Report #10927 check_circle

  • Creation Date: Sept. 2, 2020, 7:28 p.m.
  • Last Update: Sept. 2, 2020, 7:40 p.m.
  • File: 001.exe
  • Results:
Binary
DLL
False cancel
Size
2.68MB
trid
33.6% OS/2 Executable
33.1% Generic Win/DOS Executable
33.1% DOS Executable Generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
e7627ae872138da01775490a137a519e
sha1
ca5d2a1874f621e1453024f99e9cf9ea4b55692a
crc32
0xcf319a72
sha224
bee06d649f280fcd218b3e2824f664744f717064e88764f744cd25f3
sha256
e26cb383de7038789b2f99e4d340375b2da0a5cbf5a69af22472835fac004380
sha384
bddc95e661ef749766e4dea53ac58b7cfc2696766664576958a2d6c29d8be88651b31484ddd597842e906b4bfbbf1ea4
sha512
86e668a37a4f09069e17793988bd3d796890c670359e007b308893dacd74d527095e347ee7d8607f81c038d3119d6a7830939ee00acfac534aba4b5764ef258b
ssdeep
49152:++RsuD306l1+Zzm3ym6H+BUZY5h1FgI/t/fCzhFgmYOIkn8+0U2nMwPcxPP3k9Z0:5h6m3ym6H+BU1xPP3kYWU
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
maldoc_getEIP_method_1, IP, tElock_V099_V10_Private_tE, ThreadControl__Context, tElock_v098_additional, create_service, DebuggerException__ConsoleCtrl, BASE64_table, tElock_10_private_tE_additional, tElock_v098_tHE_EGOiSTE_h, MD5_API, CodeCrypt_v016b_v0163b_additional, tElock_V099_10_Private_tE, rat_webcam, DebuggerException__SetConsoleCtrl, tElock_098_Special_Build_forgot_heXer, IsWindowsGUI, win_private_profile, spreading_share, HasModified_DOS_Message, possible_includes_base64_packed_functions, tElock_098_tE_additional, Dropper_Strings, cred_local, tElockv098tE, network_http, win_files_operation, IsPE32, tElock_v098_tHE_EGOiSTE_h_additional, inject_thread, win_hook, tElock_098_tE, contentis_base64, network_tcp_socket, SEH__vectored, screenshot, tElock_098_tHE_EGOiSTE_h, win_token, win_mutex, keylogger, tElock_10_private_tE, sniff_audio, tElock_v098, tElockv098, escalate_priv, DebuggerCheck__RemoteAPI, migrate_apc, anti_dbg, tElock_098_Special_Build_forgot_heXer_additional, tElock098tE, tElock_v098_tE, tElock_v096, DebuggerHiding__Thread, tElock_v098b1_tHE_EGOiSTE, NeoLite_v200_additional, network_tcp_listen, DebuggerHiding__Active, DebuggerCheck__QueryInfo, Misc_Suspicious_Strings, win_registry, url, HasOverlay, network_dga, tElock_v098_tHE_EGOiSTE, Advapi_Hash_API, tElock_v098b1_additional, tElock_v098b1, create_com_service, tElock_099_10_private_tE, Big_Numbers1, Big_Numbers0

Suspicious
True check_circle

Strings
List
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
<dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
http://www.microsoft.com/windows0
select u.name from sysusers u, sysusers g, sysmembers m
8http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0
8http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0
8http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0
8http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0
<button id="atom(actionSystemRestorePointShield)" class="cp_nav_img" layoutpos="left" content="icon(78, sysmetric(49), sysmetric(50), library(imageres.dll))" active="mouse" accrole="graphic" accname="Security Shield Icon" accessible="true"/>
?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T
?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T
?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T
?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T
3.ht
and g.name = @SqlRoleName
where g.name = @SQLRoleName
W.Td
acproxy.pdb
<properties layout="118" icon="AccessibilityCpl.dll,-1" displayname="@AccessibilityCpl.dll,-67" canonicalname="pageAdminSettings" helptopic="mshelp://windows/?id=106e6689-2545-4d29-8821-f0c22259a63a" />
AppServerAI.pdb
API-MS-Win-Security-sddlparsecond-L1-1-0.pdb
api-ms-win-security-sddl-l1-1-0.pdb
xsi:schemaLocation="urn:schemas.microsoft.com/appcompat/2010/03/shimengstate EngineState.xsd"
HKCR,"CLSID\%CLSID_NamespaceInitStub%\%IPS%",,%REGEXSZ%,"%SystemRoot%\system32\shdocvw.dll"
api-ms-win-core-processsecurity-l1-1-0.pdb
AccessibilityCpl.pdb
API-MS-Win-Core-RegistryUserSpecific-L1-1-0.pdb
avifil32.pdb
asycfilt.pdb
acppage.pdb
adsldpc.pdb
azroleui.pdb
azroles.pdb
aaclient.pdb
ActXPrxy.pdb
avicap32.pdb
acledit.pdb
appidsvc.pdb
activeds.pdb
advpack.pdb
appinfo.pdb
appidapi.pdb
AECache.pdb
appmgmts.pdb
API-MS-Win-Security-ActiveDirectoryClient-L1-1-0.pdb
adsnt.pdb
avrt.pdb
appmgr.pdb
apds.pdb
aepdu.pdb
aepic.pdb
AdhApi.pdb
aeinv.pdb
AdhSvc.pdb
atmlib.pdb
atl.pdb
atmfd.pdb
adsldp.pdb
aclui.pdb
api-ms-win-mm-time-l1-1-0.pdb
api-ms-win-mm-misc-l1-1-0.pdb
api-ms-win-mm-misc-l2-1-0.pdb
api-ms-win-mm-mci-l1-1-0.pdb
api-ms-win-mm-mme-l1-1-0.pdb
adsmsext.pdb
aelupsvc.pdb
apphelp.pdb
adprovider.pdb
apprepapi.pdb
AppRepSync.pdb
apisetschema.pdb
adrclient.pdb
appsruprov.pdb
amstream.pdb
atl100.amd64.pdb
autoplay.pdb
AudioSrv.pdb
auditcse.pdb
api-ms-win-security-appcontainer-l1-1-0.pdb
api-ms-win-core-winrt-registration-l1-1-0.pdb
authui.pdb

Foremost
Matches
0.exe, 180 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: user32.dll, kernel32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 8192
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 4096
Suspicious: False cancel
Headers
Headers: 4096
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 184930
Suspicous: False cancel

Sections
Allowed: .cle, .rsrc,
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 8.0
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 244694
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2020-05-03 18:14:15
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: NeoLite v2.00, tElock 0.99 - 1.0 private -> tE!, tElock v0.98b1, CodeCrypt v0.16b - v0.163b, tElock v0.98, tElock 0.98 -> tE!
Compiled: False cancel
Compilers
MainPacker: tElock 0.98 -> tE!

Obfuscation
XOR: True check_circle
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.cle: 82
.rsrc: 1

pushpopmath
.cle: 54
.rsrc: 3

garbagebytes
.cle: 28

hookdetection
.cle: 8

software breakpoint
.cle: 2

programcontrolflowchange
.cle: 28

AVclass
rozca8vxylk
1
VirusTotal
md5
e7627ae872138da01775490a137a519e
sha1
ca5d2a1874f621e1453024f99e9cf9ea4b55692a
SCANS (DETECTION RATE = 46.38%)
AVG
result: Win32:Evo-gen [Susp]
update: 20200902
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20200902
version: 2.7.2019.1
detected: False cancel

MAX
result: malware (ai score=80)
update: 20200902
version: 2019.9.16.1
detected: True check_circle

APEX
result: Malicious
update: 20200901
version: 6.66
detected: True check_circle

Bkav
update: 20200901
version: 1.3.0.9899
detected: False cancel

K7GW
update: 20200902
version: 11.133.35146
detected: False cancel

ALYac
update: 20200902
version: 1.1.1.5
detected: False cancel

Avast
result: Win32:Evo-gen [Susp]
update: 20200902
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Dropper.Gen
update: 20200902
version: 8.3.3.8
detected: True check_circle

Baidu
update: 20190318
version: 1.0.0.2
detected: False cancel

Cynet
result: Malicious (score: 85)
update: 20200902
version: 4.0.0.24
detected: True check_circle

Cyren
update: 20200902
version: 6.3.0.2
detected: False cancel

DrWeb
result: Trojan.Siggen9.44167
update: 20200902
version: 7.0.48.8080
detected: True check_circle

GData
result: Gen:Trojan.Heur.DNP.RoZca8VXYLk
update: 20200902
version: A:25.26861B:27.20030
detected: True check_circle

Panda
update: 20200902
version: 4.6.4.2
detected: False cancel

VBA32
update: 20200902
version: 4.4.1
detected: False cancel

VIPRE
update: 20200902
version: 86398
detected: False cancel

Zoner
update: 20200902
version: 0.0.0.0
detected: False cancel

ClamAV
result: Win.Malware.Emotet-6691277-0
update: 20200902
version: 0.102.4.0
detected: True check_circle

Comodo
result: TrojWare.Win32.TrojanDownloader.Dadobra.~AXN@498r4p
update: 20200728
version: 32668
detected: True check_circle

Ikarus
update: 20200902
version: 0.1.5.2
detected: False cancel

McAfee
result: GenericRXLE-RD!FA565DB2AE49
update: 20200902
version: 6.0.6.653
detected: True check_circle

Rising
update: 20200902
version: 25.0.0.26
detected: False cancel

Sophos
result: Mal/MSIL-UG
update: 20200902
version: 4.98.0
detected: True check_circle

Yandex
update: 20200901
version: 5.5.2.24
detected: False cancel

Zillya
update: 20200902
version: 2.0.0.4167
detected: False cancel

Acronis
result: suspicious
update: 20200806
version: 1.1.1.77
detected: True check_circle

Alibaba
update: 20190527
version: 0.3.0.5
detected: False cancel

Arcabit
result: Trojan.Heur.DNP.RoZca8VXYLk
update: 20200902
version: 1.0.0.881
detected: True check_circle

Cylance
update: 20200902
version: 2.3.1.101
detected: False cancel

Elastic
result: malicious (high confidence)
update: 20200831
version: 4.0.8
detected: True check_circle

FireEye
result: Generic.mg.e7627ae872138da0
update: 20200902
version: 32.36.1.0
detected: True check_circle

Sangfor
result: Malware
update: 20200814
version: 1.0
detected: True check_circle

TACHYON
update: 20200902
version: 2020-09-02.02
detected: False cancel

Tencent
update: 20200902
version: 1.0.0.1
detected: False cancel

ViRobot
update: 20200902
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20200902
version: 1.0.0.403
detected: False cancel

eGambit
update: 20200902
detected: False cancel

Ad-Aware
result: Gen:Trojan.Heur.DNP.RoZca8VXYLk
update: 20200902
version: 3.0.16.117
detected: True check_circle

AegisLab
update: 20200902
version: 4.2
detected: False cancel

F-Secure
result: Trojan.TR/Dropper.Gen
update: 20200902
version: 12.0.86.52
detected: True check_circle

Fortinet
result: MSIL/GenKryptik.EJUF!tr
update: 20200902
version: 6.2.142.0
detected: True check_circle

Invincea
result: Mal/MSIL-UG
update: 20200902
version: 1.0.1.0
detected: True check_circle

Jiangmin
update: 20200902
version: 16.0.100
detected: False cancel

Kingsoft
update: 20200902
version: 2013.8.14.323
detected: False cancel

Paloalto
update: 20200902
version: 1.0
detected: False cancel

Symantec
result: ML.Attribute.HighConfidence
update: 20200902
version: 1.12.0.0
detected: True check_circle

AhnLab-V3
update: 20200902
version: 3.18.1.10026
detected: False cancel

Antiy-AVL
update: 20200902
version: 3.0.0.1
detected: False cancel

Kaspersky
result: HEUR:Backdoor.MSIL.Remcos.gen
update: 20200902
version: 15.0.1.13
detected: True check_circle

MaxSecure
update: 20200902
version: 1.0.0.1
detected: False cancel

Microsoft
result: Trojan:MSIL/AgentTesla.BL!MTB
update: 20200902
version: 1.1.17400.5
detected: True check_circle

Qihoo-360
result: HEUR/QVM18.1.AABB.Malware.Gen
update: 20200902
version: 1.0.0.1120
detected: True check_circle

ZoneAlarm
result: HEUR:Backdoor.MSIL.Remcos.gen
update: 20200902
version: 1.0
detected: True check_circle

Cybereason
result: malicious.872138
update: 20190616
version: 1.2.449
detected: True check_circle

ESET-NOD32
update: 20200902
version: 21926
detected: False cancel

TrendMicro
update: 20200902
version: 11.0.0.1006
detected: False cancel

BitDefender
result: Gen:Trojan.Heur.DNP.RoZca8VXYLk
update: 20200902
version: 7.2
detected: True check_circle

CrowdStrike
result: win/malicious_confidence_100% (D)
update: 20190702
version: 1.0
detected: True check_circle

K7AntiVirus
update: 20200902
version: 11.133.35146
detected: False cancel

SentinelOne
result: DFI - Malicious PE
update: 20200724
version: 4.4.0.0
detected: True check_circle

Malwarebytes
update: 20200902
version: 3.6.4.335
detected: False cancel

TotalDefense
update: 20200902
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
update: 20200902
version: 14.00
detected: False cancel

NANO-Antivirus
update: 20200902
version: 1.0.134.25140
detected: False cancel

BitDefenderTheta
result: AI:Packer.7EFE5F601F
update: 20200902
version: 7.2.37796.0
detected: True check_circle

MicroWorld-eScan
result: Gen:Trojan.Heur.DNP.RoZca8VXYLk
update: 20200902
version: 14.0.409.0
detected: True check_circle

SUPERAntiSpyware
update: 20200828
version: 5.6.0.1032
detected: False cancel

TrendMicro-HouseCall
update: 20200902
version: 10.0.0.1040
detected: False cancel

total
69
sha256
e26cb383de7038789b2f99e4d340375b2da0a5cbf5a69af22472835fac004380
scan_id
e26cb383de7038789b2f99e4d340375b2da0a5cbf5a69af22472835fac004380-1599085871
resource
e7627ae872138da01775490a137a519e
positives
32
scan_date
2020-09-02 22:31:11
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace

Process
Trace

Analysis
Reason
Blue Screen

Status
Execution Failed

Results
0

Registry
Trace

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: False cancel

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: False cancel

Loading...

DNS
Query

Response

TCP
Info

UDP
Info

HTTP
Info

Summary
DNS
False cancel

TCP
False cancel

UDP
False cancel

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: False cancel

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 62.79%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 65.39%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 62.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 99.84%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 94.31%
suspicious: False cancel

Add to Collection
Download