Report - bin.exe

Malicious Library PE32 PE File
ScreenShot
Created 2024.01.20 18:06 Machine s1_win7_x6403
Filename bin.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.4
ZERO API file : malware
VT API (file) 52 detected (AIDetectMalware, SmokeLoader, malicious, high confidence, score, Lockbit, GenericKD, unsafe, Save, Attribute, HighConfidence, Kryptik, HWAN, Artemis, BotX, CLASSIC, vzlkp, MulDrop9, Krypt, IcedID, GenKD, Detected, Sabsik, FormBook, QQI1Q1, Eldorado, FSWW, R631044, ZexaF, vq1@aGtINQnG, GdSda, Obfuscated, Static AI, Malicious PE, susgen, confidence, 100%)
md5 cb200521eb0a2795343b74dc489bceb6
sha256 41c452f4ba12f523916ad3390d3711d9d6c05a7c698a83a890095a8c722249a5
ssdeep 6144:wVe3lL1uX1ACTFC1NQYNYD3ffl1fqdIhwqB1pJd:EiRu3FoQ9vfl1ydIhN1
imphash 99ab48e675287c5fa87def369efc076c
impfuzzy 24:jkrksOwKYUTgfMfPlJUbDo4jEdQBOpVO/euY6KJittdcMiRv9dQluHuOvRB+vjME:kd+d7pVO/K3cttdcMS9S0ZB+aw
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x432000 GetConsoleAliasesLengthW
 0x432004 FindResourceW
 0x432008 InterlockedIncrement
 0x43200c QueryDosDeviceA
 0x432010 InterlockedCompareExchange
 0x432014 FindCloseChangeNotification
 0x432018 GetComputerNameW
 0x43201c CreateHardLinkA
 0x432020 GetTickCount
 0x432024 GlobalFindAtomA
 0x432028 SetConsoleMode
 0x43202c WriteConsoleW
 0x432030 SetComputerNameExW
 0x432034 GetStartupInfoA
 0x432038 GetLastError
 0x43203c SetLastError
 0x432040 ReadConsoleOutputCharacterA
 0x432044 GetProcAddress
 0x432048 VirtualAlloc
 0x43204c SetComputerNameA
 0x432050 LoadLibraryA
 0x432054 InterlockedExchangeAdd
 0x432058 LocalAlloc
 0x43205c AddAtomW
 0x432060 lstrcmpiW
 0x432064 GetModuleHandleA
 0x432068 PurgeComm
 0x43206c CompareStringA
 0x432070 DeleteFileW
 0x432074 GetCurrentProcessId
 0x432078 DebugBreak
 0x43207c ResetWriteWatch
 0x432080 ResumeThread
 0x432084 GetConsoleOutputCP
 0x432088 MultiByteToWideChar
 0x43208c GetModuleHandleW
 0x432090 Sleep
 0x432094 ExitProcess
 0x432098 GetStartupInfoW
 0x43209c GetCPInfo
 0x4320a0 InterlockedDecrement
 0x4320a4 GetACP
 0x4320a8 GetOEMCP
 0x4320ac IsValidCodePage
 0x4320b0 TlsGetValue
 0x4320b4 TlsAlloc
 0x4320b8 TlsSetValue
 0x4320bc TlsFree
 0x4320c0 GetCurrentThreadId
 0x4320c4 TerminateProcess
 0x4320c8 GetCurrentProcess
 0x4320cc UnhandledExceptionFilter
 0x4320d0 SetUnhandledExceptionFilter
 0x4320d4 IsDebuggerPresent
 0x4320d8 EnterCriticalSection
 0x4320dc LeaveCriticalSection
 0x4320e0 RtlUnwind
 0x4320e4 SetHandleCount
 0x4320e8 GetStdHandle
 0x4320ec GetFileType
 0x4320f0 DeleteCriticalSection
 0x4320f4 HeapFree
 0x4320f8 WriteFile
 0x4320fc GetModuleFileNameA
 0x432100 InitializeCriticalSectionAndSpinCount
 0x432104 GetModuleFileNameW
 0x432108 FreeEnvironmentStringsW
 0x43210c GetEnvironmentStringsW
 0x432110 GetCommandLineW
 0x432114 HeapCreate
 0x432118 VirtualFree
 0x43211c QueryPerformanceCounter
 0x432120 GetSystemTimeAsFileTime
 0x432124 RaiseException
 0x432128 LCMapStringA
 0x43212c WideCharToMultiByte
 0x432130 LCMapStringW
 0x432134 GetStringTypeA
 0x432138 GetStringTypeW
 0x43213c GetLocaleInfoA
 0x432140 CloseHandle
 0x432144 CreateFileA
 0x432148 HeapAlloc
 0x43214c HeapReAlloc
 0x432150 HeapSize
 0x432154 GetConsoleCP
 0x432158 GetConsoleMode
 0x43215c FlushFileBuffers
 0x432160 SetStdHandle
 0x432164 SetFilePointer
 0x432168 SetEndOfFile
 0x43216c GetProcessHeap
 0x432170 ReadFile
 0x432174 WriteConsoleA
USER32.dll
 0x43217c SetMessageExtraInfo

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure