Report - Setup.exe

Malicious Library UPX PWS SMTP AntiDebug AntiVM PE File PE32 OS Processor Check
ScreenShot
Created 2023.10.04 07:42 Machine s1_win7_x6401
Filename Setup.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
3
Behavior Score
9.8
ZERO API file : malware
VT API (file) 24 detected (AIDetectMalware, Lazy, Attribute, HighConfidence, malicious, high confidence, score, Stealerc, SpywareX, ai score=87, Sabsik, Detected, BScope, TrojanPSW, Convagent, Genetic, SmokeLoader, CLASSIC, Krypt)
md5 46a22f0849344f152364d921c3c28435
sha256 1041ffa7fe11147bca657c7f9b58b76a63fab9bedd01e37726e7a5f9df72aed2
ssdeep 24576:WwzT5gWn2HsJRx/6a9DhvhSCPhwtzZc7m6fgA7:dx/6a3vtqtu7m6
imphash 0019c5cc9dc02122ed11385f5bfdf094
impfuzzy 48:sghfBfWDz99rxHRyXtXFc+p5t8dz2Qo3ruFZGf:ZfBfWnDrxHMXtXFc+p5t8dqQ/c
  Network IP location

Signature (20cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
danger Executed a process and injected code into it
warning File has been identified by 24 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Code injection by writing an executable or DLL to the memory of another process
watch Communicates with host for which no DNS query was performed
watch Manipulates memory of a non-child process indicative of process injection
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice Terminates another process
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (15cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice Generic_PWS_Memory_Zero PWS Memory memory
notice Network_SMTP_dotNet Communications smtp memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.149.146.17 LU Foton Telecom CJSC 185.149.146.17 clean

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x5a82e4 GetClipCursor
ole32.dll
 0x5a8314 CoGetApartmentType
 0x5a8318 CoGetObjectContext
ADVAPI32.dll
 0x5a8000 RegDisablePredefinedCacheEx
KERNEL32.dll
 0x5a8030 ReadConsoleW
 0x5a8034 ReadFile
 0x5a8038 CreateFileW
 0x5a803c WriteConsoleW
 0x5a8040 CreateEventW
 0x5a8044 FreeConsole
 0x5a8048 RaiseException
 0x5a804c CloseHandle
 0x5a8050 WaitForSingleObjectEx
 0x5a8054 Sleep
 0x5a8058 SwitchToThread
 0x5a805c GetCurrentThreadId
 0x5a8060 GetExitCodeThread
 0x5a8064 GetNativeSystemInfo
 0x5a8068 InitializeSRWLock
 0x5a806c ReleaseSRWLockExclusive
 0x5a8070 AcquireSRWLockExclusive
 0x5a8074 TryAcquireSRWLockExclusive
 0x5a8078 InitializeConditionVariable
 0x5a807c WakeConditionVariable
 0x5a8080 WakeAllConditionVariable
 0x5a8084 SleepConditionVariableSRW
 0x5a8088 FormatMessageA
 0x5a808c InitOnceBeginInitialize
 0x5a8090 InitOnceComplete
 0x5a8094 GetLastError
 0x5a8098 FreeLibraryWhenCallbackReturns
 0x5a809c CreateThreadpoolWork
 0x5a80a0 SubmitThreadpoolWork
 0x5a80a4 CloseThreadpoolWork
 0x5a80a8 GetModuleHandleExW
 0x5a80ac RtlCaptureStackBackTrace
 0x5a80b0 IsProcessorFeaturePresent
 0x5a80b4 QueryPerformanceCounter
 0x5a80b8 QueryPerformanceFrequency
 0x5a80bc LocalFree
 0x5a80c0 GetLocaleInfoEx
 0x5a80c4 SetFileInformationByHandle
 0x5a80c8 GetTempPathW
 0x5a80cc FlsAlloc
 0x5a80d0 FlsGetValue
 0x5a80d4 FlsSetValue
 0x5a80d8 FlsFree
 0x5a80dc InitializeCriticalSectionEx
 0x5a80e0 InitOnceExecuteOnce
 0x5a80e4 SleepConditionVariableCS
 0x5a80e8 CreateEventExW
 0x5a80ec CreateSemaphoreExW
 0x5a80f0 FlushProcessWriteBuffers
 0x5a80f4 GetCurrentProcessorNumber
 0x5a80f8 GetSystemTimeAsFileTime
 0x5a80fc GetTickCount64
 0x5a8100 CreateThreadpoolTimer
 0x5a8104 SetThreadpoolTimer
 0x5a8108 WaitForThreadpoolTimerCallbacks
 0x5a810c CloseThreadpoolTimer
 0x5a8110 CreateThreadpoolWait
 0x5a8114 SetThreadpoolWait
 0x5a8118 CloseThreadpoolWait
 0x5a811c GetModuleHandleW
 0x5a8120 GetProcAddress
 0x5a8124 GetFileInformationByHandleEx
 0x5a8128 CreateSymbolicLinkW
 0x5a812c EnterCriticalSection
 0x5a8130 LeaveCriticalSection
 0x5a8134 DeleteCriticalSection
 0x5a8138 InitializeCriticalSectionAndSpinCount
 0x5a813c SetEvent
 0x5a8140 ResetEvent
 0x5a8144 DecodePointer
 0x5a8148 IsDebuggerPresent
 0x5a814c UnhandledExceptionFilter
 0x5a8150 SetUnhandledExceptionFilter
 0x5a8154 GetStartupInfoW
 0x5a8158 GetCurrentProcess
 0x5a815c TerminateProcess
 0x5a8160 GetCurrentProcessId
 0x5a8164 InitializeSListHead
 0x5a8168 HeapReAlloc
 0x5a816c RtlUnwind
 0x5a8170 InterlockedPushEntrySList
 0x5a8174 InterlockedFlushSList
 0x5a8178 SetLastError
 0x5a817c EncodePointer
 0x5a8180 TlsAlloc
 0x5a8184 TlsGetValue
 0x5a8188 TlsSetValue
 0x5a818c TlsFree
 0x5a8190 FreeLibrary
 0x5a8194 LoadLibraryExW
 0x5a8198 CreateThread
 0x5a819c ExitThread
 0x5a81a0 ResumeThread
 0x5a81a4 FreeLibraryAndExitThread
 0x5a81a8 ExitProcess
 0x5a81ac GetModuleFileNameW
 0x5a81b0 GetStdHandle
 0x5a81b4 WriteFile
 0x5a81b8 GetCommandLineA
 0x5a81bc GetCommandLineW
 0x5a81c0 GetCurrentThread
 0x5a81c4 SetConsoleCtrlHandler
 0x5a81c8 HeapAlloc
 0x5a81cc HeapFree
 0x5a81d0 GetDateFormatW
 0x5a81d4 GetTimeFormatW
 0x5a81d8 CompareStringW
 0x5a81dc LCMapStringW
 0x5a81e0 GetLocaleInfoW
 0x5a81e4 IsValidLocale
 0x5a81e8 GetUserDefaultLCID
 0x5a81ec EnumSystemLocalesW
 0x5a81f0 GetFileType
 0x5a81f4 GetFileSizeEx
 0x5a81f8 SetFilePointerEx
 0x5a81fc FindClose
 0x5a8200 FindFirstFileExW
 0x5a8204 FindNextFileW
 0x5a8208 IsValidCodePage
 0x5a820c GetACP
 0x5a8210 GetOEMCP
 0x5a8214 GetCPInfo
 0x5a8218 MultiByteToWideChar
 0x5a821c WideCharToMultiByte
 0x5a8220 GetEnvironmentStringsW
 0x5a8224 FreeEnvironmentStringsW
 0x5a8228 SetEnvironmentVariableW
 0x5a822c GetProcessHeap
 0x5a8230 OutputDebugStringW
 0x5a8234 SetStdHandle
 0x5a8238 GetStringTypeW
 0x5a823c FlushFileBuffers
 0x5a8240 GetConsoleOutputCP
 0x5a8244 GetConsoleMode
 0x5a8248 HeapSize

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure