Report #6747 check_circle

  • Creation Date: Feb. 18, 2020, 2:25 p.m.
  • Last Update: Feb. 19, 2020, 2:55 a.m.
  • File: hlc.exe
  • Results:
Binary
DLL
False cancel
Size
3.25MB
trid
35.7% Win32 Executable
16.4% Win16/32 Executable Delphi generic
16.0% OS/2 Executable
15.8% Generic Win/DOS Executable
15.8% DOS Executable Generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
e071553cd48108c45798066746f9d1cd
sha1
4204eea0ef32baf967fe311a60f41d37f2016e49
crc32
0xc493ef27
sha224
d7b89f34ed1d3a0f82a72d5215477794f8b680f1b4fbf9e0ab25bd73
sha256
2cd31df4a74ed26c66ca965cb9aba5532cf7b6fc534e7a62478938289a485d6d
sha384
a57e645d3d2b95ae72503ea5b11cae1a1b96115a442d7a34f151cce987f6cd2d9df5021d9f435433efb574adedb5fab8
sha512
3576844526639ca8fb53d15b36c944732208818424aa49172f1616fc83e6dd4ae2a0bf0e21b59be86b3b17540a858bc4c322c8573c2027d3b572cfd830435544
ssdeep
98304:TCi5MbSs4vsvugVELUMLEM20MI4JSaOAoUDtvGkCipuObSJ+:/cx4ouZUtMRKJSaOyEk7Xbx
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
maldoc_getEIP_method_1, domain, ASProtect_123_RC4_130824_Solodovnikov_Alexey, Borland, Microsoft_Visual_Basic_v50, ASProtect_v123_RC1, ASProtect_v12x_New_Strain_additional, ASProtect_v11_BRS, ASProtect_v12_additional, ASProtect_133_21_Registered_Alexey_Solodovnikov, IsPacked, ASProtect_v12x_New_Strain, network_tcp_socket, ASProtectv12xNewStrain, contentis_base64, IsPE32, ASProtectv123RC1, IsWindowsGUI, ASProtect_V2X_Registered_Alexey_Solodovnikov, HasDigitalSignature, url, ASProtect_133_21_Registered_Alexey_Solodovnikov_additional, HasOverlay, ASProtect13321RegisteredAlexeySolodovnikov, VMProtect_1704_phpbb3, Big_Numbers1

Suspicious
True check_circle

Strings
List
*http://ns.adobe.com/xap/1.0/
Jhttp://repositorio.icpbrasil.gov.br/lcr/ACSOLUTI/ac-soluti-multipla-v1.crl0
;https://ccd.acsoluti.com.br/docs/dpc-ac-soluti-multipla.pdf0
9http://ccd2.acsoluti.com.br/lcr/ac-soluti-multipla-v1.crl0P
8http://ccd.acsoluti.com.br/lcr/ac-soluti-multipla-v1.crl0?
comerciallarbelle@outlook.com
8http://ccd.acsoluti.com.br/lcr/ac-soluti-multipla-v1.p7b0
1http://crl.usertrust.com/UTN-USERFirst-Object.crl05
" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c014 79.151481, 2013/03/13-12:09:15 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC (Windows)" xmpMM:InstanceID="xmp.iid:6ED2CB54293211E796F8863E9F3C18FB" xmpMM:DocumentID="xmp.did:6ED2CB55293211E796F8863E9F3C18FB"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:6ED2CB52293211E796F8863E9F3C18FB" stRef:documentID="xmp.did:6ED2CB53293211E796F8863E9F3C18FB"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>
TabFont.Name
s.hM
TabFont.Style
IGT.tV
h.SO
Ln.ki
Font.Name
Font.Name
Font.Name
Font.Style
Font.Style
Font.Name
Font.Name
Font.Style
Font.Style
Font.Name
Font.Style
Font.Style
Font.Name
Font.Style
Font.Style
Font.Name
Font.Style
Font.Name
Font.Name
Font.Style
Font.Style
Font.Name
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Style
Font.Name
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Style
Font.Style
Font.Name
Font.Name
Font.Style
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Name
Font.Name
Font.Style
Font.Style
Font.Style
Font.Name
Font.Style
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Style
Font.Name
Font.Name

Foremost
Matches
2969.jpg, 33 KB, 3037.jpg, 2 KB, 3932.jpg, 60 KB, 0.exe, 3 MB, 1659.png, 45 KB, 1751.png, 41 KB, 1834.png, 33 KB, 1902.png, 64 KB, 2033.png, 33 KB, 2100.png, 33 KB, 2167.png, 33 KB, 2235.png, 34 KB, 2304.png, 35 KB, 2374.png, 37 KB, 2449.png, 35 KB, 2520.png, 35 KB, 2592.png, 28 KB, 2649.png, 35 KB, 2721.png, 29 KB, 2780.png, 29 KB, 2840.png, 33 KB, 2907.png, 29 KB, 3043.png, 21 KB, 3089.png, 29 KB, 3160.png, 27 KB, 3217.png, 30 KB, 3280.png, 26 KB, 3335.png, 46 KB, 3429.png, 30 KB, 3492.png, 28 KB, 3549.png, 48 KB, 3648.png, 37 KB, 3725.png, 34 KB, 3796.png, 67 KB, 4055.png, 37 KB, 4134.png, 26 KB, 4190.png, 35 KB, 4263.png, 31 KB, 4328.png, 56 KB, 4443.png, 26 KB, 4498.png, 42 KB, 4583.png, 30 KB, 4646.png, 41 KB, 4730.png, 26 KB, 4785.png, 44 KB, 4874.png, 43 KB, 4964.png, 34 KB, 5034.png, 24 KB, 5086.png, 42 KB, 5171.png, 31 KB, 5236.png, 45 KB, 5329.png, 33 KB, 5397.png, 46 KB, 5493.png, 31 KB, 5556.png, 25 KB, 5608.png, 33 KB, 5676.png, 26 KB, 5730.png, 35 KB, 5804.png, 32 KB, 5871.png, 31 KB, 5939.png, 39 KB, 6022.png, 36 KB, 6098.png, 36 KB, 6175.png, 38 KB, 6255.png, 30 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed: http://www.w3.org/1999/02/22-rdf-syntax-ns#
hasURLs: True check_circle
Suspicious: http://ccd2.acsoluti.com.br/lcr/ac-soluti-multipla-v1.crl0p, http://www.usertrust.com1, http://ccd.acsoluti.com.br/lcr/ac-soluti-multipla-v1.p7b0, http://crl.usertrust.com/utn-userfirst-object.crl05, https://ccd.acsoluti.com.br/docs/dpc-ac-soluti-multipla.pdf0, http://repositorio.icpbrasil.gov.br/lcr/acsoluti/ac-soluti-multipla-v1.crl0, http://ocsp.usertrust.com0, http://ccd.acsoluti.com.br/lcr/ac-soluti-multipla-v1.crl0?, http://ns.adobe.com/xap/1.0/mm/, http://ns.adobe.com/xap/1.0/stype/resourceref#, http://ns.adobe.com/xap/1.0/
hasAllowed: True check_circle
hasSuspicious: True check_circle

Files
Allowed: shell32.dll, ntdll.dll, wsock32.dll, oleaut32.dll, version.dll, msimg32.dll, user32.dll, comctl32.dll, advapi32.dll, kernel32.dll, ole32.dll, gdi32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 2782208
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 3433913
Suspicous: False cancel

Sections
Allowed: , , , , , , , , , .rsrc, .data, .adata
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 4096
Suspicious: False cancel

Anomalies
Anomalies
hasAnomalies: False cancel

Libraries
Allowed: shell32.dll, ntdll.dll, wsock32.dll, oleaut32.dll, version.dll, msimg32.dll, user32.dll, comctl32.dll, advapi32.dll, kernel32.dll, ole32.dll, gdi32.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2017-05-04 12:20:50
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: ASProtect v1.2x, ASProtect 1.33 - 2.1 Registered -> Alexey Solodovnikov, ASProtect v1.2
Compiled: False cancel
Compilers
MainPacker: ASProtect v1.23 RC1

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 341
.data: 63
.rsrc: 1205

pushpopmath
none: 192
.data: 43
.rsrc: 1110

ss register
none: 14
.data: 1
.rsrc: 12

garbagebytes
none: 123
.data: 29
.rsrc: 404

hookdetection
none: 12
.data: 3
.rsrc: 46

software breakpoint
none: 9
.data: 2
.rsrc: 45

fakeconditionaljumps
none: 10
.data: 2
.rsrc: 26

programcontrolflowchange
none: 116
.data: 27
.rsrc: 380

cpuinstructionsresultscomparison
.data: 3
.rsrc: 11

AVclass
zusy
1
VirusTotal
md5
e071553cd48108c45798066746f9d1cd
sha1
4204eea0ef32baf967fe311a60f41d37f2016e49
SCANS (DETECTION RATE = 61.11%)
AVG
result: FileRepMalware
update: 20200108
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20190321
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=85)
update: 20200108
version: 2019.9.16.1
detected: True check_circle

APEX
update: 20200107
version: 5.103
detected: False cancel

Bkav
update: 20200107
version: 1.3.0.9899
detected: False cancel

K7GW
result: Spyware ( 004f91bf1 )
update: 20200108
version: 11.86.32978
detected: True check_circle

ALYac
result: Gen:Variant.Zusy.236557
update: 20200108
version: 1.1.1.5
detected: True check_circle

Avast
update: 20200108
version: 18.4.3895.0
detected: False cancel

Avira
result: TR/Spy.Banker.gzfzd
update: 20200108
version: 8.3.3.8
detected: True check_circle

Baidu
update: 20190318
version: 1.0.0.2
detected: False cancel

Cyren
update: 20200108
version: 6.2.2.2
detected: False cancel

DrWeb
result: Trojan.DownLoader24.61328
update: 20200108
version: 7.0.42.9300
detected: True check_circle

GData
result: Gen:Variant.Zusy.236557
update: 20200108
version: A:25.24508B:26.17281
detected: True check_circle

Panda
result: Trj/CI.A
update: 20200107
version: 4.6.4.2
detected: True check_circle

VBA32
result: TScope.Malware-Cryptor.SB
update: 20200104
version: 4.3.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20200108
version: 80622
detected: True check_circle

Zoner
update: 20200108
version: 1.0.0.1
detected: False cancel

ClamAV
update: 20200107
version: 0.102.1.0
detected: False cancel

Comodo
result: Malware@#79umq3iaa01n
update: 20200108
version: 31936
detected: True check_circle

F-Prot
update: 20200108
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Spy.Agent
update: 20200107
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!E071553CD481
update: 20200108
version: 6.0.6.653
detected: True check_circle

Rising
result: Malware.Undefined!8.C (TFE:5:bDFkuZQJMy)
update: 20200108
version: 25.0.0.24
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20200108
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.PWS.BestaFera!
update: 20200107
version: 5.5.2.24
detected: True check_circle

Zillya
update: 20200106
version: 2.0.0.3991
detected: False cancel

Acronis
update: 20200107
version: 1.1.1.58
detected: False cancel

Alibaba
update: 20190527
version: 0.3.0.5
detected: False cancel

Arcabit
result: Trojan.Zusy.D39C0D
update: 20200108
version: 1.0.0.869
detected: True check_circle

Cylance
result: Unsafe
update: 20200108
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20190918
version: 3.0.15
detected: True check_circle

FireEye
result: Generic.mg.e071553cd48108c4
update: 20200108
version: 29.7.0.0
detected: True check_circle

Sangfor
result: Malware
update: 20200107
version: 1.0
detected: True check_circle

TACHYON
update: 20200108
version: 2020-01-08.01
detected: False cancel

Tencent
update: 20200108
version: 1.0.0.1
detected: False cancel

ViRobot
update: 20200108
version: 2014.3.20.0
detected: False cancel

Webroot
update: 20200108
version: 1.0.0.403
detected: False cancel

eGambit
update: 20200108
detected: False cancel

Ad-Aware
result: Gen:Variant.Zusy.236557
update: 20200108
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Trojan.Win32.Delf.4!c
update: 20191220
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Zusy.236557 (B)
update: 20200108
version: 2018.12.0.1641
detected: True check_circle

F-Secure
result: Trojan.TR/Spy.Banker.gzfzd
update: 20200108
version: 12.0.86.52
detected: True check_circle

Fortinet
result: W32/Banker.ADGI!tr
update: 20200108
version: 6.2.137.0
detected: True check_circle

Invincea
result: heuristic
update: 20191211
version: 6.3.6.26157
detected: True check_circle

Jiangmin
result: Packed.Black.akhg
update: 20200108
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20200108
version: 2013.8.14.323
detected: False cancel

Paloalto
update: 20200108
version: 1.0
detected: False cancel

Symantec
result: Trojan.Gen.2
update: 20200108
version: 1.11.0.0
detected: True check_circle

Trapmine
result: malicious.high.ml.score
update: 20191216
version: 3.2.16.890
detected: True check_circle

AhnLab-V3
result: Trojan/Win32.BestaFera.C1949901
update: 20200108
version: 3.17.0.26111
detected: True check_circle

Antiy-AVL
update: 20200108
version: 3.0.0.1
detected: False cancel

Kaspersky
result: Trojan.Win32.Delf.ensh
update: 20200108
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Dynamer!ac
update: 20200108
version: 1.1.16600.7
detected: True check_circle

Qihoo-360
result: Win32/Trojan.Spy.e71
update: 20200108
version: 1.0.0.1120
detected: True check_circle

ZoneAlarm
result: Trojan.Win32.Delf.ensh
update: 20200108
version: 1.0
detected: True check_circle

Cybereason
result: malicious.cd4810
update: 20190616
version: 1.2.449
detected: True check_circle

ESET-NOD32
result: a variant of Win32/Spy.Zumanek.BS
update: 20200108
version: 20636
detected: True check_circle

TrendMicro
update: 20200108
version: 11.0.0.1006
detected: False cancel

BitDefender
result: Gen:Variant.Zusy.236557
update: 20200108
version: 7.2
detected: True check_circle

CrowdStrike
update: 20190702
version: 1.0
detected: False cancel

K7AntiVirus
result: Spyware ( 004f91bf1 )
update: 20200108
version: 11.86.32978
detected: True check_circle

SentinelOne
result: DFI - Suspicious PE
update: 20191218
version: 1.12.1.57
detected: True check_circle

Avast-Mobile
update: 20200106
version: 200106-02
detected: False cancel

Malwarebytes
update: 20200108
version: 3.6.4.330
detected: False cancel

TotalDefense
update: 20200108
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
update: 20200107
version: 14.00
detected: False cancel

NANO-Antivirus
result: Trojan.Win32.Black.eovxom
update: 20200108
version: 1.0.134.25031
detected: True check_circle

BitDefenderTheta
result: AI:Packer.F23C722821
update: 20191223
version: 7.2.37796.0
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Zusy.236557
update: 20200108
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20200103
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: Artemis!Trojan
update: 20200108
version: v2017.3010
detected: True check_circle

TrendMicro-HouseCall
update: 20200108
version: 10.0.0.1040
detected: False cancel

total
72
sha256
2cd31df4a74ed26c66ca965cb9aba5532cf7b6fc534e7a62478938289a485d6d
scan_id
2cd31df4a74ed26c66ca965cb9aba5532cf7b6fc534e7a62478938289a485d6d-1578469190
resource
e071553cd48108c45798066746f9d1cd
positives
44
scan_date
2020-01-08 07:39:50
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
19/2/2020 - 1:45:43.247Open1480C:\malware.exe\Device\Harddisk0\DR0
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exe\Device\Harddisk0\DR0
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Unknown1480C:\malware.exeC:\Monitor\Malware
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\dwmapi.dll
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\dwmapi.dll
19/2/2020 - 1:45:43.247Open1480C:\malware.exeC:\Windows\Fonts\StaticCache.dat
19/2/2020 - 1:45:43.247Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
19/2/2020 - 1:45:43.309Open1480C:\malware.exeC:\ntmarta.dll
19/2/2020 - 1:45:43.309Open1480C:\malware.exeC:\Windows\SysWOW64\ntmarta.dll
19/2/2020 - 1:45:43.309Open1480C:\malware.exeC:\Windows\SysWOW64\ntmarta.dll
19/2/2020 - 1:45:43.309Open1480C:\malware.exeC:\
19/2/2020 - 1:45:43.309Unknown1480C:\malware.exeC:\
19/2/2020 - 1:45:43.325Open1480C:\malware.exeC:\Windows\Fonts\sserife.fon
19/2/2020 - 1:45:43.325Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
19/2/2020 - 1:45:43.325Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
19/2/2020 - 1:45:43.325Open1480C:\malware.exeC:\malware.exe.Local
19/2/2020 - 1:45:43.325Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
19/2/2020 - 1:45:43.325Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
19/2/2020 - 1:45:43.325Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
19/2/2020 - 1:45:43.325Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
19/2/2020 - 1:45:43.325Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
19/2/2020 - 1:45:43.325Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
19/2/2020 - 1:45:43.325Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
19/2/2020 - 1:46:23.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/2/2020 - 1:46:23.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
19/2/2020 - 1:46:23.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Google\Chrome\User Data\Local State
19/2/2020 - 1:46:23.684Open1480C:\malware.exeC:\srms.dat
19/2/2020 - 1:46:23.684Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.mui
19/2/2020 - 1:46:23.731Open1480C:\malware.exeC:\Windows\SysWOW64\explorer.exe
19/2/2020 - 1:46:23.809Open1480C:\malware.exeC:\Program Files (x86)
19/2/2020 - 1:46:23.809Unknown1480C:\malware.exeC:\Program Files (x86)
19/2/2020 - 1:46:23.809Open1480C:\malware.exeC:\Program Files (x86)\GbPlugin
19/2/2020 - 1:46:23.809Open1480C:\malware.exeC:\Program Files (x86)\Scpad
19/2/2020 - 1:46:23.809Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.dll
19/2/2020 - 1:46:23.856Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.dll
19/2/2020 - 1:46:24.137Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemcomn.dll
19/2/2020 - 1:46:24.137Open1480C:\malware.exeC:\Windows\SysWOW64\wbemcomn.dll
19/2/2020 - 1:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\wbemcomn.dll
19/2/2020 - 1:46:24.747Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\Logs
19/2/2020 - 1:46:24.793Unknown1480C:\malware.exeC:\Windows\SysWOW64\wbem\Logs
19/2/2020 - 1:46:24.793Open1480C:\malware.exeC:\Windows\SysWOW64\advapi32.dll
19/2/2020 - 1:46:24.793Open1480C:\malware.exeC:\Windows\SysWOW64\advapi32.dll
19/2/2020 - 1:46:24.793Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemprox.dll
19/2/2020 - 1:46:24.793Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemprox.dll
19/2/2020 - 1:46:25.28Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wmiutils.dll
19/2/2020 - 1:46:25.28Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wmiutils.dll
19/2/2020 - 1:46:25.450Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
19/2/2020 - 1:46:25.450Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
19/2/2020 - 1:46:25.450Open1480C:\malware.exeC:\Windows\SysWOW64\NapiNSP.dll
19/2/2020 - 1:46:25.450Open1480C:\malware.exeC:\Windows\SysWOW64\NapiNSP.dll
19/2/2020 - 1:46:25.778Open1480C:\malware.exeC:\srms.dat
19/2/2020 - 1:46:25.778Open1480C:\malware.exeC:\Windows\SysWOW64\pnrpnsp.dll
19/2/2020 - 1:46:25.778Open1480C:\malware.exeC:\Windows\SysWOW64\pnrpnsp.dll
19/2/2020 - 1:46:26.106Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
19/2/2020 - 1:46:26.106Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
19/2/2020 - 1:46:26.106Open1480C:\malware.exeC:\DNSAPI.dll
19/2/2020 - 1:46:26.106Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
19/2/2020 - 1:46:26.106Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
19/2/2020 - 1:46:26.106Open1480C:\malware.exeC:\Windows\SysWOW64\winrnr.dll
