Report - NimDllLoader.exe

UPX PE64 PE File
ScreenShot
Created 2024.05.31 10:25 Machine s1_win7_x6403
Filename NimDllLoader.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
4
Behavior Score
0.8
ZERO API file : mailcious
VT API (file) 15 detected (malicious, high confidence, Save, Detected, PossibleThreat, PALLAS, confidence)
md5 8960bb93e3796d6fdd8d637d54bc2d24
sha256 41dfa864f8603937bc72ac9f9f9eca22dae0fed561e54c8f27675e75e43a2d63
ssdeep 12288:NUAc/V3MutnA3kXIK4y8SBUghSBvzmVDIbX:qAQV3Mu9A3OZ4y8SBUghSVzYDIbX
imphash d980032757258196e9c35f2cfd546175
impfuzzy 24:DfjcDq+kLQYJd53jIlMblR95XG6qKZ8dd1TomvlxcqK06Zy:Dfn+kbSslTJG6qA8dd1T1vkqd7
  Network IP location

Signature (2cnts)

Level Description
watch File has been identified by 15 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140051264 CreateSemaphoreW
 0x14005126c DeleteCriticalSection
 0x140051274 EnterCriticalSection
 0x14005127c GetLastError
 0x140051284 GetProcAddress
 0x14005128c GetStartupInfoA
 0x140051294 InitializeCriticalSection
 0x14005129c IsDBCSLeadByteEx
 0x1400512a4 LeaveCriticalSection
 0x1400512ac LoadLibraryA
 0x1400512b4 MultiByteToWideChar
 0x1400512bc ReleaseSemaphore
 0x1400512c4 SetLastError
 0x1400512cc SetUnhandledExceptionFilter
 0x1400512d4 Sleep
 0x1400512dc TlsAlloc
 0x1400512e4 TlsGetValue
 0x1400512ec TlsSetValue
 0x1400512f4 VirtualAlloc
 0x1400512fc VirtualFree
 0x140051304 VirtualProtect
 0x14005130c VirtualQuery
 0x140051314 WaitForSingleObject
 0x14005131c WideCharToMultiByte
msvcrt.dll
 0x14005132c __C_specific_handler
 0x140051334 ___lc_codepage_func
 0x14005133c ___mb_cur_max_func
 0x140051344 __getmainargs
 0x14005134c __initenv
 0x140051354 __iob_func
 0x14005135c __lconv_init
 0x140051364 __set_app_type
 0x14005136c __setusermatherr
 0x140051374 _acmdln
 0x14005137c _amsg_exit
 0x140051384 _cexit
 0x14005138c _commode
 0x140051394 _errno
 0x14005139c _fileno
 0x1400513a4 _fmode
 0x1400513ac _initterm
 0x1400513b4 _lock
 0x1400513bc _onexit
 0x1400513c4 _setmode
 0x1400513cc _unlock
 0x1400513d4 abort
 0x1400513dc calloc
 0x1400513e4 exit
 0x1400513ec fflush
 0x1400513f4 fprintf
 0x1400513fc fputc
 0x140051404 free
 0x14005140c fwrite
 0x140051414 localeconv
 0x14005141c malloc
 0x140051424 memchr
 0x14005142c memcmp
 0x140051434 memcpy
 0x14005143c memset
 0x140051444 realloc
 0x14005144c signal
 0x140051454 strcmp
 0x14005145c strerror
 0x140051464 strlen
 0x14005146c strncmp
 0x140051474 vfprintf
 0x14005147c wcslen

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure