Report - tus.exe

Malicious Library UPX AntiDebug AntiVM PE File PE32 OS Processor Check
ScreenShot
Created 2023.10.26 10:23 Machine s1_win7_x6403
Filename tus.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
7.0
ZERO API
VT API (file) 32 detected (AIDetectMalware, 5yW@amESq5n, Pwsx, Smokeloader, malicious, confidence, Attribute, HighConfidence, high confidence, Kryptik, HUYH, score, Convagent, CLASSIC, Redline, Detected, Wacapew, Eldorado, ai score=89, Static AI, Suspicious PE, susgen, HUKQ, CrypterX)
md5 10a17abe9f1d739be062dfa9f1730298
sha256 1fed84f709df74d68b6b899c01698daad2266a433ec956ba1656ed791f3fe2c8
ssdeep 12288:BO6tSZ29AzVvWD+wVLZ5D4bzdKhvixnC7vuZf/60h6DPqY1R:Ba29AzVvWD+wVT4bzWKxG/q
imphash 0827946c9a1e10fe2b73e3062ee67b37
impfuzzy 48:Bi9scpVJxYWDWYMXtXOroGtXGzPpU63TuFZGVc:BiOcpVJxYWKHXtXUoGtXGTpUft
  Network IP location

Signature (13cnts)

Level Description
danger Executed a process and injected code into it
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Code injection by writing an executable or DLL to the memory of another process
watch Detects Avast Antivirus through the presence of a library
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice One or more potentially interesting buffers were extracted
notice Yara rule detected in process memory
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info This executable has a PDB path

Rules (13cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x4e2000 CloseHandle
 0x4e2004 WaitForSingleObjectEx
 0x4e2008 Sleep
 0x4e200c SwitchToThread
 0x4e2010 GetCurrentThreadId
 0x4e2014 GetExitCodeThread
 0x4e2018 GetNativeSystemInfo
 0x4e201c FormatMessageA
 0x4e2020 WideCharToMultiByte
 0x4e2024 MultiByteToWideChar
 0x4e2028 GetStringTypeW
 0x4e202c EnterCriticalSection
 0x4e2030 LeaveCriticalSection
 0x4e2034 InitializeCriticalSectionEx
 0x4e2038 DeleteCriticalSection
 0x4e203c QueryPerformanceCounter
 0x4e2040 QueryPerformanceFrequency
 0x4e2044 InitializeSRWLock
 0x4e2048 ReleaseSRWLockExclusive
 0x4e204c AcquireSRWLockExclusive
 0x4e2050 TryAcquireSRWLockExclusive
 0x4e2054 InitializeConditionVariable
 0x4e2058 WakeConditionVariable
 0x4e205c WakeAllConditionVariable
 0x4e2060 SleepConditionVariableSRW
 0x4e2064 LocalFree
 0x4e2068 GetLocaleInfoEx
 0x4e206c EncodePointer
 0x4e2070 DecodePointer
 0x4e2074 LCMapStringEx
 0x4e2078 SetFileInformationByHandle
 0x4e207c GetTempPathW
 0x4e2080 FlsAlloc
 0x4e2084 FlsGetValue
 0x4e2088 FlsSetValue
 0x4e208c FlsFree
 0x4e2090 InitOnceExecuteOnce
 0x4e2094 SleepConditionVariableCS
 0x4e2098 CreateEventExW
 0x4e209c CreateSemaphoreExW
 0x4e20a0 FlushProcessWriteBuffers
 0x4e20a4 GetCurrentProcessorNumber
 0x4e20a8 GetSystemTimeAsFileTime
 0x4e20ac GetTickCount64
 0x4e20b0 FreeLibraryWhenCallbackReturns
 0x4e20b4 CreateThreadpoolWork
 0x4e20b8 SubmitThreadpoolWork
 0x4e20bc CloseThreadpoolWork
 0x4e20c0 CreateThreadpoolTimer
 0x4e20c4 SetThreadpoolTimer
 0x4e20c8 WaitForThreadpoolTimerCallbacks
 0x4e20cc CloseThreadpoolTimer
 0x4e20d0 CreateThreadpoolWait
 0x4e20d4 SetThreadpoolWait
 0x4e20d8 CloseThreadpoolWait
 0x4e20dc GetModuleHandleW
 0x4e20e0 GetProcAddress
 0x4e20e4 GetFileInformationByHandleEx
 0x4e20e8 CreateSymbolicLinkW
 0x4e20ec CompareStringEx
 0x4e20f0 GetCPInfo
 0x4e20f4 IsProcessorFeaturePresent
 0x4e20f8 GetCurrentProcessId
 0x4e20fc InitializeSListHead
 0x4e2100 IsDebuggerPresent
 0x4e2104 UnhandledExceptionFilter
 0x4e2108 SetUnhandledExceptionFilter
 0x4e210c GetStartupInfoW
 0x4e2110 GetCurrentProcess
 0x4e2114 TerminateProcess
 0x4e2118 CreateFileW
 0x4e211c RaiseException
 0x4e2120 RtlUnwind
 0x4e2124 InterlockedPushEntrySList
 0x4e2128 InterlockedFlushSList
 0x4e212c GetLastError
 0x4e2130 SetLastError
 0x4e2134 InitializeCriticalSectionAndSpinCount
 0x4e2138 TlsAlloc
 0x4e213c TlsGetValue
 0x4e2140 TlsSetValue
 0x4e2144 TlsFree
 0x4e2148 FreeLibrary
 0x4e214c LoadLibraryExW
 0x4e2150 CreateThread
 0x4e2154 ExitThread
 0x4e2158 ResumeThread
 0x4e215c FreeLibraryAndExitThread
 0x4e2160 GetModuleHandleExW
 0x4e2164 GetStdHandle
 0x4e2168 WriteFile
 0x4e216c GetModuleFileNameW
 0x4e2170 ExitProcess
 0x4e2174 GetCommandLineA
 0x4e2178 GetCommandLineW
 0x4e217c GetCurrentThread
 0x4e2180 HeapAlloc
 0x4e2184 HeapFree
 0x4e2188 GetDateFormatW
 0x4e218c GetTimeFormatW
 0x4e2190 CompareStringW
 0x4e2194 LCMapStringW
 0x4e2198 GetLocaleInfoW
 0x4e219c IsValidLocale
 0x4e21a0 GetUserDefaultLCID
 0x4e21a4 EnumSystemLocalesW
 0x4e21a8 GetFileType
 0x4e21ac SetConsoleCtrlHandler
 0x4e21b0 FlushFileBuffers
 0x4e21b4 GetConsoleOutputCP
 0x4e21b8 GetConsoleMode
 0x4e21bc ReadFile
 0x4e21c0 GetFileSizeEx
 0x4e21c4 SetFilePointerEx
 0x4e21c8 ReadConsoleW
 0x4e21cc HeapReAlloc
 0x4e21d0 GetTimeZoneInformation
 0x4e21d4 OutputDebugStringW
 0x4e21d8 FindClose
 0x4e21dc FindFirstFileExW
 0x4e21e0 FindNextFileW
 0x4e21e4 IsValidCodePage
 0x4e21e8 GetACP
 0x4e21ec GetOEMCP
 0x4e21f0 GetEnvironmentStringsW
 0x4e21f4 FreeEnvironmentStringsW
 0x4e21f8 SetEnvironmentVariableW
 0x4e21fc SetStdHandle
 0x4e2200 GetProcessHeap
 0x4e2204 HeapSize
 0x4e2208 WriteConsoleW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure