Report - dl.php

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.05.31 10:15 Machine s1_win7_x6403
Filename dl.php
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
2.2
ZERO API file : malware
VT API (file) 37 detected (AIDetectMalware, malicious, high confidence, score, Lockbit, Unsafe, Save, Ransomware, Tepfer, Attribute, HighConfidence, Convagent, SmokeLoader, CLASSIC, XPACK, Gen4, HPGen, high, Krypt, Detected, STOP, Kryptik, Eldorado, R651058, ZexaE, yq0@ay9U8qcG, Obfuscated, Static AI, Malicious PE, susgen, GenKryptik, GXVJ, confidence, 100%)
md5 27818a4fe57d322127c3311959c5af69
sha256 56c8dadefb7be471568c38f7c60c89220b3f1ec24f9899d7576ead45d817fce6
ssdeep 6144:O5S9X2/BnftXOjXJWFkWZ+xKVU1V2ZEW7qJhvMTVXnd3:+S9G/BftXK5WF5koVksZET0Tdn
imphash 5608b5e25a7505b4514f9e0627e29ef5
impfuzzy 24:dlJfprLXh49n2mEz8DGc+WsuGHOov3tRl1ZeolYxtvfSBZLYjMcgGA6lWAFE:FZpc++GuOtRzZeaYxFfShGA6op
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41b008 GetLastError
 0x41b00c SetLastError
 0x41b010 ReadProcessMemory
 0x41b014 _lopen
 0x41b018 OpenEventA
 0x41b01c LoadLibraryA
 0x41b020 LoadLibraryExW
 0x41b024 GetModuleFileNameA
 0x41b028 GetModuleHandleA
 0x41b02c GetSystemDirectoryW
 0x41b030 CreateDirectoryW
 0x41b034 SetFileAttributesW
 0x41b038 GetVolumeInformationW
 0x41b03c LocalAlloc
 0x41b040 BuildCommDCBA
 0x41b044 SetComputerNameA
 0x41b048 SetInformationJobObject
 0x41b04c FindNextVolumeMountPointW
 0x41b050 GetOEMCP
 0x41b054 GetCalendarInfoA
 0x41b058 GetNumberFormatA
 0x41b05c GetStringTypeA
 0x41b060 SetConsoleCursorInfo
 0x41b064 SetConsoleWindowInfo
 0x41b068 AddConsoleAliasA
 0x41b06c ReadConsoleW
 0x41b070 ReadFile
 0x41b074 SetEndOfFile
 0x41b078 WriteConsoleW
 0x41b07c IsBadStringPtrW
 0x41b080 GetProcAddress
 0x41b084 WideCharToMultiByte
 0x41b088 MultiByteToWideChar
 0x41b08c GetStringTypeW
 0x41b090 EnterCriticalSection
 0x41b094 LeaveCriticalSection
 0x41b098 DeleteCriticalSection
 0x41b09c EncodePointer
 0x41b0a0 DecodePointer
 0x41b0a4 HeapFree
 0x41b0a8 RaiseException
 0x41b0ac RtlUnwind
 0x41b0b0 GetCommandLineA
 0x41b0b4 GetCPInfo
 0x41b0b8 HeapAlloc
 0x41b0bc UnhandledExceptionFilter
 0x41b0c0 SetUnhandledExceptionFilter
 0x41b0c4 InitializeCriticalSectionAndSpinCount
 0x41b0c8 Sleep
 0x41b0cc GetCurrentProcess
 0x41b0d0 TerminateProcess
 0x41b0d4 TlsAlloc
 0x41b0d8 TlsGetValue
 0x41b0dc TlsSetValue
 0x41b0e0 TlsFree
 0x41b0e4 GetStartupInfoW
 0x41b0e8 GetModuleHandleW
 0x41b0ec IsProcessorFeaturePresent
 0x41b0f0 LCMapStringW
 0x41b0f4 GetLocaleInfoW
 0x41b0f8 IsValidLocale
 0x41b0fc GetUserDefaultLCID
 0x41b100 EnumSystemLocalesW
 0x41b104 ExitProcess
 0x41b108 GetModuleHandleExW
 0x41b10c AreFileApisANSI
 0x41b110 HeapSize
 0x41b114 GetProcessHeap
 0x41b118 IsDebuggerPresent
 0x41b11c GetCurrentThreadId
 0x41b120 GetStdHandle
 0x41b124 GetFileType
 0x41b128 WriteFile
 0x41b12c GetModuleFileNameW
 0x41b130 QueryPerformanceCounter
 0x41b134 GetCurrentProcessId
 0x41b138 GetSystemTimeAsFileTime
 0x41b13c GetEnvironmentStringsW
 0x41b140 FreeEnvironmentStringsW
 0x41b144 IsValidCodePage
 0x41b148 GetACP
 0x41b14c HeapReAlloc
 0x41b150 OutputDebugStringW
 0x41b154 GetConsoleCP
 0x41b158 GetConsoleMode
 0x41b15c SetFilePointerEx
 0x41b160 FlushFileBuffers
 0x41b164 CreateFileW
 0x41b168 CloseHandle
 0x41b16c SetStdHandle
USER32.dll
 0x41b174 GetSysColorBrush
 0x41b178 GetMenu
 0x41b17c DdeCmpStringHandles
ADVAPI32.dll
 0x41b000 ClearEventLogA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure