Report - liva.exe

Generic Malware EnigmaProtector Malicious Library Malicious Packer UPX Code injection AntiDebug AntiVM PE32 PE File OS Processor Check MSOffice File PNG Format ZIP Format
ScreenShot
Created 2024.01.17 08:24 Machine s1_win7_x6403
Filename liva.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
19.6
ZERO API file : mailcious
VT API (file) 45 detected (AIDetectMalware, RisePro, Windows, Threat, Malicious, score, TrojanAitInject, GenericRXAA, unsafe, Zusy, V7oa, Genus, Attribute, HighConfidence, ADVG, TrojanX, TrojanPSW, RiseProStealer, kgujrs, CLASSIC, Nekark, hegsr, Siggen23, R630829, ZexaF, Cv0@ayCdv2gk, GdSda, Gencirc, Static AI, Suspicious PE, susgen, confidence)
md5 fb987f700ecaba1d1bced04a45c572e8
sha256 0742fbe471be70d2879753f3e87a31201eb452cd8388d7140e3f68875491233c
ssdeep 24576:nUalkVcJGB7FyCTEaYtT9SfVK5Y3IexDzSf3Z8MQQvTICTNisPUXl7TP8o1Cl8:nyWJG7yUVYtT8RSPKqvTVTLs9TP8o1Cm
imphash 96fa9927288c4f8325d3528d85326fb2
impfuzzy 96:tjEtkzwbKPc+p7tGOWqLed6wVmGGFWkOx8lbxrXuAln:yuzWctGH/9IW18Cy
  Network IP location

Signature (42cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Appends a known multi-family ransomware file extension to files that have been encrypted
watch Attempts to access Bitcoin/ALTCoin wallets
watch Attempts to create or modify system certificates
watch Checks the CPU name from registry
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local email clients
watch Harvests credentials from local FTP client softwares
watch Installs itself for autorun at Windows startup
watch Network activity contains more than one unique useragent
watch One or more non-whitelisted processes were created
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice An executable file was downloaded by the process liva.exe
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Looks up the external IP address
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Potentially malicious URLs were found in the process memory dump
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Searches running processes potentially to identify processes for sandbox evasion
notice Steals private information from local Internet browsers
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info Tries to locate where the browsers are installed

Rules (25cnts)

Level Name Description Collection
warning EnigmaProtector_IN EnigmaProtector binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice Code_injection Code injection with CreateRemoteThread in a remote process memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info zip_file_format ZIP file format binaries (download)

Network (36cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://109.107.182.3/cost/go.exe RU Teleport-TV Ltd 109.107.182.3 clean
http://185.215.113.68/mine/amer.exe Unknown 185.215.113.68 clean
https://static.xx.fbcdn.net/rsrc.php/v3/y2/l/0,cross/7_6o7HJ05F8.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yV/l/0,cross/om552iOCRxJ.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://www.facebook.com/favicon.ico US FACEBOOK 157.240.215.35 clean
https://connect.facebook.net/security/hsts-pixel.gif US FACEBOOK 157.240.215.14 clean
https://www.facebook.com/login US FACEBOOK 157.240.215.35 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yB/r/Y0L6f5sxdIV.png US FACEBOOK 157.240.215.14 clean
https://db-ip.com/demo/home.php?s=175.208.134.152 US CLOUDFLARENET 172.67.75.166 clean
https://facebook.com/security/hsts-pixel.gif?c=3.2.5 US FACEBOOK 157.240.215.35 clean
https://fbcdn.net/security/hsts-pixel.gif?c=2.5 US FACEBOOK 157.240.215.35 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yE/r/xGzxHIbkRpC.js?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yU/r/O7nelmd9XSI.png US FACEBOOK 157.240.215.14 clean
https://fbsbx.com/security/hsts-pixel.gif?c=5 US FACEBOOK 157.240.215.35 clean
https://static.xx.fbcdn.net/rsrc.php/v3/y1/r/0_HoU29ShlI.js?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yK/r/Lzd-U--zeLf.js?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://static.xx.fbcdn.net/rsrc.php/y1/r/4lCu2zih0ca.svg US FACEBOOK 157.240.215.14 clean
https://static.xx.fbcdn.net/rsrc.php/v3/yr/l/0,cross/wMc7fNlPdnA.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://static.xx.fbcdn.net/rsrc.php/v3/y5/l/0,cross/QoWVNltU_ZO.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
https://static.xx.fbcdn.net/rsrc.php/v3/ya/l/0,cross/EQ0cyse2DGv.css?_nc_x=Ij3Wp8lg5Kz US FACEBOOK 157.240.215.14 clean
db-ip.com US CLOUDFLARENET 104.26.5.15 clean
fbsbx.com US FACEBOOK 157.240.215.35 clean
www.facebook.com US FACEBOOK 157.240.215.35 clean
static.xx.fbcdn.net US FACEBOOK 157.240.215.14 clean
fbcdn.net US FACEBOOK 157.240.215.35 clean
ipinfo.io US GOOGLE 34.117.186.192 clean
connect.facebook.net US FACEBOOK 157.240.215.14 clean
facebook.com US FACEBOOK 157.240.215.35 clean
172.67.75.166 US CLOUDFLARENET 172.67.75.166 clean
157.240.215.14 US FACEBOOK 157.240.215.14 clean
185.215.113.68 Unknown 185.215.113.68 malware
193.233.132.62 RU JSC Redcom-lnternet 193.233.132.62 mailcious
34.117.186.192 US GOOGLE 34.117.186.192 clean
23.67.53.17 US Akamai International B.V. 23.67.53.17 clean
157.240.215.35 US FACEBOOK 157.240.215.35 clean
109.107.182.3 RU Teleport-TV Ltd 109.107.182.3 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x52e050 GetVolumeInformationA
 0x52e054 WaitForSingleObject
 0x52e058 LocalAlloc
 0x52e05c GetCurrentThreadId
 0x52e060 GetModuleHandleA
 0x52e064 GetLocaleInfoA
 0x52e068 OpenProcess
 0x52e06c CreateToolhelp32Snapshot
 0x52e070 MultiByteToWideChar
 0x52e074 Sleep
 0x52e078 GetTempPathA
 0x52e07c GetModuleHandleExA
 0x52e080 GetTimeZoneInformation
 0x52e084 GetTickCount64
 0x52e088 CopyFileA
 0x52e08c GetLastError
 0x52e090 GetFileAttributesA
 0x52e094 TzSpecificLocalTimeToSystemTime
 0x52e098 CreateFileA
 0x52e09c SetEvent
 0x52e0a0 TerminateThread
 0x52e0a4 LoadLibraryA
 0x52e0a8 GetVersionExA
 0x52e0ac DeleteFileA
 0x52e0b0 Process32Next
 0x52e0b4 CloseHandle
 0x52e0b8 GetSystemInfo
 0x52e0bc CreateThread
 0x52e0c0 ResetEvent
 0x52e0c4 GetWindowsDirectoryA
 0x52e0c8 HeapAlloc
 0x52e0cc SetFileAttributesA
 0x52e0d0 GetLocalTime
 0x52e0d4 GetProcAddress
 0x52e0d8 VirtualAllocEx
 0x52e0dc LocalFree
 0x52e0e0 IsProcessorFeaturePresent
 0x52e0e4 GetFileSize
 0x52e0e8 RemoveDirectoryA
 0x52e0ec ReadProcessMemory
 0x52e0f0 GetCurrentProcessId
 0x52e0f4 GetProcessHeap
 0x52e0f8 GlobalMemoryStatusEx
 0x52e0fc FreeLibrary
 0x52e100 WideCharToMultiByte
 0x52e104 CreateRemoteThread
 0x52e108 CreateDirectoryA
 0x52e10c GetSystemTime
 0x52e110 CreateMutexA
 0x52e114 CreateEventA
 0x52e118 GetPrivateProfileStringA
 0x52e11c IsWow64Process
 0x52e120 IsDebuggerPresent
 0x52e124 VirtualQueryEx
 0x52e128 GetComputerNameA
 0x52e12c SetUnhandledExceptionFilter
 0x52e130 GetUserDefaultLocaleName
 0x52e134 lstrcpynA
 0x52e138 SetFilePointer
 0x52e13c CreateFileW
 0x52e140 AreFileApisANSI
 0x52e144 EnterCriticalSection
 0x52e148 GetFullPathNameW
 0x52e14c GetDiskFreeSpaceW
 0x52e150 LockFile
 0x52e154 LeaveCriticalSection
 0x52e158 InitializeCriticalSection
 0x52e15c GetFullPathNameA
 0x52e160 SetEndOfFile
 0x52e164 GetTempPathW
 0x52e168 GetFileAttributesW
 0x52e16c FormatMessageW
 0x52e170 GetDiskFreeSpaceA
 0x52e174 DeleteFileW
 0x52e178 UnlockFile
 0x52e17c LockFileEx
 0x52e180 DeleteCriticalSection
 0x52e184 GetSystemTimeAsFileTime
 0x52e188 FormatMessageA
 0x52e18c QueryPerformanceCounter
 0x52e190 GetTickCount
 0x52e194 FlushFileBuffers
 0x52e198 HeapSize
 0x52e19c SetEnvironmentVariableW
 0x52e1a0 FreeEnvironmentStringsW
 0x52e1a4 GetEnvironmentStringsW
 0x52e1a8 GetCommandLineW
 0x52e1ac GetCommandLineA
 0x52e1b0 GetOEMCP
 0x52e1b4 GetACP
 0x52e1b8 IsValidCodePage
 0x52e1bc SetStdHandle
 0x52e1c0 HeapReAlloc
 0x52e1c4 FindClose
 0x52e1c8 lstrlenA
 0x52e1cc InitializeCriticalSectionEx
 0x52e1d0 FindNextFileA
 0x52e1d4 TerminateProcess
 0x52e1d8 OutputDebugStringA
 0x52e1dc WriteFile
 0x52e1e0 GetCurrentProcess
 0x52e1e4 HeapFree
 0x52e1e8 FindFirstFileA
 0x52e1ec WriteProcessMemory
 0x52e1f0 Process32First
 0x52e1f4 GetPrivateProfileSectionNamesA
 0x52e1f8 GetModuleFileNameA
 0x52e1fc WriteConsoleW
 0x52e200 EnumSystemLocalesW
 0x52e204 GetUserDefaultLCID
 0x52e208 IsValidLocale
 0x52e20c GetLocaleInfoW
 0x52e210 LCMapStringW
 0x52e214 CompareStringW
 0x52e218 GetTimeFormatW
 0x52e21c GetDateFormatW
 0x52e220 GetFileSizeEx
 0x52e224 GetConsoleOutputCP
 0x52e228 ReadConsoleW
 0x52e22c GetConsoleMode
 0x52e230 GetStdHandle
 0x52e234 GetModuleFileNameW
 0x52e238 GetModuleHandleExW
 0x52e23c ExitProcess
 0x52e240 GetFileType
 0x52e244 SetFilePointerEx
 0x52e248 LoadLibraryExW
 0x52e24c ReadFile
 0x52e250 TlsFree
 0x52e254 TlsSetValue
 0x52e258 TlsGetValue
 0x52e25c TlsAlloc
 0x52e260 InitializeCriticalSectionAndSpinCount
 0x52e264 SetLastError
 0x52e268 RaiseException
 0x52e26c RtlUnwind
 0x52e270 InitializeSListHead
 0x52e274 GetStartupInfoW
 0x52e278 UnhandledExceptionFilter
 0x52e27c GetStringTypeW
 0x52e280 FindFirstFileW
 0x52e284 FindFirstFileExW
 0x52e288 FindNextFileW
 0x52e28c GetFileAttributesExW
 0x52e290 GetFinalPathNameByHandleW
 0x52e294 GetModuleHandleW
 0x52e298 GetFileInformationByHandleEx
 0x52e29c GetLocaleInfoEx
 0x52e2a0 InitializeSRWLock
 0x52e2a4 ReleaseSRWLockExclusive
 0x52e2a8 AcquireSRWLockExclusive
 0x52e2ac TryAcquireSRWLockExclusive
 0x52e2b0 LCMapStringEx
 0x52e2b4 EncodePointer
 0x52e2b8 DecodePointer
 0x52e2bc CompareStringEx
 0x52e2c0 GetCPInfo
USER32.dll
 0x52e2f0 wsprintfA
 0x52e2f4 GetSystemMetrics
 0x52e2f8 GetDesktopWindow
 0x52e2fc GetWindowRect
 0x52e300 EnumDisplayDevicesA
 0x52e304 ReleaseDC
 0x52e308 GetDC
 0x52e30c GetKeyboardLayoutList
 0x52e310 GetCursorPos
 0x52e314 CharNextA
GDI32.dll
 0x52e038 CreateCompatibleBitmap
 0x52e03c SelectObject
 0x52e040 CreateCompatibleDC
 0x52e044 DeleteObject
 0x52e048 BitBlt
ADVAPI32.dll
 0x52e000 CredEnumerateA
 0x52e004 RegOpenKeyExA
 0x52e008 RegEnumKeyA
 0x52e00c RegCloseKey
 0x52e010 GetCurrentHwProfileA
 0x52e014 RegQueryValueExA
 0x52e018 RegEnumKeyExA
 0x52e01c RegCreateKeyExA
 0x52e020 CredFree
 0x52e024 GetUserNameA
 0x52e028 RegSetValueExA
SHELL32.dll
 0x52e2dc SHGetFolderPathA
 0x52e2e0 ShellExecuteA
ole32.dll
 0x52e378 CoInitializeEx
 0x52e37c CoInitialize
 0x52e380 CoUninitialize
 0x52e384 CoCreateInstance
WS2_32.dll
 0x52e31c shutdown
 0x52e320 getaddrinfo
 0x52e324 WSAStartup
 0x52e328 send
 0x52e32c socket
 0x52e330 connect
 0x52e334 recv
 0x52e338 freeaddrinfo
 0x52e33c setsockopt
 0x52e340 WSAGetLastError
 0x52e344 WSACleanup
 0x52e348 closesocket
CRYPT32.dll
 0x52e030 CryptUnprotectData
SHLWAPI.dll
 0x52e2e8 PathFindExtensionA
gdiplus.dll
 0x52e350 GdiplusStartup
 0x52e354 GdiplusShutdown
 0x52e358 GdipDisposeImage
 0x52e35c GdipSaveImageToFile
 0x52e360 GdipGetImageEncodersSize
 0x52e364 GdipCreateBitmapFromHBITMAP
 0x52e368 GdipGetImageEncoders
SETUPAPI.dll
 0x52e2c8 SetupDiGetClassDevsA
 0x52e2cc SetupDiEnumDeviceInfo
 0x52e2d0 SetupDiGetDeviceInterfaceDetailA
 0x52e2d4 SetupDiEnumDeviceInterfaces
ntdll.dll
 0x52e370 RtlUnicodeStringToAnsiString

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure