Report - setup.exe

Malicious Library PE File OS Processor Check PE32
ScreenShot
Created 2021.09.15 18:15 Machine s1_win7_x6402
Filename setup.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
2
Behavior Score
2.0
ZERO API file : clean
VT API (file) 28 detected (AIDetect, malware1, malicious, high confidence, Fragtor, Save, confidence, 100%, ZexaF, rq0@a887svaG, Kryptik, Eldorado, Attribute, HighConfidence, Reline, A + Troj, Krypt, susgen, Tnega, score, ai score=88, Unsafe, CLASSIC, Static AI, Malicious PE)
md5 498d616eef919be56eb9760a0d749500
sha256 3a51d7178b120209414c12b1247ded02bef39cc060bc9905300eb4c7b6e860d0
ssdeep 6144:SL9LNkItY7fJ8KvCOzQs6o69NkhmuqtdL:E5lt2f6OzFp69WYt
imphash 8291759aef0e46c8057b5d52bd12239f
impfuzzy 24:Qoc0ZaQr3/wJ1e5DXOLhbXh1OqfdYE7/J3Jqtqiyv4OT42l9NWjMvheNpb:BZaQr3/0bLIqfrVwtqbpc2plof
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 28 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x434000 GetLocaleInfoA
 0x434004 LoadResource
 0x434008 ReadConsoleA
 0x43400c InterlockedDecrement
 0x434010 GetCurrentProcess
 0x434014 GetEnvironmentStringsW
 0x434018 GetUserDefaultLCID
 0x43401c FindActCtxSectionStringA
 0x434020 GetUserDefaultLangID
 0x434024 QueryActCtxW
 0x434028 InitializeCriticalSection
 0x43402c ReadConsoleInputA
 0x434030 GetSystemWindowsDirectoryA
 0x434034 LeaveCriticalSection
 0x434038 PulseEvent
 0x43403c VerifyVersionInfoA
 0x434040 WriteConsoleW
 0x434044 GetModuleFileNameW
 0x434048 ReleaseSemaphore
 0x43404c GetConsoleOutputCP
 0x434050 GetProcAddress
 0x434054 PrepareTape
 0x434058 OpenMutexA
 0x43405c LocalAlloc
 0x434060 GlobalGetAtomNameW
 0x434064 WaitForMultipleObjects
 0x434068 SetSystemTime
 0x43406c GetModuleFileNameA
 0x434070 GetModuleHandleA
 0x434074 FindFirstVolumeA
 0x434078 AddConsoleAliasA
 0x43407c GetProfileSectionW
 0x434080 GetCommandLineW
 0x434084 HeapAlloc
 0x434088 GetStartupInfoW
 0x43408c DeleteCriticalSection
 0x434090 EnterCriticalSection
 0x434094 HeapFree
 0x434098 VirtualFree
 0x43409c VirtualAlloc
 0x4340a0 HeapReAlloc
 0x4340a4 HeapCreate
 0x4340a8 GetModuleHandleW
 0x4340ac Sleep
 0x4340b0 ExitProcess
 0x4340b4 WriteFile
 0x4340b8 GetStdHandle
 0x4340bc TlsGetValue
 0x4340c0 TlsAlloc
 0x4340c4 TlsSetValue
 0x4340c8 TlsFree
 0x4340cc InterlockedIncrement
 0x4340d0 SetLastError
 0x4340d4 GetCurrentThreadId
 0x4340d8 GetLastError
 0x4340dc HeapSize
 0x4340e0 TerminateProcess
 0x4340e4 UnhandledExceptionFilter
 0x4340e8 SetUnhandledExceptionFilter
 0x4340ec IsDebuggerPresent
 0x4340f0 RtlUnwind
 0x4340f4 SetHandleCount
 0x4340f8 GetFileType
 0x4340fc GetStartupInfoA
 0x434100 SetFilePointer
 0x434104 CloseHandle
 0x434108 FreeEnvironmentStringsW
 0x43410c QueryPerformanceCounter
 0x434110 GetTickCount
 0x434114 GetCurrentProcessId
 0x434118 GetSystemTimeAsFileTime
 0x43411c InitializeCriticalSectionAndSpinCount
 0x434120 LoadLibraryA
 0x434124 GetCPInfo
 0x434128 GetACP
 0x43412c GetOEMCP
 0x434130 IsValidCodePage
 0x434134 WideCharToMultiByte
 0x434138 CreateFileA
 0x43413c RaiseException
 0x434140 SetStdHandle
 0x434144 GetConsoleCP
 0x434148 GetConsoleMode
 0x43414c FlushFileBuffers
 0x434150 GetStringTypeA
 0x434154 MultiByteToWideChar
 0x434158 GetStringTypeW
 0x43415c LCMapStringA
 0x434160 LCMapStringW
 0x434164 SetEndOfFile
 0x434168 GetProcessHeap
 0x43416c ReadFile
 0x434170 WriteConsoleA
USER32.dll
 0x434178 RealChildWindowFromPoint

EAT(Export Address Table) Library

0x401000 @SetViceVariants@12


Similarity measure (PE file only) - Checking for service failure