Report - Updatе.exe

Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check
ScreenShot
Created 2023.11.21 18:18 Machine s1_win7_x6402
Filename Updatе.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
7
Behavior Score
1.8
ZERO API file : clean
VT API (file) 33 detected (AIDetectMalware, Stealerc, Save, malicious, confidence, Attribute, HighConfidence, high confidence, score, LUMMASTEALER, YXDKTZ, high, Static AI, Malicious PE, ABRisk, LIET, Leonem, Detected, Artemis, BScope, Wirenet, unsafe, Chgt, Generic@AI, RDML, MifeMdidFMWS9qAo3Wk8iw, susgen, PossibleThreat, ZexaF, RqW@auLEUL)
md5 3f6d2aa85fcd8e38412f4ab60f8f47f4
sha256 3eb644492c55f3afab73d0b9842a835d67ccf35c46767d45ae7d2e78fc96d7e5
ssdeep 12288:R1nGfvqfcZCnVsUonX/hNKo1FdsJt2m2Nl1KsHBMIDG4LcykS/xXn8SUtbR+i:RrcZ0VGnPnveJxwl1uu/9/xXn8b4
imphash 411d07b56145caf2dc98484203a9ed7b
impfuzzy 24:DAIJFiqqlxaLDonztP1GMndlJeDc+pl7LoEOovbOrRZHu93vB3l1:0IJFfqlxDztP1xic+pBc3gBV1
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x423130 TranslateMessage
 0x423134 KillTimer
 0x423138 DispatchMessageW
 0x42313c GetMessageW
 0x423140 SetTimer
KERNEL32.dll
 0x423000 FreeLibrary
 0x423004 WriteConsoleW
 0x423008 CloseHandle
 0x42300c CreateFileW
 0x423010 GetDiskFreeSpaceExA
 0x423014 QueryPerformanceCounter
 0x423018 QueryPerformanceFrequency
 0x42301c HeapAlloc
 0x423020 HeapFree
 0x423024 GetCurrentProcess
 0x423028 GetSystemTime
 0x42302c GetLocalTime
 0x423030 VirtualProtect
 0x423034 GetModuleHandleA
 0x423038 GetProcAddress
 0x42303c LoadLibraryA
 0x423040 lstrcmpA
 0x423044 lstrlenA
 0x423048 FreeConsole
 0x42304c UnhandledExceptionFilter
 0x423050 SetUnhandledExceptionFilter
 0x423054 TerminateProcess
 0x423058 IsProcessorFeaturePresent
 0x42305c GetCurrentProcessId
 0x423060 GetCurrentThreadId
 0x423064 GetSystemTimeAsFileTime
 0x423068 InitializeSListHead
 0x42306c IsDebuggerPresent
 0x423070 GetStartupInfoW
 0x423074 GetModuleHandleW
 0x423078 SetFilePointerEx
 0x42307c GetConsoleMode
 0x423080 RaiseException
 0x423084 GetLastError
 0x423088 SetLastError
 0x42308c EncodePointer
 0x423090 EnterCriticalSection
 0x423094 LeaveCriticalSection
 0x423098 DeleteCriticalSection
 0x42309c InitializeCriticalSectionAndSpinCount
 0x4230a0 TlsAlloc
 0x4230a4 TlsGetValue
 0x4230a8 TlsSetValue
 0x4230ac TlsFree
 0x4230b0 DecodePointer
 0x4230b4 LoadLibraryExW
 0x4230b8 GetStdHandle
 0x4230bc WriteFile
 0x4230c0 GetModuleFileNameW
 0x4230c4 ExitProcess
 0x4230c8 GetModuleHandleExW
 0x4230cc GetCommandLineA
 0x4230d0 GetCommandLineW
 0x4230d4 FindClose
 0x4230d8 FindFirstFileExW
 0x4230dc FindNextFileW
 0x4230e0 IsValidCodePage
 0x4230e4 GetACP
 0x4230e8 GetOEMCP
 0x4230ec GetCPInfo
 0x4230f0 MultiByteToWideChar
 0x4230f4 WideCharToMultiByte
 0x4230f8 GetEnvironmentStringsW
 0x4230fc FreeEnvironmentStringsW
 0x423100 SetEnvironmentVariableW
 0x423104 SetStdHandle
 0x423108 GetFileType
 0x42310c GetStringTypeW
 0x423110 CompareStringW
 0x423114 LCMapStringW
 0x423118 GetProcessHeap
 0x42311c HeapSize
 0x423120 HeapReAlloc
 0x423124 FlushFileBuffers
 0x423128 GetConsoleOutputCP
ntdll.dll
 0x423148 RtlUnwind

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure