Report #9377 check_circle

Binary
DLL
False cancel
Size
2.75MB
trid
66.9% Inno Setup installer
25.3% Win32 EXE PECompact compressed
2.7% Win32 Executable
1.2% Win16/32 Executable Delphi generic
1.2% OS/2 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
3eec91e916718d2ffa27919f4fc57d7b
sha1
69632f0d0b3da2fd5f56dac571b16b013a183181
crc32
0x77935ba2
sha224
68ee718aff3e2fe8f8111f8246056d9bc18ba914eb70590b144751ec
sha256
9a80cffc2dc77d42b502a6167aad57b298ab158a44079028ddf6e5ce220b785d
sha384
7b718a6f45b8dfe2a1ef126903a534892de3bd05154dee55920c7ec60f1e2fe936bf6aec7ea3bf84787e61f0efd960c4
sha512
308d3b8da8152dac88d28ea2cc03835670ff14cd9deb0d5a1d863c15bada648edc1299570e8fdec3702054c6a3e6607a35ed6e6e2f02c07dbf93fa5d781a18b2
ssdeep
49152:Pwz7iPLNNoSZ/Jk3v6JIhC9oib5TQKJp6p+:PwyjxCwIaoiOo6
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, Borland, IP, Borland_Delphi_30_, network_dropper, CRC32_poly_Constant, BASE64_table, borland_delphi, Delphi_FormShow, BobSoftMiniDelphiBoBBobSoft, CRC32_table, Microsoft_Visual_Cpp_v50v60_MFC, BobSoft_Mini_Delphi_BoB_BobSoft_additional, win_files_operation, IsPE32, win_hook, contentis_base64, screenshot, Borland_Delphi_v40_v50, keylogger, MD5_Constants, Borland_Delphi_40_additional, OpenSSL_DSA, Borland_Delphi_40, network_ssl, Delphi_Random, IsWindowsGUI, anti_dbg, Borland_Delphi_Setup_Module, Borland_Delphi_DLL, url, android_meterpreter, win_registry, Delphi_CompareCall, Borland_Delphi_30_additional, Borland_Delphi_v30

Suspicious
True check_circle

Strings
List
http://www.indyproject.org/
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
Vcl.Graphics
t.Ht
Winapi.Windows
Winapi.Windows
Winapi.Windows
Font.Name
Font.Style
Font.Name
Font.Style
.stl=application/vnd.ms-pki.stl
.sxg=application/vnd.sun.xml.writer.global
.pko=application/vnd.ms-pki.pko
libssl32.dll
ssleay32.dll
dd.mm.yyyy
Uh.pH
127.0.0.1
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" publicKeyToken="6595b64144ccf1df" language="*" processorArchitecture="*"/>
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" publicKeyToken="6595b64144ccf1df" language="*" processorArchitecture="*"/>
System\CurrentControlSet\Control\Keyboard Layouts\%.8x
security.dll
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
System.Win.Registry
%s.Seek not implemented$Operation not allowed on sorted list
_ossl_old_des_ecb_encrypt
-The requested security package does not exist6The caller is not the owner of the desired credentialsBThe security package failed to initialize, and cannot be installed-The token supplied to the function is invalid^The security package is not able to marshall the logon buffer, so the logon attempt has failedNThe per-message Quality of Protection is not supported by the security package?The security context does not allow impersonation of the client
Variable %s is not a container Action does not provide response+Action can't respone to unknown HTTP method"Action can't redirect to blank URL
.pkg=vnd.apple.installer+xml
.mpkg=vnd.apple.installer+xml
Unknown credentials use!Do AcquireCredentialsHandle first"CompleteAuthToken is not supported$Error accepting connection with SSL.
Data.Win.ADODB1
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB
Data.Win.ADODB

Foremost
Matches
0.exe, 2 MB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: True check_circle
Allowed: 6.0.0.1, 1, 2(SERVFAIL), 255.255.255.255, 1, record, 127.0.0.1, 1, localhost.
Suspicious: 0.0.0.1, 0, Unknown
hasAllowed: True check_circle
hasSuspicious: True check_circle

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://www.indyproject.org/
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: user32.dll, secur32.dll, kernel32.dll, uxtheme.dll, NTDLL.DLL, security.dll, MSWSOCK.DLL, libeay32.dll, Fwpuclnt.dll, PSAPI.dll, comctl32.dll, Wship6.dll, mtxex.dll, ssleay32.dll, ole32.dll, libssl32.dll, imm32.dll, oleaut32.dll, WS2_32.DLL, msvcrt.dll, URLMON.DLL, advapi32.dll, gdi32.dll, DWMAPI.DLL, SHFolder.dll, wtsapi32.dll, windowscodecs.dll, shell32.dll, msimg32.dll, version.dll
hasFiles: True check_circle
Suspicious: Data.DB
hasAllowed: True check_circle
hasSuspicious: True check_circle

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 603136
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .text, .itext, .data, .bss, .idata, .didata, .tls, .rdata, .reloc, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 2289252
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, secur32.dll, kernel32.dll, uxtheme.dll, ntdll.dll, security.dll, mswsock.dll, psapi.dll, comctl32.dll, wship6.dll, mtxex.dll, ole32.dll, imm32.dll, oleaut32.dll, ws2_32.dll, msvcrt.dll, urlmon.dll, advapi32.dll, gdi32.dll, dwmapi.dll, shfolder.dll, wtsapi32.dll, windowscodecs.dll, shell32.dll, msimg32.dll, version.dll
hasLibs: True check_circle
Suspicious: libeay32.dll, fwpuclnt.dll, ssleay32.dll, libssl32.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2014-08-16 23:44:07
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: BobSoft Mini Delphi -> BoB / BobSoft
Compiled: True check_circle
Compilers: Borland Delphi 3.0 (???), Borland Delphi 4.0, Borland Delphi v6.0 - v7.0
MainPacker: BobSoft Mini Delphi -> BoB / BobSoft

Obfuscation
XOR: False cancel
Fuzzing: True check_circle

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.data: 8
.rsrc: 3
.text: 88
.itext: 7

pushpopmath
.data: 5
.rsrc: 1
.text: 48
.idata: 1
.reloc: 160

garbagebytes
.data: 4
.rsrc: 2
.text: 68
.itext: 7

hookdetection
.data: 1
.text: 2
.reloc: 14

software breakpoint
.text: 10
.reloc: 59

fakeconditionaljumps
.text: 1

programcontrolflowchange
.data: 4
.rsrc: 2
.text: 67
.itext: 7

cpuinstructionsresultscomparison
.data: 6
.rsrc: 21
.text: 35
.reloc: 5

AVclass
banload
1
VirusTotal
md5
3eec91e916718d2ffa27919f4fc57d7b
sha1
69632f0d0b3da2fd5f56dac571b16b013a183181
SCANS (DETECTION RATE = 70.31%)
AVG
result: Win32:GenMalicious-NZ [Trj]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180324
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=87)
update: 20180325
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180325
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan ( 7000000f1 )
update: 20180325
version: 10.42.26601
detected: True check_circle

Avast
result: Win32:GenMalicious-NZ [Trj]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Delphi.Gen
update: 20180324
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Sodebral.A.gen!Eldorado
update: 20180325
version: 5.4.30.7
detected: True check_circle

DrWeb
update: 20180325
version: 7.0.28.2020
detected: False cancel

GData
result: Trojan.GenericKD.2939641
update: 20180325
version: A:25.16495B:25.11872
detected: True check_circle

Panda
result: Trj/CI.A
update: 20180324
version: 4.6.4.2
detected: True check_circle

VBA32
result: Hoax.Blocker
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.sodebral.a (v)
update: 20180325
version: 65508
detected: True check_circle

Zoner
update: 20180325
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.sodebral.a (v)
update: 20180325
version: 1.5.0.42
detected: True check_circle

Comodo
result: .UnclassifiedMalware
update: 20180325
version: 28741
detected: True check_circle

F-Prot
result: W32/Sodebral.A.gen!Eldorado
update: 20180325
version: 4.7.1.166
detected: True check_circle

Ikarus
result: Trojan-Downloader.Banload2
update: 20180324
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!3EEC91E91671
update: 20180325
version: 6.0.6.653
detected: True check_circle

Rising
update: 20180327
version: 25.0.0.1
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20180325
version: 4.98.0
detected: True check_circle

Yandex
result: Trojan.Blocker!CNk2hNw3f7k
update: 20180324
version: 5.5.1.3
detected: True check_circle

Zillya
update: 20180326
version: 2.0.0.3520
detected: False cancel

Arcabit
result: Trojan.Generic.D2CDAF9
update: 20180325
version: 1.0.0.831
detected: True check_circle

Endgame
result: malicious (moderate confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan.Generic.Lpma
update: 20180325
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180324
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180325
version: v4.3.5
detected: False cancel

Ad-Aware
result: Trojan.GenericKD.2939641
update: 20180325
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Ransom.W32.Blocker.fjqy!c
update: 20180325
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.2939641 (B)
update: 20180325
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.GenericKD.2939641
update: 20180325
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.UOL!tr.dldr
update: 20180325
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
update: 20180325
version: 16.0.100
detected: False cancel

Kingsoft
update: 20180325
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180325
version: 1.0
detected: True check_circle

Symantec
result: Downloader
update: 20180324
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180325
version: 2018-03-25.01
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Banload.C210026
update: 20180324
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan[Ransom]/Win32.Blocker
update: 20180325
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180325
version: 15.0.1.13
detected: True check_circle

Microsoft
result: Trojan:Win32/Sodebral.E
update: 20180325
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: Win32/Trojan.Ransom.324
update: 20180325
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180325
version: 1.0
detected: True check_circle

Cybereason
result: malicious.916718
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.TWB
update: 20180325
version: 17111
detected: True check_circle

TrendMicro
result: TROJ_BANLOAD.YZZ
update: 20180325
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180324
detected: False cancel

BitDefender
result: Trojan.GenericKD.2939641
update: 20180325
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_90% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan ( 7000000f1 )
update: 20180325
version: 10.42.26601
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180324
version: 180324-00
detected: False cancel

Malwarebytes
result: Trojan.Banker.FRM
update: 20180325
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20180325
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojan.Sodebral
update: 20180324
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Blocker.ddwlaf
update: 20180325
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.2939641
update: 20180325
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180325
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Downloader.vh
update: 20180324
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_BANLOAD.YZZ
update: 20180325
version: 9.950.0.1006
detected: True check_circle

total
64
sha256
9a80cffc2dc77d42b502a6167aad57b298ab158a44079028ddf6e5ce220b785d
scan_id
9a80cffc2dc77d42b502a6167aad57b298ab158a44079028ddf6e5ce220b785d-1521955358
resource
3eec91e916718d2ffa27919f4fc57d7b
positives
45
scan_date
2018-03-25 05:22:38
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\Windows\Fonts\StaticCache.dat
11/3/2020 - 21:45:42.918Read1480C:\malware.exeC:\Windows\Fonts\StaticCache.datStaticCache.dat
11/3/2020 - 21:45:42.918Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nls
11/3/2020 - 21:45:42.918Unknown1480C:\malware.exeC:\Windows\Globalization\Sorting\SortDefault.nlsSortDefault.nls
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\security.dll
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\security.dll
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\security.dll
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\SECUR32.DLL
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\malware.exe.Local
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88
11/3/2020 - 21:45:42.918Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88
11/3/2020 - 21:45:42.918Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.7600.16385_pt-br_59b90943c4d9db88\comctl32.dll.mui
11/3/2020 - 21:45:42.934Open1480C:\malware.exeC:\Fwpuclnt.dll
11/3/2020 - 21:45:42.934Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
11/3/2020 - 21:45:42.934Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
11/3/2020 - 21:45:42.934Open1480C:\malware.exeC:\Program Files (x86)\Common Files\System\ado\msado15.dll
11/3/2020 - 21:45:42.934Open1480C:\malware.exeC:\Program Files (x86)\Common Files\System\ado\msado15.dll
11/3/2020 - 21:45:42.934Open1480C:\malware.exeC:\Program Files (x86)\Common Files\System\ado\MSDART.DLL
11/3/2020 - 21:45:42.934Open1480C:\malware.exeC:\Windows\SysWOW64\msdart.dll
11/3/2020 - 21:45:42.934Open1480C:\malware.exeC:\Windows\SysWOW64\msdart.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\CRYPTSP.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\RpcRtRemote.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
11/3/2020 - 21:45:43.75Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
11/3/2020 - 21:45:43.75Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
11/3/2020 - 21:45:43.75Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
11/3/2020 - 21:45:43.137Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll.Config
11/3/2020 - 21:45:43.137Open1480C:\malware.exeC:\Windows\SysWOW64\uxtheme.dll
11/3/2020 - 21:45:43.137Open1480C:\malware.exeC:\malware.exe.Local
11/3/2020 - 21:45:43.137Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
11/3/2020 - 21:45:43.137Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
11/3/2020 - 21:45:43.137Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
11/3/2020 - 21:45:43.137Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
11/3/2020 - 21:46:6.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
11/3/2020 - 21:46:6.168Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
11/3/2020 - 21:46:6.168Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.txt
11/3/2020 - 21:46:6.168Open1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Read1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.exe
11/3/2020 - 21:46:7.903Unknown1480C:\malware.exeC:\malware.exe
11/3/2020 - 21:46:7.903Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\GoRdEnY.txt
11/3/2020 - 21:46:7.903Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\windataup.inf
11/3/2020 - 21:46:7.903Write1480C:\malware.exeC:\Users\Behemot\AppData\Local\windataup.infwindataup.inf
11/3/2020 - 21:46:7.903Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
11/3/2020 - 21:46:7.903Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\DNSAPI.dll
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\IPHLPAPI.DLL
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\WINNSI.DLL
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
11/3/2020 - 21:46:7.918Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
11/3/2020 - 21:46:7.997Open1480C:\malware.exeC:\rasadhlp.dll
11/3/2020 - 21:46:7.997Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
11/3/2020 - 21:46:7.997Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
11/3/2020 - 21:46:7.903Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\RunGoRdEnY

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: False cancel

Browsers
Identified: False cancel

Internet
Identified: False cancel

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code www.tecnoappweb.com.br.
computer localhost arrow_forward computer gateway:DNS code www.tecnoappweb.com.br.

Response

TCP
Info

UDP
Info
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:53 arrow_forward computer localhost:50273

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 45.91%
suspicious: False cancel

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 96.45%
suspicious: True check_circle

Random Forest (100 estimators, NFS-BRMalware)
confidence: 59.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 35.03%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 36.37%
suspicious: False cancel

Add to Collection
Download