Report - 123.dll

Generic Malware Malicious Packer Antivirus Malicious Library UPX Anti_VM PE File DLL PE32 OS Processor Check
ScreenShot
Created 2025.05.01 08:34 Machine s1_win7_x6403
Filename 123.dll
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
3.6
ZERO API file : clean
VT API (file) 41 detected (Malicious, score, FileRep, Jaik, Unsafe, SilverFox, swkah, confidence, Windows, DustyWarehouse, Farfli, MalwareX, Misc, Fragtor, AntiAV, khthkw, CLASSIC, AGEN, Static AI, Suspicious PE, Detected, Wacapew, GdSda, susgen, Manuscrypt)
md5 2a76c9def2e5f4d2503f1cc3ec882e4f
sha256 a77a678b63be93410305679e884b744cf7b82479872251db400372523568bb14
ssdeep 12288:NLjYuY+GWBBcGbpXaRwDNIUAzmER9KHgR9uTT0n:NLUT+GWrcgpXaaDNFK9eiuTT
imphash 35df1e9438f71df442de46ffe74e70c9
impfuzzy 96:fc3yaqB/yttgYDIzf+2rP8LyEUTsm/kKBt0od51Vp:03yaNj16TtBt0Mp
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 41 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info This executable has a PDB path

Rules (10cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
2000.ink Unknown clean
45.152.67.113 Unknown 45.152.67.113 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1005d04c CreateToolhelp32Snapshot
 0x1005d050 Process32FirstW
 0x1005d054 Process32NextW
 0x1005d058 CloseHandle
 0x1005d05c LoadLibraryW
 0x1005d060 GetProcAddress
 0x1005d064 CreateFileW
 0x1005d068 GetCurrentProcess
 0x1005d06c lstrcpyW
 0x1005d070 GetLastError
 0x1005d074 HeapAlloc
 0x1005d078 GetProcessHeap
 0x1005d07c HeapFree
 0x1005d080 OpenProcess
 0x1005d084 GetDriveTypeW
 0x1005d088 GetDiskFreeSpaceExW
 0x1005d08c GlobalMemoryStatusEx
 0x1005d090 GetSystemInfo
 0x1005d094 FreeLibrary
 0x1005d098 GetModuleFileNameW
 0x1005d09c GetCommandLineW
 0x1005d0a0 GetStartupInfoW
 0x1005d0a4 CreateProcessW
 0x1005d0a8 ExitProcess
 0x1005d0ac WideCharToMultiByte
 0x1005d0b0 CreateFileA
 0x1005d0b4 DeviceIoControl
 0x1005d0b8 QueryPerformanceFrequency
 0x1005d0bc CreateEventW
 0x1005d0c0 SetEvent
 0x1005d0c4 ResetEvent
 0x1005d0c8 QueryPerformanceCounter
 0x1005d0cc WaitForSingleObject
 0x1005d0d0 InterlockedExchange
 0x1005d0d4 WriteFile
 0x1005d0d8 ExpandEnvironmentStringsW
 0x1005d0dc CopyFileW
 0x1005d0e0 SetFileAttributesW
 0x1005d0e4 GetConsoleWindow
 0x1005d0e8 CreateEventA
 0x1005d0ec FormatMessageW
 0x1005d0f0 SetLastError
 0x1005d0f4 VirtualProtect
 0x1005d0f8 IsBadReadPtr
 0x1005d0fc LoadLibraryA
 0x1005d100 GetNativeSystemInfo
 0x1005d104 CreateThread
 0x1005d108 SetErrorMode
 0x1005d10c SetUnhandledExceptionFilter
 0x1005d110 CreateMutexW
 0x1005d114 GetFileSize
 0x1005d118 DeleteFileW
 0x1005d11c ReleaseMutex
 0x1005d120 SetFilePointer
 0x1005d124 RaiseException
 0x1005d128 LocalFree
 0x1005d12c ReadFile
 0x1005d130 LCMapStringW
 0x1005d134 FlushFileBuffers
 0x1005d138 SetStdHandle
 0x1005d13c WriteConsoleW
 0x1005d140 GetSystemTimeAsFileTime
 0x1005d144 GetEnvironmentStringsW
 0x1005d148 GetModuleHandleW
 0x1005d14c lstrcmpW
 0x1005d150 GetTickCount
 0x1005d154 Sleep
 0x1005d158 lstrcatW
 0x1005d15c GetSystemDirectoryW
 0x1005d160 GetLocaleInfoW
 0x1005d164 GetLocalTime
 0x1005d168 GetCurrentProcessId
 0x1005d16c MultiByteToWideChar
 0x1005d170 lstrlenW
 0x1005d174 InterlockedDecrement
 0x1005d178 VirtualAlloc
 0x1005d17c LeaveCriticalSection
 0x1005d180 EnterCriticalSection
 0x1005d184 DeleteCriticalSection
 0x1005d188 VirtualFree
 0x1005d18c FreeEnvironmentStringsW
 0x1005d190 GetModuleFileNameA
 0x1005d194 GetFileType
 0x1005d198 SetHandleCount
 0x1005d19c IsValidCodePage
 0x1005d1a0 GetOEMCP
 0x1005d1a4 GetACP
 0x1005d1a8 GetCPInfo
 0x1005d1ac InitializeCriticalSectionAndSpinCount
 0x1005d1b0 GetFileAttributesW
 0x1005d1b4 InitializeCriticalSection
 0x1005d1b8 GetCurrentThreadId
 0x1005d1bc HeapCreate
 0x1005d1c0 HeapDestroy
 0x1005d1c4 CreateWaitableTimerW
 0x1005d1c8 GetStringTypeW
 0x1005d1cc HeapSize
 0x1005d1d0 GetConsoleMode
 0x1005d1d4 GetConsoleCP
 0x1005d1d8 GetStdHandle
 0x1005d1dc TlsFree
 0x1005d1e0 TlsSetValue
 0x1005d1e4 TlsGetValue
 0x1005d1e8 TlsAlloc
 0x1005d1ec IsProcessorFeaturePresent
 0x1005d1f0 IsDebuggerPresent
 0x1005d1f4 UnhandledExceptionFilter
 0x1005d1f8 TerminateProcess
 0x1005d1fc RtlUnwind
 0x1005d200 GetCommandLineA
 0x1005d204 HeapReAlloc
 0x1005d208 ExitThread
 0x1005d20c EncodePointer
 0x1005d210 DecodePointer
 0x1005d214 TryEnterCriticalSection
 0x1005d218 CancelWaitableTimer
 0x1005d21c SetWaitableTimer
 0x1005d220 lstrlenA
 0x1005d224 UnmapViewOfFile
 0x1005d228 SwitchToThread
 0x1005d22c CreateFileMappingW
 0x1005d230 MapViewOfFileEx
 0x1005d234 InterlockedIncrement
 0x1005d238 InterlockedCompareExchange
USER32.dll
 0x1005d278 PeekMessageW
 0x1005d27c MsgWaitForMultipleObjects
 0x1005d280 GetWindowTextW
 0x1005d284 GetMonitorInfoW
 0x1005d288 EnumDisplayMonitors
 0x1005d28c GetForegroundWindow
 0x1005d290 SendMessageW
 0x1005d294 FindWindowA
 0x1005d298 GetWindowTextA
 0x1005d29c GetWindow
 0x1005d2a0 GetClassNameA
 0x1005d2a4 OpenWindowStationW
 0x1005d2a8 SetProcessWindowStation
 0x1005d2ac IsWindow
 0x1005d2b0 GetLastInputInfo
 0x1005d2b4 DispatchMessageW
 0x1005d2b8 TranslateMessage
 0x1005d2bc wsprintfW
ADVAPI32.dll
 0x1005d000 OpenProcessToken
 0x1005d004 RegSetValueExW
 0x1005d008 RegCreateKeyW
 0x1005d00c RegDeleteValueW
 0x1005d010 RegQueryValueExW
 0x1005d014 RegOpenKeyExW
 0x1005d018 LookupAccountSidW
 0x1005d01c GetTokenInformation
 0x1005d020 GetCurrentHwProfileW
 0x1005d024 FreeSid
 0x1005d028 CheckTokenMembership
 0x1005d02c AllocateAndInitializeSid
 0x1005d030 RegCloseKey
 0x1005d034 RegEnumKeyExA
 0x1005d038 RegQueryInfoKeyW
 0x1005d03c RegOpenKeyExA
SHELL32.dll
 0x1005d260 SHGetFolderPathW
ole32.dll
 0x1005d350 CoUninitialize
 0x1005d354 CoInitializeEx
 0x1005d358 CoInitializeSecurity
 0x1005d35c CoCreateInstance
 0x1005d360 CoInitialize
OLEAUT32.dll
 0x1005d248 VariantInit
 0x1005d24c SysFreeString
 0x1005d250 SysStringLen
 0x1005d254 VariantClear
 0x1005d258 SysAllocString
WS2_32.dll
 0x1005d2d8 getsockname
 0x1005d2dc WSAAddressToStringW
 0x1005d2e0 WSASetLastError
 0x1005d2e4 WSAStringToAddressW
 0x1005d2e8 closesocket
 0x1005d2ec send
 0x1005d2f0 setsockopt
 0x1005d2f4 WSAIoctl
 0x1005d2f8 htons
 0x1005d2fc WSAGetLastError
 0x1005d300 inet_ntoa
 0x1005d304 gethostbyname
 0x1005d308 gethostname
 0x1005d30c freeaddrinfo
 0x1005d310 getaddrinfo
 0x1005d314 WSAStartup
 0x1005d318 WSAResetEvent
 0x1005d31c WSAEventSelect
 0x1005d320 WSACleanup
 0x1005d324 ind
 0x1005d328 connect
 0x1005d32c recv
 0x1005d330 WSACloseEvent
 0x1005d334 WSACreateEvent
 0x1005d338 socket
 0x1005d33c WSAEnumNetworkEvents
 0x1005d340 WSAWaitForMultipleEvents
 0x1005d344 shutdown
 0x1005d348 ntohs
SHLWAPI.dll
 0x1005d268 StrChrW
 0x1005d26c StrPBrkW
 0x1005d270 PathIsDirectoryA
NETAPI32.dll
 0x1005d240 NetWkstaGetInfo
DINPUT8.dll
 0x1005d044 DirectInput8Create
WINMM.dll
 0x1005d2c4 timeGetDevCaps
 0x1005d2c8 timeEndPeriod
 0x1005d2cc timeBeginPeriod
 0x1005d2d0 timeGetTime

EAT(Export Address Table) Library

0x10009a20 GetInstallDetailsPayload
0x10009a20 SignalChromeElf
0x10009a70 Version
0x10009950 load
0x100099c0 run


Similarity measure (PE file only) - Checking for service failure