Report - Update.exe2.rar

Generic Malware Malicious Packer PE File PE32
ScreenShot
Created 2021.09.18 19:47 Machine s1_win7_x6402
Filename Update.exe2.rar
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
6.6
ZERO API file : malware
VT API (file) 41 detected (malicious, high confidence, Babuk, Unsafe, Save, confidence, ZexaF, euW@a0wVUsc, Filecoder, Babyk, Ransomware, Maze, SMRD1, Static AI, Malicious PE, AGEN, ai score=85, score, R441290, GenericRXNS, BScope, Crypmod, CLASSIC, FilecoderProt, GdSda, susgen)
md5 093f098e70cc57a17d02323cbe6cd484
sha256 ae6020a06d2a95cbe91b439f4433e87d198547dec629ab0900ccfe17e729cff1
ssdeep 1536:PhkWBeG/LEOSsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2Osf:LBe8dSsrQLOJgY8Zp8LHD4XWaNH71dLT
imphash 202fa14f574c71c2f95878e40a79322d
impfuzzy 24:/zKDDokSqQfc+dcOrUIjybBcVAlkxQJaOaad/brmTk9v4qKOoMq1j:rBfc+dDmcSk2Laad/hv46oM0
  Network IP location

Signature (13cnts)

Level Description
danger File has been identified by 41 AntiVirus engines on VirusTotal as malicious
watch Attempts to detect Cuckoo Sandbox through the presence of a file
watch Drops 146 unknown file mime types indicative of ransomware writing encrypted files back to disk
watch Removes the Shadow Copy to avoid recovery of the system
watch Uses suspicious command line tools or Windows utilities
watch Writes a potential ransom message to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Searches running processes potentially to identify processes for sandbox evasion
info Command line console output was observed
info One or more processes crashed

Rules (4cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x415028 OpenProcess
 0x41502c GetTickCount
 0x415030 GetModuleHandleA
 0x415034 GetProcAddress
 0x415038 LoadLibraryA
 0x41503c lstrcmpW
 0x415040 lstrlenW
 0x415044 SetVolumeMountPointW
 0x415048 CreateToolhelp32Snapshot
 0x41504c Process32FirstW
 0x415050 Process32NextW
 0x415054 CreateFileW
 0x415058 WriteFile
 0x41505c InitializeCriticalSection
 0x415060 EnterCriticalSection
 0x415064 LeaveCriticalSection
 0x415068 DeleteCriticalSection
 0x41506c lstrlenA
 0x415070 GetCommandLineW
 0x415074 FindClose
 0x415078 FindFirstFileW
 0x41507c FindNextFileW
 0x415080 GetFileSizeEx
 0x415084 GetCurrentProcess
 0x415088 ReadFile
 0x41508c SetFileAttributesW
 0x415090 SetFilePointerEx
 0x415094 WaitForSingleObject
 0x415098 CreateMutexA
 0x41509c WaitForMultipleObjects
 0x4150a0 GetCurrentProcessId
 0x4150a4 ExitProcess
 0x4150a8 CreateThread
 0x4150ac ExitThread
 0x4150b0 SetProcessShutdownParameters
 0x4150b4 GetSystemInfo
 0x4150b8 lstrcmpiW
 0x4150bc lstrcpyW
 0x4150c0 lstrcatW
 0x4150c4 OpenMutexA
 0x4150c8 MoveFileExW
 0x4150cc WideCharToMultiByte
 0x4150d0 HeapAlloc
 0x4150d4 HeapFree
 0x4150d8 GetProcessHeap
 0x4150dc ReleaseSemaphore
 0x4150e0 CreateSemaphoreA
 0x4150e4 TerminateProcess
 0x4150e8 Sleep
 0x4150ec GetLastError
 0x4150f0 CloseHandle
 0x4150f4 GetVolumePathNamesForVolumeNameW
 0x4150f8 GetDriveTypeW
 0x4150fc FindVolumeClose
 0x415100 FindNextVolumeW
 0x415104 GetLogicalDrives
 0x415108 FindFirstVolumeW
USER32.dll
 0x415154 wsprintfA
ADVAPI32.dll
 0x415000 QueryServiceStatusEx
 0x415004 OpenSCManagerA
 0x415008 EnumDependentServicesA
 0x41500c ControlService
 0x415010 CloseServiceHandle
 0x415014 CryptAcquireContextW
 0x415018 CryptReleaseContext
 0x41501c CryptGenRandom
 0x415020 OpenServiceA
SHELL32.dll
 0x415144 SHEmptyRecycleBinA
 0x415148 CommandLineToArgvW
 0x41514c ShellExecuteW
NETAPI32.dll
 0x415124 NetShareEnum
 0x415128 NetApiBufferFree
RstrtMgr.DLL
 0x415130 RmGetList
 0x415134 RmStartSession
 0x415138 RmEndSession
 0x41513c RmRegisterResources
MPR.dll
 0x415110 WNetCloseEnum
 0x415114 WNetEnumResourceW
 0x415118 WNetOpenEnumW
 0x41511c WNetGetConnectionW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure