Report - installer.exe

Gen2 Generic Malware UPX Antivirus Malicious Library Malicious Packer OS Processor Check PE32 PE File DLL MSOffice File
ScreenShot
Created 2023.04.24 09:03 Machine s1_win7_x6403
Filename installer.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
8.8
ZERO API file : malware
VT API (file) 41 detected (Microleaves, GenericKD, Artemis, ABRisk, NACY, Malicious, score, Proxy, OnlineGuard, jrqmwz, Redcap, eotnr, high, Generic Reputation PUA, Malware@#2se21unwb8xl9, Mamson, Detected, ai score=100, unsafe, R04AH07EI22, CLOUD, susgen, PossibleThreat)
md5 fa24733f5a6a6f44d0e65d7d98b84aa6
sha256 da1b144b5f908cb7e811489dfe660e06aa6df9c9158c6972ec9c79c48afacb7e
ssdeep 98304:5YoIz3Q2HM5Qp4WzMIaX8/BG6v/gIV0sba5mFkDzLb:5i3QDCpQaJGkDegFwL
imphash 7c194251e86188363a60c4bd78b0d506
impfuzzy 48:JOscSpvEdJsQPbRioE9pwUwrkrXa9xvBrbYUrUvZk7O:JrcSpvEdJsQPYvzPwrkrgxv58UrWD
  Network IP location

Signature (21cnts)

Level Description
danger File has been identified by 41 AntiVirus engines on VirusTotal as malicious
watch Attempts to create or modify system certificates
watch Deletes executed files from disk
watch Disables proxy possibly for traffic interception
watch One or more of the buffers contains an embedded PE file
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Sends data using the HTTP POST Method
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (18cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (7cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://cacerts.digicert.com/DigiCertGlobalRootG3.crt US EDGECAST 152.195.38.76 clean
http://cacerts.digicert.com/DigiCertTrustedRootG4.crt US EDGECAST 152.195.38.76 clean
https://collect.installeranalytics.com/ US AMAZON-AES 54.204.22.198 clean
collect.installeranalytics.com US AMAZON-AES 54.204.22.198 clean
cacerts.digicert.com US EDGECAST 152.195.38.76 clean
152.195.38.76 US EDGECAST 152.195.38.76 clean
54.204.22.198 US AMAZON-AES 54.204.22.198 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x61c000 CreateFileW
 0x61c004 CloseHandle
 0x61c008 WriteFile
 0x61c00c DeleteFileW
 0x61c010 HeapDestroy
 0x61c014 HeapSize
 0x61c018 HeapReAlloc
 0x61c01c HeapFree
 0x61c020 HeapAlloc
 0x61c024 GetProcessHeap
 0x61c028 SizeofResource
 0x61c02c LockResource
 0x61c030 LoadResource
 0x61c034 FindResourceW
 0x61c038 FindResourceExW
 0x61c03c SetEvent
 0x61c040 CreateEventExW
 0x61c044 WaitForSingleObject
 0x61c048 RemoveDirectoryW
 0x61c04c GetTempPathW
 0x61c050 GetTempFileNameW
 0x61c054 CreateDirectoryW
 0x61c058 MoveFileW
 0x61c05c GetLastError
 0x61c060 EnterCriticalSection
 0x61c064 LeaveCriticalSection
 0x61c068 GetModuleFileNameW
 0x61c06c DeleteCriticalSection
 0x61c070 InitializeCriticalSectionAndSpinCount
 0x61c074 GetCurrentThreadId
 0x61c078 RaiseException
 0x61c07c SetLastError
 0x61c080 GlobalUnlock
 0x61c084 GlobalLock
 0x61c088 GlobalAlloc
 0x61c08c MulDiv
 0x61c090 lstrcmpW
 0x61c094 CreateEventW
 0x61c098 FindClose
 0x61c09c FindFirstFileW
 0x61c0a0 GetFullPathNameW
 0x61c0a4 InitializeCriticalSection
 0x61c0a8 lstrcpynW
 0x61c0ac CreateThread
 0x61c0b0 GetProcAddress
 0x61c0b4 LoadLibraryExW
 0x61c0b8 GetCurrentProcess
 0x61c0bc Sleep
 0x61c0c0 WideCharToMultiByte
 0x61c0c4 GetDiskFreeSpaceExW
 0x61c0c8 DecodePointer
 0x61c0cc GetExitCodeThread
 0x61c0d0 GetCurrentProcessId
 0x61c0d4 FreeLibrary
 0x61c0d8 GetSystemDirectoryW
 0x61c0dc lstrlenW
 0x61c0e0 VerifyVersionInfoW
 0x61c0e4 VerSetConditionMask
 0x61c0e8 lstrcmpiW
 0x61c0ec GetModuleHandleW
 0x61c0f0 LoadLibraryW
 0x61c0f4 GetDriveTypeW
 0x61c0f8 CompareStringW
 0x61c0fc FindNextFileW
 0x61c100 GetLogicalDriveStringsW
 0x61c104 GetFileSize
 0x61c108 GetFileAttributesW
 0x61c10c GetShortPathNameW
 0x61c110 SetFileAttributesW
 0x61c114 GetFileTime
 0x61c118 CopyFileW
 0x61c11c ReadFile
 0x61c120 SetFilePointer
 0x61c124 SystemTimeToFileTime
 0x61c128 MultiByteToWideChar
 0x61c12c GetSystemInfo
 0x61c130 WaitForMultipleObjects
 0x61c134 VirtualProtect
 0x61c138 VirtualQuery
 0x61c13c LoadLibraryExA
 0x61c140 GetStringTypeW
 0x61c144 SetUnhandledExceptionFilter
 0x61c148 FileTimeToSystemTime
 0x61c14c GetEnvironmentVariableW
 0x61c150 GetSystemTime
 0x61c154 GetDateFormatW
 0x61c158 GetTimeFormatW
 0x61c15c GetLocaleInfoW
 0x61c160 CreateProcessW
 0x61c164 GetExitCodeProcess
 0x61c168 GetWindowsDirectoryW
 0x61c16c CreateToolhelp32Snapshot
 0x61c170 Process32FirstW
 0x61c174 Process32NextW
 0x61c178 FormatMessageW
 0x61c17c GetEnvironmentStringsW
 0x61c180 LocalFree
 0x61c184 InitializeCriticalSectionEx
 0x61c188 LoadLibraryA
 0x61c18c GetModuleFileNameA
 0x61c190 GetCurrentThread
 0x61c194 GetConsoleOutputCP
 0x61c198 FlushFileBuffers
 0x61c19c Wow64DisableWow64FsRedirection
 0x61c1a0 Wow64RevertWow64FsRedirection
 0x61c1a4 IsWow64Process
 0x61c1a8 SetConsoleTextAttribute
 0x61c1ac GetStdHandle
 0x61c1b0 GetConsoleScreenBufferInfo
 0x61c1b4 OutputDebugStringW
 0x61c1b8 GetTickCount
 0x61c1bc GetCommandLineW
 0x61c1c0 SetCurrentDirectoryW
 0x61c1c4 SetEndOfFile
 0x61c1c8 EnumResourceLanguagesW
 0x61c1cc GetSystemDefaultLangID
 0x61c1d0 GetUserDefaultLangID
 0x61c1d4 GetLocalTime
 0x61c1d8 ResetEvent
 0x61c1dc GlobalFree
 0x61c1e0 GetPrivateProfileStringW
 0x61c1e4 GetPrivateProfileSectionNamesW
 0x61c1e8 WritePrivateProfileStringW
 0x61c1ec CreateNamedPipeW
 0x61c1f0 ConnectNamedPipe
 0x61c1f4 TerminateThread
 0x61c1f8 LocalAlloc
 0x61c1fc CompareFileTime
 0x61c200 CopyFileExW
 0x61c204 OpenEventW
 0x61c208 PeekNamedPipe
 0x61c20c WaitForSingleObjectEx
 0x61c210 QueryPerformanceCounter
 0x61c214 QueryPerformanceFrequency
 0x61c218 EncodePointer
 0x61c21c LCMapStringEx
 0x61c220 GetSystemTimeAsFileTime
 0x61c224 CompareStringEx
 0x61c228 GetCPInfo
 0x61c22c IsDebuggerPresent
 0x61c230 InitializeSListHead
 0x61c234 InterlockedPopEntrySList
 0x61c238 InterlockedPushEntrySList
 0x61c23c FlushInstructionCache
 0x61c240 IsProcessorFeaturePresent
 0x61c244 VirtualAlloc
 0x61c248 VirtualFree
 0x61c24c UnhandledExceptionFilter
 0x61c250 TerminateProcess
 0x61c254 GetStartupInfoW
 0x61c258 RtlUnwind
 0x61c25c TlsAlloc
 0x61c260 TlsGetValue
 0x61c264 TlsSetValue
 0x61c268 TlsFree
 0x61c26c ExitThread
 0x61c270 FreeLibraryAndExitThread
 0x61c274 GetModuleHandleExW
 0x61c278 ExitProcess
 0x61c27c GetFileType
 0x61c280 LCMapStringW
 0x61c284 IsValidLocale
 0x61c288 GetUserDefaultLCID
 0x61c28c EnumSystemLocalesW
 0x61c290 GetTimeZoneInformation
 0x61c294 GetConsoleMode
 0x61c298 GetFileSizeEx
 0x61c29c SetFilePointerEx
 0x61c2a0 FindFirstFileExW
 0x61c2a4 IsValidCodePage
 0x61c2a8 GetACP
 0x61c2ac GetOEMCP
 0x61c2b0 GetCommandLineA
 0x61c2b4 FreeEnvironmentStringsW
 0x61c2b8 SetEnvironmentVariableW
 0x61c2bc SetStdHandle
 0x61c2c0 ReadConsoleW
 0x61c2c4 WriteConsoleW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure