Report #9587 check_circle

  • Creation Date: March 13, 2020, 12:33 p.m.
  • Last Update: March 13, 2020, 2:07 p.m.
  • File: Comprovante_NFe.exe
  • Results:
Binary
DLL
False cancel
Size
277.00KB
trid
37.1% UPX compressed Win32 Executable
36.4% Win32 EXE Yoda's Crypter
9.0% Win32 Dynamic Link Library
6.1% Win32 Executable
2.8% Win16/32 Executable Delphi generic
type
PE
wordsize
0
Subsystem
unknown
Hashes
md5
be0ab49d2d16a3d8c32b9d796666ebac
sha1
1c4158ad5369d3eb715c9c3e07e2fb6ccb2472f5
crc32
0x966b9665
sha224
b31a98c953e29c50cab6d79a5a290615facec542561ae5899f5ff3e4
sha256
ecc98917a6e8312c28bda885cde7c766a42f32e4629824dee934cd31fd51b387
sha384
ecefc957ad2202b7ce8ce9911ebefb301c6b206921f4f1d4771d5715f2702baf4381be64bdef59b0f92af7bfc5bda18d
sha512
f2fb7bb601c48a7f517d3015a99e229f9676c7139e28be5253cb1f9425c0eef1c16f1ece127d723069d56e84ce1a23cd50a266490446b715618fd224f579baf3
ssdeep
6144:kSfbl0+w8/JYwMHqmptuJzWkld5ogbvtkv58e1zacK:kSftwLwMHqS0A+dugbFkv5nBK
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
MSLRH_V031_emadicius, domain, UPX_wwwupxsourceforgenet, UPX20030XMarkusOberhumerLaszloMolnarJohnReiser, UPX_v0896_v102_v105_v122_Delphi_stub_Laszlo_Markus, yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h, CRC32_poly_Constant, UPXProtectorv10x2, UPX_wwwupxsourceforgenet_additional, UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser, IsPacked, RijnDael_AES_CHAR, UPX_v0896_v102_v105_v122_Delphi_stub, screenshot, contentis_base64, UPXv20MarkusLaszloReiser, IsPE32, UPX, PackerUPX_CompresorGratuito_wwwupxsourceforgenet, IsWindowsGUI, url, RijnDael_AES_LONG, UPX_v0896_v102_v105_v122_Delphi_stub_additional, Big_Numbers0

Suspicious
True check_circle

Strings
List
F.tH
71i.tc
e: http://w`g
comctl32.dll
version.dll
wininet.dll
SHFolder.dll
SOFTWARE\S\D
w"%s"0ot
;%pri
%a<LN
Zak has occu
Rebuild
nlKd%n
type%s
|xNNNNtplhNNNNd`\XNNNNPL<0BNNN,(8
tplhNNNn?d`\XONNNTPL
[gnH]
2.dll
EXECUTABLE
MmFtPU
GetProcAddress
ExitProcess
52EE90431D975E49DC0B
D30E32
This program must be run under Win32
VirtualAlloc
VirtualProtect
TUnitHashAr.
InternetOpenA
LoadLibraryA
NETWORK
0dCE
tP!Hg|+
#[OH
GetDC
CH_I
*2608ABE679CT
\XTP9999LHD@9999<8409999,($ 9999
|x''''tplh''''d`\X''''TPLH''''D@<8''''40,(''''$
OBUUVIIS)Z1SS@9
OWSE^09$WE'Up
ru&o
|rrrrxtplB
eL.6!UAQ;k
6u>SaYPZS
rrYSU<HtH
$5PMagel
p4FromSt*
'HSplitV9
TObject4f)
#SUPPORT_(_.SCK9
1A3TBFA44
>2tDC9A
D03Pi,H
ANSI_CHARSETh
\.i_2W@R*@LD
a4HzT!tSy
D4HHe@*LL`
kA#Y(oaB`%
zroonpGG`
_FuchsiaAqua
ive>NoAcc
SYMBOLc_M
OBGU]Zbonmlg
NBH^alog
PB24EDF023
elphi\RTL
jicAc\LBk
dAGr"Hgid
Ca,iEp0
2He#f$g
aG(MN7;
AvHc2.\
SHA1
y?sv`Op?Bs
kVSsGCU)
wDEFAULT5
ByWl'Word
$(####,048####<@DH####LPTX(
/AB&Ci,
CURRENTFOLDER
$Y{kTPR
BdEv4w|
g|Ri|_d
D""fT**~;
twa@Dev
EASTROPE
IY3Viewe
CLOSEDFOLDER
UNKNOWNFILE
PACKAGEINFO
OPENFOLDER
?EH1P
MuE;@ 1c
C++Buid
Close!_
@tUMaC`
iO`rCGx
I)rface

Foremost
Matches
0.exe, 277 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: True check_circle
Suspicious: http://w
hasAllowed: False cancel
hasSuspicious: True check_circle

Files
Allowed: ole32.dll, gdi32.dll, version.dll, advapi32.dll, oleaut32.dll, 2.dll, SHFolder.dll, KERNEL32.DLL, user32.dll, wininet.dll, comctl32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 12288
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 16384
Suspicious: False cancel
Headers
Headers: 4096
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 0
Suspicous: True check_circle

Sections
Allowed: .rsrc
Suspicious: upx0, upx1
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: True check_circle

Versions
OS
Version: 4
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 4
Linker
Version: 2.25
Suspicious: False cancel
Subsystem
Version: 4.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 748800
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: ole32.dll, gdi32.dll, version.dll, advapi32.dll, oleaut32.dll, shfolder.dll, kernel32.dll, user32.dll, wininet.dll, comctl32.dll
hasLibs: True check_circle
Suspicious: 2.dll
hasAllowed: True check_circle
hasSuspicious: True check_circle

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2014-11-12 20:05:42
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: MSLRH V0.31 -> emadicius, UPX -> www.upx.sourceforge.net
Compiled: False cancel
Compilers

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
none: 254

nopsequence
none: 2

pushpopmath
none: 215
.rsrc: 5

ss register
none: 6

garbagebytes
none: 132

hookdetection
none: 6

software breakpoint
none: 6

fakeconditionaljumps
none: 8

programcontrolflowchange
none: 124

cpuinstructionsresultscomparison
none: 8
.rsrc: 8

AVclass
banload
1
VirusTotal
md5
be0ab49d2d16a3d8c32b9d796666ebac
sha1
1c4158ad5369d3eb715c9c3e07e2fb6ccb2472f5
SCANS (DETECTION RATE = 60.61%)
AVG
result: FileRepMetagen [Malware]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

CMC
update: 20180324
version: 1.1.0.977
detected: False cancel

MAX
result: malware (ai score=88)
update: 20180325
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180325
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 004af0fc1 )
update: 20180325
version: 10.42.26601
detected: True check_circle

ALYac
result: Gen:Variant.Strictor.67541
update: 20180325
version: 1.1.1.5
detected: True check_circle

Avast
result: FileRepMetagen [Malware]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.Delphi.Gen
update: 20180324
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
result: W32/Trojan.LAHI-4206
update: 20180325
version: 5.4.30.7
detected: True check_circle

DrWeb
update: 20180325
version: 7.0.28.2020
detected: False cancel

GData
result: Gen:Variant.Strictor.67541
update: 20180325
version: A:25.16495B:25.11872
detected: True check_circle

Panda
result: Trj/Genetic.gen
update: 20180324
version: 4.6.4.2
detected: True check_circle

VBA32
result: suspected of Trojan.Downloader.gen.h
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180325
version: 65508
detected: True check_circle

Zoner
update: 20180325
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180325
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180325
version: 0.99.2.0
detected: False cancel

Comodo
update: 20180325
version: 28740
detected: False cancel

F-Prot
update: 20180325
version: 4.7.1.166
detected: False cancel

Ikarus
result: Trojan-Downloader.Win32.Banload
update: 20180324
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!BE0AB49D2D16
update: 20180325
version: 6.0.6.653
detected: True check_circle

Rising
result: Downloader.Banload!8.15B (TFE:5:7LKu3XT3IlV)
update: 20180325
version: 25.0.0.1
detected: True check_circle

Sophos
result: Mal/Generic-S
update: 20180325
version: 4.98.0
detected: True check_circle

Yandex
update: 20180324
version: 5.5.1.3
detected: False cancel

Zillya
update: 20180323
version: 2.0.0.3519
detected: False cancel

Arcabit
update: 20180325
version: 1.0.0.831
detected: False cancel

Cylance
result: Unsafe
update: 20180325
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (moderate confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
update: 20180325
version: 1.0.0.1
detected: False cancel

ViRobot
update: 20180324
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180325
version: v4.3.5
detected: False cancel

Ad-Aware
result: Gen:Variant.Strictor.67541
update: 20180325
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.W32.Generic!c
update: 20180325
version: 4.2
detected: True check_circle

Emsisoft
result: Gen:Variant.Strictor.67541 (B)
update: 20180325
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Gen:Variant.Strictor.67541
update: 20180325
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Banload.UKZ!tr.dldr
update: 20180325
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: Trojan/Generic.bafab
update: 20180325
version: 16.0.100
detected: True check_circle

Kingsoft
update: 20180325
version: 2013.8.14.323
detected: False cancel

Paloalto
result: generic.ml
update: 20180325
version: 1.0
detected: True check_circle

Symantec
result: Trojan.Gen.2
update: 20180324
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180325
version: 2018-03-25.01
detected: False cancel

AhnLab-V3
result: Trojan/Win32.Ba.C648589
update: 20180324
version: 3.12.0.20130
detected: True check_circle

Antiy-AVL
result: Trojan/Win32.AGeneric
update: 20180325
version: 3.0.0.1
detected: True check_circle

Kaspersky
result: HEUR:Trojan.Win32.Generic
update: 20180325
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:Win32/Banload
update: 20180325
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
update: 20180325
version: 1.0.0.1120
detected: False cancel

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: HEUR:Trojan.Win32.Generic
update: 20180325
version: 1.0
detected: True check_circle

Cybereason
result: malicious.d2d16a
update: 20180225
version: 1.2.27
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Banload.UKZ
update: 20180325
version: 17111
detected: True check_circle

TrendMicro
result: TROJ_BANLOAD.EJXK
update: 20180325
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180324
detected: False cancel

BitDefender
result: Gen:Variant.Strictor.67541
update: 20180325
version: 7.2
detected: True check_circle

CrowdStrike
update: 20170201
version: 1.0
detected: False cancel

K7AntiVirus
result: Trojan-Downloader ( 004af0fc1 )
update: 20180325
version: 10.42.26601
detected: True check_circle

SentinelOne
update: 20180225
version: 1.0.15.206
detected: False cancel

Avast-Mobile
update: 20180324
version: 180324-00
detected: False cancel

Malwarebytes
update: 20180325
version: 2.1.1.1115
detected: False cancel

TotalDefense
update: 20180324
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: TrojanDownloader.Banload
update: 20180324
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Win32.Banload.diuxbu
update: 20180325
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Gen:Variant.Strictor.67541
update: 20180325
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180324
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.BadFile.dc
update: 20180324
version: v2015
detected: True check_circle

total
66
sha256
ecc98917a6e8312c28bda885cde7c766a42f32e4629824dee934cd31fd51b387
scan_id
ecc98917a6e8312c28bda885cde7c766a42f32e4629824dee934cd31fd51b387-1521953799
resource
be0ab49d2d16a3d8c32b9d796666ebac
positives
40
scan_date
2018-03-25 04:56:39
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
13/3/2020 - 13:47:43.903Open652C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
13/3/2020 - 13:47:43.903Open652C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
13/3/2020 - 13:47:43.903Open652C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
13/3/2020 - 13:47:43.903Open652C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
13/3/2020 - 13:47:43.950Open652C:\malware.exeC:\dhcpcsvc6.DLL
13/3/2020 - 13:47:43.950Open652C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
13/3/2020 - 13:47:43.950Unknown652C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
13/3/2020 - 13:47:43.950Open652C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
13/3/2020 - 13:47:43.950Unknown652C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Roaming
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Roaming
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot\AppData\Roaming
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
13/3/2020 - 13:47:43.997Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\dhcpcsvc.DLL
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\CRYPTSP.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:43.997Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:44.12Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:44.12Open652C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:47:44.12Open652C:\malware.exeC:\RpcRtRemote.dll
13/3/2020 - 13:47:44.12Open652C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
13/3/2020 - 13:47:44.12Unknown652C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
13/3/2020 - 13:47:44.12Open652C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
13/3/2020 - 13:47:44.12Unknown652C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
13/3/2020 - 13:47:44.90Open652C:\malware.exeC:\rasadhlp.dll
13/3/2020 - 13:47:44.90Open652C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
13/3/2020 - 13:47:44.90Open652C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
13/3/2020 - 13:47:44.153Open652C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
13/3/2020 - 13:47:44.153Open652C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
13/3/2020 - 13:47:45.278Open652C:\malware.exeC:\Windows\SysWOW64\wininet.dll
13/3/2020 - 13:47:45.278Open652C:\malware.exeC:\Windows\SysWOW64\wininet.dll
13/3/2020 - 13:47:45.715Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Pastaescola.zip
13/3/2020 - 13:47:45.715Write652C:\malware.exeC:\Users\Behemot\AppData\Local\Pastaescola.zipPastaescola.zip
13/3/2020 - 13:47:45.715Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local\Pastaescola.zipPastaescola.zip
13/3/2020 - 13:47:45.715Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Pastaescola.zip
13/3/2020 - 13:47:45.715Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local\Pastaescola.zipPastaescola.zip
13/3/2020 - 13:47:45.715Open652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:45.715Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:45.715Open652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:45.715Unknown652C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:47:45.715Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Pastaescola.zip
13/3/2020 - 13:47:45.715Open652C:\malware.exeC:\Users\Behemot\AppData\Local\Runner.exe

Process
Trace

Analysis
Reason
Timeout

Status
Sucessfully Executed

Results
1

Registry
Trace
13/3/2020 - 13:47:43.997Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
13/3/2020 - 13:47:43.997Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
13/3/2020 - 13:47:43.997Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
13/3/2020 - 13:47:44.200Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
13/3/2020 - 13:47:45.465Delete652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
13/3/2020 - 13:47:45.465Delete652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
13/3/2020 - 13:47:45.465Write652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
13/3/2020 - 13:47:45.465Delete652C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: True check_circle

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code catalogojoais.pe.hu.
computer localhost arrow_forward computer gateway:DNS code catalogojoais.pe.hu.

Response

TCP
Info

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:50273 arrow_forward computer localhost:53
computer localhost:67 arrow_forward computer localhost:68
computer localhost:68 arrow_forward help_outline 255.255.255.255:67

HTTP
Info

Summary
DNS
True check_circle

TCP
False cancel

UDP
True check_circle

HTTP
False cancel

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: True check_circle

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 97.19%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 55.45%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 75.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 65.52%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.16%
suspicious: True check_circle

Add to Collection
Download