Report - leru.exe

Generic Malware Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check ZIP Format
ScreenShot
Created 2024.01.13 19:01 Machine s1_win7_x6401
Filename leru.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
11.6
ZERO API file : mailcious
VT API (file) 48 detected (AIDetectMalware, RisePro, malicious, high confidence, score, Zusy, unsafe, ZexaF, Cv0@ayCdv2gk, Genus, Attribute, HighConfidence, ADVG, TrojanX, TrojanPSW, RiseProStealer, kgujrs, CLASSIC, Nekark, hegsr, Siggen23, R002C0DAD24, R630829, GenericRXAA, GdSda, Gencirc, COqHygWdqr8, Static AI, Suspicious PE, confidence, 100%)
md5 1abfdde35393e3bed6dc4c88ddaec0c6
sha256 8f1d09e38fb2d52fff1e84baf161fef2b5e4af4a7d3ab0b198e436bd2da0a364
ssdeep 24576:nUalkVcJGB7FyCTEaYtT9SfVK5Y3IexDzSf3Z8MQQvTICTNiUPUXl7TP8o1Cl8:nyWJG7yUVYtT8RSPKqvTVT7s9TP8o1Cm
imphash 96fa9927288c4f8325d3528d85326fb2
impfuzzy 96:tjEtkzwbKPc+p7tGOWqLed6wVmGGFWkOx8lbxrXuAln:yuzWctGH/9IW18Cy
  Network IP location

Signature (24cnts)

Level Description
danger File has been identified by 48 AntiVirus engines on VirusTotal as malicious
danger Disables Windows Security features
watch Appends a known CryptoMix ransomware file extension to files that have been encrypted
watch Attempts to access Bitcoin/ALTCoin wallets
watch Checks the CPU name from registry
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local email clients
watch Harvests credentials from local FTP client softwares
watch Installs itself for autorun at Windows startup
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process created a hidden window
notice Creates a suspicious process
notice Creates hidden or system file
notice Looks up the external IP address
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Steals private information from local Internet browsers
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info zip_file_format ZIP file format binaries (download)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://db-ip.com/demo/home.php?s=175.208.134.152 US CLOUDFLARENET 104.26.5.15 clean
ipinfo.io US GOOGLE 34.117.186.192 clean
db-ip.com US CLOUDFLARENET 172.67.75.166 clean
104.26.5.15 US CLOUDFLARENET 104.26.5.15 clean
193.233.132.62 RU JSC Redcom-lnternet 193.233.132.62 mailcious
34.117.186.192 US GOOGLE 34.117.186.192 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x52e050 GetVolumeInformationA
 0x52e054 WaitForSingleObject
 0x52e058 LocalAlloc
 0x52e05c GetCurrentThreadId
 0x52e060 GetModuleHandleA
 0x52e064 GetLocaleInfoA
 0x52e068 OpenProcess
 0x52e06c CreateToolhelp32Snapshot
 0x52e070 MultiByteToWideChar
 0x52e074 Sleep
 0x52e078 GetTempPathA
 0x52e07c GetModuleHandleExA
 0x52e080 GetTimeZoneInformation
 0x52e084 GetTickCount64
 0x52e088 CopyFileA
 0x52e08c GetLastError
 0x52e090 GetFileAttributesA
 0x52e094 TzSpecificLocalTimeToSystemTime
 0x52e098 CreateFileA
 0x52e09c SetEvent
 0x52e0a0 TerminateThread
 0x52e0a4 LoadLibraryA
 0x52e0a8 GetVersionExA
 0x52e0ac DeleteFileA
 0x52e0b0 Process32Next
 0x52e0b4 CloseHandle
 0x52e0b8 GetSystemInfo
 0x52e0bc CreateThread
 0x52e0c0 ResetEvent
 0x52e0c4 GetWindowsDirectoryA
 0x52e0c8 HeapAlloc
 0x52e0cc SetFileAttributesA
 0x52e0d0 GetLocalTime
 0x52e0d4 GetProcAddress
 0x52e0d8 VirtualAllocEx
 0x52e0dc LocalFree
 0x52e0e0 IsProcessorFeaturePresent
 0x52e0e4 GetFileSize
 0x52e0e8 RemoveDirectoryA
 0x52e0ec ReadProcessMemory
 0x52e0f0 GetCurrentProcessId
 0x52e0f4 GetProcessHeap
 0x52e0f8 GlobalMemoryStatusEx
 0x52e0fc FreeLibrary
 0x52e100 WideCharToMultiByte
 0x52e104 CreateRemoteThread
 0x52e108 CreateDirectoryA
 0x52e10c GetSystemTime
 0x52e110 CreateMutexA
 0x52e114 CreateEventA
 0x52e118 GetPrivateProfileStringA
 0x52e11c IsWow64Process
 0x52e120 IsDebuggerPresent
 0x52e124 VirtualQueryEx
 0x52e128 GetComputerNameA
 0x52e12c SetUnhandledExceptionFilter
 0x52e130 GetUserDefaultLocaleName
 0x52e134 lstrcpynA
 0x52e138 SetFilePointer
 0x52e13c CreateFileW
 0x52e140 AreFileApisANSI
 0x52e144 EnterCriticalSection
 0x52e148 GetFullPathNameW
 0x52e14c GetDiskFreeSpaceW
 0x52e150 LockFile
 0x52e154 LeaveCriticalSection
 0x52e158 InitializeCriticalSection
 0x52e15c GetFullPathNameA
 0x52e160 SetEndOfFile
 0x52e164 GetTempPathW
 0x52e168 GetFileAttributesW
 0x52e16c FormatMessageW
 0x52e170 GetDiskFreeSpaceA
 0x52e174 DeleteFileW
 0x52e178 UnlockFile
 0x52e17c LockFileEx
 0x52e180 DeleteCriticalSection
 0x52e184 GetSystemTimeAsFileTime
 0x52e188 FormatMessageA
 0x52e18c QueryPerformanceCounter
 0x52e190 GetTickCount
 0x52e194 FlushFileBuffers
 0x52e198 HeapSize
 0x52e19c SetEnvironmentVariableW
 0x52e1a0 FreeEnvironmentStringsW
 0x52e1a4 GetEnvironmentStringsW
 0x52e1a8 GetCommandLineW
 0x52e1ac GetCommandLineA
 0x52e1b0 GetOEMCP
 0x52e1b4 GetACP
 0x52e1b8 IsValidCodePage
 0x52e1bc SetStdHandle
 0x52e1c0 HeapReAlloc
 0x52e1c4 FindClose
 0x52e1c8 lstrlenA
 0x52e1cc InitializeCriticalSectionEx
 0x52e1d0 FindNextFileA
 0x52e1d4 TerminateProcess
 0x52e1d8 OutputDebugStringA
 0x52e1dc WriteFile
 0x52e1e0 GetCurrentProcess
 0x52e1e4 HeapFree
 0x52e1e8 FindFirstFileA
 0x52e1ec WriteProcessMemory
 0x52e1f0 Process32First
 0x52e1f4 GetPrivateProfileSectionNamesA
 0x52e1f8 GetModuleFileNameA
 0x52e1fc WriteConsoleW
 0x52e200 EnumSystemLocalesW
 0x52e204 GetUserDefaultLCID
 0x52e208 IsValidLocale
 0x52e20c GetLocaleInfoW
 0x52e210 LCMapStringW
 0x52e214 CompareStringW
 0x52e218 GetTimeFormatW
 0x52e21c GetDateFormatW
 0x52e220 GetFileSizeEx
 0x52e224 GetConsoleOutputCP
 0x52e228 ReadConsoleW
 0x52e22c GetConsoleMode
 0x52e230 GetStdHandle
 0x52e234 GetModuleFileNameW
 0x52e238 GetModuleHandleExW
 0x52e23c ExitProcess
 0x52e240 GetFileType
 0x52e244 SetFilePointerEx
 0x52e248 LoadLibraryExW
 0x52e24c ReadFile
 0x52e250 TlsFree
 0x52e254 TlsSetValue
 0x52e258 TlsGetValue
 0x52e25c TlsAlloc
 0x52e260 InitializeCriticalSectionAndSpinCount
 0x52e264 SetLastError
 0x52e268 RaiseException
 0x52e26c RtlUnwind
 0x52e270 InitializeSListHead
 0x52e274 GetStartupInfoW
 0x52e278 UnhandledExceptionFilter
 0x52e27c GetStringTypeW
 0x52e280 FindFirstFileW
 0x52e284 FindFirstFileExW
 0x52e288 FindNextFileW
 0x52e28c GetFileAttributesExW
 0x52e290 GetFinalPathNameByHandleW
 0x52e294 GetModuleHandleW
 0x52e298 GetFileInformationByHandleEx
 0x52e29c GetLocaleInfoEx
 0x52e2a0 InitializeSRWLock
 0x52e2a4 ReleaseSRWLockExclusive
 0x52e2a8 AcquireSRWLockExclusive
 0x52e2ac TryAcquireSRWLockExclusive
 0x52e2b0 LCMapStringEx
 0x52e2b4 EncodePointer
 0x52e2b8 DecodePointer
 0x52e2bc CompareStringEx
 0x52e2c0 GetCPInfo
USER32.dll
 0x52e2f0 wsprintfA
 0x52e2f4 GetSystemMetrics
 0x52e2f8 GetDesktopWindow
 0x52e2fc GetWindowRect
 0x52e300 EnumDisplayDevicesA
 0x52e304 ReleaseDC
 0x52e308 GetDC
 0x52e30c GetKeyboardLayoutList
 0x52e310 GetCursorPos
 0x52e314 CharNextA
GDI32.dll
 0x52e038 CreateCompatibleBitmap
 0x52e03c SelectObject
 0x52e040 CreateCompatibleDC
 0x52e044 DeleteObject
 0x52e048 BitBlt
ADVAPI32.dll
 0x52e000 CredEnumerateA
 0x52e004 RegOpenKeyExA
 0x52e008 RegEnumKeyA
 0x52e00c RegCloseKey
 0x52e010 GetCurrentHwProfileA
 0x52e014 RegQueryValueExA
 0x52e018 RegEnumKeyExA
 0x52e01c RegCreateKeyExA
 0x52e020 CredFree
 0x52e024 GetUserNameA
 0x52e028 RegSetValueExA
SHELL32.dll
 0x52e2dc SHGetFolderPathA
 0x52e2e0 ShellExecuteA
ole32.dll
 0x52e378 CoInitializeEx
 0x52e37c CoInitialize
 0x52e380 CoUninitialize
 0x52e384 CoCreateInstance
WS2_32.dll
 0x52e31c shutdown
 0x52e320 getaddrinfo
 0x52e324 WSAStartup
 0x52e328 send
 0x52e32c socket
 0x52e330 connect
 0x52e334 recv
 0x52e338 freeaddrinfo
 0x52e33c setsockopt
 0x52e340 WSAGetLastError
 0x52e344 WSACleanup
 0x52e348 closesocket
CRYPT32.dll
 0x52e030 CryptUnprotectData
SHLWAPI.dll
 0x52e2e8 PathFindExtensionA
gdiplus.dll
 0x52e350 GdiplusStartup
 0x52e354 GdiplusShutdown
 0x52e358 GdipDisposeImage
 0x52e35c GdipSaveImageToFile
 0x52e360 GdipGetImageEncodersSize
 0x52e364 GdipCreateBitmapFromHBITMAP
 0x52e368 GdipGetImageEncoders
SETUPAPI.dll
 0x52e2c8 SetupDiGetClassDevsA
 0x52e2cc SetupDiEnumDeviceInfo
 0x52e2d0 SetupDiGetDeviceInterfaceDetailA
 0x52e2d4 SetupDiEnumDeviceInterfaces
ntdll.dll
 0x52e370 RtlUnicodeStringToAnsiString

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure