Report - setup.exe

Generic Malware Malicious Library UPX ftp PE File PE32 OS Processor Check
ScreenShot
Created 2024.08.07 09:57 Machine s1_win7_x6403
Filename setup.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
5.2
ZERO API file : mailcious
VT API (file) 33 detected (AIDetectMalware, malicious, high confidence, score, Fragtor, Unsafe, Attribute, HighConfidence, DarkGate, Strab, Real Protect, moderate, Generic ML PUA, Static AI, Suspicious PE, Detected, ai score=81, Sonbokli, gen8, Maximus, ZexaF, iwW@a493owhi, Gencirc, susgen, confidence)
md5 fc99ddf185aa553bf30c431cc897c903
sha256 48860a4eb801109046a591d18809b1ff3e2b658f2a09c6fb36c4948cb88eb939
ssdeep 49152:Uk8BMMcyO6uzNJbIdNJbnwppkcWAta0PH1i:HasZ6uJJb6UJNa0
imphash 6482a570ab38408826cbdcd4c99083d1
impfuzzy 96:CxyWjzcpVSVt7SGa5etATMsMB0HlIg0Bt4:GyWftpWEgat4
  Network IP location

Signature (10cnts)

Level Description
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Detects the presence of Wine emulator
watch Manipulates memory of a non-child process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Looks up the external IP address
notice Performs some HTTP requests
notice Starts servers listening
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info ftp_command ftp command binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://myexternalip.com/raw Unknown 34.160.111.145 clean
myexternalip.com Unknown 34.160.111.145 clean
api.telegram.org GB Telegram Messenger Inc 149.154.167.220 mailcious
34.160.111.145 Unknown 34.160.111.145 clean
149.154.167.220 GB Telegram Messenger Inc 149.154.167.220 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x48b06c SetEnvironmentVariableA
 0x48b070 FreeEnvironmentStringsW
 0x48b074 GetEnvironmentStringsW
 0x48b078 GetCommandLineW
 0x48b07c GetCommandLineA
 0x48b080 GetOEMCP
 0x48b084 IsValidCodePage
 0x48b088 GetProcessHeap
 0x48b08c FindFirstFileExA
 0x48b090 GetTimeZoneInformation
 0x48b094 SetEndOfFile
 0x48b098 SetStdHandle
 0x48b09c FlushFileBuffers
 0x48b0a0 EnumSystemLocalesW
 0x48b0a4 GetUserDefaultLCID
 0x48b0a8 IsValidLocale
 0x48b0ac GetTimeFormatW
 0x48b0b0 GetDateFormatW
 0x48b0b4 HeapFree
 0x48b0b8 GetConsoleCP
 0x48b0bc ReadConsoleW
 0x48b0c0 WriteConsoleW
 0x48b0c4 HeapSize
 0x48b0c8 GetProcAddress
 0x48b0cc HeapAlloc
 0x48b0d0 FindResourceW
 0x48b0d4 LoadResource
 0x48b0d8 HeapReAlloc
 0x48b0dc LockResource
 0x48b0e0 GetLastError
 0x48b0e4 Sleep
 0x48b0e8 GetModuleHandleA
 0x48b0ec SetProcessShutdownParameters
 0x48b0f0 GetModuleFileNameW
 0x48b0f4 TerminateProcess
 0x48b0f8 VirtualAlloc
 0x48b0fc HeapCreate
 0x48b100 FindNextFileA
 0x48b104 GetConsoleMode
 0x48b108 GetACP
 0x48b10c ExitProcess
 0x48b110 GetModuleFileNameA
 0x48b114 WriteFile
 0x48b118 SetFilePointerEx
 0x48b11c GetModuleHandleExW
 0x48b120 ReleaseSRWLockExclusive
 0x48b124 AcquireSRWLockExclusive
 0x48b128 QueryPerformanceCounter
 0x48b12c GetTickCount
 0x48b130 CloseHandle
 0x48b134 EnterCriticalSection
 0x48b138 LeaveCriticalSection
 0x48b13c InitializeCriticalSectionEx
 0x48b140 DeleteCriticalSection
 0x48b144 SetEvent
 0x48b148 WaitForSingleObject
 0x48b14c CreateEventW
 0x48b150 MultiByteToWideChar
 0x48b154 QueryPerformanceFrequency
 0x48b158 GetSystemDirectoryW
 0x48b15c FreeLibrary
 0x48b160 GetModuleHandleW
 0x48b164 LoadLibraryW
 0x48b168 WideCharToMultiByte
 0x48b16c SetLastError
 0x48b170 FormatMessageW
 0x48b174 MoveFileExW
 0x48b178 WaitForSingleObjectEx
 0x48b17c GetEnvironmentVariableA
 0x48b180 GetStdHandle
 0x48b184 GetFileType
 0x48b188 ReadFile
 0x48b18c PeekNamedPipe
 0x48b190 WaitForMultipleObjects
 0x48b194 GetCurrentProcessId
 0x48b198 SleepEx
 0x48b19c VerSetConditionMask
 0x48b1a0 VerifyVersionInfoW
 0x48b1a4 CreateFileW
 0x48b1a8 GetFileSizeEx
 0x48b1ac GetCurrentDirectoryW
 0x48b1b0 DeleteFileW
 0x48b1b4 FindClose
 0x48b1b8 GetFileAttributesW
 0x48b1bc GetFullPathNameW
 0x48b1c0 GetTempPathW
 0x48b1c4 AreFileApisANSI
 0x48b1c8 InitializeCriticalSectionAndSpinCount
 0x48b1cc SwitchToThread
 0x48b1d0 TlsAlloc
 0x48b1d4 TlsGetValue
 0x48b1d8 TlsSetValue
 0x48b1dc TlsFree
 0x48b1e0 GetSystemTimeAsFileTime
 0x48b1e4 EncodePointer
 0x48b1e8 DecodePointer
 0x48b1ec CompareStringW
 0x48b1f0 LCMapStringW
 0x48b1f4 GetLocaleInfoW
 0x48b1f8 GetStringTypeW
 0x48b1fc GetCPInfo
 0x48b200 UnhandledExceptionFilter
 0x48b204 SetUnhandledExceptionFilter
 0x48b208 GetCurrentProcess
 0x48b20c IsProcessorFeaturePresent
 0x48b210 GetCurrentThreadId
 0x48b214 InitializeSListHead
 0x48b218 IsDebuggerPresent
 0x48b21c GetStartupInfoW
 0x48b220 RtlUnwind
 0x48b224 RaiseException
 0x48b228 LoadLibraryExW
 0x48b22c GetDriveTypeW
 0x48b230 SystemTimeToTzSpecificLocalTime
 0x48b234 FileTimeToSystemTime
 0x48b238 CreateThread
 0x48b23c ExitThread
 0x48b240 FreeLibraryAndExitThread
 0x48b244 SizeofResource
WS2_32.dll
 0x48b260 getsockopt
 0x48b264 gethostname
 0x48b268 ioctlsocket
 0x48b26c getpeername
 0x48b270 sendto
 0x48b274 recvfrom
 0x48b278 freeaddrinfo
 0x48b27c getaddrinfo
 0x48b280 recv
 0x48b284 listen
 0x48b288 htonl
 0x48b28c getsockname
 0x48b290 connect
 0x48b294 ind
 0x48b298 accept
 0x48b29c select
 0x48b2a0 __WSAFDIsSet
 0x48b2a4 socket
 0x48b2a8 htons
 0x48b2ac WSAIoctl
 0x48b2b0 setsockopt
 0x48b2b4 WSACleanup
 0x48b2b8 WSAStartup
 0x48b2bc inet_ntop
 0x48b2c0 ntohs
 0x48b2c4 inet_pton
 0x48b2c8 WSAGetLastError
 0x48b2cc WSASetLastError
 0x48b2d0 closesocket
 0x48b2d4 WSAWaitForMultipleEvents
 0x48b2d8 WSAResetEvent
 0x48b2dc WSAEventSelect
 0x48b2e0 WSAEnumNetworkEvents
 0x48b2e4 WSACreateEvent
 0x48b2e8 WSACloseEvent
 0x48b2ec send
CRYPT32.dll
 0x48b028 PFXImportCertStore
 0x48b02c CryptStringToBinaryW
 0x48b030 CryptDecodeObjectEx
 0x48b034 CertFindCertificateInStore
 0x48b038 CertEnumCertificatesInStore
 0x48b03c CertAddCertificateContextToStore
 0x48b040 CertFindExtension
 0x48b044 CertGetNameStringW
 0x48b048 CryptQueryObject
 0x48b04c CertCreateCertificateChainEngine
 0x48b050 CertFreeCertificateChainEngine
 0x48b054 CertGetCertificateChain
 0x48b058 CertFreeCertificateChain
 0x48b05c CertFreeCertificateContext
 0x48b060 CertCloseStore
 0x48b064 CertOpenStore
WININET.dll
 0x48b24c InternetReadFile
 0x48b250 InternetCloseHandle
 0x48b254 InternetOpenA
 0x48b258 InternetOpenUrlA
crypt.dll
 0x48b2f4 BCryptGenRandom
ADVAPI32.dll
 0x48b000 CryptAcquireContextW
 0x48b004 CryptReleaseContext
 0x48b008 CryptGetHashParam
 0x48b00c CryptCreateHash
 0x48b010 CryptHashData
 0x48b014 CryptDestroyHash
 0x48b018 CryptDestroyKey
 0x48b01c CryptImportKey
 0x48b020 CryptEncrypt

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure