Report - Builder.exe

Malicious Library ASPack UPX PE32 PE File OS Processor Check .NET EXE
ScreenShot
Created 2023.12.12 08:07 Machine s1_win7_x6401
Filename Builder.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
2.4
ZERO API file : malware
VT API (file)
md5 d49ec8360f618f61d91701143e475fbc
sha256 2dece16416e689ac95ae2c7b7944f4a5e37ea96ec1b59acc769216eaa6acd342
ssdeep 6144:tSncRlISncRl1Xav8nY6r1dQrD4bfv8nY6r1dQrDP:E4f4LXW8ZP
imphash 9222d372923baed7aa9dfa28449a94ea
impfuzzy 24:9H9DopK7yJlv1OovAZtQlqlEcfL7/J3IP8RyvkT4JQ:9grItZt5ecf50kcJQ
  Network IP location

Signature (8cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (10cnts)

Level Name Description Collection
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info Is_DotNET_EXE (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x409000 CreateFileA
 0x409004 FindResourceA
 0x409008 FreeLibrary
 0x40900c LoadResource
 0x409010 WriteFile
 0x409014 SizeofResource
 0x409018 GetProcAddress
 0x40901c LoadLibraryA
 0x409020 LockResource
 0x409024 EnumResourceNamesA
 0x409028 CloseHandle
 0x40902c FreeResource
 0x409030 GetWindowsDirectoryA
 0x409034 OutputDebugStringA
 0x409038 GetTempPathA
 0x40903c GetModuleHandleW
 0x409040 ExitProcess
 0x409044 DecodePointer
 0x409048 EncodePointer
 0x40904c GetCommandLineA
 0x409050 HeapSetInformation
 0x409054 GetStartupInfoW
 0x409058 RaiseException
 0x40905c TerminateProcess
 0x409060 GetCurrentProcess
 0x409064 UnhandledExceptionFilter
 0x409068 SetUnhandledExceptionFilter
 0x40906c IsDebuggerPresent
 0x409070 HeapAlloc
 0x409074 GetLastError
 0x409078 HeapFree
 0x40907c IsProcessorFeaturePresent
 0x409080 InitializeCriticalSectionAndSpinCount
 0x409084 DeleteCriticalSection
 0x409088 LeaveCriticalSection
 0x40908c EnterCriticalSection
 0x409090 LoadLibraryW
 0x409094 TlsAlloc
 0x409098 TlsGetValue
 0x40909c TlsSetValue
 0x4090a0 TlsFree
 0x4090a4 InterlockedIncrement
 0x4090a8 SetLastError
 0x4090ac GetCurrentThreadId
 0x4090b0 InterlockedDecrement
 0x4090b4 GetStdHandle
 0x4090b8 GetModuleFileNameW
 0x4090bc Sleep
 0x4090c0 HeapSize
 0x4090c4 GetModuleFileNameA
 0x4090c8 FreeEnvironmentStringsW
 0x4090cc WideCharToMultiByte
 0x4090d0 GetEnvironmentStringsW
 0x4090d4 SetHandleCount
 0x4090d8 GetFileType
 0x4090dc HeapCreate
 0x4090e0 QueryPerformanceCounter
 0x4090e4 GetTickCount
 0x4090e8 GetCurrentProcessId
 0x4090ec GetSystemTimeAsFileTime
 0x4090f0 RtlUnwind
 0x4090f4 GetCPInfo
 0x4090f8 GetACP
 0x4090fc GetOEMCP
 0x409100 IsValidCodePage
 0x409104 HeapReAlloc
 0x409108 LCMapStringW
 0x40910c MultiByteToWideChar
 0x409110 GetStringTypeW
SHELL32.dll
 0x409118 ShellExecuteA
 0x40911c SHGetSpecialFolderPathA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure