Report - mup.exe

Malicious Packer Admin Tool (Sysinternals etc ...) Malicious Library PE File PE32
ScreenShot
Created 2021.10.02 13:02 Machine s1_win7_x6401
Filename mup.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
12
Behavior Score
8.4
ZERO API file : clean
VT API (file) 49 detected (AIDetect, malware2, Fwdisable, malicious, high confidence, GenericKD, Unsafe, Save, Phorpiex, confidence, 100%, Attribute, HighConfidence, KadrBot, Swkg, Malware@#1focjyur33i1g, emW@aCxrSb, AGEN, KVMH012, kcloud, GenericMC, Sabsik, score, GenericRXQF, ai score=80, R002H0CIS21, Generic@ML, RDMK, y7ivWWGuFPyeanKUnks+fg, Static AI, Malicious PE, SecurityProtection)
md5 c532ac418f3e867907c2757a7ca56a53
sha256 555513aa074aca680c4962f0078f43445a0d382e78046623d53203d8436bad99
ssdeep 1536:+3Mz8oy284usnjFzuNXoaSTM98qKH5Fn:FwofxFK5oagMNO5F
imphash f104e80119f78ba5be523e1d9fb681d0
impfuzzy 96:nPjliR6viujULMjN9X19qmOPkfugkcRMx5EuU8DtKxFka:8k7x9FYuuvx5EuU8DQLP
  Network IP location

Signature (12cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 49 AntiVirus engines on VirusTotal as malicious
danger Disables Windows Security features
warning Generates some ICMP traffic
watch Attempts to remove evidence of file being downloaded from the Internet
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Modifies security center warnings
notice A process attempted to delay the analysis task.
notice Communication to multiple IPs on high port numbers possibly indicative of a peer-to-peer (P2P) or non-standard command and control protocol
notice Creates hidden or system file
info Checks if process is being debugged by a debugger

Rules (5cnts)

Level Name Description Collection
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (7cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
www.update.microsoft.com US MICROSOFT-CORP-MSN-AS-BLOCK 52.185.71.28 clean
217.30.163.6 UZ East Telecom 217.30.163.6 clean
89.236.216.4 UZ East Telecom 89.236.216.4 clean
46.41.210.169 IR Pars Online PJS 46.41.210.169 clean
178.253.102.214 SY Syrian Telecom 178.253.102.214 clean
52.137.90.34 US MICROSOFT-CORP-MSN-AS-BLOCK 52.137.90.34 clean
5.236.202.102 IR Iran Telecommunication Company PJS 5.236.202.102 clean

Suricata ids

PE API

IAT(Import Address Table) Library

WS2_32.dll
 0x40f204 recvfrom
 0x40f208 setsockopt
 0x40f20c sendto
 0x40f210 ind
 0x40f214 ioctlsocket
 0x40f218 WSAStartup
 0x40f21c send
 0x40f220 recv
 0x40f224 WSACloseEvent
 0x40f228 WSARecv
 0x40f22c WSASend
 0x40f230 WSAGetLastError
 0x40f234 gethostname
 0x40f238 connect
 0x40f23c inet_ntoa
 0x40f240 inet_addr
 0x40f244 htons
 0x40f248 getsockname
 0x40f24c shutdown
 0x40f250 socket
 0x40f254 closesocket
 0x40f258 gethostbyname
 0x40f25c WSAEnumNetworkEvents
 0x40f260 WSAEventSelect
 0x40f264 listen
 0x40f268 WSAWaitForMultipleEvents
 0x40f26c getpeername
 0x40f270 accept
 0x40f274 WSAGetOverlappedResult
 0x40f278 WSACreateEvent
 0x40f27c WSASocketA
SHLWAPI.dll
 0x40f160 PathFileExistsW
 0x40f164 StrCmpNW
 0x40f168 PathMatchSpecW
 0x40f16c PathFindFileNameW
 0x40f170 StrChrA
 0x40f174 StrStrIA
 0x40f178 StrCmpNIA
 0x40f17c StrStrW
urlmon.dll
 0x40f2e4 URLDownloadToFileW
WININET.dll
 0x40f1d8 InternetReadFile
 0x40f1dc InternetOpenUrlW
 0x40f1e0 InternetOpenW
 0x40f1e4 InternetCloseHandle
 0x40f1e8 InternetOpenA
 0x40f1ec HttpSendRequestA
 0x40f1f0 HttpAddRequestHeadersA
 0x40f1f4 HttpOpenRequestA
 0x40f1f8 InternetConnectA
 0x40f1fc InternetCrackUrlA
ntdll.dll
 0x40f294 memcpy
 0x40f298 _chkstk
 0x40f29c _aulldiv
 0x40f2a0 RtlUnwind
 0x40f2a4 mbstowcs
 0x40f2a8 RtlTimeToSecondsSince1980
 0x40f2ac NtQuerySystemTime
 0x40f2b0 NtQueryVirtualMemory
 0x40f2b4 memmove
 0x40f2b8 isdigit
 0x40f2bc isalpha
 0x40f2c0 _allshl
 0x40f2c4 _aullshr
 0x40f2c8 memset
msvcrt.dll
 0x40f284 rand
 0x40f288 srand
 0x40f28c _vscprintf
KERNEL32.dll
 0x40f028 GetLastError
 0x40f02c CreateProcessW
 0x40f030 GetLocaleInfoA
 0x40f034 DuplicateHandle
 0x40f038 DeleteCriticalSection
 0x40f03c GetThreadPriority
 0x40f040 SetThreadPriority
 0x40f044 GetCurrentThread
 0x40f048 GetCurrentProcess
 0x40f04c InterlockedExchangeAdd
 0x40f050 InterlockedIncrement
 0x40f054 InterlockedExchange
 0x40f058 WaitForSingleObject
 0x40f05c InterlockedDecrement
 0x40f060 GetCurrentProcessId
 0x40f064 HeapSetInformation
 0x40f068 GetSystemInfo
 0x40f06c PostQueuedCompletionStatus
 0x40f070 GetProcessHeaps
 0x40f074 HeapValidate
 0x40f078 HeapCreate
 0x40f07c HeapFree
 0x40f080 HeapAlloc
 0x40f084 HeapReAlloc
 0x40f088 ExpandEnvironmentStringsW
 0x40f08c CreateThread
 0x40f090 CreateMutexA
 0x40f094 CreateEventA
 0x40f098 ExitProcess
 0x40f09c GetQueuedCompletionStatus
 0x40f0a0 CreateIoCompletionPort
 0x40f0a4 SetEvent
 0x40f0a8 GetVolumeInformationW
 0x40f0ac SetFileAttributesW
 0x40f0b0 lstrcpyW
 0x40f0b4 DeleteFileW
 0x40f0b8 GetDiskFreeSpaceExW
 0x40f0bc FindNextFileW
 0x40f0c0 lstrcmpiW
 0x40f0c4 QueryDosDeviceW
 0x40f0c8 RemoveDirectoryW
 0x40f0cc lstrlenA
 0x40f0d0 GlobalLock
 0x40f0d4 GetModuleHandleW
 0x40f0d8 GetTickCount
 0x40f0dc GlobalAlloc
 0x40f0e0 Sleep
 0x40f0e4 lstrcpynW
 0x40f0e8 ExitThread
 0x40f0ec MultiByteToWideChar
 0x40f0f0 lstrlenW
 0x40f0f4 GlobalUnlock
 0x40f0f8 GetFileSize
 0x40f0fc MapViewOfFile
 0x40f100 UnmapViewOfFile
 0x40f104 WriteFile
 0x40f108 InitializeCriticalSection
 0x40f10c LeaveCriticalSection
 0x40f110 CreateFileW
 0x40f114 FlushFileBuffers
 0x40f118 EnterCriticalSection
 0x40f11c CreateFileMappingW
 0x40f120 CloseHandle
 0x40f124 FindFirstFileW
 0x40f128 GetDriveTypeW
 0x40f12c MoveFileExW
 0x40f130 CreateDirectoryW
 0x40f134 GetLogicalDrives
 0x40f138 CopyFileW
 0x40f13c GetModuleFileNameW
 0x40f140 lstrcmpW
 0x40f144 FindClose
USER32.dll
 0x40f184 RegisterClassExW
 0x40f188 TranslateMessage
 0x40f18c GetClipboardData
 0x40f190 EmptyClipboard
 0x40f194 ChangeClipboardChain
 0x40f198 SetWindowLongW
 0x40f19c DefWindowProcA
 0x40f1a0 wsprintfW
 0x40f1a4 SendMessageA
 0x40f1a8 IsClipboardFormatAvailable
 0x40f1ac CloseClipboard
 0x40f1b0 GetMessageA
 0x40f1b4 wvsprintfA
 0x40f1b8 GetWindowLongW
 0x40f1bc RegisterRawInputDevices
 0x40f1c0 CreateWindowExW
 0x40f1c4 DispatchMessageA
 0x40f1c8 OpenClipboard
 0x40f1cc SetClipboardData
 0x40f1d0 SetClipboardViewer
ADVAPI32.dll
 0x40f000 RegSetValueExW
 0x40f004 CryptGenRandom
 0x40f008 CryptReleaseContext
 0x40f00c CryptAcquireContextW
 0x40f010 RegQueryValueExW
 0x40f014 RegOpenKeyExA
 0x40f018 RegSetValueExA
 0x40f01c RegCloseKey
 0x40f020 RegOpenKeyExW
SHELL32.dll
 0x40f158 ShellExecuteW
ole32.dll
 0x40f2d0 CoInitializeEx
 0x40f2d4 CoCreateInstance
 0x40f2d8 CoInitialize
 0x40f2dc CoUninitialize
OLEAUT32.dll
 0x40f14c SysAllocString
 0x40f150 SysFreeString

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure