Report - dssdj.exe

Malicious Library UPX PE File PE32 MZP Format DLL DllRegisterServer dll
ScreenShot
Created 2024.07.31 21:37 Machine s1_win7_x6401
Filename dssdj.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, InnoSetup self-extracting archive
AI Score
4
Behavior Score
3.0
ZERO API file : clean
VT API (file) 1 detected (Unsafe, Score)
md5 b78013e1727d77333e2780e95d064b4b
sha256 7ff9d82d8780e8ae1b5d4721cfd0556d4ae63be353466520ac0b3cd2c44ad2df
ssdeep 49152:oVhaXlU8Nw3fXrBvMUB72TwjqJJZ/Zc2pLOicZmsnL:oVhaXlU821578JJZ/O2YcCL
imphash e2c1f18f75da1944b68774c16f2adcef
impfuzzy 48:8cfp1rcEX0gebRZZJv9oO0Gwt+Eu5F5T/lGdh:8cfpdcGNebRjh+F
  Network IP location

Signature (9cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice File has been identified by one AntiVirus engine on VirusTotal as malicious
notice Queries for potentially installed applications
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
info Checks amount of memory in system
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (12cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (download)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x4110b4 DeleteCriticalSection
 0x4110b8 LeaveCriticalSection
 0x4110bc EnterCriticalSection
 0x4110c0 InitializeCriticalSection
 0x4110c4 VirtualFree
 0x4110c8 VirtualAlloc
 0x4110cc LocalFree
 0x4110d0 LocalAlloc
 0x4110d4 WideCharToMultiByte
 0x4110d8 TlsSetValue
 0x4110dc TlsGetValue
 0x4110e0 MultiByteToWideChar
 0x4110e4 GetModuleHandleA
 0x4110e8 GetLastError
 0x4110ec GetCommandLineA
 0x4110f0 WriteFile
 0x4110f4 SetFilePointer
 0x4110f8 SetEndOfFile
 0x4110fc RtlUnwind
 0x411100 ReadFile
 0x411104 RaiseException
 0x411108 GetStdHandle
 0x41110c GetFileSize
 0x411110 GetFileType
 0x411114 ExitProcess
 0x411118 CreateFileA
 0x41111c CloseHandle
user32.dll
 0x411124 MessageBoxA
oleaut32.dll
 0x41112c VariantChangeTypeEx
 0x411130 VariantCopyInd
 0x411134 VariantClear
 0x411138 SysStringLen
 0x41113c SysAllocStringLen
advapi32.dll
 0x411144 OpenProcessToken
 0x411148 LookupPrivilegeValueA
kernel32.dll
 0x411150 Sleep
 0x411154 SetLastError
 0x411158 SetErrorMode
 0x41115c GetWindowsDirectoryA
 0x411160 GetVersionExA
 0x411164 GetTempFileNameA
 0x411168 GetSystemDefaultLCID
 0x41116c GetModuleFileNameA
 0x411170 GetLocaleInfoA
 0x411174 GetLastError
 0x411178 GetFullPathNameA
 0x41117c GetFileAttributesA
 0x411180 GetExitCodeProcess
 0x411184 GetEnvironmentVariableA
 0x411188 GetCurrentProcess
 0x41118c GetCommandLineA
 0x411190 GetCPInfo
 0x411194 FormatMessageA
 0x411198 DeleteFileA
 0x41119c CreateProcessA
 0x4111a0 CloseHandle
user32.dll
 0x4111a8 TranslateMessage
 0x4111ac SetWindowLongA
 0x4111b0 PeekMessageA
 0x4111b4 MsgWaitForMultipleObjects
 0x4111b8 MessageBoxA
 0x4111bc LoadStringA
 0x4111c0 GetSystemMetrics
 0x4111c4 ExitWindowsEx
 0x4111c8 DispatchMessageA
 0x4111cc DestroyWindow
 0x4111d0 CreateWindowExA
 0x4111d4 CallWindowProcA
 0x4111d8 CharPrevA
 0x4111dc CharNextA
comctl32.dll
 0x4111e4 InitCommonControls
advapi32.dll
 0x4111ec AdjustTokenPrivileges

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure