Report - dl

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.08.18 14:17 Machine s1_win7_x6401
Filename dl
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
2.6
ZERO API file : malware
VT API (file) 27 detected (AIDetectMalware, malicious, high confidence, score, PWSZbot, Unsafe, Save, Hacktool, Attribute, HighConfidence, Ransomware, Convagent, Kryptik@AI, RDML, yFY19vBUnWt20Iqod2tlsQ, Real Protect, high, Static AI, Malicious PE, Detected, Wacatac, ZexaF, vu0@aOEnkDkG, BScope, TrojanPSW, Azorult, susgen, confidence, 100%)
md5 c110bf099b4b7f2591ba377488be0bf4
sha256 47ebcc44aa43c4bb12bb06e8c50e7f70be8306a361a9f172522a3848e536f1d0
ssdeep 3072:m+wXTtdxfHs8DFOZTeM31BsJ9oILB//syrAi5tDE+dOKN29j0UboU7fS1X5nlN+H:gtdxfHs8YENxrA+HdfN4j0AmNSkNoH1
imphash 7088fae66f33648923ca587bcd49e86e
impfuzzy 24:j4xT2bG2SK/nHkrkR19/TdcDoEdQBmvWTjDz2oxOovtte2cfLeJ37TFBRzT42luZ:Mp1AnYU9b0dRCKktvcfS7tc2sqwSm
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
watch Looks for the Windows Idle Time to determine the uptime
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x43b000 GetComputerNameA
 0x43b004 GetFullPathNameA
 0x43b008 FillConsoleOutputCharacterA
 0x43b00c TryEnterCriticalSection
 0x43b010 GetDefaultCommConfigW
 0x43b014 InterlockedDecrement
 0x43b018 GetNamedPipeHandleStateA
 0x43b01c FindCloseChangeNotification
 0x43b020 GetModuleHandleW
 0x43b024 GetConsoleAliasesLengthA
 0x43b028 FormatMessageA
 0x43b02c ReadConsoleOutputA
 0x43b030 GetDateFormatA
 0x43b034 GetSystemTimes
 0x43b038 LocalShrink
 0x43b03c HeapDestroy
 0x43b040 GlobalFlags
 0x43b044 GetFileAttributesW
 0x43b048 GetBinaryTypeA
 0x43b04c GetStartupInfoW
 0x43b050 RaiseException
 0x43b054 GetLastError
 0x43b058 GetProcAddress
 0x43b05c LoadLibraryA
 0x43b060 InterlockedExchangeAdd
 0x43b064 LocalAlloc
 0x43b068 GetFileType
 0x43b06c FoldStringW
 0x43b070 EnumDateFormatsA
 0x43b074 lstrcatW
 0x43b078 FreeEnvironmentStringsW
 0x43b07c VirtualProtect
 0x43b080 WaitForDebugEvent
 0x43b084 FindAtomW
 0x43b088 CloseHandle
 0x43b08c DeleteAtom
 0x43b090 GetConsoleSelectionInfo
 0x43b094 HeapFree
 0x43b098 MultiByteToWideChar
 0x43b09c HeapAlloc
 0x43b0a0 GetCommandLineA
 0x43b0a4 GetStartupInfoA
 0x43b0a8 TerminateProcess
 0x43b0ac GetCurrentProcess
 0x43b0b0 UnhandledExceptionFilter
 0x43b0b4 SetUnhandledExceptionFilter
 0x43b0b8 IsDebuggerPresent
 0x43b0bc HeapCreate
 0x43b0c0 VirtualFree
 0x43b0c4 DeleteCriticalSection
 0x43b0c8 LeaveCriticalSection
 0x43b0cc EnterCriticalSection
 0x43b0d0 VirtualAlloc
 0x43b0d4 HeapReAlloc
 0x43b0d8 GetCPInfo
 0x43b0dc InterlockedIncrement
 0x43b0e0 GetACP
 0x43b0e4 GetOEMCP
 0x43b0e8 IsValidCodePage
 0x43b0ec TlsGetValue
 0x43b0f0 TlsAlloc
 0x43b0f4 TlsSetValue
 0x43b0f8 TlsFree
 0x43b0fc SetLastError
 0x43b100 GetCurrentThreadId
 0x43b104 Sleep
 0x43b108 ExitProcess
 0x43b10c WriteFile
 0x43b110 GetStdHandle
 0x43b114 GetModuleFileNameA
 0x43b118 HeapSize
 0x43b11c FreeEnvironmentStringsA
 0x43b120 GetEnvironmentStrings
 0x43b124 WideCharToMultiByte
 0x43b128 GetEnvironmentStringsW
 0x43b12c SetHandleCount
 0x43b130 QueryPerformanceCounter
 0x43b134 GetTickCount
 0x43b138 GetCurrentProcessId
 0x43b13c GetSystemTimeAsFileTime
 0x43b140 InitializeCriticalSectionAndSpinCount
 0x43b144 RtlUnwind
 0x43b148 LCMapStringA
 0x43b14c LCMapStringW
 0x43b150 GetStringTypeA
 0x43b154 GetStringTypeW
 0x43b158 GetLocaleInfoA
 0x43b15c GetModuleHandleA
USER32.dll
 0x43b164 LoadIconW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure