Report - Updater.exe

Generic Malware Malicious Library VMProtect PE File PE64
ScreenShot
Created 2024.08.23 09:49 Machine s1_win7_x6401
Filename Updater.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
2.2
ZERO API file : malware
VT API (file) 60 detected (AIDetectMalware, Reflo, malicious, high confidence, score, GenericKD, Unsafe, Vwy5, VMProtect, Artemis, xbrzux, 727qAG4EkQE, AGEN, Siggen29, R002C0XGT24, Real Protect, Detected, ai score=88, GrayWare, Wacapew, Malware@#2g1whylycqm7z, Tedy, R646909, CoinMiner, Chgt, Gencirc, susgen, Behavior, confidence, 100%, HTK2XJC)
md5 dd3aa70adbe7894d6705ddb398155628
sha256 6b32ec90229466753e03ba4d9eb0c4eb225b8ca2fc5beea04f1ca4a887907c6b
ssdeep 196608:RNPW2PdkNsUE5pWMF0PJqQFcVYjV7VHSrTEitDuTw+HCwL:Lu5NGwAQx3SskDu8
imphash 5f85c353cf9895ecc2a751010283213a
impfuzzy 12:FMHlRowfP9qZGoQtXJxZGb9AJcDfA5kLfP9m:FMrlaQtXJHc9NDI5Q8
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 60 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
xmr-eu1.nanopool.org Unknown 162.19.224.121 mailcious
pastebin.com US CLOUDFLARENET 104.20.4.235 mailcious
51.15.193.130 FR Online S.a.s. 51.15.193.130 mailcious
104.20.4.235 US CLOUDFLARENET 104.20.4.235 mailcious
163.172.154.142 GB Online S.a.s. 163.172.154.142 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x140d15000 __C_specific_handler
KERNEL32.dll
 0x140d15010 DeleteCriticalSection
WTSAPI32.dll
 0x140d15020 WTSSendMessageW
KERNEL32.dll
 0x140d15030 GetSystemTimeAsFileTime
USER32.dll
 0x140d15040 GetUserObjectInformationW
KERNEL32.dll
 0x140d15050 LocalAlloc
 0x140d15058 LocalFree
 0x140d15060 GetModuleFileNameW
 0x140d15068 GetProcessAffinityMask
 0x140d15070 SetProcessAffinityMask
 0x140d15078 SetThreadAffinityMask
 0x140d15080 Sleep
 0x140d15088 ExitProcess
 0x140d15090 FreeLibrary
 0x140d15098 LoadLibraryA
 0x140d150a0 GetModuleHandleA
 0x140d150a8 GetProcAddress
USER32.dll
 0x140d150b8 GetProcessWindowStation
 0x140d150c0 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure