Report - updater.exe

UPX Malicious Library OS Processor Check PE64 PE File
ScreenShot
Created 2023.04.02 09:03 Machine s1_win7_x6403
Filename updater.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
3
Behavior Score
5.0
ZERO API file : malware
VT API (file) 34 detected (GenericKD, unsafe, malicious, confidence, Attribute, HighConfidence, moderate confidence, score, xavjgw, EPACK, Gen2, high, Generic Reputation PUA, Wacatac, Detected, Artemis, ai score=86, CLOUD, susgen, PossibleThreat)
md5 a04a12bd76283170bc83848686e4f946
sha256 13d6361137c3e50b65f6e7385e44e2a5bbcb435aea861112953579ec2230fd44
ssdeep 98304:vT72zCNeI+sjbIBNmJ1t2WJ8BJXzN9Bhvu4:vPb+sjbIXgUJXzN9Bhvu4
imphash 1f19b48b1743dc444330a51f961069d0
impfuzzy 24:U+2WDoeQtWOovbOGMUD1uBvgJWDGZWylnjBLPOXr07Gy46uu9PJUHYjg6:UDQoTx361GuZxJjBbO+GyvgHr6
  Network IP location

Signature (11cnts)

Level Description
danger File has been identified by 34 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Drops a binary and executes it
notice A process created a hidden window
notice Creates executable files on the filesystem
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (8cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (8cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://77.91.78.143/login.php RU Foton Telecom CJSC 77.91.78.143 clean
http://77.91.78.143/index.php?page=configurations&id=1 RU Foton Telecom CJSC 77.91.78.143 clean
http://77.91.78.143/api/endpoint.php RU Foton Telecom CJSC 77.91.78.143 clean
pool.hashvault.pro AU FireNet Pty Ltd 125.253.92.50 mailcious
xmr.2miners.com Unknown 162.19.139.184 mailcious
162.19.139.184 Unknown 162.19.139.184 clean
77.91.78.143 RU Foton Telecom CJSC 77.91.78.143 malware
131.153.76.130 SG PhoenixNAP 131.153.76.130 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140032450 CloseHandle
 0x140032458 CompareStringW
 0x140032460 CreateEventW
 0x140032468 CreateFileW
 0x140032470 DecodePointer
 0x140032478 DeleteCriticalSection
 0x140032480 EncodePointer
 0x140032488 EnterCriticalSection
 0x140032490 EnumSystemLocalesW
 0x140032498 ExitProcess
 0x1400324a0 FindClose
 0x1400324a8 FindFirstFileExW
 0x1400324b0 FindNextFileW
 0x1400324b8 FlushFileBuffers
 0x1400324c0 FreeConsole
 0x1400324c8 FreeEnvironmentStringsW
 0x1400324d0 FreeLibrary
 0x1400324d8 GetACP
 0x1400324e0 GetCPInfo
 0x1400324e8 GetCommandLineA
 0x1400324f0 GetCommandLineW
 0x1400324f8 GetConsoleMode
 0x140032500 GetConsoleOutputCP
 0x140032508 GetCurrentProcess
 0x140032510 GetCurrentProcessId
 0x140032518 GetCurrentThreadId
 0x140032520 GetEnvironmentStringsW
 0x140032528 GetFileSizeEx
 0x140032530 GetFileType
 0x140032538 GetLastError
 0x140032540 GetLocaleInfoW
 0x140032548 GetModuleFileNameW
 0x140032550 GetModuleHandleExW
 0x140032558 GetModuleHandleW
 0x140032560 GetOEMCP
 0x140032568 GetProcAddress
 0x140032570 GetProcessHeap
 0x140032578 GetStartupInfoW
 0x140032580 GetStdHandle
 0x140032588 GetStringTypeW
 0x140032590 GetSystemInfo
 0x140032598 GetSystemTimeAsFileTime
 0x1400325a0 GetUserDefaultLCID
 0x1400325a8 HeapAlloc
 0x1400325b0 HeapFree
 0x1400325b8 HeapReAlloc
 0x1400325c0 HeapSize
 0x1400325c8 InitializeCriticalSectionAndSpinCount
 0x1400325d0 InitializeCriticalSectionEx
 0x1400325d8 InitializeSListHead
 0x1400325e0 IsDebuggerPresent
 0x1400325e8 IsProcessorFeaturePresent
 0x1400325f0 IsValidCodePage
 0x1400325f8 IsValidLocale
 0x140032600 LCMapStringEx
 0x140032608 LCMapStringW
 0x140032610 LeaveCriticalSection
 0x140032618 LoadLibraryExW
 0x140032620 MultiByteToWideChar
 0x140032628 QueryPerformanceCounter
 0x140032630 RaiseException
 0x140032638 ReadConsoleW
 0x140032640 ReadFile
 0x140032648 ResetEvent
 0x140032650 RtlCaptureContext
 0x140032658 RtlLookupFunctionEntry
 0x140032660 RtlPcToFileHeader
 0x140032668 RtlUnwind
 0x140032670 RtlUnwindEx
 0x140032678 RtlVirtualUnwind
 0x140032680 SetCommBreak
 0x140032688 SetEndOfFile
 0x140032690 SetEnvironmentVariableW
 0x140032698 SetEvent
 0x1400326a0 SetFilePointerEx
 0x1400326a8 SetLastError
 0x1400326b0 SetStdHandle
 0x1400326b8 SetUnhandledExceptionFilter
 0x1400326c0 Sleep
 0x1400326c8 TerminateProcess
 0x1400326d0 TlsAlloc
 0x1400326d8 TlsFree
 0x1400326e0 TlsGetValue
 0x1400326e8 TlsSetValue
 0x1400326f0 UnhandledExceptionFilter
 0x1400326f8 WaitForSingleObjectEx
 0x140032700 WideCharToMultiByte
 0x140032708 WriteConsoleW
 0x140032710 WriteFile
SHELL32.dll
 0x140032720 ShellExecuteA
USER32.dll
 0x140032730 DdeQueryNextServer

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure