Report #8565 check_circle

Binary
DLL
False cancel
Size
531.50KB
trid
30.5% Win32 Executable Delphi generic
28.1% Windows screen saver
14.1% Win32 Dynamic Link Library
9.7% Win32 Executable
4.4% Win16/32 Executable Delphi generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
abdeda37b72ef5dc3cd4b60501f2ebfd
sha1
3cbdbddc1d5b0861f0a1814b5f707006235a6674
crc32
0xfbc75977
sha224
08c9419dbfee7fe003880a69249ad0f837541127b79959c2df1a8f28
sha256
b195370cd9b049ebd38e38d8772c2c51904b3e7e849edeca4502bb51854db301
sha384
a257d3bbf6d02714d2928deb502de443fcfafa826708989c0c8f211c6470108c3891b395f9bda5afdfd79dc1b2f42cde
sha512
f8e16df090fd031fe04c924048606b60480d3f5b1ed05c7f55df67d71ca9a1e73b0078b8dd402636cfcb47c50f09a945f46ec52bbf61fd33f6334158c89393a4
ssdeep
12288:Yzh0q9DV0XotAvf0HsQAdY5asfFf8e+nG0gR+/DJiu5D:5q9pGOAvfasQAdY5ce+Rg4/k
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, borland_delphi, VMWare_Detection, Delphi_FormShow, network_dns, network_tcp_listen, Microsoft_Visual_Cpp_v50v60_MFC, win_files_operation, IsPE32, win_hook, network_tcp_socket, screenshot, Borland_Delphi_v40_v50, keylogger, contentis_base64, Borland_Delphi_40_additional, VirtualPC_Detection, Borland_Delphi_40, vmdetect, Delphi_Random, IsWindowsGUI, network_udp_sock, Delphi_Copy, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, win_registry, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30, Big_Numbers0

Suspicious
True check_circle

Strings
List
t.Ht
GlassFrame.Top
Font.Style
Font.Name
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
%s.Seek not implemented$Operation not allowed on sorted list
B.rsrc
SOFTWARE\Borland\Delphi\RTL
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
Wship6.dll
version.dll
uxtheme.dll
wininet.dll
1.0.0.0
Network is down.
Host is down.
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
Socket Error # %d
IHelpSystem\
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
name="Microsoft.Windows.Common-Controls"
Connected.
Socket is not connected..Cannot send or receive after socket is closed.#Too many references, cannot splice.
Too many open files.
Apartment
Connection reset by peer.
Connection timed out.
Sub-menu is not in menu
%s,Custom variant type (%s%.4x) is out of range/Custom variant type (%s%.4x) already used by %s*Custom variant type (%s%.4x) is not usable2Too many custom variant types have been registered5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Division by zero
clWebLawnGreen
Selected
Rebuild
bsSizeToolWin
TaskbarCreated
TaskbarCreated
Too many open files
Assertion failed
Invalid SQL date/time values*Error on call Winsock2 library function %s&Error on loading Winsock2 library (%s)
#S4<El %*a
Resolving hostname %s.
%s (%s, line %d)
Socket is already connected.
Privileged instruction(Exception %s in module %s at %p.
Error reading %s%s%s: %s
I/O error %d
No help found for %s#No context-sensitive help installed
\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
List count out of bounds (%d)
Ancestor for '%s' not found
Connecting to %s.
Cannot assign a %s to a %s
No help found for context$No topic-based help system installed
Class %s not found
OnHide$
Property %s does not exist
Resource %s not found
TPersistent`
OnDestroy
ESafecallException
Not enough timers available@GroupIndex cannot be less than a previous menu item's GroupIndex5Cannot create form. No MDI forms are currently active$%s not in a class registration group
OnContextPopup$rC
UseDockManager|
*ShellAPI
<requestedPrivileges>
IDockManager\
Socket operation on non-socket.
ssShift
publicKeyToken="6595b64144ccf1df"
ssHotTrack
Error creating window class+Cannot focus a disabled or invisible window!Control '%s' has no parent window
No route to host.
Invalid property element: %s
Invalid stream format$''%s'' is not a valid component name September
Host not found.
ssLeft
OnDockOver$rC
No argument for format '%s'"Variant method calls not supported
- Dock zone has no controlLError loading dock zone from the stream. Expecting version %d, but found %d.
Delphi Component
8DD224A22A4383C31E7DD00C49
Invalid variant operation%Invalid variant operation (%s%.8x)
TInterfacedPersistentP
TPersistent
A class named %s already exists%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
Application Error1Format '%s' invalid or incompatible with argument
inet_addr
GetProcAddress
GetProcAddress
TInterfacedObject
System Error. Code: %d.

Foremost
Matches
0.exe, 531 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: user32.dll, KERNEL32.DLL, uxtheme.dll, oleaut32.dll, gdi32.dll, comctl32.dll, Wship6.dll, DWMAPI.DLL, ole32.dll, imm32.dll, wininet.dll, advapi32.dll, WS2_32.DLL, version.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 100352
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 4096
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 448916
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, oleaut32.dll, gdi32.dll, comctl32.dll, wship6.dll, dwmapi.dll, ole32.dll, imm32.dll, wininet.dll, advapi32.dll, ws2_32.dll, version.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2015-07-03 01:40:33
Future: False cancel

Compilation
Packed: False cancel
Missing: False cancel
Packers
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.rsrc: 1
.text: 44
.itext: 7

pushpopmath
.rsrc: 3
.text: 11

garbagebytes
.text: 44
.itext: 7

hookdetection
.text: 2

software breakpoint
.text: 4

programcontrolflowchange
.text: 44
.itext: 7

cpuinstructionsresultscomparison
.data: 1
.rsrc: 6
.text: 9

AVclass
banbra
1
VirusTotal
md5
abdeda37b72ef5dc3cd4b60501f2ebfd
sha1
3cbdbddc1d5b0861f0a1814b5f707006235a6674
SCANS (DETECTION RATE = 73.13%)
AVG
result: Win32:Banker-LXY [Trj]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180324
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=84)
update: 20180325
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180325
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 004c88ce1 )
update: 20180325
version: 10.42.26601
detected: True check_circle

ALYac
result: Gen:Variant.Symmi.65562
update: 20180325
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-LXY [Trj]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Delphi.522
update: 20180324
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.CVBG-7856
update: 20180325
version: 5.4.30.7
detected: True check_circle

DrWeb
result: Trojan.Bankfraud.2931
update: 20180325
version: 7.0.28.2020
detected: True check_circle

GData
result: Gen:Variant.Symmi.65562
update: 20180325
version: A:25.16495B:25.11872
detected: True check_circle

Panda
result: Trj/CI.A
update: 20180324
version: 4.6.4.2
detected: True check_circle

VBA32
result: TrojanBanker.Banbra
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180325
version: 65508
detected: True check_circle

Zoner
update: 20180325
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180325
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180325
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180325
version: 28741
detected: False cancel

F-Prot
update: 20180325
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180324
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!ABDEDA37B72E
update: 20180325
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Banload!8.15B (TFE:3:kjNUzoRkQzC)
update: 20180325
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180325
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.PWS.Banbra!q9eXtSBmDgU
update: 20180324
version: 5.5.1.3
detected: True check_circle

Zillya
result: Trojan.Banbra.Win32.23933
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
result: Trojan.Symmi.D1001A
update: 20180325
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180325
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan-banker.Banbra.Lqpa
update: 20180325
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180324
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180325
version: v4.3.5
detected: False cancel

Ad-Aware
result: Gen:Variant.Symmi.65562
update: 20180325
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Banker.W32.Banbra.tgjd!c
update: 20180325
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Symmi.65562 (B)
update: 20180325
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Symmi.65562
update: 20180325
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.WFL!tr
update: 20180325
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: Trojan/Banker.Banbra.snt
update: 20180325
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180325
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180325
version: 1.0
detected: True check_circle

Symantec
result: Infostealer.Bancos
update: 20180324
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180325
version: 2018-03-25.01
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Banker.C918891
update: 20180324
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan[Banker]/Win32.Banbra
update: 20180325
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: Trojan-Banker.Win32.Banbra.tgjd
update: 20180325
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180325
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: HEUR/QVM05.1.Malware.Gen
update: 20180325
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: Trojan-Banker.Win32.Banbra.tgjd
update: 20180325
version: 1.0
detected: True check_circle

Cybereason
result: malicious.7b72ef
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: Win32/TrojanDownloader.Banload.WBU
update: 20180325
version: 17111
detected: True check_circle

TrendMicro
result: TROJ_GEN.R002C0DBF18
update: 20180325
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180324
detected: False cancel

BitDefender
result: Gen:Variant.Symmi.65562
update: 20180325
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_60% (D)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 004c88ce1 )
update: 20180325
version: 10.42.26601
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180324
version: 180324-00
detected: False cancel

Malwarebytes
update: 20180325
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180324
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180324
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banbra.dtmqdq
update: 20180325
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Symmi.65562
update: 20180325
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
result: Trojan.Agent/Gen-Banload
update: 20180324
version: 5.6.0.1032
detected: True check_circle

McAfee-GW-Edition
result: BehavesLike.Win32.Gnamer.hh
update: 20180324
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_GEN.R002C0DBF18
update: 20180325
version: 9.950.0.1006
detected: True check_circle

total
67
sha256
b195370cd9b049ebd38e38d8772c2c51904b3e7e849edeca4502bb51854db301
scan_id
b195370cd9b049ebd38e38d8772c2c51904b3e7e849edeca4502bb51854db301-1521954449
resource
abdeda37b72ef5dc3cd4b60501f2ebfd
positives
49
scan_date
2018-03-25 05:07:29
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
4/3/2020 - 5:45:52.653Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
4/3/2020 - 5:45:52.653Open1480C:\malware.exeC:\Windows\SysWOW64\rpcss.dll
4/3/2020 - 5:45:52.653Open1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.mui
4/3/2020 - 5:45:52.700Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
4/3/2020 - 5:45:52.700Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
4/3/2020 - 5:45:52.700Open1480C:\malware.exeC:\malware.exe.Local
4/3/2020 - 5:45:52.700Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 5:45:52.700Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 5:45:52.700Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 5:45:52.700Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 5:45:52.700Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
4/3/2020 - 5:45:52.700Open1480C:\malware.exeC:\Windows\SysWOW64\ole32.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Secur32.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 5:46:23.934Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 5:46:23.934Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 5:46:23.934Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\IPHLPAPI.DLL
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\WINNSI.DLL
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 5:46:23.934Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 5:46:23.934Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\DNSAPI.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
4/3/2020 - 5:46:23.934Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
4/3/2020 - 5:46:23.997Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
4/3/2020 - 5:46:23.997Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
4/3/2020 - 5:46:23.997Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 5:46:23.997Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 5:46:24.90Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
4/3/2020 - 5:46:24.90Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
4/3/2020 - 5:46:24.90Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
4/3/2020 - 5:46:24.90Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
4/3/2020 - 5:46:24.137Open1480C:\malware.exeC:\dhcpcsvc6.DLL
4/3/2020 - 5:46:24.137Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
4/3/2020 - 5:46:24.137Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
4/3/2020 - 5:46:24.137Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
4/3/2020 - 5:46:24.137Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
4/3/2020 - 5:46:24.184Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\dhcpcsvc.DLL
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\CRYPTSP.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.184Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.200Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.200Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
4/3/2020 - 5:46:24.200Open1480C:\malware.exeC:\RpcRtRemote.dll
4/3/2020 - 5:46:24.200Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
4/3/2020 - 5:46:24.200Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
4/3/2020 - 5:46:24.200Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
4/3/2020 - 5:46:24.200Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
4/3/2020 - 5:46:24.247Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
4/3/2020 - 5:46:24.247Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
4/3/2020 - 5:46:24.247Open1480C:\malware.exeC:\rasadhlp.dll
4/3/2020 - 5:46:24.247Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
4/3/2020 - 5:46:24.247Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
4/3/2020 - 5:46:24.293Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
4/3/2020 - 5:46:24.293Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\malware.exe.Local
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 5:46:24.450Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 5:46:24.450Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
4/3/2020 - 5:46:25.309Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
4/3/2020 - 5:46:25.309Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
4/3/2020 - 5:47:6.684Unknown1480C:\malware.exeC:\Windows
4/3/2020 - 5:47:6.684Unknown1480C:\malware.exeC:\Monitor
4/3/2020 - 5:47:6.684Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
4/3/2020 - 5:47:6.684Unknown1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
4/3/2020 - 5:47:6.684Unknown1480C:\malware.exeC:\Windows\SysWOW64\pt-BR\KernelBase.dll.muiKernelBase.dll.mui
4/3/2020 - 5:47:6.684Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
4/3/2020 - 5:47:6.684Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d

Process
Trace

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
4/3/2020 - 5:46:23.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
4/3/2020 - 5:46:23.934Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
4/3/2020 - 5:46:23.934Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
4/3/2020 - 5:46:23.934Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
4/3/2020 - 5:46:23.934Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
4/3/2020 - 5:46:23.934Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
4/3/2020 - 5:46:24.184Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
4/3/2020 - 5:46:24.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
4/3/2020 - 5:46:24.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
4/3/2020 - 5:46:24.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
4/3/2020 - 5:46:24.293Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
4/3/2020 - 5:46:25.512Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
4/3/2020 - 5:46:25.512Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
4/3/2020 - 5:46:25.512Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
4/3/2020 - 5:46:25.512Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code dns.msftncsi.com.
computer localhost arrow_forward computer gateway:DNS code dns.msftncsi.com.

Response
computer gateway:DNS arrow_forward computer localhost code dns.msftncsi.com. reply_all 131.107.255.255


TCP
Info
computer localhost:65192 arrow_forward 191.252.2.180:80
computer localhost:65191 arrow_forward 191.252.2.180:80

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53

HTTP
Info

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 77.69%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 64.66%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 66.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 35.40%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.86%
suspicious: True check_circle

Add to Collection
Download