ScreenShot
Created 2021.03.28 12:05 Machine s1_win7_x6401
Filename def.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
7.6
ZERO API file : clean
VT API (file) 33 detected (GenericKD, Unsafe, Ymacco, KillAV, xahhhi, FileRepMalware, Malicious, gyfuy, ai score=80, score, Wacatac, HykCI3wA)
md5 04a666d7cf692764645f28189bdb2e70
sha256 79dd688046ef9f26ed0cf633cab305f18b46ce7affaa396813a9587ac2918bb0
ssdeep 3072:X8FHdppuOf+wMSHjnywM0vY9t8Qkh+nXeuS:MFPMOf+wMAywM0EJksnXJS
imphash 12f12d364f5f6a801e52c9dce28d1965
impfuzzy 48:oAUXyI6U0wt8tAkACSej5SU/Svn6GK/gR6Ucx02GFXGZqAYFv08sOaOz9G9mYwGn:oAYmRRGFXGZqAYZ08sZsgLwG3f/
  Network IP location

Signature (16cnts)

Level Description
danger Disables Windows Security features
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious
danger Stops Windows services
watch Attempts to modify UAC prompt behavior
watch Creates known SpyNet files
watch Deletes executed files from disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer

Rules (6cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasOverlay Overlay Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info win_files_operation Affect private profile binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

OLEAUT32.dll
 0x416150 VariantClear
 0x416154 SysAllocString
USER32.dll
 0x416164 SendMessageA
 0x416168 SetTimer
 0x41616c KillTimer
 0x416170 DialogBoxParamA
 0x416174 SetWindowLongA
 0x416178 GetWindowLongA
 0x41617c SetWindowTextW
 0x416180 SetWindowTextA
 0x416184 LoadIconA
 0x416188 LoadStringW
 0x41618c LoadStringA
 0x416190 CharUpperW
 0x416194 CharUpperA
 0x416198 DestroyWindow
 0x41619c EndDialog
 0x4161a0 PostMessageA
 0x4161a4 ShowWindow
 0x4161a8 MessageBoxW
 0x4161ac GetDlgItem
 0x4161b0 DialogBoxParamW
SHELL32.dll
 0x41615c ShellExecuteExA
MSVCRT.dll
 0x4160e8 _controlfp
 0x4160ec __set_app_type
 0x4160f0 __p__fmode
 0x4160f4 __p__commode
 0x4160f8 _adjust_fdiv
 0x4160fc __setusermatherr
 0x416100 _initterm
 0x416104 __getmainargs
 0x416108 _acmdln
 0x41610c exit
 0x416110 _XcptFilter
 0x416114 _exit
 0x416118 _onexit
 0x41611c __dllonexit
 0x416120 ??1type_info@@UAE@XZ
 0x416124 _except_handler3
 0x416128 _beginthreadex
 0x41612c memcpy
 0x416130 free
 0x416134 malloc
 0x416138 _CxxThrowException
 0x41613c _purecall
 0x416140 memmove
 0x416144 __CxxFrameHandler
 0x416148 memcmp
KERNEL32.dll
 0x416000 GetCommandLineW
 0x416004 GetStartupInfoA
 0x416008 GetModuleHandleA
 0x41600c InitializeCriticalSection
 0x416010 ResetEvent
 0x416014 SetEvent
 0x416018 CreateEventA
 0x41601c VirtualFree
 0x416020 VirtualAlloc
 0x416024 Sleep
 0x416028 WaitForMultipleObjects
 0x41602c GetStdHandle
 0x416030 SetEndOfFile
 0x416034 WriteFile
 0x416038 ReadFile
 0x41603c SetFilePointer
 0x416040 GetFileSize
 0x416044 CreateFileA
 0x416048 FindNextFileA
 0x41604c FindFirstFileW
 0x416050 FindFirstFileA
 0x416054 FindClose
 0x416058 GetTempFileNameA
 0x41605c GetTempPathA
 0x416060 GetCurrentDirectoryA
 0x416064 GetFullPathNameW
 0x416068 GetFullPathNameA
 0x41606c lstrlenA
 0x416070 DeleteFileW
 0x416074 DeleteFileA
 0x416078 CreateDirectoryW
 0x41607c CreateDirectoryA
 0x416080 RemoveDirectoryW
 0x416084 SetFileAttributesW
 0x416088 RemoveDirectoryA
 0x41608c SetFileAttributesA
 0x416090 SetLastError
 0x416094 CreateFileW
 0x416098 SetFileTime
 0x41609c GetWindowsDirectoryA
 0x4160a0 FormatMessageW
 0x4160a4 FormatMessageA
 0x4160a8 LocalFree
 0x4160ac GetModuleFileNameW
 0x4160b0 GetModuleFileNameA
 0x4160b4 AreFileApisANSI
 0x4160b8 GetLastError
 0x4160bc WideCharToMultiByte
 0x4160c0 MultiByteToWideChar
 0x4160c4 DeleteCriticalSection
 0x4160c8 WaitForSingleObject
 0x4160cc CloseHandle
 0x4160d0 CreateProcessA
 0x4160d4 SetCurrentDirectoryA
 0x4160d8 GetVersionExA
 0x4160dc LeaveCriticalSection
 0x4160e0 EnterCriticalSection

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure