Report #8667 check_circle

  • Creation Date: March 5, 2020, 1:28 p.m.
  • Last Update: March 5, 2020, 5:27 p.m.
  • File: Debitos2015.exe
  • Results:
Binary
DLL
False cancel
Size
661.00KB
trid
44.9% Win32 Executable Borland Delphi 7
30.5% Win32 Executable Borland Delphi 5
17.7% Win32 Executable Borland Delphi 6
2.9% InstallShield setup
0.9% Win32 Executable Delphi generic
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
4bb551731d04a960a17b984c5d6b3302
sha1
c229f5527d8ca323e6decaf6050315fd0d4a0594
crc32
0x1eb0e938
sha224
2d9d63231a0fb15590a340b088dc320fc3c5ae874a107669c84c1702
sha256
a029238e906ebbb5bdf37db3e150e2f0871a50c4e58a336d33145b1d003e6b4f
sha384
fef293ebcd67b064716b0cef3ad6f5736e3992dd94ee3a2e914ec8ae918ca19cea2c869555eeb9321067c1f77d9c8954
sha512
292aa9a626a2e4a53df10c4a0eb3a14cc2bc70e067aaeccf742c907f29eb462a34cfa17ee0619d66cee4f4f677af8335f79584fc565a19518f784935915f6a6b
ssdeep
12288:pgrKDD//uB/6aSuW5AOexYNaGRNyvZKZQz9bjvoghqqHyL3/JgsFTUqnTXmaa:p+K786aSuW5AOexY9RCl9bjvoGqEyL3U
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, Borland_Delphi_30_, CRC32_poly_Constant, BASE64_table, Delphi_DecodeDate, RIPEMD160_Constants, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, RijnDael_AES_CHAR, contentis_base64, screenshot, Borland_Delphi_v40_v50, keylogger, win_mutex, Borland_Delphi_40_additional, Borland_Delphi_40, Delphi_Random, Borland_Delphi_v60_v70, IsWindowsGUI, Delphi_Copy, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, SHA1_Constants, win_registry, Delphi_CompareCall, RijnDael_AES_LONG, Delphi_StrToInt, Borland_Delphi_30_additional, Borland_Delphi_v30, Big_Numbers0

Suspicious
True check_circle

Strings
List
the appropriate version of this product at http://www.componentace.com
jupter.zip
Web site: http://www.componentace.com
,http://www.embracebridal.com/imagem01010.zip
t.Ht
Font.Style
Font.Name
Invalid compressed size, rfs.size = %d, count = %d
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
feel free to contact us at support@componentace.com
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
\Software\Borland\C++Builder
\Software\Borland\Delphi
P.rsrc
SOFTWARE\Borland\Delphi\RTL
Delphi%.8X
Software\Borland\Locales
Software\Borland\Delphi\Locales
\Software\Borland\BDS
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
comctl32.dll
version.dll
uxtheme.dll
vcltest3.dll
wininet.dll
winmm.dll
imetro.exe
Hashed list of file names is invalid
Password for "%s"
TProtection<
""fD**~T
ControlOfs%.8X%.8X
WndProcPtr%.8X%.8X
JumpID("","%s")
5%5A5I5M5d5l5
Apartment
Sub-menu is not in menu
Cannot compress file '%s'. Zip64 mode is not enabled
Division by zero
Stage
August September
Selected
TaskbarCreated
bsSizeToolWin
ToolWin
Rebuild
poDelete
Too many open files
Unexpected nil pointer
Assertion failed
Internal error. Update is not started
File is open in read-only mode
%s (%s, line %d)
\Software\Embarcadero
OLE error %.8x
Archive already has SFX stub
No help found for %s#No context-sensitive help installed$No topic-based help system installed
\Software\CodeGear\BDS
Privileged instruction(Exception %s in module %s at %p.
Error reading %s%s%s: %s
I/O error %d
Overwrite file "%s" with "%s"
List count out of bounds (%d)
Ancestor for '%s' not found
Archive is damaged. Open failed
Archive is open. You should close it beore performing this operation.
Cannot delete file "%s"
Cannot assign a %s to a %s
Class %s not found
Property %s does not exist
Resource %s not found
OnExtractFile
OnDestroy
ESafecallException
OnPasswordh
EProtectionl
THashItem
OnHide
*ShellAPI
IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")
Cannot create output file. Probably file is locked by another process. FileName = '%s'.
Enter password:
OnRequestMiddleVolume(
ssShift
ssHotTrack
Error creating window class+Cannot focus a disabled or invisible window!Control '%s' has no parent window
OnEndDock4<C
Invalid stream format$''%s'' is not a valid component name
Keysize for %s must be to %d-%d bytes6%s is not initialized call Init() or InitKey() before.
ssLeft
No argument for format '%s'"Variant method calls not supported
EXECUTABLE
Please insert disk #%dtDisk is full. Required free space: %d bytes, but available only: %d bytes. Clean the disk or find another blank disk0%s. File processing error, possibly disk is fullPFile '%s' not found on inserted disk. Please insert last disk with required file/Operation not allowed on an empty OLE container
OnCloseQuery0=C
Unspecified error (%d) from %s.
Delphi Component
appdata

Foremost
Matches
0.exe, 661 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.componentace.com, http://www.embracebridal.com/imagem01010.zip
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: ,http://www.embracebridal.com/imagem01010.zip, user32.dll, kernel32.dll, uxtheme.dll, gdi32.dll, winmm.dll, vcltest3.dll, MAPI32.DLL, version.dll, comctl32.dll, ole32.dll, imm32.dll, wininet.dll, advapi32.dll, oleaut32.dll
hasFiles: True check_circle
Suspicious: jupter.zip
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 114688
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: code, data, bss, .idata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 564892
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, kernel32.dll, uxtheme.dll, gdi32.dll, winmm.dll, mapi32.dll, version.dll, comctl32.dll, ole32.dll, imm32.dll, wininet.dll, advapi32.dll, oleaut32.dll
hasLibs: True check_circle
Suspicious: vcltest3.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: True check_circle
Valid: True check_circle
Value: 1992-06-19 19:22:17
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v3.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 106

pushpopmath
none: 19
.rsrc: 5
.idata: 17
.reloc: 19

garbagebytes
none: 101

hookdetection
none: 2

software breakpoint
none: 5
.reloc: 14

programcontrolflowchange
none: 101

cpuinstructionsresultscomparison
none: 21
.rsrc: 24

AVclass
banload
1
VirusTotal
md5
4bb551731d04a960a17b984c5d6b3302
sha1
c229f5527d8ca323e6decaf6050315fd0d4a0594
SCANS (DETECTION RATE = 76.47%)
AVG
result: Win32:Banker-LVQ [Trj]
update: 20180625
version: 18.4.3895.0
detected: True check_circle

CMC
update: 20180624
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=100)
update: 20180625
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180623
version: 1.3.0.9466
detected: False cancel

K7GW
update: 20180624
version: 10.50.27560
detected: False cancel

ALYac
result: Trojan.GenericKD.2476899
update: 20180625
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Banker-LVQ [Trj]
update: 20180625
version: 18.4.3895.0
detected: True check_circle

Avira
result: TR/Dldr.Delphi.Gen
update: 20180624
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180622
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.QLEZ-8651
update: 20180625
version: 6.0.0.4
detected: True check_circle

DrWeb
result: Trojan.DownLoad3.37265
update: 20180625
version: 7.0.33.6080
detected: True check_circle

GData
result: Trojan.GenericKD.2476899
update: 20180624
version: A:25.17572B:25.12568
detected: True check_circle

Panda
result: Trj/Genetic.gen
update: 20180624
version: 4.6.4.2
detected: True check_circle

VBA32
result: BScope.Adware.Webalt
update: 20180622
version: 3.12.32.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180625
version: 67646
detected: True check_circle

Zoner
result: Trojan.Banload
update: 20180624
version: 1.0
detected: True check_circle

AVware
result: Trojan.Win32.Generic!BT
update: 20180625
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180625
version: 0.99.2.0
detected: False cancel

Comodo
result: TrojWare.Win32.TrojanDownloader.Bemidal.~AA
update: 20180624
version: 29236
detected: True check_circle

F-Prot
result: W32/Trojan3.QHE
update: 20180624
version: 4.7.1.166
detected: True check_circle

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180624
version: 0.1.5.2
detected: True check_circle

McAfee
result: GenericR-DUB!4BB551731D04
update: 20180625
version: 6.0.6.653
detected: True check_circle

Rising
result: Trojan.DL.Win32.Banloaden.qd (CLOUD)
update: 20180625
version: 25.0.0.1
detected: True check_circle

Sophos
result: Troj/Banloa-BVN
update: 20180624
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.DL.Banload!KolgtbuQp5c
update: 20180622
version: 5.5.1.3
detected: True check_circle

Zillya
result: Downloader.Banload.Win32.63155
update: 20180622
version: 2.0.0.3580
detected: True check_circle

Arcabit
result: Trojan.Generic.D25CB63
update: 20180625
version: 1.0.0.831
detected: True check_circle

Babable
update: 20180406
version: 9107201
detected: False cancel

Cylance
result: Unsafe
update: 20180625
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180612
version: 2.1.3
detected: True check_circle

TACHYON
update: 20180624
version: 2018-06-24.02
detected: False cancel

Tencent
result: Trojan.Win32.Banload.VVS
update: 20180625
version: 1.0.0.1
detected: True check_circle

ViRobot
result: Trojan.Win32.S.Downloader.676864.A
update: 20180625
version: 2014.3.20.0
detected: True check_circle

Webroot
result: W32.Trojan.Downloader.JRWL
update: 20180625
version: 1.0.0.403
detected: True check_circle

eGambit
update: 20180625
detected: False cancel

Ad-Aware
result: Trojan.GenericKD.2476899
update: 20180625
version: 3.0.5.370
detected: True check_circle

AegisLab
result: Troj.Downloader.W32.Banload.cwqw!c
update: 20180622
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.2476899 (B)
update: 20180624
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.GenericKD.2476899
update: 20180624
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.WBG!tr
update: 20180624
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180601
version: 6.3.5.26121
detected: False cancel

Jiangmin
update: 20180624
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180625
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180625
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen
update: 20180624
version: 1.6.0.0
detected: True check_circle

AhnLab-V3
update: 20180624
version: 3.12.1.21240
detected: False cancel

Antiy-AVL
result: Trojan/Win32.TSGeneric
update: 20180625
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180625
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180625
version: 1.1.14901.4
detected: True check_circle

Qihoo-360
result: HEUR/QVM05.1.Malware.Gen
update: 20180625
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180624
version: 6.8.0.5.3208
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180625
version: 1.0
detected: True check_circle

Cybereason
result: malicious.31d04a
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: Win32/TrojanDownloader.Banload.VVS
update: 20180625
version: 17606
detected: True check_circle

TrendMicro
result: TROJ_BANLOAD.YWNJA
update: 20180625
version: 10.0.0.1040
detected: True check_circle

BitDefender
result: Trojan.GenericKD.2476899
update: 20180625
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_100% (W)
update: 20180530
version: 1.0
detected: True check_circle

K7AntiVirus
update: 20180624
version: 10.50.27560
detected: False cancel

SentinelOne
result: static engine - malicious
update: 20180618
version: 1.0.17.225
detected: True check_circle

Avast-Mobile
update: 20180624
version: 180624-04
detected: False cancel

Malwarebytes
result: Trojan.Banker.IMGen
update: 20180625
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20180624
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload.A8
update: 20180624
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.DownLoad3.dsqmko
update: 20180625
version: 1.0.116.23366
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.2476899
update: 20180625
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
result: Trojan.Agent/Gen-Banload
update: 20180624
version: 5.6.0.1032
detected: True check_circle

McAfee-GW-Edition
result: BehavesLike.Win32.Generic.jh
update: 20180624
version: v2017.2786
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_BANLOAD.YWNJA
update: 20180625
version: 9.950.0.1006
detected: True check_circle

total
68
sha256
a029238e906ebbb5bdf37db3e150e2f0871a50c4e58a336d33145b1d003e6b4f
scan_id
a029238e906ebbb5bdf37db3e150e2f0871a50c4e58a336d33145b1d003e6b4f-1529886220
resource
4bb551731d04a960a17b984c5d6b3302
positives
52
scan_date
2018-06-25 00:23:40
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
5/3/2020 - 16:45:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
5/3/2020 - 16:45:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
5/3/2020 - 16:45:44.450Open2308C:\malware.exeC:\malware.exe.Local
5/3/2020 - 16:45:44.450Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 16:45:44.450Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 16:45:44.450Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 16:45:44.450Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
5/3/2020 - 16:45:44.450Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\comctl32.dll
5/3/2020 - 16:45:44.450Open2308C:\malware.exeC:\Windows\WindowsShell.Manifest
5/3/2020 - 16:45:44.450Unknown2308C:\malware.exeC:\Windows\WindowsShell.ManifestWindowsShell.Manifest
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:44.450Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:44.450Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Secur32.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\secur32.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\secur32.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 16:46:44.450Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 16:46:44.450Unknown2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 16:46:44.450Unknown2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\webio.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\webio.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\IPHLPAPI.DLL
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\WINNSI.DLL
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 16:46:44.450Unknown2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 16:46:44.450Unknown2308C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\DNSAPI.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
5/3/2020 - 16:46:44.450Open2308C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
5/3/2020 - 16:46:44.512Open2308C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
5/3/2020 - 16:46:44.512Open2308C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
5/3/2020 - 16:46:44.512Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 16:46:44.512Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 16:46:44.606Open2308C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
5/3/2020 - 16:46:44.606Open2308C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
5/3/2020 - 16:46:44.606Open2308C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
5/3/2020 - 16:46:44.606Open2308C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
5/3/2020 - 16:46:44.653Open2308C:\malware.exeC:\dhcpcsvc6.DLL
5/3/2020 - 16:46:44.653Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
5/3/2020 - 16:46:44.653Unknown2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
5/3/2020 - 16:46:44.653Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
5/3/2020 - 16:46:44.653Unknown2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
5/3/2020 - 16:46:44.700Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\dhcpcsvc.DLL
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\CRYPTSP.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.700Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.715Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.715Open2308C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
5/3/2020 - 16:46:44.715Open2308C:\malware.exeC:\RpcRtRemote.dll
5/3/2020 - 16:46:44.715Open2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
5/3/2020 - 16:46:44.715Unknown2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
5/3/2020 - 16:46:44.715Open2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
5/3/2020 - 16:46:44.715Unknown2308C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
5/3/2020 - 16:46:44.762Open2308C:\malware.exeC:\rasadhlp.dll
5/3/2020 - 16:46:44.762Open2308C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
5/3/2020 - 16:46:44.762Open2308C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
5/3/2020 - 16:46:44.809Open2308C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
5/3/2020 - 16:46:44.809Open2308C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
5/3/2020 - 16:46:45.59Open2308C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
5/3/2020 - 16:46:45.59Open2308C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wininet.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\malware.exe.Local
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 16:46:45.137Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wship6.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 16:46:45.137Open2308C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
5/3/2020 - 16:46:45.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip
5/3/2020 - 16:46:45.668Write2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip
5/3/2020 - 16:46:45.668Write2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip
5/3/2020 - 16:46:45.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:45.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming
5/3/2020 - 16:46:45.668Open2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip
5/3/2020 - 16:46:45.668Read2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip
5/3/2020 - 16:46:45.668Read2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip
5/3/2020 - 16:46:45.668Read2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip
5/3/2020 - 16:46:45.668Read2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip
5/3/2020 - 16:46:45.668Read2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Windows
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Monitor
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
5/3/2020 - 16:46:45.668Unknown2308C:\malware.exeC:\Users\Behemot\AppData\Roaming\jupter.zip

Process
Trace

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
5/3/2020 - 16:46:44.450Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
5/3/2020 - 16:46:44.450Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
5/3/2020 - 16:46:44.450Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
5/3/2020 - 16:46:44.450Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
5/3/2020 - 16:46:44.450Delete2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
5/3/2020 - 16:46:44.450Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
5/3/2020 - 16:46:44.700Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
5/3/2020 - 16:46:44.856Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
5/3/2020 - 16:46:44.856Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
5/3/2020 - 16:46:44.856Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
5/3/2020 - 16:46:44.856Write2308C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:DNS code www.embracebridal.com.
computer localhost arrow_forward computer gateway:50273 code www.embracebridal.com.

Response
computer gateway:DNS arrow_forward computer localhost code www.embracebridal.com. reply_all 78.153.220.132


TCP
Info
computer localhost:65191 arrow_forward 78.153.220.132:80
78.153.220.132:80 arrow_forward computer localhost:65191

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info
computer localhost send GET www.embracebridal.com attach_file /imagem01010.zip

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 47.47%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 50.25%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 61.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 59.47%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 97.80%
suspicious: True check_circle

Add to Collection
Download