Report - Updater.exe

PE File PE32
ScreenShot
Created 2024.10.06 12:50 Machine s1_win7_x6403
Filename Updater.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
5.2
ZERO API file : clean
VT API (file) 35 detected (AIDetectMalware, Artemis, Unsafe, malicious, confidence, Attribute, HighConfidence, high confidence, MalwareX, score, tjbmor, CLOUD, Nekark, qzrwp, high, Static AI, Suspicious PE, Detected, Wacatac, ABTrojan, SAZR, MalPe, X2197, Outbreak, Chgt, PossibleThreat, H9nj)
md5 925ec45b5ac88ab7af039190589204b9
sha256 419901e7e1747a9c413e657920429ce1d31e1b5af24e68a7dd79629066118133
ssdeep 98304:uN96axtbMmHcvr8kqxr5XXZqUNoe++Bgt78ACWbQXMc/FzqTx8neP:k9LXMmHcvr8rXXXZqe10t78ACWbUVUTG
imphash 0decc57ad4a1f8a78ae64835b3516938
impfuzzy 3:sSVrZuCALMAJWiWbW6LlBwJBO7oAAJo1MO/OywSx2AEZsWBJAEPwS9KTXzW:VrkD4sW1bt8lJoZ/O4ErBJAEHGDW
  Network IP location

Signature (13cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process created a hidden window
notice Creates a suspicious process
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x6b1000 CopyFileA
msvcrt.dll
 0x6b1008 _strdup
msvcrt.dll
 0x6b1010 __getmainargs
SHELL32.DLL
 0x6b1018 ShellExecuteA
USER32.dll
 0x6b1020 CloseClipboard
KERNEL32.dll
 0x6b1028 HeapAlloc
 0x6b102c HeapFree
 0x6b1030 ExitProcess
 0x6b1034 GetModuleHandleA
 0x6b1038 LoadLibraryA
 0x6b103c GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure