Report - FSB.exe

Generic Malware Malicious Library Downloader UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.08.19 15:13 Machine s1_win7_x6401
Filename FSB.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
2
Behavior Score
2.0
ZERO API file : malware
VT API (file) 26 detected (AIDetectMalware, malicious, high confidence, score, Mikey, Unsafe, Attribute, HighConfidence, DropperX, Convagent, Detected, ai score=83, confidence)
md5 04c2bd9282a55152d9e640b0780b8a69
sha256 ef4e84bbd548bd86564af86b7154025a2e28d5f2e650464af56fed719140753a
ssdeep 12288:rj7s+bMz7vDMuLP70gMRK/mG7X3nCkokBIoSq:jthyQKeIXlokBIu
imphash 438d34bde39badbada8d0b9cc438db08
impfuzzy 48:UTBOcpV5QS1Yt2gGsunXZE9FSY/goCKX0WnB/KAlJVZS9:UccpV5QS1Yt2gGsuJEjKahjc
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Network_Downloader File Downloader binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14007f028 FreeLibrary
 0x14007f030 GetProcAddress
 0x14007f038 LoadLibraryA
 0x14007f040 LoadLibraryW
 0x14007f048 GetComputerNameA
 0x14007f050 VerifyVersionInfoW
 0x14007f058 WriteConsoleW
 0x14007f060 CreateFileW
 0x14007f068 HeapSize
 0x14007f070 GetProcessHeap
 0x14007f078 VirtualProtect
 0x14007f080 FreeEnvironmentStringsW
 0x14007f088 GetEnvironmentStringsW
 0x14007f090 GetCommandLineW
 0x14007f098 GetCommandLineA
 0x14007f0a0 GetOEMCP
 0x14007f0a8 GetACP
 0x14007f0b0 IsValidCodePage
 0x14007f0b8 FindNextFileW
 0x14007f0c0 FindFirstFileExW
 0x14007f0c8 CreateProcessA
 0x14007f0d0 Sleep
 0x14007f0d8 GetLastError
 0x14007f0e0 SetStdHandle
 0x14007f0e8 VerSetConditionMask
 0x14007f0f0 FindClose
 0x14007f0f8 HeapReAlloc
 0x14007f100 WideCharToMultiByte
 0x14007f108 EnterCriticalSection
 0x14007f110 LeaveCriticalSection
 0x14007f118 InitializeCriticalSectionEx
 0x14007f120 DeleteCriticalSection
 0x14007f128 EncodePointer
 0x14007f130 DecodePointer
 0x14007f138 MultiByteToWideChar
 0x14007f140 LCMapStringEx
 0x14007f148 GetStringTypeW
 0x14007f150 GetCPInfo
 0x14007f158 QueryPerformanceCounter
 0x14007f160 GetCurrentProcessId
 0x14007f168 GetCurrentThreadId
 0x14007f170 GetSystemTimeAsFileTime
 0x14007f178 InitializeSListHead
 0x14007f180 RtlCaptureContext
 0x14007f188 RtlLookupFunctionEntry
 0x14007f190 RtlVirtualUnwind
 0x14007f198 IsDebuggerPresent
 0x14007f1a0 UnhandledExceptionFilter
 0x14007f1a8 SetUnhandledExceptionFilter
 0x14007f1b0 GetStartupInfoW
 0x14007f1b8 IsProcessorFeaturePresent
 0x14007f1c0 GetModuleHandleW
 0x14007f1c8 GetCurrentProcess
 0x14007f1d0 TerminateProcess
 0x14007f1d8 RtlPcToFileHeader
 0x14007f1e0 RaiseException
 0x14007f1e8 RtlUnwindEx
 0x14007f1f0 SetLastError
 0x14007f1f8 InitializeCriticalSectionAndSpinCount
 0x14007f200 TlsAlloc
 0x14007f208 TlsGetValue
 0x14007f210 TlsSetValue
 0x14007f218 TlsFree
 0x14007f220 LoadLibraryExW
 0x14007f228 GetStdHandle
 0x14007f230 WriteFile
 0x14007f238 GetModuleFileNameW
 0x14007f240 ExitProcess
 0x14007f248 GetModuleHandleExW
 0x14007f250 HeapAlloc
 0x14007f258 HeapFree
 0x14007f260 GetFileType
 0x14007f268 FlsAlloc
 0x14007f270 FlsGetValue
 0x14007f278 FlsSetValue
 0x14007f280 FlsFree
 0x14007f288 LCMapStringW
 0x14007f290 GetLocaleInfoW
 0x14007f298 IsValidLocale
 0x14007f2a0 GetUserDefaultLCID
 0x14007f2a8 EnumSystemLocalesW
 0x14007f2b0 CloseHandle
 0x14007f2b8 FlushFileBuffers
 0x14007f2c0 GetConsoleOutputCP
 0x14007f2c8 GetConsoleMode
 0x14007f2d0 ReadFile
 0x14007f2d8 GetFileSizeEx
 0x14007f2e0 SetFilePointerEx
 0x14007f2e8 ReadConsoleW
 0x14007f2f0 RtlUnwind
USER32.dll
 0x14007f318 GetMessageW
 0x14007f320 LoadIconW
 0x14007f328 MessageBoxW
 0x14007f330 GetClientRect
 0x14007f338 UpdateWindow
 0x14007f340 ShowWindow
 0x14007f348 CreateWindowExW
 0x14007f350 RegisterClassW
 0x14007f358 PostQuitMessage
 0x14007f360 DefWindowProcW
 0x14007f368 SendMessageW
 0x14007f370 DispatchMessageW
 0x14007f378 TranslateMessage
GDI32.dll
 0x14007f000 SetBkColor
 0x14007f008 CreateSolidBrush
 0x14007f010 CreateFontW
 0x14007f018 SetTextColor
SHELL32.dll
 0x14007f300 SHGetFolderPathW
 0x14007f308 ShellExecuteW
urlmon.dll
 0x14007f388 URLDownloadToFileW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure