Report - update.exe

Generic Malware Malicious Library UPX PE File PE32 DllRegisterServer dll DLL OS Processor Check
ScreenShot
Created 2025.02.18 17:41 Machine s1_win7_x6401
Filename update.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score Not founds Behavior Score
2.4
ZERO API file : clean
VT API (file)
md5 0c1d951bd8edb3b7ee31d34c543c3db3
sha256 f38ecda755dc8ba8825fb364c2f24ca53ed33ec01332238ac074afede77edb6b
ssdeep 786432:ZFNLpFCkXnOgD/+BHmvWvzIivUGMjNV5A+TubYBoNVHQmb5YNyzombOn5PKNRYAn:ZFd+kXOgDg6AvMLv/aDrHQQYNEbffV
imphash ef9b8e6863d1f74a617655ec935c6c32
impfuzzy 48:Ebik9gZQzOSt55uSe0Q4lCKKQ5QES5/1nBX4ozmb5EM:Ebb9gZQztaHxHmb5Z
  Network IP location

Signature (7cnts)

Level Description
watch Creates an executable file in a user folder
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info The executable uses a known packer

Rules (12cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
info DllRegisterServer_Zero execute regsvr32.exe binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x408060 SetErrorMode
 0x408064 lstrcatA
 0x408068 GetDriveTypeA
 0x40806c SetEnvironmentVariableA
 0x408070 lstrcpyA
 0x408074 GetModuleFileNameA
 0x408078 GetTempPathA
 0x40807c GetTempFileNameA
 0x408080 GlobalHandle
 0x408084 _lwrite
 0x408088 _lcreat
 0x40808c _lopen
 0x408090 _lclose
 0x408094 WinExec
 0x408098 GetEnvironmentVariableA
 0x40809c RemoveDirectoryA
 0x4080a0 CreateDirectoryA
 0x4080a4 GetWindowsDirectoryA
 0x4080a8 GetProcessHeap
 0x4080ac ExitProcess
 0x4080b0 TerminateProcess
 0x4080b4 SetStdHandle
 0x4080b8 SetFilePointer
 0x4080bc FlushFileBuffers
 0x4080c0 GetStringTypeA
 0x4080c4 WriteFile
 0x4080c8 GetStringTypeW
 0x4080cc GetFileType
 0x4080d0 GetStdHandle
 0x4080d4 RtlUnwind
 0x4080d8 GetEnvironmentStringsW
 0x4080dc GetEnvironmentStrings
 0x4080e0 SetHandleCount
 0x4080e4 GlobalLock
 0x4080e8 GetCurrentProcess
 0x4080ec FreeEnvironmentStringsA
 0x4080f0 UnhandledExceptionFilter
 0x4080f4 FreeEnvironmentStringsW
 0x4080f8 LCMapStringA
 0x4080fc MultiByteToWideChar
 0x408100 LCMapStringW
 0x408104 GetVersionExA
 0x408108 HeapAlloc
 0x40810c GetCurrentThread
 0x408110 CloseHandle
 0x408114 HeapFree
 0x408118 LoadLibraryA
 0x40811c GetProcAddress
 0x408120 GetCurrentThreadId
 0x408124 FreeLibrary
 0x408128 _lread
 0x40812c _llseek
 0x408130 GlobalUnlock
 0x408134 GlobalFree
 0x408138 GlobalAlloc
 0x40813c HeapDestroy
 0x408140 HeapCreate
 0x408144 GetOEMCP
 0x408148 GetLastError
 0x40814c DeleteFileA
 0x408150 GetModuleHandleA
 0x408154 GetStartupInfoA
 0x408158 GetCommandLineA
 0x40815c GetVersion
 0x408160 GetACP
 0x408164 WideCharToMultiByte
 0x408168 VirtualFree
 0x40816c VirtualAlloc
 0x408170 HeapReAlloc
 0x408174 GetCPInfo
USER32.dll
 0x40817c ReleaseDC
 0x408180 ExitWindowsEx
 0x408184 MessageBoxA
 0x408188 LoadIconA
 0x40818c RegisterClassA
 0x408190 LoadCursorA
 0x408194 SetWindowPos
 0x408198 UpdateWindow
 0x40819c ShowWindow
 0x4081a0 wsprintfA
 0x4081a4 LoadStringA
 0x4081a8 InvalidateRect
 0x4081ac BeginPaint
 0x4081b0 EndPaint
 0x4081b4 DefWindowProcA
 0x4081b8 PostQuitMessage
 0x4081bc SendMessageA
 0x4081c0 GetDC
 0x4081c4 GetClientRect
 0x4081c8 CreateWindowExA
GDI32.dll
 0x408038 GetDeviceCaps
 0x40803c GetStockObject
 0x408040 PatBlt
 0x408044 DeleteObject
 0x408048 SelectObject
 0x40804c RealizePalette
 0x408050 CreateSolidBrush
 0x408054 CreatePalette
 0x408058 SelectPalette
ADVAPI32.dll
 0x408000 SetSecurityDescriptorDacl
 0x408004 AllocateAndInitializeSid
 0x408008 GetLengthSid
 0x40800c InitializeAcl
 0x408010 AddAccessAllowedAce
 0x408014 InitializeSecurityDescriptor
 0x408018 RevertToSelf
 0x40801c SetSecurityDescriptorOwner
 0x408020 SetSecurityDescriptorGroup
 0x408024 ImpersonateSelf
 0x408028 OpenThreadToken
 0x40802c MapGenericMask
 0x408030 AccessCheck

EAT(Export Address Table) Library

0x402a2c _MainWndProc@16
0x4030da _StubFileWrite@12


Similarity measure (PE file only) - Checking for service failure