Report - dl

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.09.25 11:12 Machine s1_win7_x6403
Filename dl
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
1.4
ZERO API file : malware
VT API (file)
md5 376af2756c19e59540331f6056b5c321
sha256 e3ade39dae11c8e6355c2e9e3e9212cfc8f7993b738bbff6768e32a26a457ee6
ssdeep 6144:wL2vEjPnYbTAJgGdGrqneldBGOEYEFYc5klNePdi:w6vE7u9G8T/Ui
imphash ef449b91b415f487291c91f6dead0311
impfuzzy 24:j4fLkPMj7NbSFkrkRDc4nMUpO5Dxus1VEdQB2dg/CCbG2SEjlNY7ta2cf3yv4/Js:An0Wp1udXFO5W7t7cfke29cJf5A6Q
  Network IP location

Signature (4cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x430008 GetComputerNameA
 0x43000c FillConsoleOutputCharacterA
 0x430010 GetNumaNodeProcessorMask
 0x430014 GetConsoleAliasExesLengthA
 0x430018 OpenJobObjectA
 0x43001c ReadConsoleA
 0x430020 QueryDosDeviceA
 0x430024 WaitForSingleObject
 0x430028 GetComputerNameW
 0x43002c GetNumaAvailableMemoryNode
 0x430030 FreeEnvironmentStringsA
 0x430034 GetModuleHandleW
 0x430038 GetConsoleAliasesLengthA
 0x43003c GetPriorityClass
 0x430040 GetEnvironmentStrings
 0x430044 FatalAppExitW
 0x430048 SetSystemTimeAdjustment
 0x43004c WriteConsoleOutputA
 0x430050 GetFileAttributesA
 0x430054 HeapCreate
 0x430058 SetConsoleMode
 0x43005c GetBinaryTypeA
 0x430060 GetModuleFileNameW
 0x430064 GetShortPathNameA
 0x430068 GetStdHandle
 0x43006c GetLastError
 0x430070 GetCommandLineW
 0x430074 GetProcAddress
 0x430078 SearchPathA
 0x43007c OpenWaitableTimerA
 0x430080 LoadLibraryA
 0x430084 InterlockedExchangeAdd
 0x430088 LocalAlloc
 0x43008c SetCalendarInfoW
 0x430090 MoveFileA
 0x430094 SetCommMask
 0x430098 FindAtomA
 0x43009c FoldStringA
 0x4300a0 CreatePipe
 0x4300a4 GetDefaultCommConfigA
 0x4300a8 GetModuleHandleA
 0x4300ac FreeEnvironmentStringsW
 0x4300b0 BuildCommDCBA
 0x4300b4 PurgeComm
 0x4300b8 WaitForDebugEvent
 0x4300bc GlobalReAlloc
 0x4300c0 CopyFileExA
 0x4300c4 GetVolumeInformationW
 0x4300c8 CreateFileA
 0x4300cc BackupRead
 0x4300d0 DebugActiveProcess
 0x4300d4 HeapFree
 0x4300d8 HeapAlloc
 0x4300dc Sleep
 0x4300e0 ExitProcess
 0x4300e4 GetStartupInfoW
 0x4300e8 TerminateProcess
 0x4300ec GetCurrentProcess
 0x4300f0 UnhandledExceptionFilter
 0x4300f4 SetUnhandledExceptionFilter
 0x4300f8 IsDebuggerPresent
 0x4300fc VirtualFree
 0x430100 DeleteCriticalSection
 0x430104 LeaveCriticalSection
 0x430108 EnterCriticalSection
 0x43010c VirtualAlloc
 0x430110 HeapReAlloc
 0x430114 WriteFile
 0x430118 GetModuleFileNameA
 0x43011c SetHandleCount
 0x430120 GetFileType
 0x430124 GetStartupInfoA
 0x430128 TlsGetValue
 0x43012c TlsAlloc
 0x430130 TlsSetValue
 0x430134 TlsFree
 0x430138 InterlockedIncrement
 0x43013c SetLastError
 0x430140 GetCurrentThreadId
 0x430144 InterlockedDecrement
 0x430148 HeapSize
 0x43014c GetCPInfo
 0x430150 GetACP
 0x430154 GetOEMCP
 0x430158 IsValidCodePage
 0x43015c InitializeCriticalSectionAndSpinCount
 0x430160 GetEnvironmentStringsW
 0x430164 QueryPerformanceCounter
 0x430168 GetTickCount
 0x43016c GetCurrentProcessId
 0x430170 GetSystemTimeAsFileTime
 0x430174 RtlUnwind
 0x430178 MultiByteToWideChar
 0x43017c ReadFile
 0x430180 LCMapStringA
 0x430184 WideCharToMultiByte
 0x430188 LCMapStringW
 0x43018c GetStringTypeA
 0x430190 GetStringTypeW
 0x430194 GetLocaleInfoA
 0x430198 GetConsoleCP
 0x43019c GetConsoleMode
 0x4301a0 FlushFileBuffers
 0x4301a4 SetFilePointer
 0x4301a8 SetStdHandle
 0x4301ac CloseHandle
 0x4301b0 WriteConsoleA
 0x4301b4 GetConsoleOutputCP
 0x4301b8 WriteConsoleW
USER32.dll
 0x4301c0 GetUserObjectInformationW
 0x4301c4 SetFocus
ADVAPI32.dll
 0x430000 ObjectPrivilegeAuditAlarmA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure