Report - test30.exe

Malicious Library PE64 PE File
ScreenShot
Created 2024.12.16 18:23 Machine s1_win7_x6403
Filename test30.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
5.2
ZERO API file : clean
VT API (file) 63 detected (Common, CobaltStrike, Malicious, score, Ghanarava, GenericKD, Unsafe, confidence, 100%, Cobalt, Windows, Artifact, HacktoolX, Countermeasure, LoaderWinGeneric, Meterpreter, ktsnbb, CLOUD, dngqg, COBEACON, Static AI, Malicious PE, hsrro, Detected, Cometer, Kryptik, Malware@#desvsfhx26e7, Eldorado, Artemis, GdSda, GenAsa, s13UMH, 2llg, susgen)
md5 e9289cac82968862715653ae5eb5d2a4
sha256 e2f0800a6b674891005a97942ff0cf8ab7082c2ecfc072d5c29cd87ecb1f09f6
ssdeep 6144:MBDGJ0RkoDaBH4Uv+XAlM2OU8sxxJn54uW1IxmMnmO2o+hZpPGiqStw:MQC3mpWwlM2OUV1LW1IVmOmZpPhtw
imphash 9133e54115603c0107b8f985598440d0
impfuzzy 24:Q2kfg1JlDzncJ9aa0mezlMC95XGDZ8k1koDquQZn:gfg1jcJbezlzJGV8k1koqz
  Network IP location

Signature (8cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 63 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Queries for the computername

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
213.238.177.46 TR Teknoboss Teknoloji Ve Danismanlik Hizmetleri Limited Sirketi 213.238.177.46 malware
20.83.148.22 US MICROSOFT-CORP-MSN-AS-BLOCK 20.83.148.22 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x45d23c CloseHandle
 0x45d244 ConnectNamedPipe
 0x45d24c CreateFileA
 0x45d254 CreateNamedPipeA
 0x45d25c CreateThread
 0x45d264 DeleteCriticalSection
 0x45d26c EnterCriticalSection
 0x45d274 GetCurrentProcess
 0x45d27c GetCurrentProcessId
 0x45d284 GetCurrentThreadId
 0x45d28c GetLastError
 0x45d294 GetModuleHandleA
 0x45d29c GetProcAddress
 0x45d2a4 GetStartupInfoA
 0x45d2ac GetSystemTimeAsFileTime
 0x45d2b4 GetTickCount
 0x45d2bc InitializeCriticalSection
 0x45d2c4 LeaveCriticalSection
 0x45d2cc QueryPerformanceCounter
 0x45d2d4 ReadFile
 0x45d2dc RtlAddFunctionTable
 0x45d2e4 RtlCaptureContext
 0x45d2ec RtlLookupFunctionEntry
 0x45d2f4 RtlVirtualUnwind
 0x45d2fc SetUnhandledExceptionFilter
 0x45d304 Sleep
 0x45d30c TerminateProcess
 0x45d314 TlsGetValue
 0x45d31c UnhandledExceptionFilter
 0x45d324 VirtualAlloc
 0x45d32c VirtualProtect
 0x45d334 VirtualQuery
 0x45d33c WriteFile
msvcrt.dll
 0x45d34c __C_specific_handler
 0x45d354 __dllonexit
 0x45d35c __getmainargs
 0x45d364 __initenv
 0x45d36c __iob_func
 0x45d374 __lconv_init
 0x45d37c __set_app_type
 0x45d384 __setusermatherr
 0x45d38c _acmdln
 0x45d394 _amsg_exit
 0x45d39c _cexit
 0x45d3a4 _fmode
 0x45d3ac _initterm
 0x45d3b4 _lock
 0x45d3bc _onexit
 0x45d3c4 _unlock
 0x45d3cc abort
 0x45d3d4 calloc
 0x45d3dc exit
 0x45d3e4 fprintf
 0x45d3ec free
 0x45d3f4 fwrite
 0x45d3fc malloc
 0x45d404 memcpy
 0x45d40c signal
 0x45d414 sprintf
 0x45d41c strlen
 0x45d424 strncmp
 0x45d42c vfprintf

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure