Report #7742 check_circle

Binary
DLL
False cancel
Size
842.50KB
trid
46.3% Win32 Executable Borland Delphi 7
31.4% Win32 Executable Borland Delphi 5
18.2% Win32 Executable Borland Delphi 6
0.9% Win32 Executable Delphi generic
0.9% Windows screen saver
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
bbf126a2411150708f74a795d0be01e7
sha1
231cee59b391dad513d4dad1ab0e3d579aa703cf
crc32
0xe42224d0
sha224
b3e253e07f174f79e0f5f08aba1033acffeacabc04687f85ffcf4c2e
sha256
b9ba4d9340c43277f9ee2eb5892c3da3bc29353972d2c363137deb02b42989ad
sha384
dc6cec78b526777ef60bf03ab95d10d7efcf80b7074b7a0a75fa382bc7e6d8110674df4ed5c8f6445e9412f682daefa7
sha512
f25aec5c63d1b711312cf58fe794a96422e59f4837d5a25e47162fd96790b83c52f062e42f4d69b5b39185ba97d35b85a5c10edacf210ef3cd219f69be8465c4
ssdeep
24576:vjJ7KznnDdW5ARenraHthtoOQh900vT28nd+jD1TU+:74X4aTtoOQhBiTP
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, CRC32_poly_Constant, BASE64_table, Delphi_DecodeDate, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, RijnDael_AES_CHAR, screenshot, Borland_Delphi_v40_v50, keylogger, contentis_base64, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, Borland_Delphi_v60_v70, IsWindowsGUI, Delphi_Copy, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, win_registry, Delphi_CompareCall, RijnDael_AES_LONG, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
http://54.233.140.167/k/kk.zip
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
t.Ht
Uh.TD
Font.Name
Font.Style
Invalid compressed size, rfs.size = %d, count = %d
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
Uh.gH
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
\Software\Borland\C++Builder
\Software\Borland\Delphi
P.rsrc
SOFTWARE\Borland\Delphi\RTL
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
\Software\Borland\BDS
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
version.dll
vcltest3.dll
uxtheme.dll
wininet.dll
Hashed list of file names is invalid
arit.exe
WComponent was expected to implement IInterfaceComponentReference for ValuesList support<Errors object must support the interface IIterateIntfSupport Action does not provide response+Action can't respone to unknown HTTP method"Action can't redirect to blank URL
Password for "%s"
OnClosedSE
%s<input type="hidden" name="%s" value="%s">%s
""fD**~T
0%0.0A0T0
Self-
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
Invalid SQL date/time values+Type mismatch in parameter %d for method %s,Invalid DispID for parameter %d in method %s#Parameter %d required for method %s/Method definition for %s has over %d parameters!Too many parameters for method %s'Execution of action %s is not permitted"Data Modification is not permitted
UhI7A
JumpID("","%s")
%s.WriteItem(%d)
%1A1O1
Response.Write(%s)
Apartment
Sub-menu is not in menu
Cannot compress file '%s'. Zip64 mode is not enabled
Producer
%s,Custom variant type (%s%.4x) is out of range/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usable2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Division by zero
Stage
Count
Count
List
Count
ToolWin
TaskbarCreated
August September
bsSizeToolWin
Selected
Rebuild
poDelete
Uh%dC
Too many open files
Unexpected nil pointer
Assertion failed
include
Internal error. Update is not started
File is open in read-only mode
PathTranslated
%s (%s, line %d)
\Software\Embarcadero
Archive already has SFX stub
No help found for %s#No context-sensitive help installed$No topic-based help system installed
\Software\CodeGear\BDS
Privileged instruction(Exception %s in module %s at %p.
Error reading %s%s%s: %s
I/O error %d
%s on line %d
Overwrite file "%s" with "%s"
List count out of bounds (%d)
Ancestor for '%s' not found
Archive is damaged. Open failed
Archive is open. You should close it beore performing this operation.
Cannot delete file "%s"
Cannot assign a %s to a %s
Class %s not found
Property %s does not exist
Resource %s not found
%s is not a valid BCD value$Could not parse SQL TimeStamp string
?HTTPApp
OnAfterExecuteAction
OnProgressH
OnDestroy0
OnExtractFile
TProtection
Variable %s is not a container
ESafecallException

Foremost
Matches
0.exe, 842 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 54.233.140.167, 1, ec2-54-233-140-167.sa-east-1.compute.amazonaws.com.
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://54.233.140.167/k/kk.zip, http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: http://54.233.140.167/k/kk.zip, MAPI32.DLL, wininet.dll, user32.dll, uxtheme.dll, oleaut32.dll, comctl32.dll, ole32.dll, imm32.dll, advapi32.dll, gdi32.dll, kernel32.dll, vcltest3.dll, shell32.dll, version.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 128512
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 736760
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: mapi32.dll, wininet.dll, user32.dll, uxtheme.dll, oleaut32.dll, comctl32.dll, ole32.dll, imm32.dll, advapi32.dll, gdi32.dll, kernel32.dll, shell32.dll, version.dll
hasLibs: True check_circle
Suspicious: vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 163

pushpopmath
none: 25
.rsrc: 4
.idata: 1
.reloc: 37

garbagebytes
none: 156

hookdetection
none: 2
.reloc: 2

software breakpoint
none: 5
.reloc: 17

programcontrolflowchange
none: 156

cpuinstructionsresultscomparison
none: 18
.rsrc: 19

AVclass
banload
1
VirusTotal
md5
bbf126a2411150708f74a795d0be01e7
sha1
231cee59b391dad513d4dad1ab0e3d579aa703cf
SCANS (DETECTION RATE = 71.93%)
AVG
result: FileRepMetagen [Malware]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180323
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=87)
update: 20180323
version: 2017.11.15.1
detected: True check_circle

K7GW
result: Trojan ( 7000000f1 )
update: 20180323
version: 10.42.26597
detected: True check_circle

ALYac
result: Gen:Variant.Symmi.57441
update: 20180323
version: 1.1.1.5
detected: True check_circle

Avast
result: FileRepMetagen [Malware]
update: 20180323
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Delphi.1333
update: 20180323
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Banload.CJ2.gen!Eldorado
update: 20180323
version: 5.4.30.7
detected: True check_circle

DrWeb
update: 20180323
version: 7.0.28.2020
detected: False cancel

GData
result: Gen:Variant.Symmi.57441
update: 20180323
version: A:25.16481B:25.11861
detected: True check_circle

Panda
result: Trj/GdSda.A
update: 20180323
version: 4.6.4.2
detected: True check_circle

VBA32
result: suspected of Trojan.Downloader.gen.h
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180323
version: 65478
detected: True check_circle

AVware
result: Trojan.Win32.Generic!BT
update: 20180323
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180323
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180323
version: 28733
detected: False cancel

F-Prot
result: W32/Banload.CJ2.gen!Eldorado
update: 20180323
version: 4.7.1.166
detected: True check_circle

McAfee
result: Artemis!BBF126A24111
update: 20180323
version: 6.0.6.653
detected: True check_circle

Rising
result: Malware.Undefined!8.C (TFE:5:RHxzsAYalDH)
update: 20180323
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180323
version: 4.98.0
detected: True check_circle

Yandex
update: 20180323
version: 5.5.1.3
detected: False cancel

Arcabit
result: Trojan.Symmi.DE061
update: 20180323
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180323
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan-downloader.Banload.Pkgv
update: 20180323
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180323
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180323
version: v4.3.5
detected: False cancel

AegisLab
result: Troj.W32.Generic!c
update: 20180323
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Symmi.57441 (B)
update: 20180323
version: 4.0.2.899
detected: True check_circle

Fortinet
result: W32/TrojanDldr.WPN!tr
update: 20180323
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Kingsoft
update: 20180323
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180323
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180323
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180323
version: 2018-03-23.02
detected: False cancel

AhnLab-V3
result: Malware/Win32.Generic.C1347012
update: 20180323
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan[Downloader]/Win32.Banload
update: 20180323
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180323
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180323
version: 1.1.14600.4
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180323
version: 1.0
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.WTT
update: 20180323
version: 17107
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0DBG18
update: 20180323
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180223
detected: False cancel

BitDefender
result: Gen:Variant.Symmi.57441
update: 20180323
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_90% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan ( 7000000f1 )
update: 20180323
version: 10.42.26598
detected: True check_circle

SentinelOne
result: static engine - malicious
update: 20180225
version: 1.0.15.206
detected: True check_circle

Avast-Mobile
update: 20180323
version: 180323-04
detected: False cancel

TotalDefense
update: 20180323
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180323
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Delphi.dzgfxg
update: 20180323
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Symmi.57441
update: 20180323
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180323
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Generic.ch
update: 20180323
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0DBG18
update: 20180323
version: 9.950.0.1006
detected: True check_circle

total
57
sha256
b9ba4d9340c43277f9ee2eb5892c3da3bc29353972d2c363137deb02b42989ad
scan_id
b9ba4d9340c43277f9ee2eb5892c3da3bc29353972d2c363137deb02b42989ad-1521842929
resource
bbf126a2411150708f74a795d0be01e7
positives
41
scan_date
2018-03-23 22:08:49
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
28/2/2020 - 12:45:43.637Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
28/2/2020 - 12:45:43.637Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
28/2/2020 - 12:45:43.637Open1480C:\malware.exeC:\malware.exe.Local
28/2/2020 - 12:45:43.637Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
28/2/2020 - 12:45:43.637Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
28/2/2020 - 12:45:43.637Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
28/2/2020 - 12:45:43.637Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
28/2/2020 - 12:45:43.637Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
28/2/2020 - 12:45:43.637Open1480C:\malware.exeC:\Windows\WindowsShell.Manifest
28/2/2020 - 12:45:43.637Unknown1480C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
28/2/2020 - 12:45:43.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\FileZill
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\FileZill
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\FileZill
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
28/2/2020 - 12:46:13.715Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\FileZill
28/2/2020 - 12:46:13.715Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\FileZill
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Secur32.dll
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
28/2/2020 - 12:46:13.715Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
28/2/2020 - 12:46:13.715Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
28/2/2020 - 12:46:13.715Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
28/2/2020 - 12:46:13.715Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\IPHLPAPI.DLL
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\WINNSI.DLL
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
28/2/2020 - 12:46:13.778Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
28/2/2020 - 12:46:13.778Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\DNSAPI.dll
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
28/2/2020 - 12:46:13.778Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
28/2/2020 - 12:46:13.825Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
28/2/2020 - 12:46:13.825Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
28/2/2020 - 12:46:13.825Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
28/2/2020 - 12:46:13.825Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
28/2/2020 - 12:46:13.872Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
28/2/2020 - 12:46:13.872Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
28/2/2020 - 12:46:13.872Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
28/2/2020 - 12:46:13.872Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
28/2/2020 - 12:46:13.918Open1480C:\malware.exeC:\dhcpcsvc6.DLL
28/2/2020 - 12:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
28/2/2020 - 12:46:13.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
28/2/2020 - 12:46:13.918Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
28/2/2020 - 12:46:13.918Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
28/2/2020 - 12:46:13.965Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\dhcpcsvc.DLL
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
28/2/2020 - 12:46:13.965Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\CRYPTSP.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\RpcRtRemote.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
28/2/2020 - 12:46:14.12Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
28/2/2020 - 12:46:14.12Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
28/2/2020 - 12:46:14.12Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
28/2/2020 - 12:46:14.28Open1480C:\malware.exeC:\rasadhlp.dll
28/2/2020 - 12:46:14.28Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
28/2/2020 - 12:46:14.28Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
28/2/2020 - 12:46:14.122Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
28/2/2020 - 12:46:14.122Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
28/2/2020 - 12:46:14.168Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
28/2/2020 - 12:46:14.168Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\malware.exe.Local
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
28/2/2020 - 12:46:14.278Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
28/2/2020 - 12:46:14.278Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
28/2/2020 - 12:46:15.293Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
28/2/2020 - 12:46:15.293Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
28/2/2020 - 12:46:13.778Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
28/2/2020 - 12:46:13.778Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
28/2/2020 - 12:46:13.778Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
28/2/2020 - 12:46:13.778Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
28/2/2020 - 12:46:13.778Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
28/2/2020 - 12:46:13.778Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
28/2/2020 - 12:46:13.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
28/2/2020 - 12:46:13.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
28/2/2020 - 12:46:13.965Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
28/2/2020 - 12:46:14.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
28/2/2020 - 12:46:14.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
28/2/2020 - 12:46:14.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
28/2/2020 - 12:46:14.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
28/2/2020 - 12:46:14.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
28/2/2020 - 12:46:14.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
28/2/2020 - 12:46:14.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
28/2/2020 - 12:46:14.122Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
28/2/2020 - 12:46:14.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
28/2/2020 - 12:46:14.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
28/2/2020 - 12:46:14.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
28/2/2020 - 12:46:14.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
28/2/2020 - 12:46:15.528Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
28/2/2020 - 12:46:15.528Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
28/2/2020 - 12:46:15.528Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
28/2/2020 - 12:46:15.528Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code dns.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code dns.msftncsi.com.

Response
computer gateway:DNS arrow_forward computer localhost code dns.msftncsi.com. reply_all 131.107.255.255


TCP
Info
computer localhost:65191 arrow_forward 54.233.140.167:80
computer localhost:65192 arrow_forward 54.233.140.167:80

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53

HTTP
Info

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 57.08%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 70.29%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 61.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 41.48%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 98.78%
suspicious: True check_circle

Add to Collection
Download