Report #6527 check_circle

Binary
DLL
False cancel
Size
1.08MB
trid
45.6% Win32 Executable Borland Delphi 7
30.9% Win32 Executable Borland Delphi 5
18.0% Win32 Executable Borland Delphi 6
2.8% Win32 EXE PECompact compressed
0.9% Win32 Executable Delphi generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
da5e7178dd49eec9c6a8bccbef44c795
sha1
39ed29b5c6e9cdc0d020f09e1e3c76c1edf0cfcf
crc32
0x117011af
sha224
5d0344589e3bb97211f2c50f4700d7766287702fd37d7b1fc6f11114
sha256
0b83d155df5543dfa1f260ed4f974e75eb1aaa695d50a2b877006a0b3562bbd2
sha384
023d5265788728cc86938b8dfcb2f06e87a5fd588d3d7fc971b444b94f510f38837e0558cce1ff9cfd50e4118464fa2f
sha512
a76074ea1a54be11441c88096ce844fc11b20e47854db89e0f2c9fc17a989e76f9e6239bd00082eb2426f01695027eeecce2c285a11fc763cc46388407719815
ssdeep
24576:cdJJTTcW5AuiuT9mBm39K6MNWzc+tJKvWcTU+NAA:ctTJkBp6MNWzRtATP
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, CookieTools, Borland_Delphi_30_, network_dropper, CRC32_poly_Constant, BASE64_table, Delphi_DecodeDate, RIPEMD160_Constants, borland_delphi, Check_OutputDebugStringA_iat, Delphi_FormShow, network_dns, network_tcp_listen, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, win_files_operation, IsPE32, win_hook, RijnDael_AES_CHAR, contentis_base64, network_tcp_socket, screenshot, Borland_Delphi_v40_v50, keylogger, win_mutex, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, IsWindowsGUI, network_udp_sock, Delphi_Copy, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, win_registry, Delphi_CompareCall, RijnDael_AES_LONG, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30, network_smtp_raw

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
whois.internic.net
whois.internic.net
t.Ht
Font.Style
Font.Name
Invalid compressed size, rfs.size = %d, count = %d
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
127.0.0.1
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
\Software\Borland\C++Builder
\Software\Borland\Delphi
P.rsrc
SOFTWARE\Borland\Delphi\RTL
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
\Software\Borland\BDS
\log.txt
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
version.dll
vcltest3.dll
uxtheme.dll
0.0.0.1
urlmon.dll
Network is down.
Host is down.
Hashed list of file names is invalid
Username
Username
Username
Password for "%s"
Socket Error # %d
OnDeleteError
OnDeleteError
OnDataAvailable event is nil.
OnReceived
OnReceive
;s4tG
""fD**~T
+IdTCPServer
Uh&oL
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
,%.%0%2%4%6%8%:%<%>%@%B%E%G%I%
\Deleted
X-Library
Calculated
fkCalculated
Bad address.
TRecordsetReasonEvent
Socks server did not respond.$Invalid socks authentication method.%Authentication error to socks server.
Connected.
Connected.
JumpID("","%s")
4%4a4s4
Socket is not connected..Cannot send or receive after socket is closed.#Too many references, cannot splice.
OnCommand(
Connect timed out.
Command not supported.
Connection refused.
Already connected.
Too many open files.
TEventReason
TEventReason
TEventReason
TEventReason
TEventReason
Apartment
AfterDelete
AfterDelete
Connection reset by peer.
Connection timed out.
Sub-menu is not in menu
Cannot compress file '%s'. Zip64 mode is not enabled
ilReadCommitted
Decompression error*Error on call Winsock2 library function %s&Error on loading Winsock2 library (%s)
/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usable2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Division by zero
OnWillExecute(
Stage
Not Connected
UhBmG
FullRepaint
erDelete
August September
BeforeDelete
TaskbarCreated
bsSizeToolWin
RecordsAffected
poDelete
Rebuild
paSigned
Selected

Foremost
Matches
0.exe, 1 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 127.0.0.1, 1, localhost.
Suspicious: 0.0.0.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: MAPI32.DLL, mtxex.dll, WS2_32.DLL, user32.dll, uxtheme.dll, comctl32.dll, ole32.dll, imm32.dll, advapi32.dll, gdi32.dll, urlmon.dll, oleaut32.dll, kernel32.dll, vcltest3.dll, version.dll, shell32.dll
hasFiles: True check_circle
Suspicious: \log.txt
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 185856
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 954404
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: mapi32.dll, mtxex.dll, ws2_32.dll, user32.dll, uxtheme.dll, comctl32.dll, ole32.dll, imm32.dll, advapi32.dll, gdi32.dll, urlmon.dll, oleaut32.dll, kernel32.dll, version.dll, shell32.dll
hasLibs: True check_circle
Suspicious: vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 205
.reloc: 1

pushpopmath
none: 32
.rsrc: 9
.reloc: 55

garbagebytes
none: 200
.reloc: 1

hookdetection
none: 7
.reloc: 5

software breakpoint
none: 7
.reloc: 28

programcontrolflowchange
none: 200
.reloc: 1

cpuinstructionsresultscomparison
none: 26
.rsrc: 25
.idata: 117

AVclass
banload
1
VirusTotal
md5
da5e7178dd49eec9c6a8bccbef44c795
sha1
39ed29b5c6e9cdc0d020f09e1e3c76c1edf0cfcf
SCANS (DETECTION RATE = 68.75%)
AVG
result: Win32:Malware-gen
update: 20180629
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20180629
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=100)
update: 20180630
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180629
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 00511c001 )
update: 20180630
version: 10.51.27609
detected: True check_circle

ALYac
result: Trojan.GenericKD.5603074
update: 20180629
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Malware-gen
update: 20180629
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Dldr.Banload.cbaoh
update: 20180629
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180628
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.AJNI-6220
update: 20180629
version: 6.0.0.4
detected: True check_circle

DrWeb
update: 20180629
version: 7.0.33.6080
detected: False cancel

GData
result: Trojan.GenericKD.5603074
update: 20180629
version: A:25.17629B:25.12609
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180629
version: 4.6.4.2
detected: True check_circle

VBA32
result: BScope.TrojanDownloader.Banload
update: 20180629
version: 3.12.32.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180629
version: 67762
detected: True check_circle

Zoner
update: 20180629
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180629
version: 1.6.0.52
detected: True check_circle

ClamAV
update: 20180629
version: 0.99.2.0
detected: False cancel

Comodo
result: UnclassifiedMalware
update: 20180630
version: 29260
detected: True check_circle

F-Prot
update: 20180630
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180629
version: 0.1.5.2
detected: True check_circle

McAfee
result: Trojan-FNXL!DA5E7178DD49
update: 20180629
version: 6.0.6.653
detected: True check_circle

Sophos
result: Mal/Banspy-K
update: 20180629
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!i7zdaUst95E
update: 20180629
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Banload.Win32.81939
update: 20180629
version: 2.0.0.3584
detected: True check_circle

Arcabit
result: Trojan.Generic
update: 20180629
version: 1.0.0.831
detected: True check_circle

Babable
update: 20180406
version: 9107201
detected: False cancel

Endgame
result: malicious (high confidence)
update: 20180612
version: 2.1.3
detected: True check_circle

TACHYON
result: Trojan-Downloader/W32.Banload.1137664
update: 20180629
version: 2018-06-29.02
detected: True check_circle

Tencent
result: Win32.Trojan-downloader.Banload.Wsag
update: 20180630
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180629
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20180630
version: 1.0.0.403
detected: False cancel

eGambit
update: 20180630
detected: False cancel

Ad-Aware
result: Trojan.GenericKD.5603074
update: 20180629
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Troj.Downloader.W32.Banload!c
update: 20180629
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.5603074 (B)
update: 20180629
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.GenericKD.5603074
update: 20180630
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.YAV!tr.dldr
update: 20180629
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180601
version: 6.3.5.26121
detected: False cancel

Jiangmin
update: 20180629
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180630
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180630
version: 1.0
detected: True check_circle

Symantec
result: ML.Attribute.HighConfidence
update: 20180629
version: 1.6.0.0
detected: True check_circle

AhnLab-V3
result: Downloader/Win32.Banload.C2040206
update: 20180629
version: 3.12.1.21240
detected: True check_circle

Antiy-AVL
update: 20180630
version: 3.0.0.1
detected: False cancel

Kaspersky
result: Trojan-Downloader.Win32.Banload.aardw
update: 20180629
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180629
version: 1.1.15000.2
detected: True check_circle

Qihoo-360
result: Win32/Trojan.Downloader.9fb
update: 20180630
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180628
version: 6.8.0.5.3218
detected: False cancel

ZoneAlarm
result: Trojan-Downloader.Win32.Banload.aardw
update: 20180629
version: 1.0
detected: True check_circle

Cybereason
result: malicious.8dd49e
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.YAC
update: 20180629
version: 17636
detected: True check_circle

BitDefender
result: Trojan.GenericKD.5603074
update: 20180629
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_100% (W)
update: 20180530
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 00511c001 )
update: 20180629
version: 10.51.27609
detected: True check_circle

SentinelOne
result: static engine - malicious
update: 20180618
version: 1.0.17.225
detected: True check_circle

Avast-Mobile
update: 20180629
version: 180628-10
detected: False cancel

Malwarebytes
update: 20180629
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180629
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180629
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.eqwfrl
update: 20180629
version: 1.0.116.23366
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.5603074
update: 20180629
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180629
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Dropper.th
update: 20180629
version: v2017.2786
detected: True check_circle

total
64
sha256
0b83d155df5543dfa1f260ed4f974e75eb1aaa695d50a2b877006a0b3562bbd2
scan_id
0b83d155df5543dfa1f260ed4f974e75eb1aaa695d50a2b877006a0b3562bbd2-1530317952
resource
da5e7178dd49eec9c6a8bccbef44c795
positives
44
scan_date
2018-06-30 00:19:12
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
18/2/2020 - 2:46:3.981Open1480C:\malware.exeC:\Program Files (x86)\Common Files\System\ado\msado15.dll
18/2/2020 - 2:46:4.28Open1480C:\malware.exeC:\Program Files (x86)\Common Files\System\ado\msado15.dll
18/2/2020 - 2:46:4.450Open1480C:\malware.exeC:\Program Files (x86)\Common Files\System\ado\MSDART.DLL
18/2/2020 - 2:46:4.450Open1480C:\malware.exeC:\Windows\SysWOW64\msdart.dll
18/2/2020 - 2:46:4.497Open1480C:\malware.exeC:\Windows\SysWOW64\msdart.dll
18/2/2020 - 2:46:5.622Open1480C:\malware.exeC:\Windows\Fonts\roman.fon
18/2/2020 - 2:46:6.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\EspecialFonts
18/2/2020 - 2:46:6.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\EspecialFonts
18/2/2020 - 2:46:6.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 2:46:6.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 2:46:6.231Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\EspecialFonts
18/2/2020 - 2:46:6.231Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\EspecialFonts
18/2/2020 - 2:46:6.231Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 2:46:6.231Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 2:46:6.247Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 2:46:6.247Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 2:46:6.247Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
18/2/2020 - 2:46:6.247Open1480C:\malware.exeC:\Secur32.dll
18/2/2020 - 2:46:6.247Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 2:46:6.247Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
18/2/2020 - 2:46:6.247Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 2:46:6.247Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 2:46:6.247Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 2:46:6.247Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 2:46:6.247Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 2:46:6.247Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 2:46:6.247Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
18/2/2020 - 2:46:6.293Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
18/2/2020 - 2:46:6.293Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 2:46:6.293Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
18/2/2020 - 2:46:6.293Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 2:46:6.293Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
18/2/2020 - 2:46:6.293Open1480C:\malware.exeC:\IPHLPAPI.DLL
18/2/2020 - 2:46:6.293Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 2:46:6.293Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
18/2/2020 - 2:46:6.309Open1480C:\malware.exeC:\WINNSI.DLL
18/2/2020 - 2:46:6.309Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 2:46:6.309Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
18/2/2020 - 2:46:6.309Open1480C:\malware.exeC:\DNSAPI.dll
18/2/2020 - 2:46:6.309Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 2:46:6.309Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
18/2/2020 - 2:46:6.356Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 2:46:6.356Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
18/2/2020 - 2:46:6.497Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 2:46:6.497Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
18/2/2020 - 2:46:6.497Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 2:46:6.497Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
18/2/2020 - 2:46:6.543Open1480C:\malware.exeC:\dhcpcsvc6.DLL
18/2/2020 - 2:46:6.543Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 2:46:6.543Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 2:46:6.543Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
18/2/2020 - 2:46:6.543Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\dhcpcsvc.DLL
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\CRYPTSP.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.590Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.606Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
18/2/2020 - 2:46:6.606Open1480C:\malware.exeC:\RpcRtRemote.dll
18/2/2020 - 2:46:6.606Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 2:46:6.606Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 2:46:6.606Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
18/2/2020 - 2:46:6.606Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
18/2/2020 - 2:46:6.653Open1480C:\malware.exeC:\rasadhlp.dll
18/2/2020 - 2:46:6.653Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 2:46:6.653Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
18/2/2020 - 2:46:6.700Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 2:46:6.700Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
18/2/2020 - 2:46:7.872Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 2:46:7.872Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 2:46:8.75Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 2:46:8.75Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\malware.exe.Local
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 2:46:8.168Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 2:46:8.168Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
18/2/2020 - 2:46:8.543Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\EspecialFonts
18/2/2020 - 2:46:8.543Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\EspecialFonts
18/2/2020 - 2:46:8.543Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
18/2/2020 - 2:46:8.543Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
18/2/2020 - 2:46:6.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 2:46:6.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 2:46:6.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 2:46:6.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 2:46:6.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
18/2/2020 - 2:46:6.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
18/2/2020 - 2:46:6.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
18/2/2020 - 2:46:6.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
18/2/2020 - 2:46:6.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
18/2/2020 - 2:46:6.309Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
18/2/2020 - 2:46:6.309Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
18/2/2020 - 2:46:6.309Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
18/2/2020 - 2:46:6.309Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
18/2/2020 - 2:46:6.309Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
18/2/2020 - 2:46:6.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
18/2/2020 - 2:46:6.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
18/2/2020 - 2:46:6.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
18/2/2020 - 2:46:6.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 2:46:6.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 2:46:6.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 2:46:6.700Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
18/2/2020 - 2:46:8.75Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 2:46:8.75Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
18/2/2020 - 2:46:8.75Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
18/2/2020 - 2:46:8.75Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code br234.teste.website.
computer localhost arrow_forward computer gateway:DNS code br234.teste.website.

Response
computer gateway:DNS arrow_forward computer localhost code br234.teste.website. reply_all 192.185.176.78


TCP
Info
192.185.176.78:80 arrow_forward computer localhost:65191
computer localhost:65191 arrow_forward 192.185.176.78:80

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53

HTTP
Info
computer localhost send GET br234.teste.website attach_file /~hoste046/default_date_78493908509489/FastNettoolks0.zip

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 50.00%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 89.53%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 52.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 62.82%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 45.53%
suspicious: False cancel

Add to Collection
Download