Report - inject.txt.exe

PE File DLL PE64
ScreenShot
Created 2024.07.22 14:26 Machine s1_win7_x6401
Filename inject.txt.exe
Type PE32+ executable (DLL) (console) x86-64, for MS Windows
AI Score
3
Behavior Score
3.8
ZERO API file : malware
VT API (file) 53 detected (AIDetectMalware, Marte, malicious, high confidence, score, Artemis, Unsafe, Rozena, Vm7w, Meterpreter, MetasploitEncod, CLOUD, xxkgf, SWRORT, YXEGUZ, Detected, ai score=89, ABTrojan, DITB, GdSda, Gencirc, confidence, 100%)
md5 03bed904291f531fc5381307e361b70f
sha256 15665af2e4efa5f4f5a25bdb36090961b92818d01f40f90b9eaa4cc5a97902e3
ssdeep 1536:S8yZzfkJ6CQ1bvbrrySCIiaC6yiJikvEDSbvz4+zeGI8ZZwZdXhXOkUWTohlqeCg:BEzsqxE2t0puoC
imphash 6490015bd77f7aa9aab54479cf5a74a0
impfuzzy 12:YRJRibJ2cDzARZqRLAEqVlaRa91Kq0iZn:8fiFlDIcLslP91PLZn
  Network IP location

Signature (5cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 53 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
info One or more processes crashed

Rules (3cnts)

Level Name Description Collection
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.208.158.176 US Simple Carrier LLC 185.208.158.176 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1fe54a124 DeleteCriticalSection
 0x1fe54a12c EnterCriticalSection
 0x1fe54a134 FreeLibrary
 0x1fe54a13c GetLastError
 0x1fe54a144 GetModuleHandleA
 0x1fe54a14c GetProcAddress
 0x1fe54a154 InitializeCriticalSection
 0x1fe54a15c LeaveCriticalSection
 0x1fe54a164 LoadLibraryA
 0x1fe54a16c Sleep
 0x1fe54a174 TlsGetValue
 0x1fe54a17c VirtualAlloc
 0x1fe54a184 VirtualProtect
 0x1fe54a18c VirtualQuery
msvcrt.dll
 0x1fe54a19c __iob_func
 0x1fe54a1a4 _amsg_exit
 0x1fe54a1ac _initterm
 0x1fe54a1b4 _lock
 0x1fe54a1bc _unlock
 0x1fe54a1c4 abort
 0x1fe54a1cc calloc
 0x1fe54a1d4 free
 0x1fe54a1dc fwrite
 0x1fe54a1e4 realloc
 0x1fe54a1ec strlen
 0x1fe54a1f4 strncmp
 0x1fe54a1fc vfprintf

EAT(Export Address Table) Library

0x1fe543020 buf


Similarity measure (PE file only) - Checking for service failure