Report - TeamViewerSetupx64.exe

Gen2 Malicious Library Malicious Packer UPX Antivirus OS Processor Check PE File PE64
ScreenShot
Created 2022.12.12 11:23 Machine s1_win7_x6401
Filename TeamViewerSetupx64.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
1
Behavior Score
3.2
ZERO API file : malware
VT API (file) 21 detected (malicious, moderate confidence, Unsafe, HackTool, Knotweed, GenKryptik, GDKI, score, FileRepMalware, Zfow, AMADEY, YXCLJZ, Artemis, skrmp, Wacatac, Phonzy, Detected, Kryptik, CLOUD, Krypt, Behavior)
md5 852011cf885e76c0441dd52fdd280db7
sha256 fc63bd7f4da2050fcad7913c2dc9ca8bd9c263a47f65dad973891c4a000a444e
ssdeep 12288:Rp6xvNQQteTpwobuR00rCSE8czRRD2KXSW5tYMM87hGR9/3TG6LnjDqa2+rr3Aro:RpMaIeuKuR0ICSE8y7DV5lM8CuEkm
imphash 2f2396f66357714ff16f3f90599a1b03
impfuzzy 24:nDLHAzGUzXo0qtpcKg3Jnc+pl39/YoEOovbOJKURZHu93vFZRXudTxGMBJMud2VZ:3sG8XYtpcKgxc+ppuc3SFZ1un5mZ
  Network IP location

Signature (7cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
watch Creates known TeamViewer mutexes and/or registry changes.
watch Creates or sets a registry key to a long series of bytes
watch Stores an executable in the registry
info Collects information to fingerprint the system (MachineGuid
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (8cnts)

Level Name Description Collection
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1400d0028 GetWindowsDirectoryW
 0x1400d0030 GetProcAddress
 0x1400d0038 CloseHandle
 0x1400d0040 GetCurrentProcessId
 0x1400d0048 GetModuleHandleW
 0x1400d0050 WriteConsoleW
 0x1400d0058 GetLastError
 0x1400d0060 Sleep
 0x1400d0068 OpenProcess
 0x1400d0070 ReadProcessMemory
 0x1400d0078 GetModuleFileNameW
 0x1400d0080 CreateFileW
 0x1400d0088 ReadConsoleW
 0x1400d0090 ReadFile
 0x1400d0098 SetFilePointerEx
 0x1400d00a0 QueryPerformanceCounter
 0x1400d00a8 GetCurrentThreadId
 0x1400d00b0 GetSystemTimeAsFileTime
 0x1400d00b8 InitializeSListHead
 0x1400d00c0 RtlCaptureContext
 0x1400d00c8 RtlLookupFunctionEntry
 0x1400d00d0 RtlVirtualUnwind
 0x1400d00d8 IsDebuggerPresent
 0x1400d00e0 UnhandledExceptionFilter
 0x1400d00e8 SetUnhandledExceptionFilter
 0x1400d00f0 GetStartupInfoW
 0x1400d00f8 IsProcessorFeaturePresent
 0x1400d0100 GetCurrentProcess
 0x1400d0108 TerminateProcess
 0x1400d0110 RtlUnwindEx
 0x1400d0118 InterlockedPushEntrySList
 0x1400d0120 InterlockedFlushSList
 0x1400d0128 RtlPcToFileHeader
 0x1400d0130 RaiseException
 0x1400d0138 SetLastError
 0x1400d0140 EnterCriticalSection
 0x1400d0148 LeaveCriticalSection
 0x1400d0150 DeleteCriticalSection
 0x1400d0158 InitializeCriticalSectionAndSpinCount
 0x1400d0160 TlsAlloc
 0x1400d0168 TlsGetValue
 0x1400d0170 TlsSetValue
 0x1400d0178 TlsFree
 0x1400d0180 FreeLibrary
 0x1400d0188 LoadLibraryExW
 0x1400d0190 EncodePointer
 0x1400d0198 GetStdHandle
 0x1400d01a0 WriteFile
 0x1400d01a8 ExitProcess
 0x1400d01b0 GetModuleHandleExW
 0x1400d01b8 GetCommandLineA
 0x1400d01c0 GetCommandLineW
 0x1400d01c8 GetCurrentThread
 0x1400d01d0 HeapAlloc
 0x1400d01d8 OutputDebugStringW
 0x1400d01e0 HeapFree
 0x1400d01e8 FindClose
 0x1400d01f0 FindFirstFileExW
 0x1400d01f8 FindNextFileW
 0x1400d0200 IsValidCodePage
 0x1400d0208 GetACP
 0x1400d0210 GetOEMCP
 0x1400d0218 GetCPInfo
 0x1400d0220 MultiByteToWideChar
 0x1400d0228 WideCharToMultiByte
 0x1400d0230 GetEnvironmentStringsW
 0x1400d0238 FreeEnvironmentStringsW
 0x1400d0240 SetEnvironmentVariableW
 0x1400d0248 SetStdHandle
 0x1400d0250 GetFileType
 0x1400d0258 GetStringTypeW
 0x1400d0260 GetLocaleInfoW
 0x1400d0268 IsValidLocale
 0x1400d0270 GetUserDefaultLCID
 0x1400d0278 EnumSystemLocalesW
 0x1400d0280 FlsAlloc
 0x1400d0288 FlsGetValue
 0x1400d0290 FlsSetValue
 0x1400d0298 FlsFree
 0x1400d02a0 GetDateFormatW
 0x1400d02a8 GetTimeFormatW
 0x1400d02b0 CompareStringW
 0x1400d02b8 LCMapStringW
 0x1400d02c0 GetProcessHeap
 0x1400d02c8 SetConsoleCtrlHandler
 0x1400d02d0 HeapSize
 0x1400d02d8 HeapReAlloc
 0x1400d02e0 FlushFileBuffers
 0x1400d02e8 GetConsoleOutputCP
 0x1400d02f0 GetConsoleMode
 0x1400d02f8 GetFileSizeEx
 0x1400d0300 RtlUnwind
ADVAPI32.dll
 0x1400d0000 RegCloseKey
 0x1400d0008 RegSetValueExA
 0x1400d0010 RegOpenKeyExA
 0x1400d0018 RegCreateKeyA
ole32.dll
 0x1400d0310 CoUninitialize
 0x1400d0318 CoInitializeEx
 0x1400d0320 CoGetObject

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure