Report - autoupdate.exe

Gen2 Generic Malware Antivirus Anti_VM UPX PE64 OS Processor Check PE File PE32
ScreenShot
Created 2021.06.25 15:19 Machine s1_win7_x6401
Filename autoupdate.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
6.2
ZERO API file : clean
VT API (file) 26 detected (Snatch, Unsafe, Wofith, FileRepMalware, DownLoader40, Artemis, Generic PUA FH, ai score=86, kcloud, Wacatac, R002H09FO21, Malicious, Behavior, susgen)
md5 63e32043d2d8713aae718fc11416153b
sha256 32ae83dce97b97caff308dc542e85e89570dc4eb35cdf10a357124300d3a1fe7
ssdeep 393216:VWPx1jpayhjOzsjEvOdlJTdNXhFUbMwc:VWPx1jpaqOzsQvOdlJTLXUD
imphash 93a138801d9601e4c36e6274c8b9d111
impfuzzy 24:UbVjhNwO+VuTnvYzoLtXOr6kwmDruMztir6UP:KwO+VIc+XOmG8nP
  Network IP location

Signature (13cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
watch Detects the presence of Wine emulator
watch Drops a binary and executes it
watch Expresses interest in specific running processes
watch Uses Sysinternals tools in order to add additional command line functionality
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (13cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://m.windowsupdatesupport.org/d/procdump.exe IS 1984 ehf 93.95.226.238 clean
m.windowsupdatesupport.org US M247 Ltd 89.45.4.101 clean
93.95.226.238 IS 1984 ehf 93.95.226.238 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x14d4020 WriteFile
 0x14d4028 WriteConsoleW
 0x14d4030 WaitForMultipleObjects
 0x14d4038 WaitForSingleObject
 0x14d4040 VirtualQuery
 0x14d4048 VirtualFree
 0x14d4050 VirtualAlloc
 0x14d4058 SwitchToThread
 0x14d4060 SuspendThread
 0x14d4068 SetWaitableTimer
 0x14d4070 SetUnhandledExceptionFilter
 0x14d4078 SetProcessPriorityBoost
 0x14d4080 SetEvent
 0x14d4088 SetErrorMode
 0x14d4090 SetConsoleCtrlHandler
 0x14d4098 ResumeThread
 0x14d40a0 QueryFullProcessImageNameA
 0x14d40a8 ProcessIdToSessionId
 0x14d40b0 PostQueuedCompletionStatus
 0x14d40b8 OpenProcess
 0x14d40c0 LoadLibraryA
 0x14d40c8 LoadLibraryW
 0x14d40d0 SetThreadContext
 0x14d40d8 GetThreadContext
 0x14d40e0 GetSystemInfo
 0x14d40e8 GetSystemDirectoryA
 0x14d40f0 GetStdHandle
 0x14d40f8 GetQueuedCompletionStatusEx
 0x14d4100 GetProcessAffinityMask
 0x14d4108 GetProcAddress
 0x14d4110 GetEnvironmentStringsW
 0x14d4118 GetConsoleMode
 0x14d4120 FreeEnvironmentStringsW
 0x14d4128 ExitProcess
 0x14d4130 DuplicateHandle
 0x14d4138 CreateThread
 0x14d4140 CreateIoCompletionPort
 0x14d4148 CreateEventA
 0x14d4150 CloseHandle
 0x14d4158 AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure