Report - setup3.exe

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.10.14 11:11 Machine s1_win7_x6401
Filename setup3.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
1.4
ZERO API
VT API (file)
md5 2640ff3ce4adabce9c3f5ddac71f7a29
sha256 3653f4a3fd7a35dd7b82e0061152749f5af17719865fa4d0f206acf96a89f1ce
ssdeep 3072:nJsnRgMQvro++hd7U+L5dCyxF9Dav+HUCIqzpjAqMi:WRg7vrobo8/4+HVIqzpjAqh
imphash dc51987737c4af4f71f5c3733cf2b1f2
impfuzzy 24:b4BbG2SGbbSFkrkRHsOc261cDbEdQBxV4WCnFO6tppjLOovttgcfdYT/J37lSQ8K:8s1CnjOkfdRnN6ktgcfI7l0cJ5P
  Network IP location

Signature (4cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x418010 OpenJobObjectA
 0x418014 ReadConsoleA
 0x418018 InterlockedDecrement
 0x41801c GlobalSize
 0x418020 SetDefaultCommConfigW
 0x418024 QueryDosDeviceA
 0x418028 GetComputerNameW
 0x41802c SetEvent
 0x418030 GetNumaAvailableMemoryNode
 0x418034 FreeEnvironmentStringsA
 0x418038 GetModuleHandleW
 0x41803c GetConsoleAliasesLengthA
 0x418040 SetCommState
 0x418044 GetConsoleWindow
 0x418048 ReadConsoleOutputW
 0x41804c GetVersionExW
 0x418050 GetStringTypeExW
 0x418054 HeapDestroy
 0x418058 GetFileAttributesA
 0x41805c DeleteVolumeMountPointA
 0x418060 DisconnectNamedPipe
 0x418064 LCMapStringA
 0x418068 GetLastError
 0x41806c GetProcAddress
 0x418070 MoveFileW
 0x418074 SetStdHandle
 0x418078 LoadLibraryA
 0x41807c InterlockedExchangeAdd
 0x418080 LocalAlloc
 0x418084 WritePrivateProfileStringA
 0x418088 GetModuleFileNameA
 0x41808c BuildCommDCBA
 0x418090 FatalAppExitA
 0x418094 GetShortPathNameW
 0x418098 SetCalendarInfoA
 0x41809c FindAtomW
 0x4180a0 SearchPathW
 0x4180a4 GetNumaProcessorNode
 0x4180a8 GetConsoleFontSize
 0x4180ac PulseEvent
 0x4180b0 HeapAlloc
 0x4180b4 MultiByteToWideChar
 0x4180b8 Sleep
 0x4180bc ExitProcess
 0x4180c0 GetCommandLineA
 0x4180c4 GetStartupInfoA
 0x4180c8 TerminateProcess
 0x4180cc GetCurrentProcess
 0x4180d0 UnhandledExceptionFilter
 0x4180d4 SetUnhandledExceptionFilter
 0x4180d8 IsDebuggerPresent
 0x4180dc DeleteCriticalSection
 0x4180e0 LeaveCriticalSection
 0x4180e4 EnterCriticalSection
 0x4180e8 HeapFree
 0x4180ec VirtualFree
 0x4180f0 VirtualAlloc
 0x4180f4 HeapReAlloc
 0x4180f8 HeapCreate
 0x4180fc WriteFile
 0x418100 GetStdHandle
 0x418104 TlsGetValue
 0x418108 TlsAlloc
 0x41810c TlsSetValue
 0x418110 TlsFree
 0x418114 InterlockedIncrement
 0x418118 SetLastError
 0x41811c GetCurrentThreadId
 0x418120 HeapSize
 0x418124 GetCPInfo
 0x418128 GetACP
 0x41812c GetOEMCP
 0x418130 IsValidCodePage
 0x418134 InitializeCriticalSectionAndSpinCount
 0x418138 GetEnvironmentStrings
 0x41813c FreeEnvironmentStringsW
 0x418140 WideCharToMultiByte
 0x418144 GetEnvironmentStringsW
 0x418148 SetHandleCount
 0x41814c GetFileType
 0x418150 QueryPerformanceCounter
 0x418154 GetTickCount
 0x418158 GetCurrentProcessId
 0x41815c GetSystemTimeAsFileTime
 0x418160 RtlUnwind
 0x418164 LCMapStringW
 0x418168 GetStringTypeA
 0x41816c GetStringTypeW
 0x418170 GetLocaleInfoA
 0x418174 SetFilePointer
 0x418178 GetConsoleCP
 0x41817c GetConsoleMode
 0x418180 FlushFileBuffers
 0x418184 WriteConsoleA
 0x418188 GetConsoleOutputCP
 0x41818c WriteConsoleW
 0x418190 CloseHandle
 0x418194 CreateFileA
GDI32.dll
 0x418008 GetBoundsRect
ADVAPI32.dll
 0x418000 ClearEventLogW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure