Report - installs.exe

Malicious Library PE File PE32
ScreenShot
Created 2023.09.30 13:09 Machine s1_win7_x6401
Filename installs.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
5
Behavior Score
7.8
ZERO API file : clean
VT API (file) 54 detected (AIDetectMalware, malicious, high confidence, GenericKD, RedLineStealer, Save, Genus, Kryptik, Eldorado, Attribute, HighConfidence, VMProtect, AU suspicious, score, evmc, PWSX, FalseSign, Swhl, sxywh, Packed2, REDLINE, USPAXIS23, Artemis, high, Static AI, Malicious PE, ApplicUnwnt@#wt3dnbz8muwf, Detected, ai score=89, BScope, TrojanPSW, unsafe, Chgt, Generic@AI, RDML, JBGBBVhRb5OnPWTAYF8bsQ, susgen, ZexaF, @RY@aS1@pxci)
md5 0508858aafafa001652f27d51ed4872b
sha256 2b159c6931ed9c1687fbbf393f91514bdb88303f1ebda6b811892faa443f3cd3
ssdeep 98304:fzqKcOaPwmZKAO0Cin1VvuJi0Q4vu7ZxI3Jyuq+L/Y:fSH1ESZxEUuq+L/Y
imphash d05c4856bcec3de7a93f93043e1eeb39
impfuzzy 24:CNDorjjYgfPOovnKQFQ8RyvDh/J3ISlRT47mfpl/qT+dNDW:t+EK3Djhc7mfp5qKa
  Network IP location

Signature (19cnts)

Level Description
danger File has been identified by 54 AntiVirus engines on VirusTotal as malicious
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Executes one or more WMI queries
watch Harvests credentials from local FTP client softwares
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Executes one or more WMI queries which can be used to identify virtual machines
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
77.91.124.151 RU Foton Telecom CJSC 77.91.124.151 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x627000 Sleep
 0x627004 CreateThread
 0x627008 lstrlenW
 0x62700c VirtualProtect
 0x627010 GetProcAddress
 0x627014 LoadLibraryA
 0x627018 VirtualAlloc
 0x62701c LockResource
 0x627020 WaitForSingleObject
 0x627024 SizeofResource
 0x627028 FindResourceW
 0x62702c GetModuleHandleW
 0x627030 GetLastError
 0x627034 CreateMutexA
 0x627038 GetModuleHandleA
 0x62703c EnumTimeFormatsW
 0x627040 FreeConsole
 0x627044 LoadResource
 0x627048 MoveFileA
 0x62704c GetCommandLineA
 0x627050 SetUnhandledExceptionFilter
 0x627054 ExitProcess
 0x627058 WriteFile
 0x62705c GetStdHandle
 0x627060 GetModuleFileNameA
 0x627064 FreeEnvironmentStringsA
 0x627068 GetEnvironmentStrings
 0x62706c FreeEnvironmentStringsW
 0x627070 WideCharToMultiByte
 0x627074 GetEnvironmentStringsW
 0x627078 SetHandleCount
 0x62707c GetFileType
 0x627080 GetStartupInfoA
 0x627084 DeleteCriticalSection
 0x627088 TlsGetValue
 0x62708c TlsAlloc
 0x627090 TlsSetValue
 0x627094 TlsFree
 0x627098 InterlockedIncrement
 0x62709c SetLastError
 0x6270a0 GetCurrentThreadId
 0x6270a4 InterlockedDecrement
 0x6270a8 HeapCreate
 0x6270ac VirtualFree
 0x6270b0 HeapFree
 0x6270b4 QueryPerformanceCounter
 0x6270b8 GetTickCount
 0x6270bc GetCurrentProcessId
 0x6270c0 GetSystemTimeAsFileTime
 0x6270c4 GetCPInfo
 0x6270c8 GetACP
 0x6270cc GetOEMCP
 0x6270d0 IsValidCodePage
 0x6270d4 TerminateProcess
 0x6270d8 GetCurrentProcess
 0x6270dc UnhandledExceptionFilter
 0x6270e0 IsDebuggerPresent
 0x6270e4 LeaveCriticalSection
 0x6270e8 EnterCriticalSection
 0x6270ec InitializeCriticalSectionAndSpinCount
 0x6270f0 HeapAlloc
 0x6270f4 HeapReAlloc
 0x6270f8 RtlUnwind
 0x6270fc LCMapStringA
 0x627100 MultiByteToWideChar
 0x627104 LCMapStringW
 0x627108 GetStringTypeA
 0x62710c GetStringTypeW
 0x627110 GetLocaleInfoA
 0x627114 HeapSize
ADVAPI32.dll
 0x62711c RegDeleteKeyA
KERNEL32.dll
 0x627124 LocalAlloc
 0x627128 LocalFree
 0x62712c GetModuleFileNameW
 0x627130 ExitProcess
 0x627134 LoadLibraryA
 0x627138 GetModuleHandleA
 0x62713c GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure