Report - Updater.exe

Malicious Library UPX PE File PE32
ScreenShot
Created 2024.10.14 10:42 Machine s1_win7_x6401
Filename Updater.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
5.2
ZERO API
VT API (file) 38 detected (AIDetectMalware, Fsysna, Malicious, score, Unsafe, Save, confidence, Attribute, HighConfidence, high confidence, VMProtect, BC suspicious, jxyn, Kryptik@AI, RDML, XGdsaXKnHPLcnQzQlyDttg, ClipBanker, rtyqx, Static AI, Malicious PE, Sonbokli, XYCBWH, Artemis, Outbreak, Edhl)
md5 9fb8cc095e016caf986f28f61a4334ca
sha256 369a92d10be574e4e96680100bba4bb8f1b94f23a129d04ce0cef93dbb4d92a1
ssdeep 98304:SA98w3AJb77ixCX3xPVLY9/zVHW2X3sANemWxOAn:x98wwJjnBPVE1zRVX8ApWbn
imphash 13222c684d764439230ed7e1d3748c9a
impfuzzy 96:SfCtgDc5xl3OqdQTx1AXJ4Zcp+AjGt0+lRYE:PGQ3VdQToZ4Dz
  Network IP location

Signature (13cnts)

Level Description
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process created a hidden window
notice Creates a suspicious process
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x633000 CopyFileA
 0x633004 DeleteCriticalSection
 0x633008 EnterCriticalSection
 0x63300c ExitProcess
 0x633010 ExpandEnvironmentStringsA
 0x633014 FindClose
 0x633018 FindFirstFileA
 0x63301c FindNextFileA
 0x633020 FreeLibrary
 0x633024 GetCommandLineA
 0x633028 GetLastError
 0x63302c GetModuleFileNameA
 0x633030 GetModuleHandleA
 0x633034 GetProcAddress
 0x633038 GlobalAlloc
 0x63303c GlobalLock
 0x633040 GlobalUnlock
 0x633044 InitializeCriticalSection
 0x633048 LeaveCriticalSection
 0x63304c LoadLibraryA
 0x633050 SetUnhandledExceptionFilter
 0x633054 Sleep
 0x633058 TlsGetValue
 0x63305c VirtualProtect
 0x633060 VirtualQuery
msvcrt.dll
 0x633068 _strdup
 0x63306c _stricoll
msvcrt.dll
 0x633074 __getmainargs
 0x633078 __mb_cur_max
 0x63307c __p__environ
 0x633080 __p__fmode
 0x633084 __set_app_type
 0x633088 _cexit
 0x63308c _errno
 0x633090 _fpreset
 0x633094 _fullpath
 0x633098 _iob
 0x63309c _isctype
 0x6330a0 _onexit
 0x6330a4 _pctype
 0x6330a8 _setmode
 0x6330ac abort
 0x6330b0 atexit
 0x6330b4 calloc
 0x6330b8 free
 0x6330bc fwrite
 0x6330c0 malloc
 0x6330c4 mbstowcs
 0x6330c8 memcpy
 0x6330cc realloc
 0x6330d0 rename
 0x6330d4 setlocale
 0x6330d8 signal
 0x6330dc sprintf
 0x6330e0 strcoll
 0x6330e4 strlen
 0x6330e8 tolower
 0x6330ec vfprintf
 0x6330f0 wcstombs
SHELL32.DLL
 0x6330f8 ShellExecuteA
USER32.dll
 0x633100 CloseClipboard
 0x633104 EmptyClipboard
 0x633108 GetClipboardData
 0x63310c OpenClipboard
 0x633110 SetClipboardData
KERNEL32.dll
 0x633118 GetSystemTimeAsFileTime
 0x63311c CreateEventA
 0x633120 GetModuleHandleA
 0x633124 TerminateProcess
 0x633128 GetCurrentProcess
 0x63312c CreateToolhelp32Snapshot
 0x633130 Thread32First
 0x633134 GetCurrentProcessId
 0x633138 GetCurrentThreadId
 0x63313c OpenThread
 0x633140 Thread32Next
 0x633144 CloseHandle
 0x633148 SuspendThread
 0x63314c ResumeThread
 0x633150 WriteProcessMemory
 0x633154 GetSystemInfo
 0x633158 VirtualAlloc
 0x63315c VirtualProtect
 0x633160 VirtualFree
 0x633164 GetProcessAffinityMask
 0x633168 SetProcessAffinityMask
 0x63316c GetCurrentThread
 0x633170 SetThreadAffinityMask
 0x633174 Sleep
 0x633178 LoadLibraryA
 0x63317c FreeLibrary
 0x633180 GetTickCount
 0x633184 SystemTimeToFileTime
 0x633188 FileTimeToSystemTime
 0x63318c GlobalFree
 0x633190 HeapAlloc
 0x633194 HeapFree
 0x633198 GetProcAddress
 0x63319c ExitProcess
 0x6331a0 EnterCriticalSection
 0x6331a4 LeaveCriticalSection
 0x6331a8 InitializeCriticalSection
 0x6331ac DeleteCriticalSection
 0x6331b0 MultiByteToWideChar
 0x6331b4 GetModuleHandleW
 0x6331b8 LoadResource
 0x6331bc FindResourceExW
 0x6331c0 FindResourceExA
 0x6331c4 WideCharToMultiByte
 0x6331c8 GetThreadLocale
 0x6331cc GetUserDefaultLCID
 0x6331d0 GetSystemDefaultLCID
 0x6331d4 EnumResourceNamesA
 0x6331d8 EnumResourceNamesW
 0x6331dc EnumResourceLanguagesA
 0x6331e0 EnumResourceLanguagesW
 0x6331e4 EnumResourceTypesA
 0x6331e8 EnumResourceTypesW
 0x6331ec CreateFileW
 0x6331f0 LoadLibraryW
 0x6331f4 GetLastError
 0x6331f8 GetCommandLineA
 0x6331fc GetCPInfo
 0x633200 InterlockedIncrement
 0x633204 InterlockedDecrement
 0x633208 GetACP
 0x63320c GetOEMCP
 0x633210 IsValidCodePage
 0x633214 TlsGetValue
 0x633218 TlsAlloc
 0x63321c TlsSetValue
 0x633220 TlsFree
 0x633224 SetLastError
 0x633228 UnhandledExceptionFilter
 0x63322c SetUnhandledExceptionFilter
 0x633230 IsDebuggerPresent
 0x633234 RaiseException
 0x633238 LCMapStringA
 0x63323c LCMapStringW
 0x633240 SetHandleCount
 0x633244 GetStdHandle
 0x633248 GetFileType
 0x63324c GetStartupInfoA
 0x633250 GetModuleFileNameA
 0x633254 FreeEnvironmentStringsA
 0x633258 GetEnvironmentStrings
 0x63325c FreeEnvironmentStringsW
 0x633260 GetEnvironmentStringsW
 0x633264 HeapCreate
 0x633268 HeapDestroy
 0x63326c QueryPerformanceCounter
 0x633270 HeapReAlloc
 0x633274 GetStringTypeA
 0x633278 GetStringTypeW
 0x63327c GetLocaleInfoA
 0x633280 HeapSize
 0x633284 WriteFile
 0x633288 RtlUnwind
 0x63328c SetFilePointer
 0x633290 GetConsoleCP
 0x633294 GetConsoleMode
 0x633298 InitializeCriticalSectionAndSpinCount
 0x63329c SetStdHandle
 0x6332a0 WriteConsoleA
 0x6332a4 GetConsoleOutputCP
 0x6332a8 WriteConsoleW
 0x6332ac CreateFileA
 0x6332b0 FlushFileBuffers
 0x6332b4 VirtualQuery

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure