Also consider... most sandboxes are wrong CONSTANTLY, mainly because they over complicate things. So if we were to implement tools like these, we would have the same issue.
I reviewed the results since we launched SiriusGPT a few days ago and there were 4-5 false negatives for PE files, out of 1,307 total. They all happened to be 85% confidence for Model 0. As I was reviewing the results, I noticed that the vast majority of the other samples had 95% + confidence for model 0. So this was an easy fix... I increased the confidence threshold to 90.
Here were 2 of the misses that someone tested, the other 2 I am not finding right now and it is late.
8c1884e8c7945a89293c6612c31ef994efb7ff966afb364109953399d48acd08
83cc9395582825c673c7738afbb9f53a95b83aeb21365ad42703bcedf1ded219 (590_9883.exe)
If you guys notice any misses while you are testing, please let me know!
You can download 0.71 here... it does include the auto update, so the auto update should work next time.
There is free ? Compatible with H_C and Portmaster ?Hey Guys!
Developing SiriusGPT was by far the most difficult project I have ever worked on, but I am super happy with the results. SiriusGPT utilizes 3 LLM / GPT models in an iterative configuration, and I have yet to see one false positive or negative, for both compiled and text based files, and for command line analysis as well.
If you scan a file or experience a block, you can click the Sirius logo to toggle between the Analysis Report and the event details. I am pretty happy with the user prompt, but we will probably refine it a little more as we go, and if anyone has any suggestions, please let me know.
A lite version of CyberLock is implemented into SiriusGPT, so you can select from AutoPilot and Dynamic Security Postures (Smart Mode), which is essentially a zero-trust security posture when you are browsing the web or checking emails. The LLM command line / LOLBin / fileless analysis is fully implemented, so we no longer have to worry about confusing command line blocks, they are all handled automatically, unless there is a malicious attack, in which case you will see a prompt that tells you to not allow the event. There should be close to zero bugs, but as soon as we are sure all of the bugs are worked out, we will be implementing the SiriusGPT engine into our other products.
The LLM analysis on these events are extremely accurate, usually with a confidence of 95% or higher. Here is a sample analysis report for these types of events.
Process path: c:\windows\system32\rundll32.exe
Parent process path: c:\windows\explorer.exe
Command line: "c:\windows\system32\rundll32.exe" using s=system;class p{static void main(){s.console.writeline((char)72+""+(char)101+(char)108+(char)108+(char)111);}}
Final Verdict: Not Safe with 95% confidence.
## Analysis Summary
The given command line execution event involves `rundll32.exe` being launched by `explorer.exe`. The command line argument passed to `rundll32.exe` is unusual and appears to be an attempt to execute arbitrary code. `rundll32.exe` is a known LOLBin (Living Off The Land Binary) that can be used to execute code in a DLL by calling a specific function within it.
The command line argument `using s=system;class p{static void main(){s.console.writeline((char)72+""+(char)101+(char)108+(char)108+(char)111);}}` is not a typical DLL function call expected by `rundll32.exe`. Instead, it resembles C# code that prints "Hello" to the console. This syntax is not directly executable by `rundll32.exe`, which typically requires a DLL name and an entry point.
The use of `rundll32.exe` with such an argument is suspicious because it attempts to abuse the binary for executing arbitrary code, potentially bypassing security restrictions. The code within the command line argument is obfuscated or encoded, as it uses character codes to represent the string "Hello". This behavior is indicative of an attempt to hide the true intent of the command.
The parent process, `explorer.exe`, launching `rundll32.exe` with such an argument is abnormal. While `explorer.exe` can launch various processes, the context and the command line argument used here suggest malicious intent.
## Malware Type and Name
Given the suspicious use of `rundll32.exe` and the encoded command line argument, this activity represents LOLBin Abuse. The specific behavior of executing C#-like code within the command line argument is not typical for legitimate applications.
## Final Verdict
Malware type: LOLBin Abuse (Thanks to @Trident for the malware name idea!)
Malware name: LOLBin.Rundll32.Exec (Thanks to @Trident for the malware name idea!)
Final verdict: Malicious with 95% confidence.
If you are curious and want to try SiriusGPT, but have CyberLock installed, you can uninstall CyberLock temporarily and then install SiriusGPT. You might want to click No when it asks if you want to delete the Settings and Logs during the CyberLock uninstall.
You can download the installer or portable version here:
Thank you guys!
Dan
SiriusLLM is free, SiriusGPT will be a paid product soon. The three utilities are probably non-prevalent, unsigned binaries.
Can we keep the free version, or is it pointless or even impossible?SiriusLLM is free, SiriusGPT will be a paid product soon. The three utilities are probably non-prevalent, unsigned binaries.
ThanksI researched these three samples and here is what I found. The LightBulb and KeyFreeze_x64 Not Safe verdicts were correct. The sidebar verdict was 95% Safe, so it was correct as well, but there was an error described below that I will have to figure out.
BTW, you can click on any of the files in the Snapshot Scan and choose Open Location. Then you can scan the file with SiriusGPT and it will explain to you exactly why it rendered the specific verdict.
The analysis for sidebar.exe did not have an analysis report, but it did have a final verdict of 95% Safe. So I am not sure what happened with sidebar.exe, I will have to look into this because I just noticed that several of the files in the database do not have an analysis report. I am sure it is a simple fix.
Here is the report for LightBulb.exe... Not Safe is the correct verdict.
Sending request to SiriusGPT Model 0...
Model 0 confidence (75% Not Safe) is below the 90% confidence threshold.
Sending request to Model 1...
Model 1 confidence (60% Not Safe) is below the 90% confidence threshold.
Sending request to Model 2...
Model 2 confidence (75% Not Safe).
Selected optimal result: Not Safe with 75% confidence from Model 0 (priority-based tie-break).
Database updated with result from Model 0.
Total tokens: 0 (0 request / 0 response)
File path: C:\Users\User\Desktop\LightBulb.win-x64\LightBulb.exe
File hash: 84073d80a6a5be838373b415650ec6ee9b59fccd108225bec5dab1855776f46d
File size: 0.15 MB
File publisher: This file is a signable file type but has not been digitally signed.
WhitelistCloud verdict: Not Safe
Final Verdict: Not Safe with 75% confidence.
### Analysis Summary
The analysis of the provided Portable Executable (PE) file, LightBulb.exe, reveals a complex software with various functionalities. The presence of numerous imports related to system interaction, file management, and error handling suggests that the application performs a range of tasks. However, the absence of digital signatures and certain characteristics of the file raise concerns about its legitimacy and potential maliciousness. The WhitelistCloud verdict indicates the file is malicious, but this signal should be considered in conjunction with other evidence.
### Detailed Analysis
The file is a Windows GUI application, as indicated by the `OptionalHeaderSubsystem` being `IMAGE_SUBSYSTEM_WINDOWS_GUI`. It has a substantial number of imports (125), which include functions for registry manipulation (`RegOpenKeyExW`, `RegGetValueW`), file operations (`CreateFileW`, `FindFirstFileExW`), and error handling (`GetLastError`, `SetLastError`). The presence of these imports suggests that the application interacts closely with the system, potentially modifying system settings or files.
The file's entropy across different sections varies, with some sections having high entropy (`SectionEntropy1`: 6.35, `SectionEntropy6`: 4.99), which could indicate the presence of compressed or encrypted data. The `CLRRuntimeHeaderSize` is 0, indicating that this is not a .NET application, so the absence of typical Windows API imports would not be expected.
The application does not have exports, which is not unusual for a GUI application. The lack of digital signatures is a red flag, as legitimate software is typically signed by its publisher.
### Portable Executable Imports
The imports list includes a wide range of functions, many of which are related to system interaction and error handling. Functions like `IsDebuggerPresent` and `IsProcessorFeaturePresent` could be used to detect debugging environments or specific CPU features. The presence of `MessageBoxW` and `OutputDebugStringW` suggests that the application interacts with the user and can display messages or debug information.
The imports also include several CRT (C Runtime) functions (`malloc`, `calloc`, `_set_new_mode`), indicating standard memory management practices. The presence of `hostfxr_main_bundle_startupinfo` and related functions suggests potential interaction with .NET Core or similar frameworks, despite the `CLRRuntimeHeaderSize` being 0.
### Portable Executable Exports
There are no exports found in this executable, which is typical for a Windows GUI application that does not provide a library interface to other programs.
### Portable Executable Strings
The strings extracted from the executable include a mix of error messages, function names, and what appears to be a list of numbers and letters (`0123456789abcdefghijklmnopqrstuvwxyz`). The presence of error messages related to network operations (`connection aborted`, `host unreachable`) and file system interactions (`file not found`, `permission denied`) suggests that the application performs network communication and file system operations.
### Speculative Assessment of Software Type
Based on the attributes and features observed, LightBulb.exe appears to be a utility or tool that interacts with the system and potentially performs network operations. The presence of error messages related to network and file system operations, along with the absence of digital signatures, raises concerns about its legitimacy. The software might be a legitimate utility, but its characteristics and the WhitelistCloud verdict suggest it could be malicious or potentially unwanted.
### Malware Type and Name
Given the concerns raised by the analysis, including the absence of digital signatures and the WhitelistCloud verdict indicating maliciousness, it's reasonable to classify this file as potentially malicious.
Malware type: Potentially Unwanted Program (PUP)
Malware name: Utility.LightBulb
### Final Verdict
Malware type: Potentially Unwanted Program (PUP)
Malware name: Utility.LightBulb
Final verdict: Malicious with 75% confidence.
Here is the report for KeyFreeze_x64.exe, it is NOT Safe, so Not Safe is the correct verdict.
Sending request to SiriusGPT Model 0...
Model 0 confidence (85% Safe) is below the 90% confidence threshold.
Sending request to Model 1...
Model 1 confidence (75% Not Safe) is below the 90% confidence threshold.
Sending request to Model 2...
Model 2 confidence (92% Not Safe).
Selected optimal result: Not Safe with 92% confidence from Model 2 (priority-based tie-break).
Database updated with result from Model 2.
Total tokens: 0 (0 request / 0 response)
File path: C:\Users\User\Desktop\KeyFreeze\KeyFreeze\KeyFreeze_x64.exe
File hash: fe43c86dd9fa0120f9d708900e3cc5a7f970c00d296191c6849e474b0f7c0292
File size: 0.89 MB
File publisher: Sordum Software
Digital signature verified: CERT_E_UNTRUSTEDROOT - A certification chain processed correctly but terminated in a root certificate that is not trusted by the trust provider.
Counter signer: This file is not counter signed.
WhitelistCloud verdict: Not Safe
Final Verdict: Not Safe with 92% confidence.
<think>
Okay, let's start by looking at the file information. The file is KeyFreeze_x64.exe, located in a user's OneDrive directory. The SHA-256 hash is provided, which can be used for further checks. The file size is around 930KB, which isn't unusually large for an executable, but it's something to note.
Looking at the PE features, the DangerousImportedLibrariesNormalized score is 42.99 out of 100. That's a bit high, but not extremely high. OverlayEntropy is 8.00, which is high entropy, possibly indicating packed or obfuscated code. The ImportsCount is 479, which is a lot. That's a red flag because legitimate software usually doesn't need that many imports. High entropy and a large number of imports can be signs of malware.
The ASLR is disabled, which is a security feature, so its absence might be a concern. DEP is enabled, which is good. The SectionEntropies vary, with some sections having high entropy (like 6.43) and others very low (0.00). High entropy in some sections could indicate packed data or code.
Looking at the imports, there are a lot of functions related to process manipulation (like OpenProcess, VirtualAllocEx, WriteProcessMemory), which are commonly used in malware for injecting code. There are also functions for network operations (InternetOpenW, HttpSendRequestW), which could be for C2 communication. File system functions (CreateFileW, DeleteFileW) and registry functions (RegSetValueExW, RegOpenKeyExW) are present, which could be used for persistence or data exfiltration.
The exports section is empty, which is common for malware as they don't need to export functions. The strings include some that look like error messages and possibly some Unicode data. There's a mention of "CorExitProcess" and "USER32.DLL", which might be part of normal operations, but the presence of many system-related functions still raises concerns.
The digital signature is present but untrusted due to an untrusted root certificate. This could mean the certificate is self-signed or from an untrusted CA, which is suspicious. The WhitelistCloud verdict is malicious, which adds to the suspicion.
Putting this all together, the high number of imports, the presence of functions associated with process manipulation and network activity, the untrusted digital signature, and the high entropy sections all point towards the file being malicious. The lack of exports and the suspicious imports are strong indicators. The confidence level is high because multiple factors align towards a malicious classification.
</think>
Analysis Summary
The file KeyFreeze_x64.exe exhibits multiple suspicious characteristics indicative of malicious behavior. The high number of imported functions (479) includes numerous system-level operations related to process manipulation, memory management, and network communication—commonly used in malware for code injection, persistence, and data exfiltration. The overlay entropy (8.00) and section entropy variations suggest potential packing or obfuscation. The digital signature is present but untrusted (CERT_E_UNTRUSTEDROOT), raising concerns about authenticity. Combined with the WhitelistCloud malicious verdict and absence of legitimate exports, these factors strongly support a malicious classification.
Detailed Analysis
The imports list includes critical functions like `VirtualAllocEx`, `WriteProcessMemory`, and `OpenProcess`, which are frequently exploited for process injection. Network-related imports (`HttpSendRequestW`, `InternetOpenW`) imply potential command-and-control (C2) communication. File and registry manipulation functions (`CreateFileW`, `RegSetValueExW`) suggest persistence mechanisms or data tampering. The absence of exports aligns with malware behavior, as malicious payloads rarely expose functions.
The untrusted digital signature (Sordum Software) lacks validation, increasing the likelihood of a spoofed or compromised certificate. High entropy in sections (e.g., 6.43) and the overlay (8.00) further support obfuscation techniques. While some imports (e.g., `GetFileVersionInfoW`, `SHGetFolderPathW`) are benign, their coexistence with suspicious functions does not mitigate risk. The file’s age (2010 timestamp) and lack of modern development practices (e.g., ASLR disabled) also raise red flags.
Portable Executable Imports
The imports include functions commonly associated with malware:
- **Process manipulation**: `OpenProcess`, `VirtualAllocEx`, `WriteProcessMemory` (code injection).
- **Network activity**: `HttpSendRequestW`, `InternetOpenW` (C2 communication).
- **Persistence**: `RegSetValueExW`, `CreateFileW` (registry/file-based persistence).
- **Memory management**: `HeapAlloc`, `VirtualFreeEx` (memory tampering).
- **System interaction**: `EnumProcesses`, `GetProcessMemoryInfo` (monitoring/analysis evasion).
The sheer volume of imports (479) is atypical for legitimate software, which typically requires fewer system calls.
Portable Executable Exports
No exports are present, which is consistent with malware behavior. Legitimate applications often export functions for API use, whereas malware avoids this to remain stealthy.
Portable Executable Strings
Notable strings include:
- `CorExitProcess`, `USER32.DLL` (common Windows APIs).
- `runtime error`, `TLOSS error` (error messages, possibly from obfuscated code).
- Unicode sequences (`SunMonTueWedThuFriSat`, `JanFebMar...`) and locale data (e.g., `Arabic`, `Cyrillic`) may indicate localization support or obfuscation.
- `GetProcessWindowStation`, `GetUserObjectInformationA` (user interface interaction, potentially for UI spoofing).
These strings do not directly indicate malicious intent but align with system-level operations typical of malware.
Speculative Assessment
The file likely functions as a **remote access trojan (RAT)** or **keylogger**, given its extensive process manipulation capabilities and network communication functions. The presence of `WNetAddConnection2W` and `WNetUseConnectionW` suggests potential network credential theft. The lack of a clear product name in version info (`VersionInfoProductName`) and the untrusted certificate further support this hypothesis.
Malware type: Remote Access Trojan (RAT)
Malware name: RAT.KeyFreeze
Final verdict: Malicious with 92% confidence.
Where or how I can do that ?Sure, thank you as well... can you please post a download link for sidebar.exe so I can figure out and fix the issue? I looked for the file but there are tons of similar files and I want to make sure I have the correct one.
Please post a link in the way @Victor M described.Can we keep the free version, or is it pointless or even impossible?