Report - ScreenUpdateSync.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.09.19 09:47 Machine s1_win7_x6403
Filename ScreenUpdateSync.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
2.6
ZERO API file : malware
VT API (file) 44 detected (AIDetectMalware, Stealc, Malicious, score, Stop, Unsafe, Save, confidence, 100%, Attribute, HighConfidence, high confidence, Kryptik, HXWX, CrypterX, Kryptik@AI, RDML, 6403Q2EIQ8yU, CkX18ziqQ, jccce, YXEIRZ, Real Protect, high, Static AI, Malicious PE, Detected, Danabot, Sabsik, LGR7RP, Eldorado, R658943, Artemis, Chgt, susgen, GenKryptik, HBTI)
md5 95c4cd6903e8db5123f6941486a2af23
sha256 5f4cc4675e728402c318c544ddfdcde87629be935157d731127fed4ce36efa1b
ssdeep 3072:3kCLNdMje+6SQTmVVpfcUKjjVtMpMIdgUZjYpkibLK57N65X7FUMwVnfyN03xH61:ZLNd2HQm9PKvVtMeKvYph5X7zwVy03R
imphash 5e1853c599f53045ffb0796f2bdab49b
impfuzzy 48:uK1JZfvMLd/1Sd4Ei7t7cfR02k2cJa8ADq:pTk/w4f7t7cfi2VcJac
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x424000 FillConsoleOutputCharacterA
 0x424004 GetNumaNodeProcessorMask
 0x424008 SearchPathW
 0x42400c GetConsoleAliasesLengthW
 0x424010 GetDefaultCommConfigW
 0x424014 CallNamedPipeA
 0x424018 GetEnvironmentStringsW
 0x42401c CreateDirectoryW
 0x424020 GetUserDefaultLCID
 0x424024 GetComputerNameW
 0x424028 SleepEx
 0x42402c ConnectNamedPipe
 0x424030 FreeEnvironmentStringsA
 0x424034 GetModuleHandleW
 0x424038 GetConsoleAliasesA
 0x42403c GetCommandLineA
 0x424040 GetPriorityClass
 0x424044 LoadLibraryW
 0x424048 GetConsoleAliasExesLengthW
 0x42404c WriteConsoleOutputA
 0x424050 HeapCreate
 0x424054 SetConsoleMode
 0x424058 GetFileAttributesW
 0x42405c GetModuleFileNameW
 0x424060 GetBinaryTypeW
 0x424064 SetConsoleTitleA
 0x424068 InterlockedExchange
 0x42406c GetStartupInfoA
 0x424070 GetLastError
 0x424074 GetProcAddress
 0x424078 SetStdHandle
 0x42407c SearchPathA
 0x424080 OpenWaitableTimerA
 0x424084 InterlockedExchangeAdd
 0x424088 LocalAlloc
 0x42408c QueryDosDeviceW
 0x424090 SetCommMask
 0x424094 FoldStringA
 0x424098 WaitForMultipleObjects
 0x42409c GetModuleHandleA
 0x4240a0 BuildCommDCBA
 0x4240a4 PurgeComm
 0x4240a8 WaitForDebugEvent
 0x4240ac GetShortPathNameW
 0x4240b0 SetCalendarInfoA
 0x4240b4 FindAtomW
 0x4240b8 GlobalReAlloc
 0x4240bc CopyFileExA
 0x4240c0 GetVolumeInformationW
 0x4240c4 CreateFileA
 0x4240c8 HeapFree
 0x4240cc HeapAlloc
 0x4240d0 MultiByteToWideChar
 0x4240d4 HeapReAlloc
 0x4240d8 Sleep
 0x4240dc ExitProcess
 0x4240e0 GetStartupInfoW
 0x4240e4 TerminateProcess
 0x4240e8 GetCurrentProcess
 0x4240ec UnhandledExceptionFilter
 0x4240f0 SetUnhandledExceptionFilter
 0x4240f4 IsDebuggerPresent
 0x4240f8 VirtualFree
 0x4240fc DeleteCriticalSection
 0x424100 LeaveCriticalSection
 0x424104 EnterCriticalSection
 0x424108 VirtualAlloc
 0x42410c WriteFile
 0x424110 GetStdHandle
 0x424114 GetModuleFileNameA
 0x424118 SetHandleCount
 0x42411c GetFileType
 0x424120 TlsGetValue
 0x424124 TlsAlloc
 0x424128 TlsSetValue
 0x42412c TlsFree
 0x424130 InterlockedIncrement
 0x424134 SetLastError
 0x424138 GetCurrentThreadId
 0x42413c InterlockedDecrement
 0x424140 HeapSize
 0x424144 GetCPInfo
 0x424148 GetACP
 0x42414c GetOEMCP
 0x424150 IsValidCodePage
 0x424154 LoadLibraryA
 0x424158 InitializeCriticalSectionAndSpinCount
 0x42415c FreeEnvironmentStringsW
 0x424160 GetCommandLineW
 0x424164 QueryPerformanceCounter
 0x424168 GetTickCount
 0x42416c GetCurrentProcessId
 0x424170 GetSystemTimeAsFileTime
 0x424174 RtlUnwind
 0x424178 ReadFile
 0x42417c LCMapStringA
 0x424180 WideCharToMultiByte
 0x424184 LCMapStringW
 0x424188 GetStringTypeA
 0x42418c GetStringTypeW
 0x424190 GetLocaleInfoA
 0x424194 GetConsoleCP
 0x424198 GetConsoleMode
 0x42419c FlushFileBuffers
 0x4241a0 SetFilePointer
 0x4241a4 CloseHandle
 0x4241a8 WriteConsoleA
 0x4241ac GetConsoleOutputCP
 0x4241b0 WriteConsoleW
USER32.dll
 0x4241b8 GetActiveWindow
 0x4241bc GetUserObjectInformationA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure