ScreenShot
Created | 2024.04.01 07:52 | Machine | s1_win7_x6401 |
Filename | hghjhjghjhgj.exe | ||
Type | PE32+ executable (GUI) x86-64, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | |||
md5 | e75338a175f80b85cb99b51580451d37 | ||
sha256 | 1f12f9b84cbc176f6313d69749c69d83ac32b322ce16d4a9a48803a264a8d4dd | ||
ssdeep | 6144:66kMYlOIa6VkctankhTl2DGl8HpZRw9wx2UCH:62X8anasZq | ||
imphash | cc12e3f394a2cfaeb0c35364d40acf00 | ||
impfuzzy | 48:3NqpgKfRVuC3tEFK9ZTJ3/KA0WFGKQ/1Wn6gq/gQ0:3wCKfRVuEtEFQZ1UiuabQ0 |
Network IP location
Signature (11cnts)
Level | Description |
---|---|
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | Executed a process and injected code into it |
danger | Executed a process and injected code into it |
watch | Communicates with host for which no DNS query was performed |
watch | Created a process named as a common system process |
watch | Creates known RBot files |
watch | Creates or sets a registry key to a long series of bytes |
watch | Manipulates memory of a non-child process indicative of process injection |
watch | Stores an executable in the registry |
notice | One or more potentially interesting buffers were extracted |
info | Checks amount of memory in system |
Rules (11cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE64 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | 1 | dumpmem | |
info | 1 | memory | |
info | 1 | office | |
info | 1 | scripts | |
info | 1 | urls | |
info | 94102 | shellcode |
PE API
IAT(Import Address Table) Library
KERNEL32.dll
&emsp
KERNEL32.dll
&emsp