Report - interactivePS-ruy-lopez.dll

Generic Malware Malicious Library Malicious Packer UPX AntiDebug AntiVM PE File DLL PE64 DllRegisterServer dll OS Processor Check
ScreenShot
Created 2024.10.27 11:49 Machine s1_win7_x6401
Filename interactivePS-ruy-lopez.dll
Type PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
AI Score
2
Behavior Score
2.6
ZERO API
VT API (file) 13 detected (Malicious, score, Ramnit, Attribute, HighConfidence, high confidence, Kryptik, JN7h59ZJssG, Wacapew, Outbreak, Agow)
md5 2ebf32f4a6b63b8dad4dac4bddf1cbee
sha256 fde4f048bb013ec3caabbe5862dcb8df0f701659bc9ac04e5bb1c5a3eee58b61
ssdeep 6144:ycPbDxd4SjM1N2GZpnqQs8vlOIUtUCHBYcHvG23JJJ655ZZo:hFjEASqN8vQIGCcH
imphash 9dee5c6e2779603605dedf99c35cff63
impfuzzy 12:YRJRibJ2cDzAR+hqRLAFCq/4lJYasTvRaAGd1Tvlp1FXoJqb//ZJVZy:8fiFlDI+kLaB4liHMjd1TvlxXUq7RvZy
  Network IP location

Signature (6cnts)

Level Description
watch File has been identified by 13 AntiVirus engines on VirusTotal as malicious
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks if process is being debugged by a debugger

Rules (17cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x3576771e4 DeleteCriticalSection
 0x3576771ec EnterCriticalSection
 0x3576771f4 FreeLibrary
 0x3576771fc GetLastError
 0x357677204 GetModuleHandleA
 0x35767720c GetProcAddress
 0x357677214 InitializeCriticalSection
 0x35767721c IsDBCSLeadByteEx
 0x357677224 LeaveCriticalSection
 0x35767722c LoadLibraryA
 0x357677234 MultiByteToWideChar
 0x35767723c Sleep
 0x357677244 TlsGetValue
 0x35767724c VirtualAlloc
 0x357677254 VirtualFree
 0x35767725c VirtualProtect
 0x357677264 VirtualQuery
 0x35767726c WideCharToMultiByte
msvcrt.dll
 0x35767727c ___lc_codepage_func
 0x357677284 ___mb_cur_max_func
 0x35767728c __iob_func
 0x357677294 _amsg_exit
 0x35767729c _errno
 0x3576772a4 _fileno
 0x3576772ac _initterm
 0x3576772b4 _lock
 0x3576772bc _setjmp
 0x3576772c4 _setmode
 0x3576772cc _unlock
 0x3576772d4 abort
 0x3576772dc calloc
 0x3576772e4 exit
 0x3576772ec fflush
 0x3576772f4 fputc
 0x3576772fc free
 0x357677304 fwrite
 0x35767730c localeconv
 0x357677314 longjmp
 0x35767731c malloc
 0x357677324 memchr
 0x35767732c memcpy
 0x357677334 memset
 0x35767733c realloc
 0x357677344 signal
 0x35767734c strcmp
 0x357677354 strerror
 0x35767735c strlen
 0x357677364 strncmp
 0x35767736c strstr
 0x357677374 vfprintf
 0x35767737c wcslen

EAT(Export Address Table) Library

0x35763ebd0 DllInstall
0x35763eb70 DllRegisterServer
0x35763eba0 DllUnregisterServer
0x35763eb40 NimMain
0x357648640 main


Similarity measure (PE file only) - Checking for service failure