Report - ffucore.dll

Generic Malware Malicious Library Malicious Packer UPX PE File DLL PE32 OS Processor Check
ScreenShot
Created 2024.06.29 15:17 Machine s1_win7_x6403
Filename ffucore.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
3.0
ZERO API file : malware
VT API (file) 44 detected (AIDetectMalware, malicious, high confidence, score, Fragtor, Infected, Unsafe, SilverFox, swkbu, Attribute, HighConfidence, ETRZ, Artemis, CLASSIC, dxafd, Loader, moderate, Detected, ai score=80, Casdet, R656658, R002H09FP24, susgen, confidence, 100%)
md5 fc5857b45516cd1decae5dbd68d59924
sha256 09dd0de52154c82e85335ebbaae98e4d8d750d826171da9c7bea2ba9033c4551
ssdeep 6144:zaU22ravSWBqQK62sZ4XDPwtLKtr616/Z8xUgK:zaR2raq0p5Z4XziGD/W2gK
imphash 92dd8a57c388fde2670d2599076670d6
impfuzzy 24:d2OxDaaxWlKbcpVWZttlS1IJ0iJvjMPlmroBjvuZjGMXpOovbOPZ+2AGkL:EMWUcpVettlS1kJbMPEGuZa3k2ANL
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Moves the original executable to a new location
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info One or more processes crashed
info This executable has a PDB path

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1003d000 GetModuleFileNameW
 0x1003d004 GetLastError
 0x1003d008 DisableThreadLibraryCalls
 0x1003d00c MoveFileExW
 0x1003d010 VirtualProtect
 0x1003d014 GetProcAddress
 0x1003d018 ReadFile
 0x1003d01c VirtualFree
 0x1003d020 VirtualAlloc
 0x1003d024 CreateFileW
 0x1003d028 CloseHandle
 0x1003d02c GetFileSize
 0x1003d030 WakeAllConditionVariable
 0x1003d034 AcquireSRWLockExclusive
 0x1003d038 ReleaseSRWLockExclusive
 0x1003d03c WriteConsoleW
 0x1003d040 WideCharToMultiByte
 0x1003d044 MultiByteToWideChar
 0x1003d048 GetStringTypeW
 0x1003d04c EnterCriticalSection
 0x1003d050 LeaveCriticalSection
 0x1003d054 InitializeCriticalSectionEx
 0x1003d058 DeleteCriticalSection
 0x1003d05c EncodePointer
 0x1003d060 DecodePointer
 0x1003d064 LCMapStringEx
 0x1003d068 GetCPInfo
 0x1003d06c IsProcessorFeaturePresent
 0x1003d070 UnhandledExceptionFilter
 0x1003d074 SetUnhandledExceptionFilter
 0x1003d078 GetCurrentProcess
 0x1003d07c TerminateProcess
 0x1003d080 QueryPerformanceCounter
 0x1003d084 GetCurrentProcessId
 0x1003d088 GetCurrentThreadId
 0x1003d08c GetSystemTimeAsFileTime
 0x1003d090 InitializeSListHead
 0x1003d094 IsDebuggerPresent
 0x1003d098 GetStartupInfoW
 0x1003d09c GetModuleHandleW
 0x1003d0a0 SetLastError
 0x1003d0a4 GetModuleHandleA
 0x1003d0a8 GetNativeSystemInfo
 0x1003d0ac LoadLibraryA
 0x1003d0b0 FreeLibrary
 0x1003d0b4 GetThreadLocale
 0x1003d0b8 lstrlenW
 0x1003d0bc RtlUnwind
 0x1003d0c0 RaiseException
 0x1003d0c4 InterlockedFlushSList
 0x1003d0c8 VirtualQuery
 0x1003d0cc InitializeCriticalSectionAndSpinCount
 0x1003d0d0 TlsAlloc
 0x1003d0d4 TlsGetValue
 0x1003d0d8 TlsSetValue
 0x1003d0dc TlsFree
 0x1003d0e0 LoadLibraryExW
 0x1003d0e4 ExitProcess
 0x1003d0e8 GetModuleHandleExW
 0x1003d0ec HeapAlloc
 0x1003d0f0 HeapFree
 0x1003d0f4 GetStdHandle
 0x1003d0f8 GetFileType
 0x1003d0fc LCMapStringW
 0x1003d100 GetLocaleInfoW
 0x1003d104 IsValidLocale
 0x1003d108 GetUserDefaultLCID
 0x1003d10c EnumSystemLocalesW
 0x1003d110 FlushFileBuffers
 0x1003d114 WriteFile
 0x1003d118 GetConsoleOutputCP
 0x1003d11c GetConsoleMode
 0x1003d120 GetFileSizeEx
 0x1003d124 SetFilePointerEx
 0x1003d128 ReadConsoleW
 0x1003d12c HeapReAlloc
 0x1003d130 FindClose
 0x1003d134 FindFirstFileExW
 0x1003d138 FindNextFileW
 0x1003d13c IsValidCodePage
 0x1003d140 GetACP
 0x1003d144 GetOEMCP
 0x1003d148 GetCommandLineA
 0x1003d14c GetCommandLineW
 0x1003d150 GetEnvironmentStringsW
 0x1003d154 FreeEnvironmentStringsW
 0x1003d158 GetProcessHeap
 0x1003d15c SetStdHandle
 0x1003d160 HeapSize
 0x1003d164 SleepConditionVariableSRW
SHLWAPI.dll
 0x1003d16c PathAppendW
 0x1003d170 PathFileExistsW
 0x1003d174 PathRemoveFileSpecW
USER32.dll
 0x1003d17c wsprintfW

EAT(Export Address Table) Library

0x1001a6e0 CreateUpdateSession
0x10004dd0 FreeLibraryMemoryAndExitThread
0x1001a6e6 InitLog
0x10004dd0 NtUnloadDllMemoryAndExitThread
0x1001a6ec SDDnsQuery
0x1001a6f2 SDDownloadFile


Similarity measure (PE file only) - Checking for service failure