Report - Sеtup.exe

Generic Malware Admin Tool (Sysinternals etc ...) UPX PE File PE32
ScreenShot
Created 2024.07.12 17:01 Machine s1_win7_x6401
Filename Sеtup.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
6.6
ZERO API file : clean
VT API (file) 45 detected (AIDetectMalware, Malicious, score, Zusy, Unsafe, Cryptnot, Vbsk, Attribute, HighConfidence, Artemis, Barys, TrojanPSW, rLw0cFpN2KM, xxlvc, Real Protect, Detected, ai score=88, QYAA, CryptBot, ZexaF, Z@aKOsQsg, PasswordStealer, Genetic, QQPass, QQRob, Pjgl, QNZO3DGW)
md5 56a5cb142c58843c3ed84e02d2af1a2c
sha256 19d930dca13749f06d8837ef4134ccb7b0af0175af53cd69a8fc4e1afc771e21
ssdeep 49152:sA7xFPOvpdikrlyqq57WqUDG+lC3Qy5uDBn4Sud5pXQikcW:sA7xTf315uDB4dXQ2W
imphash 196992c146062db84cbd73903ca4b0ad
impfuzzy 24:8fiFCDq+kLEGTX5XGKJkNJlkvlbDcq30GXZy:8fir+k4GTXJGKJkNJlkvpwq30GQ
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
watch Checks the CPU name from registry
watch Collects information about installed applications
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Resolves a suspicious Top Level Domain (TLD)
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Queries for the computername
info Tries to locate where the browsers are installed

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://tzeight8vt.top/v1/upload.php RU Sprinthost.ru LLC 185.251.89.18 clean
tzeight8vt.top RU Sprinthost.ru LLC 185.251.89.18 clean
185.251.89.18 RU Sprinthost.ru LLC 185.251.89.18 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0xbcd154 DeleteCriticalSection
 0xbcd158 EnterCriticalSection
 0xbcd15c FreeLibrary
 0xbcd160 GetLastError
 0xbcd164 GetModuleHandleA
 0xbcd168 GetModuleHandleW
 0xbcd16c GetProcAddress
 0xbcd170 GetStartupInfoA
 0xbcd174 InitializeCriticalSection
 0xbcd178 IsDBCSLeadByteEx
 0xbcd17c LeaveCriticalSection
 0xbcd180 LoadLibraryA
 0xbcd184 MultiByteToWideChar
 0xbcd188 SetUnhandledExceptionFilter
 0xbcd18c Sleep
 0xbcd190 TlsGetValue
 0xbcd194 VirtualProtect
 0xbcd198 VirtualQuery
 0xbcd19c WideCharToMultiByte
 0xbcd1a0 lstrlenA
msvcrt.dll
 0xbcd1a8 __getmainargs
 0xbcd1ac __initenv
 0xbcd1b0 __lconv_init
 0xbcd1b4 __mb_cur_max
 0xbcd1b8 __p__acmdln
 0xbcd1bc __p__commode
 0xbcd1c0 __p__fmode
 0xbcd1c4 __set_app_type
 0xbcd1c8 __setusermatherr
 0xbcd1cc _amsg_exit
 0xbcd1d0 _cexit
 0xbcd1d4 _errno
 0xbcd1d8 _initterm
 0xbcd1dc _iob
 0xbcd1e0 _lock
 0xbcd1e4 _onexit
 0xbcd1e8 _unlock
 0xbcd1ec abort
 0xbcd1f0 atoi
 0xbcd1f4 calloc
 0xbcd1f8 exit
 0xbcd1fc fputc
 0xbcd200 free
 0xbcd204 fwrite
 0xbcd208 getc
 0xbcd20c islower
 0xbcd210 isspace
 0xbcd214 isupper
 0xbcd218 isxdigit
 0xbcd21c localeconv
 0xbcd220 malloc
 0xbcd224 memcpy
 0xbcd228 memset
 0xbcd22c perror
 0xbcd230 printf
 0xbcd234 realloc
 0xbcd238 setlocale
 0xbcd23c signal
 0xbcd240 strchr
 0xbcd244 strerror
 0xbcd248 strlen
 0xbcd24c strncmp
 0xbcd250 strtol
 0xbcd254 strtoul
 0xbcd258 tolower
 0xbcd25c ungetc
 0xbcd260 vfprintf
 0xbcd264 wcslen

EAT(Export Address Table) Library

0x50a04a main


Similarity measure (PE file only) - Checking for service failure