ScreenShot
Created | 2023.05.14 17:08 | Machine | s1_win7_x6401 |
Filename | lega.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | |||
md5 | 72361b9ac961ae2ec3e94022f1ccb0a6 | ||
sha256 | 9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89 | ||
ssdeep | 24576:5ygV7gU38KOObckOMCYOMSNdA3kLfycOBVh1YWNmo:sgiUlOUckOMCBiUTyvY | ||
imphash | 646167cce332c1c252cdcb1839e0cf48 | ||
impfuzzy | 48:mPkNSpUOU4iLzNXMuM9a08vTL5wtV6x9KEl4LTrzUp5aSvd59E5o+RXpNuAC8tGg:ikmUZ4iLBXMuMc08vTLhsNeGmdM |
Network IP location
Signature (31cnts)
Level | Description |
---|---|
danger | Disables Windows Security features |
danger | Executed a process and injected code into it |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Attempts to disable Windows Auto Updates |
watch | Attempts to stop active services |
watch | Collects information about installed applications |
watch | Communicates with host for which no DNS query was performed |
watch | Executes one or more WMI queries |
watch | Harvests credentials from local FTP client softwares |
watch | Installs itself for autorun at Windows startup |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates executable files on the filesystem |
notice | Drops an executable to the user AppData folder |
notice | Executes one or more WMI queries which can be used to identify virtual machines |
notice | One or more potentially interesting buffers were extracted |
notice | Queries for potentially installed applications |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | One or more processes crashed |
info | Queries for the computername |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
info | Tries to locate where the browsers are installed |
info | Uses Windows APIs to generate a cryptographic key |
Rules (30cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | RedLine_Stealer_m_Zero | RedLine stealer | memory |
danger | RedLine_Stealer_Zero | RedLine stealer | binaries (download) |
danger | Win32_Trojan_Emotet_RL_Gen_Zero | Win32 Trojan Emotet | binaries (download) |
danger | Win32_Trojan_Emotet_RL_Gen_Zero | Win32 Trojan Emotet | binaries (upload) |
danger | Win32_Trojan_Gen_1_0904B0_Zero | Win32 Trojan Emotet | binaries (download) |
danger | Win32_Trojan_Gen_1_0904B0_Zero | Win32 Trojan Emotet | binaries (upload) |
watch | ConfuserEx_Zero | Confuser .NET | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
watch | Win32_Trojan_PWS_Net_1_Zero | Win32 Trojan PWS .NET Azorult | binaries (download) |
notice | Generic_PWS_Memory_Zero | PWS Memory | memory |
notice | Network_SMTP_dotNet | Communications smtp | memory |
info | anti_dbg | Checks if being debugged | memory |
info | CAB_file_format | CAB archive file | binaries (download) |
info | CAB_file_format | CAB archive file | binaries (upload) |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | Is_DotNET_EXE | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
info | Win_Backdoor_AsyncRAT_Zero | Win Backdoor AsyncRAT | binaries (download) |
PE API
IAT(Import Address Table) Library
ADVAPI32.dll
0x40a000 GetTokenInformation
0x40a004 RegDeleteValueA
0x40a008 RegOpenKeyExA
0x40a00c RegQueryInfoKeyA
0x40a010 FreeSid
0x40a014 OpenProcessToken
0x40a018 RegSetValueExA
0x40a01c RegCreateKeyExA
0x40a020 LookupPrivilegeValueA
0x40a024 AllocateAndInitializeSid
0x40a028 RegQueryValueExA
0x40a02c EqualSid
0x40a030 RegCloseKey
0x40a034 AdjustTokenPrivileges
KERNEL32.dll
0x40a060 _lopen
0x40a064 _llseek
0x40a068 CompareStringA
0x40a06c GetLastError
0x40a070 GetFileAttributesA
0x40a074 GetSystemDirectoryA
0x40a078 LoadLibraryA
0x40a07c DeleteFileA
0x40a080 GlobalAlloc
0x40a084 GlobalFree
0x40a088 CloseHandle
0x40a08c WritePrivateProfileStringA
0x40a090 IsDBCSLeadByte
0x40a094 GetWindowsDirectoryA
0x40a098 SetFileAttributesA
0x40a09c GetProcAddress
0x40a0a0 GlobalLock
0x40a0a4 LocalFree
0x40a0a8 RemoveDirectoryA
0x40a0ac FreeLibrary
0x40a0b0 _lclose
0x40a0b4 CreateDirectoryA
0x40a0b8 GetPrivateProfileIntA
0x40a0bc GetPrivateProfileStringA
0x40a0c0 GlobalUnlock
0x40a0c4 ReadFile
0x40a0c8 SizeofResource
0x40a0cc WriteFile
0x40a0d0 GetDriveTypeA
0x40a0d4 lstrcmpA
0x40a0d8 SetFileTime
0x40a0dc SetFilePointer
0x40a0e0 FindResourceA
0x40a0e4 CreateMutexA
0x40a0e8 GetVolumeInformationA
0x40a0ec ExpandEnvironmentStringsA
0x40a0f0 GetCurrentDirectoryA
0x40a0f4 FreeResource
0x40a0f8 GetVersion
0x40a0fc SetCurrentDirectoryA
0x40a100 GetTempPathA
0x40a104 LocalFileTimeToFileTime
0x40a108 CreateFileA
0x40a10c SetEvent
0x40a110 TerminateThread
0x40a114 GetVersionExA
0x40a118 LockResource
0x40a11c GetSystemInfo
0x40a120 CreateThread
0x40a124 ResetEvent
0x40a128 LoadResource
0x40a12c ExitProcess
0x40a130 GetModuleHandleW
0x40a134 CreateProcessA
0x40a138 FormatMessageA
0x40a13c GetTempFileNameA
0x40a140 DosDateTimeToFileTime
0x40a144 CreateEventA
0x40a148 GetExitCodeProcess
0x40a14c FindNextFileA
0x40a150 LocalAlloc
0x40a154 GetShortPathNameA
0x40a158 MulDiv
0x40a15c GetDiskFreeSpaceA
0x40a160 EnumResourceLanguagesA
0x40a164 GetTickCount
0x40a168 GetSystemTimeAsFileTime
0x40a16c GetCurrentThreadId
0x40a170 GetCurrentProcessId
0x40a174 QueryPerformanceCounter
0x40a178 TerminateProcess
0x40a17c SetUnhandledExceptionFilter
0x40a180 UnhandledExceptionFilter
0x40a184 GetStartupInfoW
0x40a188 Sleep
0x40a18c FindClose
0x40a190 GetCurrentProcess
0x40a194 FindFirstFileA
0x40a198 WaitForSingleObject
0x40a19c GetModuleFileNameA
0x40a1a0 LoadLibraryExA
GDI32.dll
0x40a058 GetDeviceCaps
USER32.dll
0x40a1a8 SetWindowLongA
0x40a1ac GetDlgItemTextA
0x40a1b0 DialogBoxIndirectParamA
0x40a1b4 ShowWindow
0x40a1b8 MsgWaitForMultipleObjects
0x40a1bc SetWindowPos
0x40a1c0 GetDC
0x40a1c4 GetWindowRect
0x40a1c8 DispatchMessageA
0x40a1cc GetDesktopWindow
0x40a1d0 CharUpperA
0x40a1d4 SetDlgItemTextA
0x40a1d8 ExitWindowsEx
0x40a1dc MessageBeep
0x40a1e0 EndDialog
0x40a1e4 CharPrevA
0x40a1e8 LoadStringA
0x40a1ec CharNextA
0x40a1f0 EnableWindow
0x40a1f4 ReleaseDC
0x40a1f8 SetForegroundWindow
0x40a1fc PeekMessageA
0x40a200 GetDlgItem
0x40a204 SendMessageA
0x40a208 SendDlgItemMessageA
0x40a20c MessageBoxA
0x40a210 SetWindowTextA
0x40a214 GetWindowLongA
0x40a218 CallWindowProcA
0x40a21c GetSystemMetrics
msvcrt.dll
0x40a234 _controlfp
0x40a238 ?terminate@@YAXXZ
0x40a23c _acmdln
0x40a240 _initterm
0x40a244 __setusermatherr
0x40a248 _except_handler4_common
0x40a24c memcpy
0x40a250 _ismbblead
0x40a254 __p__fmode
0x40a258 _cexit
0x40a25c _exit
0x40a260 exit
0x40a264 __set_app_type
0x40a268 __getmainargs
0x40a26c _amsg_exit
0x40a270 __p__commode
0x40a274 _XcptFilter
0x40a278 memcpy_s
0x40a27c _vsnprintf
0x40a280 memset
COMCTL32.dll
0x40a03c None
Cabinet.dll
0x40a044 None
0x40a048 None
0x40a04c None
0x40a050 None
VERSION.dll
0x40a224 GetFileVersionInfoA
0x40a228 VerQueryValueA
0x40a22c GetFileVersionInfoSizeA
EAT(Export Address Table) is none
ADVAPI32.dll
0x40a000 GetTokenInformation
0x40a004 RegDeleteValueA
0x40a008 RegOpenKeyExA
0x40a00c RegQueryInfoKeyA
0x40a010 FreeSid
0x40a014 OpenProcessToken
0x40a018 RegSetValueExA
0x40a01c RegCreateKeyExA
0x40a020 LookupPrivilegeValueA
0x40a024 AllocateAndInitializeSid
0x40a028 RegQueryValueExA
0x40a02c EqualSid
0x40a030 RegCloseKey
0x40a034 AdjustTokenPrivileges
KERNEL32.dll
0x40a060 _lopen
0x40a064 _llseek
0x40a068 CompareStringA
0x40a06c GetLastError
0x40a070 GetFileAttributesA
0x40a074 GetSystemDirectoryA
0x40a078 LoadLibraryA
0x40a07c DeleteFileA
0x40a080 GlobalAlloc
0x40a084 GlobalFree
0x40a088 CloseHandle
0x40a08c WritePrivateProfileStringA
0x40a090 IsDBCSLeadByte
0x40a094 GetWindowsDirectoryA
0x40a098 SetFileAttributesA
0x40a09c GetProcAddress
0x40a0a0 GlobalLock
0x40a0a4 LocalFree
0x40a0a8 RemoveDirectoryA
0x40a0ac FreeLibrary
0x40a0b0 _lclose
0x40a0b4 CreateDirectoryA
0x40a0b8 GetPrivateProfileIntA
0x40a0bc GetPrivateProfileStringA
0x40a0c0 GlobalUnlock
0x40a0c4 ReadFile
0x40a0c8 SizeofResource
0x40a0cc WriteFile
0x40a0d0 GetDriveTypeA
0x40a0d4 lstrcmpA
0x40a0d8 SetFileTime
0x40a0dc SetFilePointer
0x40a0e0 FindResourceA
0x40a0e4 CreateMutexA
0x40a0e8 GetVolumeInformationA
0x40a0ec ExpandEnvironmentStringsA
0x40a0f0 GetCurrentDirectoryA
0x40a0f4 FreeResource
0x40a0f8 GetVersion
0x40a0fc SetCurrentDirectoryA
0x40a100 GetTempPathA
0x40a104 LocalFileTimeToFileTime
0x40a108 CreateFileA
0x40a10c SetEvent
0x40a110 TerminateThread
0x40a114 GetVersionExA
0x40a118 LockResource
0x40a11c GetSystemInfo
0x40a120 CreateThread
0x40a124 ResetEvent
0x40a128 LoadResource
0x40a12c ExitProcess
0x40a130 GetModuleHandleW
0x40a134 CreateProcessA
0x40a138 FormatMessageA
0x40a13c GetTempFileNameA
0x40a140 DosDateTimeToFileTime
0x40a144 CreateEventA
0x40a148 GetExitCodeProcess
0x40a14c FindNextFileA
0x40a150 LocalAlloc
0x40a154 GetShortPathNameA
0x40a158 MulDiv
0x40a15c GetDiskFreeSpaceA
0x40a160 EnumResourceLanguagesA
0x40a164 GetTickCount
0x40a168 GetSystemTimeAsFileTime
0x40a16c GetCurrentThreadId
0x40a170 GetCurrentProcessId
0x40a174 QueryPerformanceCounter
0x40a178 TerminateProcess
0x40a17c SetUnhandledExceptionFilter
0x40a180 UnhandledExceptionFilter
0x40a184 GetStartupInfoW
0x40a188 Sleep
0x40a18c FindClose
0x40a190 GetCurrentProcess
0x40a194 FindFirstFileA
0x40a198 WaitForSingleObject
0x40a19c GetModuleFileNameA
0x40a1a0 LoadLibraryExA
GDI32.dll
0x40a058 GetDeviceCaps
USER32.dll
0x40a1a8 SetWindowLongA
0x40a1ac GetDlgItemTextA
0x40a1b0 DialogBoxIndirectParamA
0x40a1b4 ShowWindow
0x40a1b8 MsgWaitForMultipleObjects
0x40a1bc SetWindowPos
0x40a1c0 GetDC
0x40a1c4 GetWindowRect
0x40a1c8 DispatchMessageA
0x40a1cc GetDesktopWindow
0x40a1d0 CharUpperA
0x40a1d4 SetDlgItemTextA
0x40a1d8 ExitWindowsEx
0x40a1dc MessageBeep
0x40a1e0 EndDialog
0x40a1e4 CharPrevA
0x40a1e8 LoadStringA
0x40a1ec CharNextA
0x40a1f0 EnableWindow
0x40a1f4 ReleaseDC
0x40a1f8 SetForegroundWindow
0x40a1fc PeekMessageA
0x40a200 GetDlgItem
0x40a204 SendMessageA
0x40a208 SendDlgItemMessageA
0x40a20c MessageBoxA
0x40a210 SetWindowTextA
0x40a214 GetWindowLongA
0x40a218 CallWindowProcA
0x40a21c GetSystemMetrics
msvcrt.dll
0x40a234 _controlfp
0x40a238 ?terminate@@YAXXZ
0x40a23c _acmdln
0x40a240 _initterm
0x40a244 __setusermatherr
0x40a248 _except_handler4_common
0x40a24c memcpy
0x40a250 _ismbblead
0x40a254 __p__fmode
0x40a258 _cexit
0x40a25c _exit
0x40a260 exit
0x40a264 __set_app_type
0x40a268 __getmainargs
0x40a26c _amsg_exit
0x40a270 __p__commode
0x40a274 _XcptFilter
0x40a278 memcpy_s
0x40a27c _vsnprintf
0x40a280 memset
COMCTL32.dll
0x40a03c None
Cabinet.dll
0x40a044 None
0x40a048 None
0x40a04c None
0x40a050 None
VERSION.dll
0x40a224 GetFileVersionInfoA
0x40a228 VerQueryValueA
0x40a22c GetFileVersionInfoSizeA
EAT(Export Address Table) is none