Report - VERSION_2.DLL

Generic Malware Malicious Library Malicious Packer UPX PE File DLL PE32 OS Processor Check
ScreenShot
Created 2025.03.06 11:20 Machine s1_win7_x6401
Filename VERSION_2.DLL
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score Not founds Behavior Score
3.6
ZERO API file : clean
VT API (file) 26 detected (Malicious, score, Unsafe, V4em, confidence, high confidence, MalwareX, DllHijack, PredThief, xurmv, Siggen30, Detected, XEGT42, R684503, Artemis, Behavior)
md5 66e8096b9b061550314a82654ce0fabd
sha256 c43507b6f2c2cb033d3f55229b20adfde9cda4dfb93dc3db45556847638ec7f8
ssdeep 6144:3FfBi5Kr4x+r+XvG2EsNXgLMBVyynN+XxE0uYeEfdAOIHpTIy:xI5Kr4x+r4vGDstgL0VFNj0uYe24/
imphash ef010df142cc83b7965c91c2e1814b80
impfuzzy 48:JM/pEZOg6KfrBO9rZStjcpKtSSQzlQxCrzMIKjm/mSh6Ljusq:JM/pEZR/fwdOcpKtSSulZAm/BYL6sq
  Network IP location

Signature (9cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
watch Attempts to identify installed AV products by installation directory
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice One or more potentially interesting buffers were extracted
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Tries to locate where the browsers are installed

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
review.accountprotection.info US CLOUDFLARENET 104.21.96.63 1 clean
github.com US MICROSOFT-CORP-MSN-AS-BLOCK 20.200.245.247 mailcious
104.21.96.63 US CLOUDFLARENET 104.21.96.63 clean
20.200.245.247 US MICROSOFT-CORP-MSN-AS-BLOCK 20.200.245.247 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1003e048 GetProcessHeap
 0x1003e04c FreeLibrary
 0x1003e050 CreateProcessA
 0x1003e054 MultiByteToWideChar
 0x1003e058 GetModuleHandleA
 0x1003e05c WideCharToMultiByte
 0x1003e060 InitializeCriticalSectionEx
 0x1003e064 GetLastError
 0x1003e068 RaiseException
 0x1003e06c DecodePointer
 0x1003e070 DeleteCriticalSection
 0x1003e074 ReadFile
 0x1003e078 WriteFile
 0x1003e07c SetFilePointer
 0x1003e080 UnmapViewOfFile
 0x1003e084 CreateFileA
 0x1003e088 FileTimeToSystemTime
 0x1003e08c CloseHandle
 0x1003e090 GetLocalTime
 0x1003e094 CreateFileMappingA
 0x1003e098 SystemTimeToFileTime
 0x1003e09c MapViewOfFile
 0x1003e0a0 FindNextFileA
 0x1003e0a4 FindClose
 0x1003e0a8 DeleteFileA
 0x1003e0ac FindFirstFileW
 0x1003e0b0 FindNextFileW
 0x1003e0b4 CreateMutexA
 0x1003e0b8 WaitForSingleObject
 0x1003e0bc GetFileAttributesW
 0x1003e0c0 GetCurrentThreadId
 0x1003e0c4 SuspendThread
 0x1003e0c8 Sleep
 0x1003e0cc GetTempPathA
 0x1003e0d0 GetFileAttributesA
 0x1003e0d4 CreateThread
 0x1003e0d8 SetFileAttributesA
 0x1003e0dc ExitProcess
 0x1003e0e0 IsWow64Process
 0x1003e0e4 GetDriveTypeW
 0x1003e0e8 OpenThread
 0x1003e0ec SetEnvironmentVariableA
 0x1003e0f0 FreeEnvironmentStringsW
 0x1003e0f4 GetEnvironmentStringsW
 0x1003e0f8 GetCommandLineW
 0x1003e0fc GetCommandLineA
 0x1003e100 GetProcAddress
 0x1003e104 HeapAlloc
 0x1003e108 LoadLibraryA
 0x1003e10c SetLastError
 0x1003e110 HeapFree
 0x1003e114 GetModuleFileNameA
 0x1003e118 GetVolumeInformationA
 0x1003e11c GetTickCount
 0x1003e120 GetLogicalDrives
 0x1003e124 GetOEMCP
 0x1003e128 IsValidCodePage
 0x1003e12c FindFirstFileExA
 0x1003e130 HeapSize
 0x1003e134 EnumSystemLocalesW
 0x1003e138 GetUserDefaultLCID
 0x1003e13c IsValidLocale
 0x1003e140 WriteConsoleW
 0x1003e144 FlushFileBuffers
 0x1003e148 GetTimeZoneInformation
 0x1003e14c GetConsoleCP
 0x1003e150 SetStdHandle
 0x1003e154 ReadConsoleW
 0x1003e158 GetConsoleMode
 0x1003e15c SetFilePointerEx
 0x1003e160 GetStdHandle
 0x1003e164 HeapReAlloc
 0x1003e168 GetACP
 0x1003e16c GetModuleHandleExW
 0x1003e170 TzSpecificLocalTimeToSystemTime
 0x1003e174 SetFileTime
 0x1003e178 EnterCriticalSection
 0x1003e17c LeaveCriticalSection
 0x1003e180 InitializeCriticalSectionAndSpinCount
 0x1003e184 SetEvent
 0x1003e188 ResetEvent
 0x1003e18c WaitForSingleObjectEx
 0x1003e190 CreateEventW
 0x1003e194 GetModuleHandleW
 0x1003e198 IsDebuggerPresent
 0x1003e19c UnhandledExceptionFilter
 0x1003e1a0 SetUnhandledExceptionFilter
 0x1003e1a4 GetStartupInfoW
 0x1003e1a8 IsProcessorFeaturePresent
 0x1003e1ac QueryPerformanceCounter
 0x1003e1b0 GetCurrentProcessId
 0x1003e1b4 GetSystemTimeAsFileTime
 0x1003e1b8 InitializeSListHead
 0x1003e1bc GetCurrentProcess
 0x1003e1c0 TerminateProcess
 0x1003e1c4 GetStringTypeW
 0x1003e1c8 EncodePointer
 0x1003e1cc TlsAlloc
 0x1003e1d0 TlsGetValue
 0x1003e1d4 TlsSetValue
 0x1003e1d8 TlsFree
 0x1003e1dc CompareStringW
 0x1003e1e0 LCMapStringW
 0x1003e1e4 GetLocaleInfoW
 0x1003e1e8 GetCPInfo
 0x1003e1ec OutputDebugStringW
 0x1003e1f0 RtlUnwind
 0x1003e1f4 InterlockedFlushSList
 0x1003e1f8 LoadLibraryExW
 0x1003e1fc SetEndOfFile
 0x1003e200 CreateDirectoryW
 0x1003e204 CreateFileW
 0x1003e208 GetFileType
USER32.dll
 0x1003e21c GetMonitorInfoA
 0x1003e220 GetDesktopWindow
 0x1003e224 EnumDisplayMonitors
 0x1003e228 GetDC
GDI32.dll
 0x1003e01c BitBlt
 0x1003e020 SaveDC
 0x1003e024 SelectObject
 0x1003e028 CreateDIBSection
 0x1003e02c CreateCompatibleDC
 0x1003e030 GetDeviceCaps
 0x1003e034 DeleteDC
 0x1003e038 RestoreDC
 0x1003e03c DeleteObject
 0x1003e040 CreateDCA
ADVAPI32.dll
 0x1003e000 RegCloseKey
 0x1003e004 RegOpenKeyA
 0x1003e008 RegQueryValueExA
 0x1003e00c RegSetValueExA
 0x1003e010 RegOpenKeyExA
 0x1003e014 RegCreateKeyA
SHELL32.dll
 0x1003e210 SHCreateDirectoryExA
 0x1003e214 SHGetFolderPathA
ole32.dll
 0x1003e298 CreateStreamOnHGlobal
WINHTTP.dll
 0x1003e230 WinHttpQueryAuthSchemes
 0x1003e234 WinHttpQueryDataAvailable
 0x1003e238 WinHttpReceiveResponse
 0x1003e23c WinHttpOpen
 0x1003e240 WinHttpQueryHeaders
 0x1003e244 WinHttpReadData
 0x1003e248 WinHttpOpenRequest
 0x1003e24c WinHttpSetOption
 0x1003e250 WinHttpCloseHandle
 0x1003e254 WinHttpSendRequest
 0x1003e258 WinHttpSetCredentials
 0x1003e25c WinHttpConnect
ntdll.dll
 0x1003e290 RtlGetVersion
gdiplus.dll
 0x1003e264 GdiplusStartup
 0x1003e268 GdiplusShutdown
 0x1003e26c GdipGetImageEncoders
 0x1003e270 GdipCloneImage
 0x1003e274 GdipSaveImageToStream
 0x1003e278 GdipGetImageEncodersSize
 0x1003e27c GdipFree
 0x1003e280 GdipDisposeImage
 0x1003e284 GdipCreateBitmapFromHBITMAP
 0x1003e288 GdipAlloc

EAT(Export Address Table) Library

0x100133e0 GetFileVersionInfoA
0x100133f0 GetFileVersionInfoByHandle
0x10013400 GetFileVersionInfoExA
0x10013410 GetFileVersionInfoExW
0x10013420 GetFileVersionInfoSizeA
0x10013430 GetFileVersionInfoSizeExA
0x10013440 GetFileVersionInfoSizeExW
0x10013450 GetFileVersionInfoSizeW
0x10013460 GetFileVersionInfoW
0x10013470 VerFindFileA
0x10013480 VerFindFileW
0x10013490 VerInstallFileA
0x100134a0 VerInstallFileW
0x100134b0 VerLanguageNameA
0x100134c0 VerLanguageNameW
0x100134d0 VerQueryValueA
0x100134e0 VerQueryValueW


Similarity measure (PE file only) - Checking for service failure