Report - wlanext.exe

Malicious Library UPX PE File PE32 MZP Format
ScreenShot
Created 2024.10.24 10:22 Machine s1_win7_x6403
Filename wlanext.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
4.8
ZERO API file : clean
VT API (file) 45 detected (AIDetectMalware, ModiLoader, Malicious, score, Unsafe, Vkid, confidence, Midie, Jaik, Attribute, HighConfidence, high confidence, DelfInject, CLASSIC, uisrh, REMCOS, YXEJVZ, Static AI, Suspicious PE, Detected, ABDownloader, NKKL, Artemis, BScope, RmRAT, GdSda, susgen)
md5 a4d92d023f0158e3c7107def757641ae
sha256 eb7e203a572088217f7e24002c468a57f356e80f1c003e9c14f81eeb5f24139b
ssdeep 24576:uCtVqnbUQ25Qm2XzQiYcx3RqrPBzKRfuHpEqiyu5T5:ukabmAYc3qrWyuv
imphash be622105a275afb1f62a7a713bbb6f71
impfuzzy 192:o13MDbuuaxSUvK9kso1XET0AG1QnPOQH8:C3maq9up1iPOQc
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch Disables proxy possibly for traffic interception
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
103.161.133.169 Unknown 103.161.133.169 clean

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x50471c SysFreeString
 0x504720 SysReAllocStringLen
 0x504724 SysAllocStringLen
advapi32.dll
 0x50472c RegQueryValueExA
 0x504730 RegOpenKeyExA
 0x504734 RegCloseKey
user32.dll
 0x50473c GetKeyboardType
 0x504740 DestroyWindow
 0x504744 LoadStringA
 0x504748 MessageBoxA
 0x50474c CharNextA
kernel32.dll
 0x504754 GetACP
 0x504758 Sleep
 0x50475c VirtualFree
 0x504760 VirtualAlloc
 0x504764 GetCurrentThreadId
 0x504768 InterlockedDecrement
 0x50476c InterlockedIncrement
 0x504770 VirtualQuery
 0x504774 WideCharToMultiByte
 0x504778 MultiByteToWideChar
 0x50477c lstrlenA
 0x504780 lstrcpynA
 0x504784 LoadLibraryExA
 0x504788 GetThreadLocale
 0x50478c GetStartupInfoA
 0x504790 GetProcAddress
 0x504794 GetModuleHandleA
 0x504798 GetModuleFileNameA
 0x50479c GetLocaleInfoA
 0x5047a0 GetCommandLineA
 0x5047a4 FreeLibrary
 0x5047a8 FindFirstFileA
 0x5047ac FindClose
 0x5047b0 ExitProcess
 0x5047b4 CompareStringA
 0x5047b8 WriteFile
 0x5047bc UnhandledExceptionFilter
 0x5047c0 RtlUnwind
 0x5047c4 RaiseException
 0x5047c8 GetStdHandle
kernel32.dll
 0x5047d0 TlsSetValue
 0x5047d4 TlsGetValue
 0x5047d8 LocalAlloc
 0x5047dc GetModuleHandleA
user32.dll
 0x5047e4 CreateWindowExA
 0x5047e8 WindowFromPoint
 0x5047ec WaitMessage
 0x5047f0 UpdateWindow
 0x5047f4 UnregisterClassA
 0x5047f8 UnhookWindowsHookEx
 0x5047fc TranslateMessage
 0x504800 TranslateMDISysAccel
 0x504804 TrackPopupMenu
 0x504808 SystemParametersInfoA
 0x50480c ShowWindow
 0x504810 ShowScrollBar
 0x504814 ShowOwnedPopups
 0x504818 SetWindowsHookExA
 0x50481c SetWindowTextA
 0x504820 SetWindowPos
 0x504824 SetWindowPlacement
 0x504828 SetWindowLongW
 0x50482c SetWindowLongA
 0x504830 SetTimer
 0x504834 SetScrollRange
 0x504838 SetScrollPos
 0x50483c SetScrollInfo
 0x504840 SetRect
 0x504844 SetPropA
 0x504848 SetParent
 0x50484c SetMenuItemInfoA
 0x504850 SetMenu
 0x504854 SetForegroundWindow
 0x504858 SetFocus
 0x50485c SetCursor
 0x504860 SetClassLongA
 0x504864 SetCapture
 0x504868 SetActiveWindow
 0x50486c SendMessageW
 0x504870 SendMessageA
 0x504874 ScrollWindow
 0x504878 ScreenToClient
 0x50487c RemovePropA
 0x504880 RemoveMenu
 0x504884 ReleaseDC
 0x504888 ReleaseCapture
 0x50488c RegisterWindowMessageA
 0x504890 RegisterClipboardFormatA
 0x504894 RegisterClassA
 0x504898 RedrawWindow
 0x50489c PtInRect
 0x5048a0 PostQuitMessage
 0x5048a4 PostMessageA
 0x5048a8 PeekMessageW
 0x5048ac PeekMessageA
 0x5048b0 OffsetRect
 0x5048b4 OemToCharA
 0x5048b8 MessageBoxA
 0x5048bc MapWindowPoints
 0x5048c0 MapVirtualKeyA
 0x5048c4 LoadStringA
 0x5048c8 LoadKeyboardLayoutA
 0x5048cc LoadIconA
 0x5048d0 LoadCursorA
 0x5048d4 LoadBitmapA
 0x5048d8 KillTimer
 0x5048dc IsZoomed
 0x5048e0 IsWindowVisible
 0x5048e4 IsWindowUnicode
 0x5048e8 IsWindowEnabled
 0x5048ec IsWindow
 0x5048f0 IsRectEmpty
 0x5048f4 IsIconic
 0x5048f8 IsDialogMessageW
 0x5048fc IsDialogMessageA
 0x504900 IsChild
 0x504904 InvalidateRect
 0x504908 IntersectRect
 0x50490c InsertMenuItemA
 0x504910 InsertMenuA
 0x504914 InflateRect
 0x504918 GetWindowThreadProcessId
 0x50491c GetWindowTextA
 0x504920 GetWindowRect
 0x504924 GetWindowPlacement
 0x504928 GetWindowLongW
 0x50492c GetWindowLongA
 0x504930 GetWindowDC
 0x504934 GetTopWindow
 0x504938 GetSystemMetrics
 0x50493c GetSystemMenu
 0x504940 GetSysColorBrush
 0x504944 GetSysColor
 0x504948 GetSubMenu
 0x50494c GetScrollRange
 0x504950 GetScrollPos
 0x504954 GetScrollInfo
 0x504958 GetPropA
 0x50495c GetParent
 0x504960 GetWindow
 0x504964 GetMessagePos
 0x504968 GetMenuStringA
 0x50496c GetMenuState
 0x504970 GetMenuItemInfoA
 0x504974 GetMenuItemID
 0x504978 GetMenuItemCount
 0x50497c GetMenu
 0x504980 GetLastActivePopup
 0x504984 GetKeyboardState
 0x504988 GetKeyboardLayoutNameA
 0x50498c GetKeyboardLayoutList
 0x504990 GetKeyboardLayout
 0x504994 GetKeyState
 0x504998 GetKeyNameTextA
 0x50499c GetIconInfo
 0x5049a0 GetForegroundWindow
 0x5049a4 GetFocus
 0x5049a8 GetDesktopWindow
 0x5049ac GetDCEx
 0x5049b0 GetDC
 0x5049b4 GetCursorPos
 0x5049b8 GetCursor
 0x5049bc GetClientRect
 0x5049c0 GetClassNameA
 0x5049c4 GetClassLongA
 0x5049c8 GetClassInfoA
 0x5049cc GetCapture
 0x5049d0 GetActiveWindow
 0x5049d4 FrameRect
 0x5049d8 FindWindowA
 0x5049dc FillRect
 0x5049e0 EqualRect
 0x5049e4 EnumWindows
 0x5049e8 EnumThreadWindows
 0x5049ec EnumChildWindows
 0x5049f0 EndPaint
 0x5049f4 EnableWindow
 0x5049f8 EnableScrollBar
 0x5049fc EnableMenuItem
 0x504a00 DrawTextA
 0x504a04 DrawMenuBar
 0x504a08 DrawIconEx
 0x504a0c DrawIcon
 0x504a10 DrawFrameControl
 0x504a14 DrawEdge
 0x504a18 DispatchMessageW
 0x504a1c DispatchMessageA
 0x504a20 DestroyWindow
 0x504a24 DestroyMenu
 0x504a28 DestroyIcon
 0x504a2c DestroyCursor
 0x504a30 DeleteMenu
 0x504a34 DefWindowProcA
 0x504a38 DefMDIChildProcA
 0x504a3c DefFrameProcA
 0x504a40 CreatePopupMenu
 0x504a44 CreateMenu
 0x504a48 CreateIcon
 0x504a4c ClientToScreen
 0x504a50 ChildWindowFromPoint
 0x504a54 CheckMenuItem
 0x504a58 CallWindowProcA
 0x504a5c CallNextHookEx
 0x504a60 BeginPaint
 0x504a64 CharNextA
 0x504a68 CharLowerA
 0x504a6c CharToOemA
 0x504a70 AdjustWindowRectEx
 0x504a74 ActivateKeyboardLayout
gdi32.dll
 0x504a7c UnrealizeObject
 0x504a80 StretchBlt
 0x504a84 SetWindowOrgEx
 0x504a88 SetViewportOrgEx
 0x504a8c SetTextColor
 0x504a90 SetStretchBltMode
 0x504a94 SetROP2
 0x504a98 SetPixel
 0x504a9c SetDIBColorTable
 0x504aa0 SetBrushOrgEx
 0x504aa4 SetBkMode
 0x504aa8 SetBkColor
 0x504aac SelectPalette
 0x504ab0 SelectObject
 0x504ab4 SaveDC
 0x504ab8 RestoreDC
 0x504abc Rectangle
 0x504ac0 RectVisible
 0x504ac4 RealizePalette
 0x504ac8 PatBlt
 0x504acc MoveToEx
 0x504ad0 MaskBlt
 0x504ad4 LineTo
 0x504ad8 IntersectClipRect
 0x504adc GetWindowOrgEx
 0x504ae0 GetTextMetricsA
 0x504ae4 GetTextExtentPoint32A
 0x504ae8 GetSystemPaletteEntries
 0x504aec GetStockObject
 0x504af0 GetRgnBox
 0x504af4 GetPixel
 0x504af8 GetPaletteEntries
 0x504afc GetObjectA
 0x504b00 GetDeviceCaps
 0x504b04 GetDIBits
 0x504b08 GetDIBColorTable
 0x504b0c GetDCOrgEx
 0x504b10 GetCurrentPositionEx
 0x504b14 GetClipBox
 0x504b18 GetBrushOrgEx
 0x504b1c GetBitmapBits
 0x504b20 ExtTextOutA
 0x504b24 ExcludeClipRect
 0x504b28 DeleteObject
 0x504b2c DeleteDC
 0x504b30 CreateSolidBrush
 0x504b34 CreatePenIndirect
 0x504b38 CreatePalette
 0x504b3c CreateHalftonePalette
 0x504b40 CreateFontIndirectA
 0x504b44 CreateDIBitmap
 0x504b48 CreateDIBSection
 0x504b4c CreateCompatibleDC
 0x504b50 CreateCompatibleBitmap
 0x504b54 CreateBrushIndirect
 0x504b58 CreateBitmap
 0x504b5c BitBlt
version.dll
 0x504b64 VerQueryValueA
 0x504b68 GetFileVersionInfoSizeA
 0x504b6c GetFileVersionInfoA
kernel32.dll
 0x504b74 lstrcpyA
 0x504b78 lstrcmpA
 0x504b7c WriteFile
 0x504b80 WaitForSingleObject
 0x504b84 VirtualQuery
 0x504b88 VirtualProtect
 0x504b8c VirtualAlloc
 0x504b90 SizeofResource
 0x504b94 SetThreadLocale
 0x504b98 SetFilePointer
 0x504b9c SetEvent
 0x504ba0 SetErrorMode
 0x504ba4 SetEndOfFile
 0x504ba8 ResetEvent
 0x504bac ReadFile
 0x504bb0 MulDiv
 0x504bb4 LockResource
 0x504bb8 LoadResource
 0x504bbc LoadLibraryExA
 0x504bc0 LoadLibraryA
 0x504bc4 LeaveCriticalSection
 0x504bc8 InitializeCriticalSection
 0x504bcc GlobalFindAtomA
 0x504bd0 GlobalDeleteAtom
 0x504bd4 GlobalAddAtomA
 0x504bd8 GetVersionExA
 0x504bdc GetVersion
 0x504be0 GetTickCount
 0x504be4 GetThreadLocale
 0x504be8 GetStdHandle
 0x504bec GetProcAddress
 0x504bf0 GetModuleHandleW
 0x504bf4 GetModuleHandleA
 0x504bf8 GetModuleFileNameA
 0x504bfc GetLocaleInfoA
 0x504c00 GetLocalTime
 0x504c04 GetLastError
 0x504c08 GetFullPathNameA
 0x504c0c GetFileAttributesA
 0x504c10 GetDiskFreeSpaceA
 0x504c14 GetDateFormatA
 0x504c18 GetCurrentThreadId
 0x504c1c GetCurrentProcessId
 0x504c20 GetCPInfo
 0x504c24 FreeResource
 0x504c28 InterlockedExchange
 0x504c2c FreeLibrary
 0x504c30 FormatMessageA
 0x504c34 FindResourceA
 0x504c38 EnumCalendarInfoA
 0x504c3c EnterCriticalSection
 0x504c40 DeleteCriticalSection
 0x504c44 CreateThread
 0x504c48 CreateFileA
 0x504c4c CreateEventA
 0x504c50 CompareStringA
 0x504c54 CloseHandle
advapi32.dll
 0x504c5c RegQueryValueExA
 0x504c60 RegOpenKeyExA
 0x504c64 RegFlushKey
 0x504c68 RegCloseKey
ole32.dll
 0x504c70 CoTaskMemAlloc
 0x504c74 CoCreateInstance
 0x504c78 CoUninitialize
 0x504c7c CoInitialize
kernel32.dll
 0x504c84 Sleep
oleaut32.dll
 0x504c8c SafeArrayPtrOfIndex
 0x504c90 SafeArrayGetUBound
 0x504c94 SafeArrayGetLBound
 0x504c98 SafeArrayCreate
 0x504c9c VariantChangeType
 0x504ca0 VariantCopy
 0x504ca4 VariantClear
 0x504ca8 VariantInit
comctl32.dll
 0x504cb0 _TrackMouseEvent
 0x504cb4 ImageList_SetIconSize
 0x504cb8 ImageList_GetIconSize
 0x504cbc ImageList_Write
 0x504cc0 ImageList_Read
 0x504cc4 ImageList_GetDragImage
 0x504cc8 ImageList_DragShowNolock
 0x504ccc ImageList_DragMove
 0x504cd0 ImageList_DragLeave
 0x504cd4 ImageList_DragEnter
 0x504cd8 ImageList_EndDrag
 0x504cdc ImageList_BeginDrag
 0x504ce0 ImageList_Remove
 0x504ce4 ImageList_DrawEx
 0x504ce8 ImageList_Draw
 0x504cec ImageList_GetBkColor
 0x504cf0 ImageList_SetBkColor
 0x504cf4 ImageList_Add
 0x504cf8 ImageList_GetImageCount
 0x504cfc ImageList_Destroy
 0x504d00 ImageList_Create
 0x504d04 InitCommonControls

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure