Report - setup294.exe

Malicious Library AntiDebug AntiVM PE32 PE File DLL
ScreenShot
Created 2023.12.11 20:00 Machine s1_win7_x6401
Filename setup294.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
5.0
ZERO API file : malware
VT API (file) 46 detected (AIDetectMalware, Fero, Lazy, unsafe, Zenpak, Kryptik, V5ne, ZedlaF, @I8@ayfXccai, Attribute, HighConfidence, malicious, high confidence, HVNO, score, TrojanX, hdolk, PRIVATELOADER, YXDLJZ, Krypt, RemoteAdmin, NetCat, Eldorado, X9PBD8, Detected, Zusy, ai score=89, Chgt, Generic@AI, RDML, 2oIvsHJRxxv2Yh6SsLCdSg, Static AI, Malicious SFX, HUEI, confidence, 100%)
md5 f6817fb73608c56fbae10d7189621efd
sha256 5ee5c46d61a945ad630a4d86a34959cb99242006a87b6d03f6c3f0ac96afa279
ssdeep 49152:cYElmEMylsn4bjNFWXiB5YgAAvtQifHbThuYb7zCsoI8QD016MLmevRCT:cYE0olsn43NASB5cAvtQif74wfCstL0k
imphash e24e2b765a0ca8ebb142df10bd69ab5c
impfuzzy 24:SVB+5T0v+GdMqhR9F3EDywkOxgO8B4XFjvcW:i+x02GyqdFpO98e5cW
  Network IP location

Signature (11cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
watch Deletes executed files from disk
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info The executable uses a known packer

Rules (15cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x4080f8 MessageBoxA
SHELL32.dll
 0x4080f0 ShellExecuteExW
MSVCRT.dll
 0x40808c _controlfp
 0x408090 _except_handler3
 0x408094 __set_app_type
 0x408098 __p__fmode
 0x40809c __p__commode
 0x4080a0 _adjust_fdiv
 0x4080a4 __setusermatherr
 0x4080a8 _initterm
 0x4080ac __getmainargs
 0x4080b0 _acmdln
 0x4080b4 exit
 0x4080b8 _XcptFilter
 0x4080bc _exit
 0x4080c0 memcpy
 0x4080c4 free
 0x4080c8 malloc
 0x4080cc wcscmp
 0x4080d0 memcmp
 0x4080d4 memmove
 0x4080d8 strlen
 0x4080dc wcslen
 0x4080e0 wcscpy
 0x4080e4 wcscat
 0x4080e8 memset
KERNEL32.dll
 0x408000 CreateProcessW
 0x408004 GetStartupInfoA
 0x408008 GetModuleHandleA
 0x40800c GetModuleHandleW
 0x408010 GetProcAddress
 0x408014 GetSystemDirectoryW
 0x408018 lstrlenW
 0x40801c lstrcatW
 0x408020 LoadLibraryExW
 0x408024 GetVersionExW
 0x408028 SetFilePointer
 0x40802c WriteFile
 0x408030 ReadFile
 0x408034 CreateFileW
 0x408038 DeleteFileW
 0x40803c FindNextFileW
 0x408040 RemoveDirectoryW
 0x408044 FindFirstFileW
 0x408048 FindClose
 0x40804c GetModuleFileNameW
 0x408050 GetCommandLineW
 0x408054 GetTempPathW
 0x408058 GetCurrentThreadId
 0x40805c GetTickCount
 0x408060 GetCurrentProcessId
 0x408064 CreateDirectoryW
 0x408068 GetLastError
 0x40806c SetFileTime
 0x408070 SetFileAttributesW
 0x408074 GetExitCodeProcess
 0x408078 WaitForSingleObject
 0x40807c CloseHandle
 0x408080 SetCurrentDirectoryW
 0x408084 GetCurrentDirectoryW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure