Report #9590 check_circle

Binary
DLL
False cancel
Size
472.02KB
trid
50.1% Win32 EXE PECompact compressed
35.3% Win32 EXE PECompact compressed
5.5% Win32 Dynamic Link Library
3.8% Win32 Executable
1.7% OS/2 Executable
type
PE
wordsize
32
Subsystem
Windows GUI
Hashes
md5
e7c6386a541aab4cbdcee962e8322fad
sha1
baf43a94c962693147cb7ed321d116dee60be472
crc32
0x739ef486
sha224
9e4a10bd26c856007bda1754ecf52fb9cffc55fbd4c14e6c48b1de60
sha256
210a4f7c392e0bfdc39380ce609a4b94b1ee6ae2f885c7e7785e820ac9194383
sha384
aeef38ca1a4340000d1ecb5369cd310f36259e8c9e6e41fdab9e4a527f4f6ddfe1abc364d0558f64d1793a7e76d54442
sha512
b70b9067d30acd4626d661b3cd94aa312e89910d6868fdf9ec818fded17f147cb9519269fde0eb1ad5ed003371edf71c1698150100a961babe616f72ca24a831
ssdeep
12288:71bOuVLWnqBaM8CR1hL4O03HMjGGy6nnjqKoeF:7BOuVqnML8CX7uHMjGP6nnjqKoeF
Community
Google
False cancel
HashLib
False cancel
YARA
Matches
domain, PECompact_2x_Jeremy_Collake, PECompact_v20_additional, PECompact_v20, PECompact_V2X_Bitsum_Technologies_additional, HasRichSignature, PECompact_20x_Heuristic_Mode_Jeremy_Collake, HasOverlay, PECompact_v2xx_additional, PECompactv2xx, IsPE32, PeCompact_v208_Bitsum_Technologiessignature_by_loveboom, PECompact2xxBitSumTechnologies, PECompact_v2xx, PeCompact_2xx_BitSum_Technologies, IP, contentis_base64, IsPacked, PeCompact_253_DLL_BitSum_Technologies_additional, IsWindowsGUI, PECompactV2XBitsumTechnologies, PECompact_2xx_BitSum_Technologies, PeCompact_253_DLL_BitSum_Technologies, pecompact2, PECompact_V2X_Bitsum_Technologies

Suspicious
True check_circle

Strings
List
L.AI
T.Ki
<assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" language="*" processorArchitecture="*" publicKeyToken="6595b64144ccf1df"></assemblyIdentity>
F.kZ
WSOCK32.dll
COMCTL32.dll
USERENV.dll
VERSION.dll
^p.few
WININET.dll
WINMM.dll
MPR.dll
%d8!c!S"
HtU-
_~e%sn
eN%%=
a:\eB
<requestedPrivileges>
GetProcAddress
PECompact2
+s.Bw
EnumProcesses
7dE
VirtualAlloc
InternetReadFile
LoadLibraryA
DfE5
0Fed
A5cd
s in
A)fD
E^fD
rIVNC
:I&o
AutoIt v3 Script: 3, 3, 8, 1
<requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
E_VN
4.Bz/
H}AU3!EA06
_VAU3!EA06
8HA!AB,&
N!ac.4%IV%}h
vYTI82]
x6Df*Cli
NhU5YlF.
66.0....!
<dependentAssembly>
</assembly>7
bfffPPOOOL=
666.6..//
4HVao><
cd7c?Ui
</dependentAssembly>
AHTR!\
,H;BrBe$tY
<b;4hkhe
<dependency>
kffffPPOOLG>
</dependency>
UM=a%Y:
$m<HUI?
nT84)Rllkkkm
khffffPPOOLf>
^>4443)))
YY(GE2n
XH4n*ta
_vs!|Mf}D6
4....&&&&!!!
:Ia?AICg
PEC2^O
oUaSfP?
CompiledScript
[peFn-I
~|fsEak
8ho8-S
TPO)
Esp6.
H\ uTa-i"
7bnP${CM
|IW=E_
{E-)GI
...&&&&#!!!
..&&&#!!!
=RaHn?tn
TBY/Ohy;
#Gm9cE
gDA6;l
)-hll@ss
H],[4rG
~~}{}{{\
8Ei.g
g8iN}
MEu`!2
;T!Pe1
a6,-wD
l&G2Prb
3FRd/l/
WHtR.@
noF\}
$ERG-

Foremost
Matches
0.exe, 471 KB, 512.png, 25 KB
Suspicious
True check_circle
Heuristics
IPs
hasIPs: False cancel
Allowed
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

URLs
Allowed
hasURLs: False cancel
Suspicious
hasAllowed: False cancel
hasSuspicious: False cancel

Files
Allowed: USER32.dll, ADVAPI32.dll, VERSION.dll, WININET.dll, MPR.dll, WINMM.dll, kernel32.dll, SHELL32.dll, OLEAUT32.dll, PSAPI.DLL, USERENV.dll, COMCTL32.dll, COMDLG32.dll, ole32.dll, GDI32.dll, WSOCK32.dll
hasFiles: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Binary
Sizes
RVA
RVA: 16
Suspicious: False cancel
Code
Size: 121856
Suspicious: False cancel
Image
Address: 4194304
Suspicious: False cancel
Stack
Stack: 4096
Suspicious: False cancel
Headers
Headers: 1024
Suspicious: False cancel
Suspicious: False cancel

Symbols
Number
Number: 0
Suspicious: True check_circle
Pointer
Pointer: 0
Suspicious: True check_circle
Directories
Number: 16
Suspicious: False cancel

Checksum
Value: 486684
Suspicous: False cancel

Sections
Allowed: .text, .rsrc
Suspicious
hasAllowed: True check_circle
hasSections: True check_circle
hasSuspicious: False cancel

Versions
OS
Version: 5
Suspicious: False cancel
Image
Version: True check_circle
Suspicious: 5
Linker
Version: 10.0
Suspicious: False cancel
Subsystem
Version: 5.0
Suspicious: False cancel
Suspicious: False cancel

EntryPoint
Address: 91585
Suspicious: False cancel

Anomalies
Anomalies: The header checksum and the calculated checksum do not match.
hasAnomalies: True check_circle

Libraries
Allowed: user32.dll, advapi32.dll, version.dll, wininet.dll, mpr.dll, winmm.dll, kernel32.dll, shell32.dll, oleaut32.dll, psapi.dll, userenv.dll, comctl32.dll, comdlg32.dll, ole32.dll, gdi32.dll, wsock32.dll
hasLibs: True check_circle
Suspicious
hasAllowed: True check_circle
hasSuspicious: False cancel

Timestamp
Past: False cancel
Valid: True check_circle
Value: 2012-01-29 19:32:28
Future: False cancel

Compilation
Packed: True check_circle
Missing: False cancel
Packers: PECompact 2.x -> Jeremy Collake, PECompact v2.0, PeCompact 2.53 DLL --> BitSum Technologies, PECompact 2.0x Heuristic Mode -> Jeremy Collake
Compiled: False cancel
Compilers
MainPacker: PECompact 2.xx --> BitSum Technologies

Obfuscation
XOR: False cancel
Fuzzing: False cancel

PEDetector
Matches
None
Suspicious
False cancel
Disassembly
hasTricks
True check_circle
Tricks
pushret
.rsrc: 33
.text: 127

nopsequence
.rsrc: 1

pushpopmath
.rsrc: 6
.text: 63

ss register
.text: 3

garbagebytes
.rsrc: 15
.text: 52

hookdetection
.rsrc: 1
.text: 4

software breakpoint
.text: 9

fakeconditionaljumps
.text: 5

programcontrolflowchange
.rsrc: 15
.text: 47

cpuinstructionsresultscomparison
.rsrc: 30

AVclass
autoit
1
VirusTotal
md5
e7c6386a541aab4cbdcee962e8322fad
sha1
baf43a94c962693147cb7ed321d116dee60be472
SCANS (DETECTION RATE = 71.21%)
AVG
result: Win32:Dropper-gen [Drp]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

CMC
result: Trojan.Win32.Generic!O
update: 20180324
version: 1.1.0.977
detected: True check_circle

MAX
result: malware (ai score=87)
update: 20180325
version: 2017.11.15.1
detected: True check_circle

Bkav
update: 20180325
version: 1.3.0.9466
detected: False cancel

K7GW
result: Trojan-Downloader ( 0049eac71 )
update: 20180325
version: 10.42.26600
detected: True check_circle

ALYac
result: Trojan.GenericKD.1774001
update: 20180325
version: 1.1.1.5
detected: True check_circle

Avast
result: Win32:Dropper-gen [Drp]
update: 20180325
version: 18.2.3827.0
detected: True check_circle

Avira
result: TR/Dldr.AutoIt.nsv.1
update: 20180324
version: 8.3.3.6
detected: True check_circle

Baidu
update: 20180323
version: 1.0.0.2
detected: False cancel

Cyren
update: 20180325
version: 5.4.30.7
detected: False cancel

DrWeb
result: Trojan.DownLoader11.23021
update: 20180325
version: 7.0.28.2020
detected: True check_circle

GData
result: Trojan.GenericKD.1774001
update: 20180325
version: A:25.16493B:25.11870
detected: True check_circle

Panda
result: Trj/Chgt.C
update: 20180324
version: 4.6.4.2
detected: True check_circle

VBA32
result: Trojan-Downloader.Autoit.gen
update: 20180323
version: 3.12.28.0
detected: True check_circle

VIPRE
result: Trojan.Win32.Generic!BT
update: 20180325
version: 65504
detected: True check_circle

Zoner
update: 20180325
version: 1.0
detected: False cancel

AVware
result: Trojan.Win32.Generic!BT
update: 20180325
version: 1.5.0.42
detected: True check_circle

ClamAV
update: 20180324
version: 0.99.2.0
detected: False cancel

Comodo
result: .UnclassifiedMalware
update: 20180325
version: 28740
detected: True check_circle

F-Prot
update: 20180325
version: 4.7.1.166
detected: False cancel

Ikarus
result: Worm.Win32.AutoIt
update: 20180324
version: 0.1.5.2
detected: True check_circle

McAfee
result: Artemis!E7C6386A541A
update: 20180325
version: 6.0.6.653
detected: True check_circle

Rising
update: 20180325
version: 25.0.0.1
detected: False cancel

Sophos
result: Mal/Generic-S
update: 20180325
version: 4.98.0
detected: True check_circle

Yandex
update: 20180324
version: 5.5.1.3
detected: False cancel

Zillya
result: Downloader.Genome.Win32.51595
update: 20180323
version: 2.0.0.3519
detected: True check_circle

Arcabit
result: Trojan.Generic.D1B11B1
update: 20180325
version: 1.0.0.831
detected: True check_circle

Cylance
result: Unsafe
update: 20180325
version: 2.3.1.101
detected: True check_circle

Endgame
result: malicious (high confidence)
update: 20180316
version: 2.0.5
detected: True check_circle

Tencent
result: Win32.Trojan-downloader.Genome.Amly
update: 20180325
version: 1.0.0.1
detected: True check_circle

ViRobot
update: 20180324
version: 2014.3.20.0
detected: False cancel

eGambit
update: 20180325
version: v4.3.5
detected: False cancel

Ad-Aware
result: Trojan.GenericKD.1774001
update: 20180325
version: 3.0.3.1010
detected: True check_circle

AegisLab
result: Troj.Downloader.W32.Genome.hxep!c
update: 20180325
version: 4.2
detected: True check_circle

Emsisoft
result: Trojan.GenericKD.1774001 (B)
update: 20180325
version: 4.0.2.899
detected: True check_circle

F-Secure
result: Trojan.GenericKD.1774001
update: 20180325
version: 11.0.19100.45
detected: True check_circle

Fortinet
result: W32/Autoit.NSV!tr.dldr
update: 20180325
version: 5.4.247.0
detected: True check_circle

Invincea
update: 20180121
version: 6.3.4.26036
detected: False cancel

Jiangmin
result: Trojan/Autoit.dpw
update: 20180324
version: 16.0.100
detected: True check_circle

