Report - fgdump.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check PE64 DLL
ScreenShot
Created 2024.10.20 10:12 Machine s1_win7_x6403
Filename fgdump.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
2
Behavior Score
3.4
ZERO API file : mailcious
VT API (file)
md5 0762764e298c369a2de8afaec5174ed9
sha256 a6cad2d0f8dc05246846d2a9618fc93b7d97681331d5826f8353e7c3a3206e86
ssdeep 12288:ED7lxIXgij3qi3MAxGQ3BdOukFfY+F1ldsui3hBTo:EEXjj3qgPGQ3BVkpY+F1ldsui37To
imphash fd35e4db9753c3fb74671af9bb4e4e64
impfuzzy 48:qVDeOGmSpy9n7qdnMTCbxcKpFZmj/eBpAy:qVDeASpyh7mnMTCbxcufmzk
  Network IP location

Signature (9cnts)

Level Description
watch Creates known Hupigon files
watch Creates known PWDump/FGDump files
notice Creates a service
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
info Command line console output was observed
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (14cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

NETAPI32.dll
 0x4171d0 NetShareEnum
 0x4171d4 NetApiBufferFree
MPR.dll
 0x4171c4 WNetCancelConnection2A
 0x4171c8 WNetAddConnection2A
KERNEL32.dll
 0x417034 ResetEvent
 0x417038 LeaveCriticalSection
 0x41703c WaitForMultipleObjects
 0x417040 EnterCriticalSection
 0x417044 GetSystemTime
 0x417048 GetCurrentThreadId
 0x41704c CreateThread
 0x417050 CreateEventA
 0x417054 GetLastError
 0x417058 GetTempPathA
 0x41705c CopyFileA
 0x417060 DeleteFileA
 0x417064 InterlockedIncrement
 0x417068 GetCommandLineA
 0x41706c GetLocalTime
 0x417070 CloseHandle
 0x417074 CreateProcessA
 0x417078 SetEvent
 0x41707c DuplicateHandle
 0x417080 GetCurrentProcess
 0x417084 CreatePipe
 0x417088 GetStdHandle
 0x41708c GetCurrentDirectoryA
 0x417090 FreeResource
 0x417094 SizeofResource
 0x417098 LockResource
 0x41709c LoadResource
 0x4170a0 FindResourceA
 0x4170a4 Sleep
 0x4170a8 CreateMutexA
 0x4170ac GetLocaleInfoW
 0x4170b0 DeleteCriticalSection
 0x4170b4 InitializeCriticalSection
 0x4170b8 LoadLibraryExA
 0x4170bc FormatMessageA
 0x4170c0 FreeLibrary
 0x4170c4 WaitForSingleObject
 0x4170c8 SetEndOfFile
 0x4170cc ReadFile
 0x4170d0 ExitProcess
 0x4170d4 InterlockedExchange
 0x4170d8 LoadLibraryA
 0x4170dc SetStdHandle
 0x4170e0 HeapFree
 0x4170e4 RtlUnwind
 0x4170e8 RaiseException
 0x4170ec GetProcAddress
 0x4170f0 GetModuleHandleA
 0x4170f4 TerminateProcess
 0x4170f8 HeapAlloc
 0x4170fc WriteConsoleA
 0x417100 ReadConsoleInputA
 0x417104 SetConsoleMode
 0x417108 GetConsoleMode
 0x41710c MultiByteToWideChar
 0x417110 WideCharToMultiByte
 0x417114 GetVersionExA
 0x417118 LCMapStringA
 0x41711c LCMapStringW
 0x417120 GetCPInfo
 0x417124 HeapDestroy
 0x417128 HeapCreate
 0x41712c VirtualFree
 0x417130 VirtualAlloc
 0x417134 HeapReAlloc
 0x417138 IsBadWritePtr
 0x41713c SetUnhandledExceptionFilter
 0x417140 WriteFile
 0x417144 FlushFileBuffers
 0x417148 QueryPerformanceCounter
 0x41714c GetTickCount
 0x417150 GetCurrentProcessId
 0x417154 GetSystemTimeAsFileTime
 0x417158 GetModuleFileNameA
 0x41715c SetFilePointer
 0x417160 CreateFileA
 0x417164 VirtualProtect
 0x417168 GetSystemInfo
 0x41716c VirtualQuery
 0x417170 SetHandleCount
 0x417174 GetFileType
 0x417178 GetStartupInfoA
 0x41717c HeapSize
 0x417180 GetACP
 0x417184 GetOEMCP
 0x417188 UnhandledExceptionFilter
 0x41718c FreeEnvironmentStringsA
 0x417190 GetEnvironmentStrings
 0x417194 FreeEnvironmentStringsW
 0x417198 GetEnvironmentStringsW
 0x41719c GetLocaleInfoA
 0x4171a0 GetStringTypeA
 0x4171a4 GetStringTypeW
 0x4171a8 GetUserDefaultLCID
 0x4171ac EnumSystemLocalesA
 0x4171b0 IsValidLocale
 0x4171b4 IsValidCodePage
 0x4171b8 IsBadReadPtr
 0x4171bc IsBadCodePtr
USER32.dll
 0x4171dc wsprintfA
ADVAPI32.dll
 0x417000 CreateServiceA
 0x417004 ControlService
 0x417008 StartServiceA
 0x41700c OpenSCManagerA
 0x417010 OpenServiceA
 0x417014 CloseServiceHandle
 0x417018 QueryServiceStatus
 0x41701c RegConnectRegistryA
 0x417020 RegOpenKeyA
 0x417024 RegQueryValueExA
 0x417028 RegCloseKey
 0x41702c DeleteService
ole32.dll
 0x4171e4 CoCreateGuid
 0x4171e8 StringFromGUID2

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure