
sha256 ea755384c6e3558710e6bc8833d51e09aff904c76ecfa751895b9948feff726d
ssdeep 3072:t07gIqLEHi+cOtsLpAjPsXp0qCAfs5qtrpJrkG5RScg7:cgIqLKi+cCjPwlCL5qBM
imphash bcb945da6d587ee0214ea3353c638407
impfuzzy 24:jkrkIpNs0X6FSDTgFfkhlJ0DB4jpWCM6BJRdh4bt/zm0+cfpluHuOZyvnRSBw9c:kRfK4qfEMYzdGt/Srcfp0uRSBw9c
  Network IP location

Signature (12cnts)

Level Description
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Detects Avast Antivirus through the presence of a library
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks if process is being debugged by a debugger
info This executable has a PDB path

Rules (10cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x420008 GetConsoleAliasesLengthW
 0x42000c EnumDateFormatsExW
 0x420010 TlsGetValue
 0x420014 LoadResource
 0x420018 SystemTimeToTzSpecificLocalTime
 0x42001c GlobalAddAtomA
 0x420020 InterlockedIncrement
 0x420024 GetCurrentProcess
 0x420028 InterlockedCompareExchange
 0x42002c OpenSemaphoreA
 0x420030 GetTickCount
 0x420034 GetDateFormatA
 0x420038 GetVolumePathNameW
 0x42003c GetCurrencyFormatW
 0x420040 GlobalAlloc
 0x420044 GlobalFindAtomA
 0x420048 Sleep
 0x42004c AssignProcessToJobObject
 0x420050 SizeofResource
 0x420054 GetSystemWindowsDirectoryA
 0x420058 CreateFileW
 0x42005c FlushFileBuffers
 0x420060 CreateJobObjectA
 0x420064 GetFullPathNameA
 0x420068 GetLastError
 0x42006c SetLastError
 0x420070 BackupRead
 0x420074 GetProcAddress
 0x420078 GetProcessHeaps
 0x42007c VirtualAlloc
 0x420080 BeginUpdateResourceW
 0x420084 SetComputerNameA
 0x420088 LoadLibraryA
 0x42008c CreateFileMappingW
 0x420090 FoldStringA
 0x420094 FindFirstVolumeMountPointA
 0x420098 CreateIoCompletionPort
 0x42009c GetModuleHandleA
 0x4200a0 FindFirstChangeNotificationA
 0x4200a4 VirtualProtect
 0x4200a8 GetVersionExA
 0x4200ac FindAtomW
 0x4200b0 GetWindowsDirectoryW
 0x4200b4 LCMapStringW
 0x4200b8 InterlockedExchange
 0x4200bc GetComputerNameA
 0x4200c0 UnhandledExceptionFilter
 0x4200c4 SetUnhandledExceptionFilter
 0x4200c8 GetModuleHandleW
 0x4200cc ExitProcess
 0x4200d0 GetStartupInfoW
 0x4200d4 WriteFile
 0x4200d8 GetStdHandle
 0x4200dc GetModuleFileNameA
 0x4200e0 GetCPInfo
 0x4200e4 InterlockedDecrement
 0x4200e8 GetACP
 0x4200ec GetOEMCP
 0x4200f0 IsValidCodePage
 0x4200f4 TlsAlloc
 0x4200f8 TlsSetValue
 0x4200fc TlsFree
 0x420100 GetCurrentThreadId
 0x420104 HeapSize
 0x420108 HeapFree
 0x42010c TerminateProcess
 0x420110 IsDebuggerPresent
 0x420114 DeleteCriticalSection
 0x420118 LeaveCriticalSection
 0x42011c EnterCriticalSection
 0x420120 InitializeCriticalSectionAndSpinCount
 0x420124 GetModuleFileNameW
 0x420128 FreeEnvironmentStringsW
 0x42012c GetEnvironmentStringsW
 0x420130 GetCommandLineW
 0x420134 SetHandleCount
 0x420138 GetFileType
 0x42013c GetStartupInfoA
 0x420140 HeapCreate
 0x420144 VirtualFree
 0x420148 QueryPerformanceCounter
 0x42014c GetCurrentProcessId
 0x420150 GetSystemTimeAsFileTime
 0x420154 LCMapStringA
 0x420158 WideCharToMultiByte
 0x42015c MultiByteToWideChar
 0x420160 GetStringTypeA
 0x420164 GetStringTypeW
 0x420168 GetLocaleInfoA
 0x42016c HeapAlloc
 0x420170 HeapReAlloc
 0x420174 RtlUnwind
USER32.dll
 0x42017c RealGetWindowClassA
GDI32.dll
 0x420000 SetDeviceGammaRamp

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure