Analyzing...
|
File Name:   hao123.1.0.0.1111.exe
SHA1:   0e79bd6410392c6085749e057d59cac119b365a8
MD5:   0bea12a5fe4b821a064db591dad69d59
First Seen Date:  2018-01-07 02:52:13.402301 ( )
Number of Clients Seen:   5
Last Analysis Date:  2018-01-07 02:52:13.402301 ( )
Human Expert Analysis Result:   No human expert analysis verdict given to this sample yet.
Analysis Summary
Analysis Type | Date | Verdict | |
---|---|---|---|
Signature Based Detection | 2018-01-07 02:52:13.402301 | Clean | |
Static Analysis Overall Verdict | 2018-01-07 02:52:13.402301 | No Threat Found | help |
Dynamic Analysis Overall Verdict | 2018-01-07 02:52:13.402301 | No Threat Found | help |
Precise Detectors Overall Verdict | 2018-01-07 02:52:13.402301 | No Match | help |
Static Analysis
Static Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Detector | Result | |
---|---|---|
Optional Header LoaderFlags field is valued illegal | Clean | |
Non-ascii or empty section names detected | Clean | |
Illegal size of optional Header | Clean | |
Packer detection on signature database | Unknown | help |
Based on the sections entropy check! file is possibly packed | Clean | |
Timestamp value suspicious | Clean | |
Header Checksum is zero! | Clean | |
Enrty point is outside the 1st(.code) section! Binary is possibly packed | Clean | |
Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
Anti-vm present | Suspicious | |
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Clean | |
TLS callback functions array detected | Clean |
Dynamic Analysis
Dynamic Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Suspicious Behaviors | |
---|---|
Injects code to another process | |
Creates a child process | |
Writes to address space of another process | |
Uses a function clandestinely | |
Logs user key strokes | |
Reads memory of another process | |
Modifies Windows policies | |
Opens a file in a system directory | |
Has no visible windows |
Behavioral Information
api-ms-win-downlevel-shell32-l1-1-0.dll
OLEACCRC.DLL
iphlpapi.dll
shell32.dll
ADVAPI32.dll
SHELL32.dll
ole32.dll
propsys.dll
comctl32.dll
ntmarta.dll
C:\Windows\system32\ExplorerFrame.dll
ntdll.dll
API-MS-Win-Security-LSALookup-L1-1-0.dll
CRYPTBASE.dll
SXS.DLL
PROPSYS.dll
OLEAUT32
OLEAUT32.dll
ntoskrnl.exe
urlmon.dll
mshtml.dll
shdocvw.dll
WINTRUST.DLL
C:\Windows\syswow64\CRYPT32.dll
CRYPTSP.dll
USER32.dll
bcrypt.dll
C:\Windows\SysWOW64\bcryptprimitives.dll
API-MS-Win-Security-SDDL-L1-1-0.dll
API-MS-WIN-Service-Management-L1-1-0.dll
API-MS-WIN-Service-winsvc-L1-1-0.dll
imagehlp.dll
ncrypt.dll
USERENV.dll
cryptnet.dll
C:\Windows\system32\cryptnet.dll
SensApi.dll
profapi.dll
SHLWAPI.dll
Secur32.dll
api-ms-win-downlevel-advapi32-l2-1-0.dll
api-ms-win-downlevel-ole32-l1-1-0.dll
WS2_32.dll
winhttp.dll
IPHLPAPI.DLL
api-ms-win-downlevel-shlwapi-l2-1-0.dll
DNSAPI.dll
dhcpcsvc.DLL
http
"C:\Program Files\Internet Explorer\IEXPLORE.EXE"
C:\Windows\SysWOW64\ieframe.dll
C:\Windows\SysWOW64\stdole2.tlb
\\.\C:
C:\hao123.1.0.0.1111.exe
C:\Users\win7\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D47DBD2F9E3365FBBE008D71FB06716F_D33192D58AA9CA2B9097E848E9FE86DE
C:\Users\win7\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D47DBD2F9E3365FBBE008D71FB06716F_A181C5603FD5980A35CF32BD209BBF4F
C:\Users\win7\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\60E31627FDA0A46932B0E5948949F2A5
C:\Users\win7\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6
C:\Users\win7\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6
<NULL>
C:\hao123.1.0.0.1111.exe
C:\Windows\syswow64\CRYPT32.dll
C:\Windows\system32\cryptnet.dll
\REGISTRY\MACHINE\SOFTWARE\Classes\http\shell
\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
\REGISTRY\MACHINE\SOFTWARE\Policies
\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Micro
\REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command
\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft
\REGISTRY\MACHINE\SOFTWARE\Wow6432Node
\REGISTRY\USER\S-1-5-21-3979321414-2393373014-21
\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights
\REGISTRY\USER\S-1-5-21-3979321414-2393373014-2172761192-100
Precise Detectors Analysis Results
Detector Name | Date | Verdict | Reason | |
---|---|---|---|---|
Static Precise PUA Detector 1 | 2018-01-07 02:52:08.484753 | No Match | help | NotDetected |
Static Precise Virus Detector | 2018-01-07 02:52:08.379988 | No Match | help | NotDetected |
Static Precise Trojan Detector | 2018-01-07 02:52:08.408223 | No Match | help | NotDetected |
Static Precise Adware InstallCore Detector 1 | 2018-01-07 02:52:08.414617 | No Match | help | NotDetected |
Static Precise Trojan Detector 2 | 2018-01-07 02:52:08.413138 | No Match | help | NotDetected |
Static Precise Trojan Detector 3 | 2018-01-07 02:52:08.407224 | No Match | help | NotDetected |
Static Precise Trojan Generic Cryptor Detector 1 | 2018-01-07 02:52:08.404708 | No Match | help | NotDetected |
Static Precise Virus Detector 2 | 2018-01-07 02:52:08.416132 | No Match | help | NotDetected |
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Additional File Information
Property | Value |
---|
Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
---|