Kingsoft
result: Win32.TrojDownloader.Genome.hx.(kcloud)
update: 20180325
version: 2013.8.14.323
detected: True check_circle

Paloalto
result: generic.ml
update: 20180325
version: 1.0
detected: True check_circle

Symantec
result: Downloader
update: 20180324
version: 1.5.0.0
detected: True check_circle

nProtect
update: 20180325
version: 2018-03-25.01
detected: False cancel

AhnLab-V3
update: 20180324
version: 3.12.0.20130
detected: False cancel

Antiy-AVL
update: 20180325
version: 3.0.0.1
detected: False cancel

Kaspersky
result: Trojan-Downloader.Win32.Genome.hxep
update: 20180325
version: 15.0.1.13
detected: True check_circle

Microsoft
result: TrojanDownloader:AutoIt/Banload.gen!A
update: 20180325
version: 1.1.14600.4
detected: True check_circle

Qihoo-360
result: HEUR/Malware.QVM17.Gen
update: 20180325
version: 1.0.0.1120
detected: True check_circle

TheHacker
update: 20180319
version: 6.8.0.5.2551
detected: False cancel

ZoneAlarm
result: Trojan-Downloader.Win32.Genome.hxep
update: 20180325
version: 1.0
detected: True check_circle

ESET-NOD32
result: a variant of Win32/TrojanDownloader.Autoit.NSV
update: 20180324
version: 17111
detected: True check_circle

TrendMicro
result: TROJ_OTOTI.VUD
update: 20180325
version: 9.862.0.1074
detected: True check_circle

WhiteArmor
update: 20180324
detected: False cancel

BitDefender
result: Trojan.GenericKD.1774001
update: 20180325
version: 7.2
detected: True check_circle

CrowdStrike
result: malicious_confidence_90% (W)
update: 20170201
version: 1.0
detected: True check_circle

K7AntiVirus
result: Trojan-Downloader ( 0049eac71 )
update: 20180324
version: 10.42.26600
detected: True check_circle

SentinelOne
result: static engine - malicious
update: 20180225
version: 1.0.15.206
detected: True check_circle

Avast-Mobile
update: 20180324
version: 180324-00
detected: False cancel

Malwarebytes
result: Trojan.FakePDF.Email
update: 20180324
version: 2.1.1.1115
detected: True check_circle

TotalDefense
update: 20180324
version: 37.1.62.1
detected: False cancel

CAT-QuickHeal
result: Trojandownloader.Banloada
update: 20180324
version: 14.00
detected: True check_circle

NANO-Antivirus
result: Trojan.Script.Dwn.dnxnks
update: 20180325
version: 1.0.100.22043
detected: True check_circle

MicroWorld-eScan
result: Trojan.GenericKD.1774001
update: 20180324
version: 14.0.297.0
detected: True check_circle

SUPERAntiSpyware
update: 20180324
version: 5.6.0.1032
detected: False cancel

McAfee-GW-Edition
result: BehavesLike.Win32.Downloader.gc
update: 20180324
version: v2015
detected: True check_circle

TrendMicro-HouseCall
result: TROJ_OTOTI.VUD
update: 20180324
version: 9.950.0.1006
detected: True check_circle

total
66
sha256
210a4f7c392e0bfdc39380ce609a4b94b1ee6ae2f885c7e7785e820ac9194383
scan_id
210a4f7c392e0bfdc39380ce609a4b94b1ee6ae2f885c7e7785e820ac9194383-1521945340
resource
e7c6386a541aab4cbdcee962e8322fad
positives
47
scan_date
2018-03-25 02:35:40
verbose_msg
Scan finished, information embedded
response_code
1
File
Trace
13/3/2020 - 13:46:9.590Open1480C:\malware.exeC:\Secur32.dll
13/3/2020 - 13:46:9.590Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
13/3/2020 - 13:46:9.590Open1480C:\malware.exeC:\Windows\SysWOW64\secur32.dll
13/3/2020 - 13:46:9.590Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 13:46:9.590Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 13:46:9.590Open1480C:\malware.exeC:\api-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 13:46:9.590Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 13:46:9.590Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 13:46:9.590Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 13:46:9.590Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dllapi-ms-win-downlevel-advapi32-l2-1-0.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\winhttp.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\webio.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\IPHLPAPI.DLL
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\IPHLPAPI.DLL
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\WINNSI.DLL
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\winnsi.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\api-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dllapi-ms-win-downlevel-shlwapi-l2-1-0.dll
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Roaming\Microsoft\Windows\Cookies
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History
13/3/2020 - 13:46:9.637Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
13/3/2020 - 13:46:9.637Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\History\History.IE5
13/3/2020 - 13:46:9.700Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
13/3/2020 - 13:46:9.700Open1480C:\malware.exeC:\Windows\SysWOW64\mswsock.dll
13/3/2020 - 13:46:9.700Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
13/3/2020 - 13:46:9.700Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
13/3/2020 - 13:46:9.793Open1480C:\malware.exeC:\DNSAPI.dll
13/3/2020 - 13:46:9.793Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
13/3/2020 - 13:46:9.793Open1480C:\malware.exeC:\Windows\SysWOW64\dnsapi.dll
13/3/2020 - 13:46:9.934Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
13/3/2020 - 13:46:9.934Open1480C:\malware.exeC:\Windows\SysWOW64\netprofm.dll
13/3/2020 - 13:46:9.934Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
13/3/2020 - 13:46:9.934Open1480C:\malware.exeC:\Windows\SysWOW64\nlaapi.dll
13/3/2020 - 13:46:9.981Open1480C:\malware.exeC:\dhcpcsvc6.DLL
13/3/2020 - 13:46:9.981Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
13/3/2020 - 13:46:9.981Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
13/3/2020 - 13:46:9.981Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dll
13/3/2020 - 13:46:9.981Unknown1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc6.dlldhcpcsvc6.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\CRYPTSP.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\cryptsp.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\rsaenh.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\RpcRtRemote.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
13/3/2020 - 13:46:10.28Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dll
13/3/2020 - 13:46:10.28Unknown1480C:\malware.exeC:\Windows\SysWOW64\RpcRtRemote.dllRpcRtRemote.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\dhcpcsvc.DLL
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
13/3/2020 - 13:46:10.28Open1480C:\malware.exeC:\Windows\SysWOW64\dhcpcsvc.dll
13/3/2020 - 13:46:10.90Open1480C:\malware.exeC:\rasadhlp.dll
13/3/2020 - 13:46:10.90Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
13/3/2020 - 13:46:10.90Open1480C:\malware.exeC:\Windows\SysWOW64\rasadhlp.dll
13/3/2020 - 13:46:10.137Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
13/3/2020 - 13:46:10.137Open1480C:\malware.exeC:\Windows\SysWOW64\npmproxy.dll
13/3/2020 - 13:46:11.200Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
13/3/2020 - 13:46:11.200Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
13/3/2020 - 13:46:11.418Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
13/3/2020 - 13:46:11.418Open1480C:\malware.exeC:\Windows\SysWOW64\FWPUCLNT.DLL
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wininet.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\malware.exe.Local
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
13/3/2020 - 13:46:11.512Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\ws2_32.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\WSHTCPIP.DLL
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wship6.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
13/3/2020 - 13:46:11.512Open1480C:\malware.exeC:\Windows\SysWOW64\wshqos.dll
13/3/2020 - 13:46:12.28Open1480C:\malware.exeC:\Monitor
13/3/2020 - 13:46:12.28Unknown1480C:\malware.exeC:\Monitor
13/3/2020 - 13:46:12.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Temp\firefx.exe
13/3/2020 - 13:46:12.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Temp\firefx.exe.exe
13/3/2020 - 13:46:21.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Temp\firefx.exe
13/3/2020 - 13:46:21.28Open1480C:\malware.exeC:\Users\Behemot\AppData\Local\Temp
13/3/2020 - 13:46:21.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Temp
13/3/2020 - 13:46:21.28Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
13/3/2020 - 13:46:21.28Unknown1480C:\malware.exeC:\Windows
13/3/2020 - 13:46:21.28Unknown1480C:\malware.exeC:\Monitor
13/3/2020 - 13:46:21.28Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d
13/3/2020 - 13:46:21.28Unknown1480C:\malware.exeC:\Users\Behemot\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat
13/3/2020 - 13:46:21.28Unknown1480C:\malware.exeC:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d

Process
Trace

Analysis
Reason
Finished

Status
Sucessfully Executed

Results
1

Registry
Trace
13/3/2020 - 13:46:9.637Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnable
13/3/2020 - 13:46:9.637Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyServer
13/3/2020 - 13:46:9.637Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsProxyOverride
13/3/2020 - 13:46:9.637Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoConfigURL
13/3/2020 - 13:46:9.637Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet SettingsAutoDetect
13/3/2020 - 13:46:9.637Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ConnectionsSavedLegacySettings
13/3/2020 - 13:46:9.637Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\ContentCachePrefix
13/3/2020 - 13:46:9.637Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\CookiesCachePrefix
13/3/2020 - 13:46:9.637Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\HistoryCachePrefix
13/3/2020 - 13:46:10.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
13/3/2020 - 13:46:10.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
13/3/2020 - 13:46:10.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
13/3/2020 - 13:46:10.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
13/3/2020 - 13:46:10.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapProxyBypass
13/3/2020 - 13:46:10.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapIntranetName
13/3/2020 - 13:46:10.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapUNCAsIntranet
13/3/2020 - 13:46:10.28Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapAutoDetect
13/3/2020 - 13:46:10.137Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
13/3/2020 - 13:46:10.137Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
13/3/2020 - 13:46:10.137Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
13/3/2020 - 13:46:10.137Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionReason
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecisionTime
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDecision
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadNetworkName
13/3/2020 - 13:46:11.418Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D8C667F4-C62D-460A-82E2-EC8687C3DC60}WpadDetectedUrl
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
13/3/2020 - 13:46:11.418Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionReason
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecisionTime
13/3/2020 - 13:46:11.418Write1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDecision
13/3/2020 - 13:46:11.418Delete1480C:\malware.exeHKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-54-00-83-08-f3WpadDetectedUrl

File Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Process Summary
Created
Identified: False cancel

Deleted
Identified: False cancel

Registry Summary
Proxy
Identified: False cancel

AutoRun
Identified: False cancel

Created
Identified: True check_circle

Deleted
Identified: True check_circle

Browsers
Identified: False cancel

Internet
Identified: True check_circle

Loading...

DNS
Query
computer localhost arrow_forward computer gateway:50273 code www.satnett.co.uk.
computer localhost arrow_forward computer gateway:DNS code www.satnett.co.uk.

Response
computer gateway:DNS arrow_forward computer localhost code www.satnett.co.uk. reply_all 87.106.82.112


TCP
Info
87.106.82.112:80 arrow_forward computer localhost:65191
computer localhost:65191 arrow_forward 87.106.82.112:80

UDP
Info
computer localhost:53 arrow_forward computer localhost:50273
computer localhost:68 arrow_forward help_outline 255.255.255.255:67
computer localhost:67 arrow_forward computer localhost:68
computer localhost:50273 arrow_forward computer localhost:53

HTTP
Info
computer localhost send GET www.satnett.co.uk attach_file /languages/french/lang/firefx.exe

Summary
DNS
True check_circle

TCP
True check_circle

UDP
True check_circle

HTTP
True check_circle

Results
BINARY
KNN (K=3, NFS-BRMalware)
confidence: 66.67%
suspicious: False cancel

Decision Tree (NFS-BRMalware)
confidence: 100.00%
suspicious: True check_circle

SVC (Kernel=Linear, NFS-BRMalware)
confidence: 85.32%
suspicious: True check_circle

MalConv (Ember: Raw Bytes, Threshold=0.5)
confidence: 97.68%
suspicious: False cancel

Random Forest (100 estimators, NFS-BRMalware)
confidence: 63.00%
suspicious: True check_circle

Non-Negative MalConv (Ember: Raw Bytes, Threshold=0.35)
confidence: 68.26%
suspicious: True check_circle

LightGDM (Ember: File Characteristics, Threshold=0.8336)
confidence: 99.47%
suspicious: True check_circle

Add to Collection
Download