Report - Gigantic_Setup.exe

Generic Malware Malicious Library Antivirus Malicious Packer UPX PE File PE64
ScreenShot
Created 2025.04.21 10:37 Machine s1_win7_x6403
Filename Gigantic_Setup.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
1.6
ZERO API file : malware
VT API (file) 51 detected (Common, Gatak, Malicious, score, Ghanarava, Emotet, GenericKD, Unsafe, Kryptik, Vqlk, confidence, high confidence, PWSX, swgtIFjZzO, Rhadamanthys, sewvt, Detected, Convagent, Malware@#1b9fygmcmuvt8, Wacatac, ABTrojan, ZRUC, Artemis, PE04C9V, Gencirc, susgen, GenKryptik, HGGK, B9nj)
md5 dc34da6f3d1a32c6347bb1b78e4bf66e
sha256 77812c4ccb785a839fad3b3fe3445e8eec3601ae175a82e3f841cc106921f616
ssdeep 49152:G4Dc9gae7g/0rzjw1MqkO/GEKeBKxThMZ+czB:4M7g/0LtqTwekTyb
imphash 184e98d1d9ae7bd5be8a15e7dcad9e4c
impfuzzy 48:8fpcmG+JGfwAkoqtTbfItMlmf9/4nenb1XHK:8fpcmG+JGnRqtnQtimfqnSb1XHK
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14019e4f8 DeleteCriticalSection
 0x14019e500 EnterCriticalSection
 0x14019e508 InitializeCriticalSection
 0x14019e510 LeaveCriticalSection
 0x14019e518 RaiseException
 0x14019e520 RtlUnwindEx
 0x14019e528 VirtualQuery
 0x14019e530 __C_specific_handler
msvcrt.dll
 0x14019e540 __getmainargs
 0x14019e548 __initenv
 0x14019e550 __iob_func
 0x14019e558 __set_app_type
 0x14019e560 __setusermatherr
 0x14019e568 _amsg_exit
 0x14019e570 _cexit
 0x14019e578 _commode
 0x14019e580 _fmode
 0x14019e588 _fpreset
 0x14019e590 _initterm
 0x14019e598 abort
 0x14019e5a0 atexit
 0x14019e5a8 calloc
 0x14019e5b0 exit
 0x14019e5b8 fprintf
 0x14019e5c0 free
 0x14019e5c8 fwrite
 0x14019e5d0 malloc
 0x14019e5d8 memcmp
 0x14019e5e0 memcpy
 0x14019e5e8 memmove
 0x14019e5f0 memset
 0x14019e5f8 signal
 0x14019e600 strlen
 0x14019e608 strncmp
 0x14019e610 vfprintf
ntdll.dll
 0x14019e620 NtReadFile
 0x14019e628 NtWriteFile
 0x14019e630 RtlCaptureContext
 0x14019e638 RtlLookupFunctionEntry
 0x14019e640 RtlNtStatusToDosError
 0x14019e648 RtlVirtualUnwind
advapi32.dll
 0x14019e658 GetTokenInformation
 0x14019e660 OpenProcessToken
 0x14019e668 SystemFunction036
crypt.dll
 0x14019e678 BCryptGenRandom
kernel32.dll
 0x14019e688 AddVectoredExceptionHandler
 0x14019e690 CancelIo
 0x14019e698 CloseHandle
 0x14019e6a0 CompareStringOrdinal
 0x14019e6a8 CreateEventW
 0x14019e6b0 CreateFileMappingA
 0x14019e6b8 CreateFileW
 0x14019e6c0 CreateMutexA
 0x14019e6c8 CreateNamedPipeW
 0x14019e6d0 CreateProcessW
 0x14019e6d8 CreateThread
 0x14019e6e0 CreateTimerQueue
 0x14019e6e8 CreateToolhelp32Snapshot
 0x14019e6f0 DeleteProcThreadAttributeList
 0x14019e6f8 DeleteTimerQueue
 0x14019e700 DuplicateHandle
 0x14019e708 ExitProcess
 0x14019e710 FindClose
 0x14019e718 FindFirstFileExW
 0x14019e720 FormatMessageW
 0x14019e728 FreeEnvironmentStringsW
 0x14019e730 GetCommandLineW
 0x14019e738 GetConsoleMode
 0x14019e740 GetCurrentDirectoryW
 0x14019e748 GetCurrentProcess
 0x14019e750 GetCurrentProcessId
 0x14019e758 GetCurrentThread
 0x14019e760 GetEnvironmentStringsW
 0x14019e768 GetEnvironmentVariableW
 0x14019e770 GetExitCodeProcess
 0x14019e778 GetFileAttributesW
 0x14019e780 GetFileInformationByHandle
 0x14019e788 GetFileInformationByHandleEx
 0x14019e790 GetFullPathNameW
 0x14019e798 GetLastError
 0x14019e7a0 GetModuleFileNameW
 0x14019e7a8 GetModuleHandleA
 0x14019e7b0 GetModuleHandleExW
 0x14019e7b8 GetModuleHandleW
 0x14019e7c0 GetOverlappedResult
 0x14019e7c8 GetProcAddress
 0x14019e7d0 GetProcessHeap
 0x14019e7d8 GetStdHandle
 0x14019e7e0 GetSystemDirectoryW
 0x14019e7e8 GetWindowsDirectoryW
 0x14019e7f0 HeapAlloc
 0x14019e7f8 HeapCreate
 0x14019e800 HeapFree
 0x14019e808 HeapReAlloc
 0x14019e810 InitOnceBeginInitialize
 0x14019e818 InitOnceComplete
 0x14019e820 InitializeProcThreadAttributeList
 0x14019e828 LoadLibraryA
 0x14019e830 MapViewOfFile
 0x14019e838 Module32FirstW
 0x14019e840 Module32NextW
 0x14019e848 MultiByteToWideChar
 0x14019e850 Process32FirstW
 0x14019e858 Process32NextW
 0x14019e860 ReadFile
 0x14019e868 ReadFileEx
 0x14019e870 SetEvent
 0x14019e878 SetFileInformationByHandle
 0x14019e880 SetLastError
 0x14019e888 SetThreadStackGuarantee
 0x14019e890 SetUnhandledExceptionFilter
 0x14019e898 Sleep
 0x14019e8a0 SleepEx
 0x14019e8a8 TlsAlloc
 0x14019e8b0 TlsFree
 0x14019e8b8 TlsGetValue
 0x14019e8c0 TlsSetValue
 0x14019e8c8 UnmapViewOfFile
 0x14019e8d0 UpdateProcThreadAttribute
 0x14019e8d8 VirtualProtect
 0x14019e8e0 WaitForMultipleObjects
 0x14019e8e8 WaitForSingleObject
 0x14019e8f0 WriteConsoleW
 0x14019e8f8 WriteFileEx
api-ms-win-core-synch-l1-2-0.dll
 0x14019e908 WaitOnAddress
 0x14019e910 WakeByAddressAll
 0x14019e918 WakeByAddressSingle
cryptprimitives.dll
 0x14019e928 ProcessPrng

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure