Report #10682 check_circle

  • Creation Date: June 24, 2020, 1:46 p.m.
  • Last Update: June 24, 2020, 1:54 p.m.
  • File: doc.rar.exe
  • Results:
Binary
DLL
False cancel
Size
1.55MB
trid
72.3% Win64 Executable
11.8% Win32 Executable
5.3% OS/2 Executable
5.2% Generic Win/DOS Executable
5.2% DOS Executable Generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
38ba587ce794865d51a37317ef1a6842
sha1
7c916b452976347cbf94b25c4979ee697c5c385c
crc32
0x8aa007d9
sha224
c712c3b8f994e0d562bcc626558d43e29efab3f14c6641086763c20c
sha256
219b60b9ab2892b4cd8b2d5b95c345cc6ed9f6fda264be6068bddb49026c2258
sha384
0afd24385e4559e70ba09b4f8362b9864ab7eabe8b3d025c4b5b26b7688ddeff06dc5b820efa561c8c856deee436c64f
sha512
1c05b1e1919b9bfbd81dd53cb47f1156fb883f72242568ba25ef1b7234fe7945b8a0807dd86c6989b90f8b4f85343bf6ae9e4eef4b39bf986f39d5c6740a75fc
ssdeep
24576:ntb20pkaCqT5TBWgNQ7aM2K1oOWVeBRJ8pLyaSsoqlkWYU6A:kVg5tQ7aM2K1dWWwLyaSRqlkW95
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, HasDebugData, CRC32_poly_Constant, escalate_priv, HasRichSignature, VC8_Microsoft_Corporation, CRC32_table, network_http, win_files_operation, IsPacked, AutoIT_compiled_script, screenshot, IP, contentis_base64, keylogger, win_token, IsPE32, AutoIt, IsWindowsGUI, inject_thread, anti_dbg, Microsoft_Visual_Cpp_8, win_registry

Suspicious
True check_circle

Strings
List
Fu.MC
L.gD
3Ur.Gu
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" language="*" processorArchitecture="*" publicKeyToken="6595b64144ccf1df"/>
Gt.Ht$
y.Sj
7.BZ
Vv.Sj
q4.gH
Y.FJ
H.SD[
WSOCK32.dll
Software\AutoIt v3\AutoIt
COMCTL32.dll
USERENV.dll
VERSION.dll
WININET.dll
WINMM.dll
UxTheme.dll
0.0.0.0
MPR.dll
AUTOITCALLVARIABLE%d
255.255.255.255
SeDebugPrivilege
SeRestorePrivilege
(^mNavr
<"t|<%tx<'tt<$tp<&tl<!th<otd<]t`<[t\<\tX<
\Include\
fr-be
fr-ca
fr-ch
<%o9/h6
%i09h#
E*3%e
SC%8a
%ca.d/
+'l%eF
Er6L%a
This is a third-party compiled AutoIt script.
BACKSPACE
Iav%E]X
Hebrew
HvT%G
TaskbarCreated
HOTKEYSET
HOTKEYPRESSED
Include
%dNbo
FpU%A
closed
failed to get memory
invalid range in character class
too many forward references
number is too big
regular expression is too large
\ at end of pattern
WUPi%o
\c at end of pattern
two named subpatterns have the same name
BROWSER_SEARCH
HKEY_CLASSES_ROOT
TCPSHUTDOWN
BROWSER_REFRESH
AutoIt has detected the stack has become corrupt.
BROWSER_FORWARD
BROWSER_BACK
BROWSER_STOP
BROWSER_HOME
LAUNCH_MAIL
BROWSER_FAVORTIES
%ot `
HKEY_LOCAL_MACHINE
Line %d (File "%s"):
VOLUME_UP
VOLUME_DOWN
VOLUME_MUTE
] is an invalid data character in JavaScript compatibility mode
LAUNCH_MEDIA
SOFTWARE\Classes\
Line %d:
TCPLISTEN
FtpOpenFileW
SYSTEM\CurrentControlSet\Control\Nls\Language
FtpGetFileSize
FTPSETPROXY
SW_HIDE
AUTOITWINGETTITLE
GETCURRENTSELECTION
TCPCLOSESOCKET
TCPCONNECT
HTTPSETUSERAGENT
GETSELECTEDCOUNT
GETSELECTED
HTTPSETPROXY
WINGETCLASSLIST
CWM_GETCONTROLNAME
Control Panel\Mouse
Control Panel\Appearance
HttpOpenRequestW
HttpSendRequestW

Foremost
Matches
0.exe, 1 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 255.255.255.255, 1, record
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: USER32.DLL, kernel32.dll, mscoree.dll, combase.dll, ADVAPI32.dll, OLEAUT32.dll, VERSION.dll, UxTheme.dll, WSOCK32.dll, SHELL32.dll, PSAPI.DLL, COMCTL32.dll, ole32.dll, IPHLPAPI.DLL, WININET.dll, USERENV.dll, WINMM.dll, GDI32.dll, COMDLG32.dll, MPR.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 1056768
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 4096
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 1644067
Suspicous: False cancel

Sections
Allowed: .text, .rdata, .data, .rsrc, .reloc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 11.0
Suspicious: False cancel
Subsystem
Version: 5.1
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 155508
Suspicious: False cancel

Anomalies
Anomalies: The Debug TimeDateStamp(s) and the file header TimeDateStamp do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, mscoree.dll, combase.dll, advapi32.dll, oleaut32.dll, version.dll, uxtheme.dll, wsock32.dll, shell32.dll, psapi.dll, comctl32.dll, ole32.dll, wininet.dll, userenv.dll, winmm.dll, gdi32.dll, comdlg32.dll, mpr.dll
hasLibs: True check_circle
Suspicious: iphlpapi.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2020-05-25 05:37:45
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Microsoft Visual C++ 8, VC8 -> Microsoft Corporation

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 1
.rsrc: 343
.text: 2
.rdata: 10

nopsequence
.text: 1

pushpopmath
.rsrc: 200
.text: 30
.rdata: 6
.reloc: 17

ss register
.rsrc: 4

garbagebytes
.data: 1
.rsrc: 122
.text: 2
.rdata: 5

hookdetection
.rsrc: 11
.rdata: 3
.reloc: 4

stealthimport
.text: 1

software breakpoint
.rsrc: 10
.text: 4
.rdata: 1
.reloc: 5

fakeconditionaljumps
.rsrc: 8

programcontrolflowchange
.data: 1
.rsrc: 114
.text: 2
.rdata: 5

cpuinstructionsresultscomparison
.rsrc: 1
.rdata: 8

AVclass
autoit
1
VirusTotal
md5
38ba587ce794865d51a37317ef1a6842
sha1
7c916b452976347cbf94b25c4979ee697c5c385c
SCANS (DETECTION RATE = 68.49%)
AVG
result: Script:SNH-gen [Trj]
update: 20200616
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20200616
version: 2.7.2019.1
detected: False cancel

MAX
result: malware (ai score=87)
update: 20200616
version: 2019.9.16.1
detected: True check_circle

APEX
result: Malicious
update: 20200616
version: 6.37
detected: True check_circle

Bkav
result: W32.AIDetectVM.malwareA
update: 20200616
version: 1.3.0.9899
detected: True check_circle

K7GW
result: Trojan ( 700000111 )
update: 20200616
version: 11.116.34425
detected: True check_circle

ALYac
result: Trojan.GenericKD.33904889
update: 20200616
version: 1.1.1.5
detected: True check_circle

Avast
result: Script:SNH-gen [Trj]
update: 20200616
version: 18.4.3895.0
detected: True check_circle

Avira
result: HEUR/AGEN.1100180
update: 20200616
version: 8.3.3.8
detected: True check_circle

Baidu
update: 20190318
version: 1.0.0.2
detected: False cancel

Cynet
result: Malicious (score: 85)
update: 20200616
version: 4.0.0.24
detected: True check_circle

Cyren
result: W32/AutoIt.OM.gen!Eldorado
update: 20200616
version: 6.3.0.2
detected: True check_circle

DrWeb
result: Trojan.Siggen9.49783
update: 20200616
version: 7.0.46.3050
detected: True check_circle

GData
result: Trojan.GenericKD.33904889
update: 20200616
version: A:25.25940B:27.19117
detected: True check_circle

Panda
result: Trj/CI.A
update: 20200616
version: 4.6.4.2
detected: True check_circle

VBA32
update: 20200616
version: 4.4.1
detected: False cancel

VIPRE
result: Trojan.Win32.Generic!BT
update: 20200616
version: 84524
detected: True check_circle

Zoner
update: 20200615
version: 0.0.0.0
detected: False cancel

ClamAV
update: 20200616
version: 0.102.3.0
detected: False cancel

Comodo
result: Malware@#ps71ffwhhqi
update: 20200616
version: 32542
detected: True check_circle

F-Prot
update: 20200616
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan.Autoit
update: 20200616
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!38BA587CE794
update: 20200616
version: 6.0.6.653
detected: True check_circle

Rising
result: Trojan.Obfus/Autoit!1.C075 (CLASSIC)
update: 20200616
version: 25.0.0.25
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20200616
version: 4.98.0
detected: True check_circle

Yandex
update: 20200616
version: 5.5.2.24
detected: False cancel

Zillya
update: 20200616
version: 2.0.0.4111
detected: False cancel

Acronis
update: 20200603
version: 1.1.1.76
detected: False cancel

Alibaba
result: TrojanPSW:Win32/Agensla.b07f18b4
update: 20190527
version: 0.3.0.5
detected: True check_circle

Arcabit
result: Trojan.Generic.D20558F9
update: 20200616
version: 1.0.0.875
detected: True check_circle

Cylance
result: Unsafe
update: 20200616
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20200608
version: 4.0.5
detected: True check_circle

FireEye
result: Generic.mg.38ba587ce794865d
update: 20200616
version: 32.31.0.0
detected: True check_circle

Sangfor
update: 20200423
version: 1.0
detected: False cancel

TACHYON
update: 20200616
version: 2020-06-16.02
detected: False cancel

Tencent
result: Msil.Trojan-qqpass.Qqrob.Lmbi
update: 20200616
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20200616
version: 2014.3.20.0
detected: False cancel

Webroot
result: W32.Malware.Gen
update: 20200616
version: 1.0.0.403
detected: True check_circle

eGambit
result: Unsafe.AI_Score_53%
update: 20200616
detected: True check_circle

Ad-Aware
result: Trojan.GenericKD.33904889
update: 20200616
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Trojan.Win32.AutoIt.4!c
update: 20200616
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.33904889 (B)
update: 20200616
version: 2018.12.0.1641
detected: True check_circle

F-Secure
result: Heuristic.HEUR/AGEN.1100180
update: 20200616
version: 12.0.86.52
detected: True check_circle

Fortinet
result: AutoIt/Injector.FIC!tr
update: 20200616
version: 6.2.142.0
detected: True check_circle

Invincea
result: heuristic
update: 20200502
version: 6.3.6.26157
detected: True check_circle

Jiangmin
update: 20200616
version: 16.0.100
detected: False cancel

Kingsoft
update: 20200616
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20200616
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.MBT
update: 20200616
version: 1.11.0.0
detected: True check_circle

Trapmine
update: 20200505
version: 3.2.25.947
detected: False cancel

AhnLab-V3
update: 20200616
version: 3.18.0.10004
detected: False cancel

Antiy-AVL
result: GrayWare/Autoit.BinToStr.a
update: 20200616
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-PSW.MSIL.Agensla.rgz
update: 20200616
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Dawnla.A!MSR
update: 20200616
version: 1.1.17100.2
detected: True check_circle

Qihoo-360
result: Generic/Trojan.PSW.c57
update: 20200616
version: 1.0.0.1120
detected: True check_circle

ZoneAlarm
result: Trojan-PSW.MSIL.Agensla.rgz
update: 20200616
version: 1.0
detected: True check_circle

Cybereason
update: 20190616
version: 1.2.449
detected: False cancel

ESET-NOD32
result: a variant of Win32/Injector.Autoit.FIC
update: 20200616
version: 21504
detected: True check_circle

TrendMicro
result: TROJ_GEN.R05AC0DEP20
update: 20200616
version: 11.0.0.1006
detected: True check_circle

BitDefender
result: Trojan.GenericKD.33904889
update: 20200616
version: 7.2
detected: True check_circle

CrowdStrike
result: win/malicious_confidence_100% (W)
update: 20190702
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan ( 700000111 )
update: 20200616
version: 11.116.34426
detected: True check_circle

SentinelOne
update: 20200601
version: 4.3.0.105
detected: False cancel

Avast-Mobile
update: 20200616
version: 200616-00
detected: False cancel

Malwarebytes
result: Spyware.AgentTesla
update: 20200616
version: 3.6.4.335
detected: True check_circle

TotalDefense
update: 20200616
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Zapchast.C5
update: 20200616
version: 14.00
detected: True check_circle

NANO-Antivirus
update: 20200616
version: 1.0.134.25119
detected: False cancel

BitDefenderTheta
update: 20200609
version: 7.2.37796.0
detected: False cancel

MicroWorld-eScan
result: Trojan.GenericKD.33904889
update: 20200616
version: 14.0.409.0
detected: True check_circle

SUPERAntiSpyware
update: 20200612
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.TrojanAitInject.tc
update: 20200616
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R05AC0DEP20
update: 20200616
version: 10.0.0.1040
detected: True check_circle

total
73
sha256
219b60b9ab2892b4cd8b2d5b95c345cc6ed9f6fda264be6068bddb49026c2258
scan_id
219b60b9ab2892b4cd8b2d5b95c345cc6ed9f6fda264be6068bddb49026c2258-1592338449
resource
38ba587ce794865d51a37317ef1a6842
positives
50
scan_date
2020-06-16 20:14:09
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace

Process
Trace

Analysis
Reason
Blue Screen

Status
Machine Crashed

Results
0

Registry
Trace

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: False cancel

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: False cancel

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:52300 code www.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code ctldl.windowsupdate.com.
computer localhost arrow_forward computer gateway:DNS code time.windows.com.
computer localhost arrow_forward computer gateway:DNS code teredo.ipv6.microsoft.com.
computer localhost arrow_forward computer gateway:59197 code ipv6.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code www.msftncsi.com.
computer localhost arrow_forward computer gateway:50106 code teredo.ipv6.microsoft.com.
computer localhost arrow_forward computer gateway:DNS code ipv6.msftncsi.com.

Response
computer gateway:DNS arrow_forward computer localhost code www.msftncsi.com. reply_all 200.143.247.10

computer gateway:DNS arrow_forward computer localhost code ctldl.windowsupdate.com. reply_all 200.143.247.9

computer gateway:DNS arrow_forward computer localhost code ipv6.msftncsi.com. reply_all a978.i6g1.akamai.net.

computer gateway:DNS arrow_forward computer localhost code time.windows.com. reply_all 40.119.6.228


TCP
Info
200.143.247.10:80 arrow_forward computer localhost:49159
200.143.247.9:80 arrow_forward computer localhost:49157
computer localhost:49157 arrow_forward 200.143.247.9:80
computer localhost:49159 arrow_forward 200.143.247.10:80

UDP
Info
40.119.6.228:123 arrow_forward computer localhost:123
computer localhost:61794 arrow_forward help_outline 224.0.0.252:5355
computer localhost:53915 arrow_forward help_outline 224.0.0.252:5355
computer localhost:59197 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:53529
computer localhost:55382 arrow_forward help_outline 224.0.0.252:5355
computer localhost:53071 arrow_forward computer localhost:53
computer localhost:53529 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:53071
computer localhost:53 arrow_forward computer localhost:59197
computer localhost:53 arrow_forward computer localhost:50106
computer localhost:54618 arrow_forward help_outline 224.0.0.252:5355
computer localhost:53 arrow_forward computer localhost:52300
computer localhost:50106 arrow_forward computer localhost:53
computer localhost:54144 arrow_forward help_outline 224.0.0.252:5355
computer localhost:53859 arrow_forward help_outline 224.0.0.252:5355
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:123 arrow_forward 40.119.6.228:123
computer localhost:67 arrow_forward computer localhost:68
computer localhost:52300 arrow_forward computer localhost:53
computer localhost:63932 arrow_forward help_outline 224.0.0.252:5355
computer localhost:51469 arrow_forward help_outline 224.0.0.252:5355
computer localhost:55383 arrow_forward help_outline 239.255.255.250:3702

HTTP
Info
computer localhost send GET ctldl.windowsupdate.com attach_file /msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?2102d8828e8cb646
computer localhost send GET www.msftncsi.com attach_file /ncsi.txt

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: False cancel

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 97.04%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 86.28%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 70.00%
suspicious: False cancel

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 74.51%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.99%
suspicious: True check_circle

Add to Collection
Download