Report - Tan.jpg.dll

Generic Malware Malicious Library Malicious Packer UPX PE File DLL PE32 OS Processor Check
ScreenShot
Created 2024.07.12 09:24 Machine s1_win7_x6402
Filename Tan.jpg.dll
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
AI Score
1
Behavior Score
2.4
ZERO API file : mailcious
VT API (file) 21 detected (AIDetectMalware, malicious, high confidence, score, Unsafe, Vq70, Attribute, HighConfidence, DLLhijack, YzY0Ops8AVTXoyrz, Casdet, ZedlaF, 1u5@aqtNtEcb, Static AI, Malicious PE, confidence)
md5 d8402908a8e78bb04f0745c963d4b1c1
sha256 de07814ec61330a24f6408f8aefd40aa9b381902b44985c223cb7f540be812b0
ssdeep 24576:vxA4sT9DOnCt9JwJKXPzHlwVIH06iyB6L2n:v2DgCOKXLHmIU6i86yn
imphash 42de1a379f1bbbfbb6e3b36c2d26d244
impfuzzy 24:+OjCL+cpVWjstMS17MYlJBl3eDoVPtxvigGM2ZpjOpOovbOPZQM:bcpVwstMS17MSpptREZP3SM
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1004b000 VirtualProtect
 0x1004b004 VirtualFree
 0x1004b008 VirtualAlloc
 0x1004b00c WaitForSingleObject
 0x1004b010 GetModuleHandleA
 0x1004b014 CloseHandle
 0x1004b018 CreateThread
 0x1004b01c GetConsoleWindow
 0x1004b020 CreateFileW
 0x1004b024 SetStdHandle
 0x1004b028 EnterCriticalSection
 0x1004b02c LeaveCriticalSection
 0x1004b030 InitializeCriticalSectionEx
 0x1004b034 DeleteCriticalSection
 0x1004b038 EncodePointer
 0x1004b03c DecodePointer
 0x1004b040 MultiByteToWideChar
 0x1004b044 WideCharToMultiByte
 0x1004b048 LCMapStringEx
 0x1004b04c GetStringTypeW
 0x1004b050 GetCPInfo
 0x1004b054 UnhandledExceptionFilter
 0x1004b058 SetUnhandledExceptionFilter
 0x1004b05c GetCurrentProcess
 0x1004b060 TerminateProcess
 0x1004b064 IsProcessorFeaturePresent
 0x1004b068 QueryPerformanceCounter
 0x1004b06c GetCurrentProcessId
 0x1004b070 GetCurrentThreadId
 0x1004b074 GetSystemTimeAsFileTime
 0x1004b078 InitializeSListHead
 0x1004b07c IsDebuggerPresent
 0x1004b080 GetStartupInfoW
 0x1004b084 GetModuleHandleW
 0x1004b088 RtlUnwind
 0x1004b08c RaiseException
 0x1004b090 InterlockedFlushSList
 0x1004b094 GetLastError
 0x1004b098 SetLastError
 0x1004b09c InitializeCriticalSectionAndSpinCount
 0x1004b0a0 TlsAlloc
 0x1004b0a4 TlsGetValue
 0x1004b0a8 TlsSetValue
 0x1004b0ac TlsFree
 0x1004b0b0 FreeLibrary
 0x1004b0b4 GetProcAddress
 0x1004b0b8 LoadLibraryExW
 0x1004b0bc GetModuleFileNameW
 0x1004b0c0 GetModuleHandleExW
 0x1004b0c4 HeapAlloc
 0x1004b0c8 HeapValidate
 0x1004b0cc GetSystemInfo
 0x1004b0d0 ExitProcess
 0x1004b0d4 GetStdHandle
 0x1004b0d8 GetFileType
 0x1004b0dc WriteFile
 0x1004b0e0 OutputDebugStringW
 0x1004b0e4 WriteConsoleW
 0x1004b0e8 GetFileSizeEx
 0x1004b0ec SetFilePointerEx
 0x1004b0f0 FlushFileBuffers
 0x1004b0f4 GetConsoleOutputCP
 0x1004b0f8 GetConsoleMode
 0x1004b0fc LCMapStringW
 0x1004b100 GetLocaleInfoW
 0x1004b104 IsValidLocale
 0x1004b108 GetUserDefaultLCID
 0x1004b10c EnumSystemLocalesW
 0x1004b110 HeapFree
 0x1004b114 HeapReAlloc
 0x1004b118 HeapSize
 0x1004b11c HeapQueryInformation
 0x1004b120 GetProcessHeap
 0x1004b124 ReadFile
 0x1004b128 ReadConsoleW
 0x1004b12c FindClose
 0x1004b130 FindFirstFileExW
 0x1004b134 FindNextFileW
 0x1004b138 IsValidCodePage
 0x1004b13c GetACP
 0x1004b140 GetOEMCP
 0x1004b144 GetCommandLineA
 0x1004b148 GetCommandLineW
 0x1004b14c GetEnvironmentStringsW
 0x1004b150 FreeEnvironmentStringsW
 0x1004b154 SetEndOfFile
USER32.dll
 0x1004b15c ShowWindow

EAT(Export Address Table) Library

0x100026f0 Netpas_Init
0x100026f0 Netpas_Start
0x100026f0 Netpas_Stop


Similarity measure (PE file only) - Checking for service failure