19/2/2020 - 1:46:26.106Open1480C:\malware.exeC:\Windows\SysWOW64\winrnr.dll
19/2/2020 - 1:46:26.340Open1480C:\malware.exeC:\IPHLPAPI.DLL
19/2/2020 - 1:46:26.340Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
19/2/2020 - 1:46:26.340Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
19/2/2020 - 1:46:26.340Open1480C:\malware.exeC:\WINNSI.DLL
19/2/2020 - 1:46:26.340Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
19/2/2020 - 1:46:26.340Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
19/2/2020 - 1:46:26.387Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
19/2/2020 - 1:46:26.387Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
19/2/2020 - 1:46:26.481Open1480C:\malware.exeC:\rasadhlp.dll
19/2/2020 - 1:46:26.481Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
19/2/2020 - 1:46:26.481Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\CRYPTSP.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\RpcRtRemote.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
19/2/2020 - 1:46:26.575Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
19/2/2020 - 1:46:26.575Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
19/2/2020 - 1:46:26.575Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
19/2/2020 - 1:46:26.762Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemsvc.dll
19/2/2020 - 1:46:26.762Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemsvc.dll
19/2/2020 - 1:46:27.231Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\fastprox.dll
19/2/2020 - 1:46:27.231Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\fastprox.dll
19/2/2020 - 1:46:27.231Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\NTDSAPI.dll
19/2/2020 - 1:46:27.231Open1480C:\malware.exeC:\Windows\SysWOW64\ntdsapi.dll
19/2/2020 - 1:46:27.231Open1480C:\malware.exeC:\Windows\SysWOW64\ntdsapi.dll
19/2/2020 - 1:46:27.653Open1480C:\malware.exeC:\SXS.DLL
19/2/2020 - 1:46:27.653Open1480C:\malware.exeC:\Windows\SysWOW64\sxs.dll
19/2/2020 - 1:46:27.653Open1480C:\malware.exeC:\Windows\SysWOW64\sxs.dll
19/2/2020 - 1:46:27.653Open1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:27.653Read1480C:\malware.exeC:\Windows\SysWOW64\wbem\wbemdisp.tlb
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\
19/2/2020 - 1:46:28.825Unknown1480C:\malware.exeC:\
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\credssp.dll
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\credssp.dll
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/2/2020 - 1:46:28.825Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
19/2/2020 - 1:46:29.356Open1480C:\malware.exeC:\srms.dat
19/2/2020 - 1:46:29.356Open1480C:\malware.exeC:\srms.dat
19/2/2020 - 1:46:29.356Write1480C:\malware.exeC:\Users\Behemot\ntuser.dat.LOG1
19/2/2020 - 1:46:29.387Write1480C:\malware.exeC:\Users\Behemot\ntuser.dat.LOG1
19/2/2020 - 1:46:29.387Write1480C:\malware.exeC:\Users\Behemot\ntuser.dat.LOG1
19/2/2020 - 1:46:29.434Write1480C:\malware.exeC:\Users\Behemot\ntuser.dat.LOG1
19/2/2020 - 1:46:29.434Write1480C:\malware.exeC:\Users\Behemot\ntuser.dat.LOG1
19/2/2020 - 1:46:29.481Write1480C:\malware.exeC:\Users\Behemot\NTUSER.DAT
19/2/2020 - 1:46:29.575Write1480C:\malware.exeC:\Users\Behemot\NTUSER.DAT
19/2/2020 - 1:46:29.575Write1480C:\malware.exeC:\Users\Behemot\NTUSER.DAT
19/2/2020 - 1:46:29.575Write1480C:\malware.exeC:\Users\Behemot\NTUSER.DAT
19/2/2020 - 1:46:29.668Write1480C:\malware.exeC:\Users\Behemot\NTUSER.DAT

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
19/2/2020 - 1:45:43.247Write1480C:\malware.exe\REGISTRY\MACHINE\SOFTWARE\Classes\.key
19/2/2020 - 1:45:43.247Write1480C:\malware.exe\REGISTRY\MACHINE\SOFTWARE\Classes\.key
19/2/2020 - 1:46:29.356Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Runmalware.exe

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: False cancel

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code www.eletrodoria.com.br.
computer localhost arrow_forward computer gateway:50273 code www.eletrodoria.com.br.

Response
computer gateway:DNS arrow_forward computer localhost code www.eletrodoria.com.br. reply_all 69.49.115.33


TCP
Info
69.49.115.33:80 arrow_forward computer localhost:65191
computer localhost:65191 arrow_forward 69.49.115.33:80

UDP
Info
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273

HTTP
Info
computer localhost send POST www.eletrodoria.com.br attach_file /scripts/aviso/index.php

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: False cancel

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 85.29%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 76.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 97.14%
suspicious: False cancel

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.26%
suspicious: False cancel

Add to Collection
Download