Report #8538 check_circle

Binary
DLL
False cancel
Size
813.00KB
trid
46.5% Win32 Executable Borland Delphi 7
31.5% Win32 Executable Borland Delphi 5
18.3% Win32 Executable Borland Delphi 6
0.9% Win32 Executable Delphi generic
0.9% Windows screen saver
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
f609c2bcfea61db718b52793abca55ed
sha1
ca4d6f012c84214ab2aae5af728d252d932ceef9
crc32
0x52edc2b0
sha224
6ca5f8a9f6ff4a0df4923612b807831c66f4a4f47d13a2af32d19e73
sha256
79808a530a8400122fa0832d2dbfa69e54f3d04a3216e9f32a8bcb8710237d14
sha384
ba5a961e0fa1a02e355db59d83e35320efb7cb753fc4f027e9fdd749ccaff7383710d8a56ab8f7f9837d818f0767e771
sha512
4c892145cf830ce73bb66de3e1144d270f936ee88662424854564b82ecd8a8836d15c5d7be5c3d6180af6e04d0dcdb92c19c1c8f30176c3e710f4544c33fae0a
ssdeep
24576:7MgyxIW5AaAHlqV6DHtKG+UpTU+b7nZCE:7MriQVutKG+uTPb7Z
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Dropper_Strings, Borland_Delphi_30_, CRC32_poly_Constant, BASE64_table, Delphi_DecodeDate, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, RijnDael_AES_CHAR, screenshot, Borland_Delphi_v40_v50, keylogger, contentis_base64, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, IsWindowsGUI, Delphi_Copy, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, win_registry, Delphi_CompareCall, RijnDael_AES_LONG, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30, System_Tools

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
Web site: http://www.componentace.com
<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <assemblyIdentity type="win32" name="ProjetoTeste.exe" version="3.1.0.0" processorArchitecture="*"/> <dependency> <dependentAssembly> <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" publicKeyToken="6595b64144ccf1df" language="*" processorArchitecture="*"/> </dependentAssembly> </dependency> <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level="requireAdministrator" uiAccess="false"/> </requestedPrivileges> </security> </trustInfo> <compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"> <application> <!--The ID below indicates application support for Windows Vista --> <supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/> <!--The ID below indicates application support for Windows 7 --> <supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/> </application> </compatibility> </assembly>
<?xml version="1.0" encoding="UTF-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <assemblyIdentity type="win32" name="ProjetoTeste.exe" version="3.1.0.0" processorArchitecture="*"/> <dependency> <dependentAssembly> <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" publicKeyToken="6595b64144ccf1df" language="*" processorArchitecture="*"/> </dependentAssembly> </dependency> <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level="requireAdministrator" uiAccess="false"/> </requestedPrivileges> </security> </trustInfo> <compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"> <application> <!--The ID below indicates application support for Windows Vista --> <supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/> <!--The ID below indicates application support for Windows 7 --> <supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/> </application> </compatibility> </assembly>
t.Ht
Font.Name
Font.Name
Font.Style
Font.Style
Font.Name
Font.Style
C:\Windows\System32\regsvr32.exe "
Invalid compressed size, rfs.size = %d, count = %d
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
h.BB
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
1.2.3.19
1.2.3.19
\Software\Borland\C++Builder
\Software\Borland\Delphi
P.rsrc
SOFTWARE\Borland\Delphi\RTL
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
\Software\Borland\BDS
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
version.dll
wininet.dll
uxtheme.dll
vcltest3.dll
SHFolder.dll
Hashed list of file names is invalid
Password for "%s"
""fD**~T
HelpFile4,E
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
SnapBuffer4,E
HorzScrollBar4,E
JumpID("","%s")
OnHide,4E
type="win32" name="ProjetoTeste.exe" version="3.
Apartment
Sub-menu is not in menu
Cannot compress file '%s'. Zip64 mode is not enabled
Division by zero
Stage
Selected
FullRepaint
poDelete
August September
TaskbarCreated
ToolWin
Rebuild
bsSizeToolWin
SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Too many open files
Unexpected nil pointer
cbUnchecked cbChecked
Assertion failed
Internal error. Update is not started
File is open in read-only mode
%s (%s, line %d)
\Software\Embarcadero
Archive already has SFX stub
No help found for %s#No context-sensitive help installed$No topic-based help system installed
\Software\CodeGear\BDS
Privileged instruction(Exception %s in module %s at %p.
Error reading %s%s%s: %s
I/O error %d
Overwrite file "%s" with "%s"
JPEG error #%d
List count out of bounds (%d)
Ancestor for '%s' not found
Archive is damaged. Open failed
Archive is open. You should close it beore performing this operation.
Cannot delete file "%s"
Cannot assign a %s to a %s
Failed to set data for '%s'
Class %s not found
Property %s does not exist
\AppData\Roaming\
Resource %s not found
OnExtractFile
TProtection
OnDestroytfA
ESafecallException
OnPassword
EProtectionD
TJPEGData
THashItem
TRegIniFile
*ShellAPI
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")

Foremost
Matches
0.exe, 813 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed
Suspicious: 1.2.3.19, 0, Unknown
hasAllowed: False cancel
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.componentace.com
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, kernel32.dll, uxtheme.dll, gdi32.dll, vcltest3.dll, MAPI32.DLL, version.dll, SHFolder.dll, comctl32.dll, ole32.dll, imm32.dll, wininet.dll, advapi32.dll, oleaut32.dll
hasFiles: True check_circle
Suspicious: 2.txt, 6.txt, 5.txt, /up.txt, 4.txt, 3.txt
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 182784
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 652436
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, gdi32.dll, mapi32.dll, version.dll, shfolder.dll, comctl32.dll, ole32.dll, imm32.dll, wininet.dll, advapi32.dll, oleaut32.dll
hasLibs: True check_circle
Suspicious: vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 106
.rsrc: 6
.idata: 4

pushpopmath
none: 20
.rsrc: 3
.reloc: 36

garbagebytes
none: 101
.rsrc: 6
.idata: 2

hookdetection
none: 2

software breakpoint
none: 10
.idata: 1
.reloc: 5

programcontrolflowchange
none: 101
.rsrc: 6
.idata: 2

cpuinstructionsresultscomparison
none: 22
.rsrc: 28

AVclass
banload
1
VirusTotal
md5
f609c2bcfea61db718b52793abca55ed
sha1
ca4d6f012c84214ab2aae5af728d252d932ceef9
SCANS (DETECTION RATE = 66.15%)
AVG
result: Win32:Banker-LWG [Trj]
update: 20180324
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180323
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=88)
update: 20180324
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180322
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan ( 7000000f1 )
update: 20180323
version: 10.42.26598
detected: True check_circle

ALYac
result: Gen:Variant.Graftor.63420
update: 20180324
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-LWG [Trj]
update: 20180324
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Delphi.Gen
update: 20180323
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.CUWK-4524
update: 20180324
version: 5.4.30.7
detected: True check_circle

DrWeb
result: Trojan.DownLoader14.1927
update: 20180324
version: 7.0.28.2020
detected: True check_circle

GData
result: Gen:Variant.Graftor.63420
update: 20180324
version: A:25.16483B:25.11862
detected: True check_circle

Panda
result: Trj/CI.A
update: 20180323
version: 4.6.4.2
detected: True check_circle

VBA32
update: 20180323
version: 3.12.28.0
detected: False cancel

VIPRE
result: Trojan.Win32.Generic.pak!cobra
update: 20180324
version: 65482
detected: True check_circle

Zoner
update: 20180324
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic.pak!cobra
update: 20180324
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180323
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180323
detected: False cancel

F-Prot
update: 20180324
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180323
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!F609C2BCFEA6
update: 20180324
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Banload!8.15B (TFE:5:8XOTGAWSaZU)
update: 20180324
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180323
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.PWS.ChePro!
update: 20180323
version: 5.5.1.3
detected: True check_circle

Zillya
update: 20180323
version: 2.0.0.3519
detected: False cancel

Arcabit
update: 20180324
version: 1.0.0.831
detected: False cancel

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan-banker.Chepro.Eamr
update: 20180324
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180324
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180324
version: v4.3.5
detected: False cancel

Ad-Aware
result: Gen:Variant.Graftor.63420
update: 20180324
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Banker.W32.Chepro!c
update: 20180324
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Graftor.63420 (B)
update: 20180324
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Graftor.63420
update: 20180324
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.VZY!tr.dldr
update: 20180324
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
update: 20180324
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180324
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180324
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen
update: 20180323
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180323
version: 2018-03-23.02
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Banload.R155396
update: 20180323
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.TSGeneric
update: 20180323
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Banker.Win32.ChePro.mkcv
update: 20180323
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload!rfn
update: 20180324
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: HEUR/QVM05.1.Malware.Gen
update: 20180324
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: Trojan-Banker.Win32.ChePro.mkcv
update: 20180324
version: 1.0
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.VZY
update: 20180323
version: 17107
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0DBF18
update: 20180324
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180223
detected: False cancel

BitDefender
result: Gen:Variant.Graftor.63420
update: 20180324
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_70% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan ( 7000000f1 )
update: 20180323
version: 10.42.26598
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180323
version: 180323-04
detected: False cancel

Malwarebytes
result: Trojan.Banker.GGL
update: 20180323
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20180323
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Downloader.Banload.10171
update: 20180323
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Delphi.dtapgp
update: 20180324
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Graftor.63420
update: 20180324
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180323
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Downloader.ch
update: 20180323
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0DBF18
update: 20180324
version: 9.950.0.1006
detected: True check_circle

total
65
sha256
79808a530a8400122fa0832d2dbfa69e54f3d04a3216e9f32a8bcb8710237d14
scan_id
79808a530a8400122fa0832d2dbfa69e54f3d04a3216e9f32a8bcb8710237d14-1521856387
resource
f609c2bcfea61db718b52793abca55ed
positives
43
scan_date
2018-03-24 01:53:07
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
4/3/2020 - 3:45:42.778Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
4/3/2020 - 3:45:42.778Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
4/3/2020 - 3:45:42.778Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\IPHLPAPI.DLL
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\WINNSI.DLL
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 3:45:42.793Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 3:45:42.793Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 3:45:42.793Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 3:45:42.809Open1480C:\malware.exeC:\DNSAPI.dll
4/3/2020 - 3:45:42.809Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
4/3/2020 - 3:45:42.809Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
4/3/2020 - 3:45:42.903Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
4/3/2020 - 3:45:42.903Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
4/3/2020 - 3:45:42.903Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 3:45:42.903Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 3:45:43.28Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
4/3/2020 - 3:45:43.28Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
4/3/2020 - 3:45:43.28Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
4/3/2020 - 3:45:43.28Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
4/3/2020 - 3:45:43.75Open1480C:\malware.exeC:\dhcpcsvc6.DLL
4/3/2020 - 3:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
4/3/2020 - 3:45:43.75Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
4/3/2020 - 3:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
4/3/2020 - 3:45:43.75Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\CRYPTSP.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.153Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\RpcRtRemote.dll
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
4/3/2020 - 3:45:43.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
4/3/2020 - 3:45:43.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
4/3/2020 - 3:45:43.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
4/3/2020 - 3:45:43.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
4/3/2020 - 3:45:43.184Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 3:45:43.184Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 3:45:43.184Open1480C:\malware.exeC:\dhcpcsvc.DLL
4/3/2020 - 3:45:43.184Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
4/3/2020 - 3:45:43.184Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
4/3/2020 - 3:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
4/3/2020 - 3:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
4/3/2020 - 3:45:43.247Open1480C:\malware.exeC:\rasadhlp.dll
4/3/2020 - 3:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
4/3/2020 - 3:45:43.247Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
4/3/2020 - 3:45:43.325Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
4/3/2020 - 3:45:43.325Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\malware.exe.Local
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 3:45:43.497Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 3:45:43.497Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 3:45:44.434Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
4/3/2020 - 3:45:44.434Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
4/3/2020 - 3:45:44.622Unknown2108C:\Windows\SysWOW64\schtasks.exeC:\Windows
4/3/2020 - 3:45:44.622Unknown2108C:\Windows\SysWOW64\schtasks.exeC:\Monitor
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\GOOGLE_I9\mods.jpeg
4/3/2020 - 3:46:25.512Write1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\GOOGLE_I9\mods.jpegmods.jpeg
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\imageres.dll
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\Windows\SysWOW64\imageres.dll
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\Windows\SysWOW64\imageres.dll
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\imageres.dll.mui
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\Windows\System32\pt-BR\imageres.dll.mui
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\Windows\SysWOW64\pt\imageres.dll.mui
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\Windows\SysWOW64\en-US\imageres.dll.mui
4/3/2020 - 3:46:25.512Read1480C:\malware.exeC:\Windows\SysWOW64\en-US\imageres.dll.muiimageres.dll.mui
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
4/3/2020 - 3:46:25.512Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll

Process
Trace
4/3/2020 - 3:45:44.622Terminate1480C:\malware.exe2108C:\Windows\SysWOW64\schtasks.exe

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
4/3/2020 - 3:45:42.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
4/3/2020 - 3:45:42.793Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
4/3/2020 - 3:45:42.793Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
4/3/2020 - 3:45:42.793Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
4/3/2020 - 3:45:42.793Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
4/3/2020 - 3:45:42.793Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
4/3/2020 - 3:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
4/3/2020 - 3:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
4/3/2020 - 3:45:43.168Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
4/3/2020 - 3:45:43.247Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
4/3/2020 - 3:45:43.247Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
4/3/2020 - 3:45:43.247Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
4/3/2020 - 3:45:43.247Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
4/3/2020 - 3:45:43.247Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
4/3/2020 - 3:45:43.247Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
4/3/2020 - 3:45:43.247Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
4/3/2020 - 3:45:43.247Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
4/3/2020 - 3:45:43.325Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
4/3/2020 - 3:45:43.325Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
4/3/2020 - 3:45:43.325Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
4/3/2020 - 3:45:43.325Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
4/3/2020 - 3:45:44.622Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
4/3/2020 - 3:45:44.622Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
4/3/2020 - 3:45:44.622Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
4/3/2020 - 3:45:44.622Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: True check_circle

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code dns.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code dns.msftncsi.com.

Response
computer gateway:DNS arrow_forward computer localhost code dns.msftncsi.com. reply_all 131.107.255.255


TCP
Info
computer localhost:65192 arrow_forward 198.71.81.247:80
computer localhost:65191 arrow_forward 198.71.81.247:80

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53

HTTP
Info

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 57.76%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 91.13%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 61.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 38.94%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 98.51%
suspicious: True check_circle

Add to Collection
Download