Report - updatetes.exe

Malicious Packer Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.06.16 09:45 Machine s1_win7_x6401
Filename updatetes.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
3.4
ZERO API file : malware
VT API (file) 47 detected (AIDetect, malware1, malicious, high confidence, Graftor, Unsafe, Save, None, Kryptik, Eldorado, Attribute, HighConfidence, HLIZ, PWSX, Zenpak, Siggen3, R002C0DFF21, susgen, ai score=81, kcloud, Azorult, NetSteal, CXT1WY, score, R425830, GenericRXAA, BScope, Sabsik, CLASSIC, Static AI, Malicious PE, ZexaE, vuW@aSlgdegG, GdSda, confidence)
md5 a4f1f7fe9de324bf060f44976d1e0d17
sha256 2fb6bf1f605b4441037e7870f0060ad5e5bdcfd9b8ad065a42dc953be5c8d321
ssdeep 6144:PIXuxqHbApdbj/WCrrPY22E0QHYW5n+RZKXpuLVRB:PIXuxwApdbj/BPQ22E0anUZwp6B
imphash b0d3854c557fd79a46b820c312bd2709
impfuzzy 48:FfNaOVSkPW4d7zSGjFF9Plp6bO6whV22eLaAqSc7ZJPGuz:FrkdQqU3tv6ahV22eOAqSc7Zz
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 47 AntiVirus engines on VirusTotal as malicious
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x442008 TlsGetValue
 0x44200c GetStringTypeA
 0x442010 SetLocalTime
 0x442014 GetDriveTypeW
 0x442018 GetNumberOfConsoleInputEvents
 0x44201c FindResourceExW
 0x442020 MapUserPhysicalPages
 0x442024 CallNamedPipeA
 0x442028 InterlockedIncrement
 0x44202c GetQueuedCompletionStatus
 0x442030 GetCommState
 0x442034 InterlockedDecrement
 0x442038 ScrollConsoleScreenBufferW
 0x44203c QueryDosDeviceA
 0x442040 WaitForSingleObject
 0x442044 OpenSemaphoreA
 0x442048 CreateDirectoryExA
 0x44204c FreeEnvironmentStringsA
 0x442050 GetModuleHandleW
 0x442054 GetPrivateProfileStringW
 0x442058 GetConsoleTitleA
 0x44205c FindActCtxSectionStringA
 0x442060 WriteFileGather
 0x442064 GetVolumeInformationA
 0x442068 Sleep
 0x44206c SetVolumeMountPointA
 0x442070 GetSystemTimeAdjustment
 0x442074 GlobalFlags
 0x442078 Beep
 0x44207c SetMessageWaitingIndicator
 0x442080 VerifyVersionInfoA
 0x442084 GetBinaryTypeA
 0x442088 WritePrivateProfileSectionW
 0x44208c CreateFileW
 0x442090 GetACP
 0x442094 lstrlenW
 0x442098 LCMapStringA
 0x44209c VerifyVersionInfoW
 0x4420a0 CreateDirectoryA
 0x4420a4 InterlockedExchange
 0x4420a8 GetStdHandle
 0x4420ac OpenMutexW
 0x4420b0 WriteConsoleInputW
 0x4420b4 GetProcAddress
 0x4420b8 GetProcessHeaps
 0x4420bc GetComputerNameExW
 0x4420c0 SetVolumeLabelW
 0x4420c4 ReadFileEx
 0x4420c8 SetComputerNameA
 0x4420cc CreateMemoryResourceNotification
 0x4420d0 SetFileApisToOEM
 0x4420d4 GetAtomNameA
 0x4420d8 Process32FirstW
 0x4420dc OpenWaitableTimerW
 0x4420e0 LocalAlloc
 0x4420e4 GetFileType
 0x4420e8 SetConsoleOutputCP
 0x4420ec SetCurrentDirectoryW
 0x4420f0 WriteProfileSectionW
 0x4420f4 GetCommMask
 0x4420f8 AddAtomA
 0x4420fc SetCommMask
 0x442100 GetPrivateProfileStructA
 0x442104 EnumResourceTypesW
 0x442108 SetConsoleCursorInfo
 0x44210c GetThreadPriority
 0x442110 SetConsoleTitleW
 0x442114 GetModuleHandleA
 0x442118 EnumResourceNamesA
 0x44211c FindNextFileW
 0x442120 RequestWakeupLatency
 0x442124 BuildCommDCBA
 0x442128 GetCurrentDirectoryA
 0x44212c CompareStringA
 0x442130 SetCalendarInfoA
 0x442134 GetVersionExA
 0x442138 GetWindowsDirectoryW
 0x44213c GetCurrentProcessId
 0x442140 InterlockedPushEntrySList
 0x442144 GetProfileSectionW
 0x442148 ResumeThread
 0x44214c CloseHandle
 0x442150 SetStdHandle
 0x442154 GetConsoleMode
 0x442158 GetConsoleCP
 0x44215c IsDBCSLeadByteEx
 0x442160 FindFirstFileW
 0x442164 GetLastError
 0x442168 MoveFileA
 0x44216c GetCommandLineW
 0x442170 HeapSetInformation
 0x442174 GetStartupInfoW
 0x442178 SetUnhandledExceptionFilter
 0x44217c QueryPerformanceCounter
 0x442180 GetTickCount
 0x442184 GetCurrentThreadId
 0x442188 GetSystemTimeAsFileTime
 0x44218c DecodePointer
 0x442190 ExitProcess
 0x442194 GetModuleFileNameW
 0x442198 FreeEnvironmentStringsW
 0x44219c GetEnvironmentStringsW
 0x4421a0 SetHandleCount
 0x4421a4 InitializeCriticalSectionAndSpinCount
 0x4421a8 DeleteCriticalSection
 0x4421ac HeapValidate
 0x4421b0 IsBadReadPtr
 0x4421b4 EncodePointer
 0x4421b8 TlsAlloc
 0x4421bc TlsSetValue
 0x4421c0 TlsFree
 0x4421c4 SetLastError
 0x4421c8 HeapCreate
 0x4421cc WriteFile
 0x4421d0 TerminateProcess
 0x4421d4 GetCurrentProcess
 0x4421d8 UnhandledExceptionFilter
 0x4421dc IsDebuggerPresent
 0x4421e0 RtlUnwind
 0x4421e4 GetOEMCP
 0x4421e8 GetCPInfo
 0x4421ec IsValidCodePage
 0x4421f0 EnterCriticalSection
 0x4421f4 LeaveCriticalSection
 0x4421f8 LoadLibraryW
 0x4421fc HeapAlloc
 0x442200 GetModuleFileNameA
 0x442204 HeapReAlloc
 0x442208 HeapSize
 0x44220c HeapQueryInformation
 0x442210 HeapFree
 0x442214 OutputDebugStringA
 0x442218 WriteConsoleW
 0x44221c OutputDebugStringW
 0x442220 GetStringTypeW
 0x442224 MultiByteToWideChar
 0x442228 WideCharToMultiByte
 0x44222c LCMapStringW
 0x442230 IsProcessorFeaturePresent
 0x442234 RaiseException
 0x442238 SetFilePointer
 0x44223c FlushFileBuffers
USER32.dll
 0x442244 GetCursorInfo
 0x442248 GetMenuInfo
 0x44224c GetMenuBarInfo
ADVAPI32.dll
 0x442000 InitiateSystemShutdownA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure