Report - HashDrop.exe

Malicious Library PE File PE32
ScreenShot
Created 2025.04.07 10:01 Machine s1_win7_x6401
Filename HashDrop.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
2.8
ZERO API file : malware
VT API (file) 54 detected (AIDetectMalware, malicious, high confidence, score, Ghanarava, Artemis, @x0@aW, u74li, Unsafe, GenericKD, Save, confidence, 100%, GenHeur, Kryptik, HYUP, tkcrqv, ShellCodeLoader, CLASSIC, pmwza, Siggen31, high, Static AI, Malicious PE, Detected, GrayWare, Wacapew, LummaC, ABApplication, AZKL, Sabsik, BScope, Stealc, Chgt, PE04C9V, Gencirc, susgen, PossibleThreat, FMC2XJC)
md5 524faa5c0e252d6edebacc31ec488d31
sha256 ab8d42ebe660e813c943cacc78d23b80f9ba88392ff32fc3ae07fabaaeb13647
ssdeep 98304:z8oKhObimn6gZvA8nqOdZbWGPTyj7UHvzjZ2ejcdVgSRXWxepmm0uHq1VNae10l5:z8rsFRZ4mqOTKGbGw7j4hdKKXnl0uHqY
imphash 1b088a03e230d1f75f7d6f7f538ea8ea
impfuzzy 24:p7TUHwj2k3zrzizDBtFkEkwkgx/oWT8v9R25K8zBMIX1/mu3:p7N9Drz09tFkEk/glorR2Uwd/d3
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 54 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x471bb0 CloseHandle
 0x471bb4 CopyFileW
 0x471bb8 CreateFileW
 0x471bbc ExitProcess
 0x471bc0 GetCurrentProcess
 0x471bc4 GetLastError
 0x471bc8 GetLocalTime
 0x471bcc GetModuleFileNameW
 0x471bd0 GetSystemInfo
 0x471bd4 GetTempPathW
 0x471bd8 GetTickCount
 0x471bdc GlobalMemoryStatusEx
 0x471be0 LocalAlloc
 0x471be4 LocalFree
 0x471be8 ReadFile
 0x471bec SetFilePointer
 0x471bf0 Sleep
 0x471bf4 VirtualAlloc
 0x471bf8 VirtualFree
 0x471bfc WriteFile
 0x471c00 lstrcatW
 0x471c04 lstrlenW
USER32.dll
 0x471c0c FindWindowW
 0x471c10 GetCursorPos
 0x471c14 GetDesktopWindow
 0x471c18 GetForegroundWindow
 0x471c1c GetKeyState
 0x471c20 GetSysColor
 0x471c24 GetSystemMetrics
 0x471c28 GetWindowLongW
 0x471c2c GetWindowTextW
 0x471c30 MessageBoxW
 0x471c34 SendMessageW
 0x471c38 SetWindowLongW
 0x471c3c wsprintfW
ADVAPI32.dll
 0x471c44 CryptAcquireContextW
 0x471c48 CryptDestroyKey
 0x471c4c CryptGenKey
 0x471c50 CryptReleaseContext
 0x471c54 GetSidSubAuthority
 0x471c58 GetSidSubAuthorityCount
 0x471c5c GetTokenInformation
 0x471c60 GetUserNameW
 0x471c64 OpenProcessToken
 0x471c68 RegCloseKey
 0x471c6c RegOpenKeyExW
 0x471c70 RegOpenKeyW
 0x471c74 RegQueryValueExW
 0x471c78 RegSetValueExW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure