Report - setup%E4%B8%8B%E8%BD%BD%E5%90%8D%E5%8D%95%E7%9B%AE%E5%BD%956056.exe

Malicious Library PE64 PE File
ScreenShot
Created 2024.06.14 09:28 Machine s1_win7_x6401
Filename setup%E4%B8%8B%E8%BD%BD%E5%90%8D%E5%8D%95%E7%9B%AE%E5%BD%956056.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
4
Behavior Score
3.2
ZERO API file : malware
VT API (file) 47 detected (Common, malicious, high confidence, GenericKDZ, Unsafe, Vvbv, xycsah, Genric, cg4jjrc1DLF, lhkgd, R03BC0XDT24, Detected, ai score=86, GrayWare, Caypnamer, Casdet, ABDownloader, PGBU, R646446, Neshta, FileInfector, susgen, confidence)
md5 2b2690881f0030510504113baf20831b
sha256 c2ffdc8abad170351313c2cf2dc4f6ef3f9c320543f0608a37dbf75da2e2b539
ssdeep 6144:jPTc+NurrbUTp1YC+P6PPPTP2PdN2WHPPjLB:jYpUDYCu
imphash 5c1e1a097c044357c4eefded92c1ce68
impfuzzy 24:6mDBOOle0u//+1HRnlyv96J3XJT4NfjQzSgwd:ycu//+HK9aZcNfj+W
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 47 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
notice Foreign language identified in PE resource

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
8.138.0.158 Unknown 8.138.0.158 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140007000 GetCurrentThread
 0x140007008 LoadLibraryW
 0x140007010 GetProcAddress
 0x140007018 QueueUserAPC
 0x140007020 GetModuleHandleA
 0x140007028 VirtualProtect
 0x140007030 GetCommandLineW
 0x140007038 GetStartupInfoW
 0x140007040 GetLastError
 0x140007048 HeapFree
 0x140007050 EncodePointer
 0x140007058 DecodePointer
 0x140007060 HeapAlloc
 0x140007068 RaiseException
 0x140007070 RtlPcToFileHeader
 0x140007078 SetUnhandledExceptionFilter
 0x140007080 GetModuleHandleW
 0x140007088 ExitProcess
 0x140007090 WriteFile
 0x140007098 GetStdHandle
 0x1400070a0 GetModuleFileNameW
 0x1400070a8 RtlUnwindEx
 0x1400070b0 FreeEnvironmentStringsW
 0x1400070b8 GetEnvironmentStringsW
 0x1400070c0 SetHandleCount
 0x1400070c8 InitializeCriticalSectionAndSpinCount
 0x1400070d0 GetFileType
 0x1400070d8 DeleteCriticalSection
 0x1400070e0 FlsGetValue
 0x1400070e8 FlsSetValue
 0x1400070f0 FlsFree
 0x1400070f8 SetLastError
 0x140007100 GetCurrentThreadId
 0x140007108 FlsAlloc
 0x140007110 HeapSetInformation
 0x140007118 GetVersion
 0x140007120 HeapCreate
 0x140007128 QueryPerformanceCounter
 0x140007130 GetTickCount
 0x140007138 GetCurrentProcessId
 0x140007140 GetSystemTimeAsFileTime
 0x140007148 Sleep
 0x140007150 HeapSize
 0x140007158 LeaveCriticalSection
 0x140007160 EnterCriticalSection
 0x140007168 UnhandledExceptionFilter
 0x140007170 IsDebuggerPresent
 0x140007178 RtlVirtualUnwind
 0x140007180 RtlLookupFunctionEntry
 0x140007188 RtlCaptureContext
 0x140007190 TerminateProcess
 0x140007198 GetCurrentProcess
 0x1400071a0 GetCPInfo
 0x1400071a8 GetACP
 0x1400071b0 GetOEMCP
 0x1400071b8 IsValidCodePage
 0x1400071c0 HeapReAlloc
 0x1400071c8 WideCharToMultiByte
 0x1400071d0 LCMapStringW
 0x1400071d8 MultiByteToWideChar
 0x1400071e0 GetStringTypeW
USER32.dll
 0x1400071f0 MessageBoxW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure