Report - audiodg.exe

Malicious Library UPX PE File PE32 MZP Format
ScreenShot
Created 2024.09.22 18:25 Machine s1_win7_x6403
Filename audiodg.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
3.4
ZERO API file : mailcious
VT API (file) 55 detected (AIDetectMalware, Injuke, Malicious, score, GenericKD, Unsafe, Vpzf, confidence, Attribute, HighConfidence, moderate confidence, ModiLoader, MalwareX, ohxv, CLASSIC, Nekark, dvynl, Starter, REMCOS, YXEILZ, Detected, Malware@#47qt3chbclmz, JVQF, Artemis, TScope, Delf, Krypt, Chgt, Zylw, Igent, b2YTJ9, susgen, VMB2XJC)
md5 d2d166937422f379e6dd15041d83af21
sha256 c59da5938f667c04ca2ba3639b6cb3d5813fc189d4b2f412613b4bfa36ae0664
ssdeep 24576:mZGjH3HfO7fC0Nj3+8OioUMxW24Q7Q9p+Lz:mUrwP+8OiSWaOp+Lz
imphash 6e64daf69e8e4577f3613fe9a6f2b519
impfuzzy 192:ot3sDbuuaxSUvK9tso1Xy79TM1QpPOQHs:E3Gaq9xj1OPOQM
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
watch Disables proxy possibly for traffic interception
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
info Checks if process is being debugged by a debugger
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
maan2u.com MY TM-VADS DC Hosting 112.137.173.77 mailcious
112.137.173.77 MY TM-VADS DC Hosting 112.137.173.77 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x481788 SysFreeString
 0x48178c SysReAllocStringLen
 0x481790 SysAllocStringLen
advapi32.dll
 0x481798 RegQueryValueExA
 0x48179c RegOpenKeyExA
 0x4817a0 RegCloseKey
user32.dll
 0x4817a8 GetKeyboardType
 0x4817ac DestroyWindow
 0x4817b0 LoadStringA
 0x4817b4 MessageBoxA
 0x4817b8 CharNextA
kernel32.dll
 0x4817c0 GetACP
 0x4817c4 Sleep
 0x4817c8 VirtualFree
 0x4817cc VirtualAlloc
 0x4817d0 GetTickCount
 0x4817d4 QueryPerformanceCounter
 0x4817d8 GetCurrentThreadId
 0x4817dc InterlockedDecrement
 0x4817e0 InterlockedIncrement
 0x4817e4 VirtualQuery
 0x4817e8 WideCharToMultiByte
 0x4817ec MultiByteToWideChar
 0x4817f0 lstrlenA
 0x4817f4 lstrcpynA
 0x4817f8 LoadLibraryExA
 0x4817fc GetThreadLocale
 0x481800 GetStartupInfoA
 0x481804 GetProcAddress
 0x481808 GetModuleHandleA
 0x48180c GetModuleFileNameA
 0x481810 GetLocaleInfoA
 0x481814 GetCommandLineA
 0x481818 FreeLibrary
 0x48181c FindFirstFileA
 0x481820 FindClose
 0x481824 ExitProcess
 0x481828 ExitThread
 0x48182c CreateThread
 0x481830 CompareStringA
 0x481834 WriteFile
 0x481838 UnhandledExceptionFilter
 0x48183c RtlUnwind
 0x481840 RaiseException
 0x481844 GetStdHandle
kernel32.dll
 0x48184c TlsSetValue
 0x481850 TlsGetValue
 0x481854 LocalAlloc
 0x481858 GetModuleHandleA
user32.dll
 0x481860 CreateWindowExA
 0x481864 WindowFromPoint
 0x481868 WaitMessage
 0x48186c UpdateWindow
 0x481870 UnregisterClassA
 0x481874 UnhookWindowsHookEx
 0x481878 TranslateMessage
 0x48187c TranslateMDISysAccel
 0x481880 TrackPopupMenu
 0x481884 SystemParametersInfoA
 0x481888 ShowWindow
 0x48188c ShowScrollBar
 0x481890 ShowOwnedPopups
 0x481894 SetWindowsHookExA
 0x481898 SetWindowTextA
 0x48189c SetWindowPos
 0x4818a0 SetWindowPlacement
 0x4818a4 SetWindowLongW
 0x4818a8 SetWindowLongA
 0x4818ac SetTimer
 0x4818b0 SetScrollRange
 0x4818b4 SetScrollPos
 0x4818b8 SetScrollInfo
 0x4818bc SetRect
 0x4818c0 SetPropA
 0x4818c4 SetParent
 0x4818c8 SetMenuItemInfoA
 0x4818cc SetMenu
 0x4818d0 SetForegroundWindow
 0x4818d4 SetFocus
 0x4818d8 SetCursor
 0x4818dc SetClassLongA
 0x4818e0 SetCapture
 0x4818e4 SetActiveWindow
 0x4818e8 SendMessageW
 0x4818ec SendMessageA
 0x4818f0 ScrollWindow
 0x4818f4 ScreenToClient
 0x4818f8 RemovePropA
 0x4818fc RemoveMenu
 0x481900 ReleaseDC
 0x481904 ReleaseCapture
 0x481908 RegisterWindowMessageA
 0x48190c RegisterClipboardFormatA
 0x481910 RegisterClassA
 0x481914 RedrawWindow
 0x481918 PtInRect
 0x48191c PostQuitMessage
 0x481920 PostMessageA
 0x481924 PeekMessageW
 0x481928 PeekMessageA
 0x48192c OffsetRect
 0x481930 OemToCharA
 0x481934 MsgWaitForMultipleObjects
 0x481938 MessageBoxA
 0x48193c MapWindowPoints
 0x481940 MapVirtualKeyA
 0x481944 LoadStringA
 0x481948 LoadKeyboardLayoutA
 0x48194c LoadIconA
 0x481950 LoadCursorA
 0x481954 LoadBitmapA
 0x481958 KillTimer
 0x48195c IsZoomed
 0x481960 IsWindowVisible
 0x481964 IsWindowUnicode
 0x481968 IsWindowEnabled
 0x48196c IsWindow
 0x481970 IsRectEmpty
 0x481974 IsIconic
 0x481978 IsDialogMessageW
 0x48197c IsDialogMessageA
 0x481980 IsChild
 0x481984 InvalidateRect
 0x481988 IntersectRect
 0x48198c InsertMenuItemA
 0x481990 InsertMenuA
 0x481994 InflateRect
 0x481998 GetWindowThreadProcessId
 0x48199c GetWindowTextA
 0x4819a0 GetWindowRect
 0x4819a4 GetWindowPlacement
 0x4819a8 GetWindowLongW
 0x4819ac GetWindowLongA
 0x4819b0 GetWindowDC
 0x4819b4 GetTopWindow
 0x4819b8 GetSystemMetrics
 0x4819bc GetSystemMenu
 0x4819c0 GetSysColorBrush
 0x4819c4 GetSysColor
 0x4819c8 GetSubMenu
 0x4819cc GetScrollRange
 0x4819d0 GetScrollPos
 0x4819d4 GetScrollInfo
 0x4819d8 GetPropA
 0x4819dc GetParent
 0x4819e0 GetWindow
 0x4819e4 GetMessagePos
 0x4819e8 GetMenuStringA
 0x4819ec GetMenuState
 0x4819f0 GetMenuItemInfoA
 0x4819f4 GetMenuItemID
 0x4819f8 GetMenuItemCount
 0x4819fc GetMenu
 0x481a00 GetLastActivePopup
 0x481a04 GetKeyboardState
 0x481a08 GetKeyboardLayoutNameA
 0x481a0c GetKeyboardLayoutList
 0x481a10 GetKeyboardLayout
 0x481a14 GetKeyState
 0x481a18 GetKeyNameTextA
 0x481a1c GetIconInfo
 0x481a20 GetForegroundWindow
 0x481a24 GetFocus
 0x481a28 GetDlgItem
 0x481a2c GetDesktopWindow
 0x481a30 GetDCEx
 0x481a34 GetDC
 0x481a38 GetCursorPos
 0x481a3c GetCursor
 0x481a40 GetClientRect
 0x481a44 GetClassLongA
 0x481a48 GetClassInfoA
 0x481a4c GetCapture
 0x481a50 GetActiveWindow
 0x481a54 FrameRect
 0x481a58 FindWindowA
 0x481a5c FillRect
 0x481a60 EqualRect
 0x481a64 EnumWindows
 0x481a68 EnumThreadWindows
 0x481a6c EnumChildWindows
 0x481a70 EndPaint
 0x481a74 EnableWindow
 0x481a78 EnableScrollBar
 0x481a7c EnableMenuItem
 0x481a80 DrawTextA
 0x481a84 DrawMenuBar
 0x481a88 DrawIconEx
 0x481a8c DrawIcon
 0x481a90 DrawFrameControl
 0x481a94 DrawEdge
 0x481a98 DispatchMessageW
 0x481a9c DispatchMessageA
 0x481aa0 DestroyWindow
 0x481aa4 DestroyMenu
 0x481aa8 DestroyIcon
 0x481aac DestroyCursor
 0x481ab0 DeleteMenu
 0x481ab4 DefWindowProcA
 0x481ab8 DefMDIChildProcA
 0x481abc DefFrameProcA
 0x481ac0 CreatePopupMenu
 0x481ac4 CreateMenu
 0x481ac8 CreateIcon
 0x481acc ClientToScreen
 0x481ad0 CheckMenuItem
 0x481ad4 CallWindowProcA
 0x481ad8 CallNextHookEx
 0x481adc BeginPaint
 0x481ae0 CharNextA
 0x481ae4 CharLowerA
 0x481ae8 CharToOemA
 0x481aec AdjustWindowRectEx
 0x481af0 ActivateKeyboardLayout
gdi32.dll
 0x481af8 UnrealizeObject
 0x481afc StretchBlt
 0x481b00 SetWindowOrgEx
 0x481b04 SetViewportOrgEx
 0x481b08 SetTextColor
 0x481b0c SetStretchBltMode
 0x481b10 SetROP2
 0x481b14 SetPixel
 0x481b18 SetDIBColorTable
 0x481b1c SetBrushOrgEx
 0x481b20 SetBkMode
 0x481b24 SetBkColor
 0x481b28 SelectPalette
 0x481b2c SelectObject
 0x481b30 SelectClipRgn
 0x481b34 SaveDC
 0x481b38 RestoreDC
 0x481b3c RectVisible
 0x481b40 RealizePalette
 0x481b44 PatBlt
 0x481b48 MoveToEx
 0x481b4c MaskBlt
 0x481b50 LineTo
 0x481b54 IntersectClipRect
 0x481b58 GetWindowOrgEx
 0x481b5c GetTextMetricsA
 0x481b60 GetTextExtentPoint32A
 0x481b64 GetSystemPaletteEntries
 0x481b68 GetStockObject
 0x481b6c GetRgnBox
 0x481b70 GetPixel
 0x481b74 GetPaletteEntries
 0x481b78 GetObjectA
 0x481b7c GetDeviceCaps
 0x481b80 GetDIBits
 0x481b84 GetDIBColorTable
 0x481b88 GetDCOrgEx
 0x481b8c GetCurrentPositionEx
 0x481b90 GetClipBox
 0x481b94 GetBrushOrgEx
 0x481b98 GetBitmapBits
 0x481b9c GdiFlush
 0x481ba0 ExcludeClipRect
 0x481ba4 DeleteObject
 0x481ba8 DeleteDC
 0x481bac CreateSolidBrush
 0x481bb0 CreatePenIndirect
 0x481bb4 CreatePalette
 0x481bb8 CreateHalftonePalette
 0x481bbc CreateFontIndirectA
 0x481bc0 CreateDIBitmap
 0x481bc4 CreateDIBSection
 0x481bc8 CreateCompatibleDC
 0x481bcc CreateCompatibleBitmap
 0x481bd0 CreateBrushIndirect
 0x481bd4 CreateBitmap
 0x481bd8 BitBlt
version.dll
 0x481be0 VerQueryValueA
 0x481be4 GetFileVersionInfoSizeA
 0x481be8 GetFileVersionInfoA
kernel32.dll
 0x481bf0 lstrcpyA
 0x481bf4 WriteFile
 0x481bf8 WaitForSingleObject
 0x481bfc VirtualQuery
 0x481c00 VirtualAlloc
 0x481c04 SizeofResource
 0x481c08 SetThreadLocale
 0x481c0c SetFilePointer
 0x481c10 SetEvent
 0x481c14 SetErrorMode
 0x481c18 SetEndOfFile
 0x481c1c ResumeThread
 0x481c20 ResetEvent
 0x481c24 ReadFile
 0x481c28 MultiByteToWideChar
 0x481c2c MulDiv
 0x481c30 LockResource
 0x481c34 LoadResource
 0x481c38 LoadLibraryExA
 0x481c3c LoadLibraryA
 0x481c40 LeaveCriticalSection
 0x481c44 InitializeCriticalSection
 0x481c48 GlobalFindAtomA
 0x481c4c GlobalDeleteAtom
 0x481c50 GlobalAddAtomA
 0x481c54 GetVolumeInformationA
 0x481c58 GetVersionExA
 0x481c5c GetVersion
 0x481c60 GetTickCount
 0x481c64 GetThreadLocale
 0x481c68 GetStdHandle
 0x481c6c GetProcAddress
 0x481c70 GetModuleHandleA
 0x481c74 GetModuleFileNameA
 0x481c78 GetLocaleInfoA
 0x481c7c GetLocalTime
 0x481c80 GetLastError
 0x481c84 GetFullPathNameA
 0x481c88 GetExitCodeThread
 0x481c8c GetDiskFreeSpaceA
 0x481c90 GetDateFormatA
 0x481c94 GetCurrentThreadId
 0x481c98 GetCurrentProcessId
 0x481c9c GetCPInfo
 0x481ca0 FreeResource
 0x481ca4 InterlockedIncrement
 0x481ca8 InterlockedExchange
 0x481cac InterlockedDecrement
 0x481cb0 FreeLibrary
 0x481cb4 FormatMessageA
 0x481cb8 FindResourceA
 0x481cbc EnumCalendarInfoA
 0x481cc0 EnterCriticalSection
 0x481cc4 DeleteCriticalSection
 0x481cc8 CreateThread
 0x481ccc CreateFileA
 0x481cd0 CreateEventA
 0x481cd4 CompareStringA
 0x481cd8 CloseHandle
advapi32.dll
 0x481ce0 RegQueryValueExA
 0x481ce4 RegOpenKeyExA
 0x481ce8 RegFlushKey
 0x481cec RegCloseKey
oleaut32.dll
 0x481cf4 GetErrorInfo
 0x481cf8 SysFreeString
ole32.dll
 0x481d00 CoUninitialize
 0x481d04 CoInitialize
kernel32.dll
 0x481d0c Sleep
oleaut32.dll
 0x481d14 SafeArrayPtrOfIndex
 0x481d18 SafeArrayGetUBound
 0x481d1c SafeArrayGetLBound
 0x481d20 SafeArrayCreate
 0x481d24 VariantChangeType
 0x481d28 VariantCopy
 0x481d2c VariantClear
 0x481d30 VariantInit
comctl32.dll
 0x481d38 _TrackMouseEvent
 0x481d3c ImageList_SetIconSize
 0x481d40 ImageList_GetIconSize
 0x481d44 ImageList_Write
 0x481d48 ImageList_Read
 0x481d4c ImageList_GetDragImage
 0x481d50 ImageList_DragShowNolock
 0x481d54 ImageList_DragMove
 0x481d58 ImageList_DragLeave
 0x481d5c ImageList_DragEnter
 0x481d60 ImageList_EndDrag
 0x481d64 ImageList_BeginDrag
 0x481d68 ImageList_GetIcon
 0x481d6c ImageList_Remove
 0x481d70 ImageList_DrawEx
 0x481d74 ImageList_Draw
 0x481d78 ImageList_GetBkColor
 0x481d7c ImageList_SetBkColor
 0x481d80 ImageList_Add
 0x481d84 ImageList_GetImageCount
 0x481d88 ImageList_Destroy
 0x481d8c ImageList_Create
 0x481d90 InitCommonControls
shell32.dll
 0x481d98 Shell_NotifyIconA
comdlg32.dll
 0x481da0 GetOpenFileNameA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure