Analyzing...
|
File Name:   Vk.com.exe
SHA1:   272af238c90d9d9641cda6b61befd6f95e41be79
MD5:   f1944d516a153fbbc594f11a7ecdd825
First Seen Date:  2015-10-12 13:19:32.678000 ( )
Number of Clients Seen:   9
Last Analysis Date:  2017-05-09 09:07:35.356973 ( )
Human Expert Analysis Date:  2016-01-20 23:21:47.150890 ( )Human Expert Analysis Result:   Malware
Analysis Summary
Analysis Type | Date | Verdict | |
---|---|---|---|
Signature Based Detection | 2017-05-09 09:07:35.356973 | Malware | |
Static Analysis Overall Verdict | 2017-05-09 09:07:35.356973 | No Threat Found | help |
Dynamic Analysis Overall Verdict | 2017-05-09 09:07:35.356973 | No Threat Found | help |
Precise Detectors Overall Verdict | 2017-05-09 09:07:35.356973 | No Match | help |
Human Expert Analysis Overall Verdict | 2016-01-20 23:21:47.150890 | Malware |
Static Analysis
Static Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Detector | Result | |
---|---|---|
Optional Header LoaderFlags field is valued illegal | Clean | |
Non-ascii or empty section names detected | Clean | |
Illegal size of optional Header | Clean | |
Packer detection on signature database | Unknown | help |
Based on the sections entropy check! file is possibly packed | Suspicious | |
Timestamp value suspicious | Clean | |
Header Checksum is zero! | Suspicious | |
Enrty point is outside the 1st(.code) section! Binary is possibly packed | Suspicious | |
Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
Anti-vm present | Clean | |
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Clean | |
TLS callback functions array detected | Clean |
Dynamic Analysis
Dynamic Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Suspicious Behaviors | |
---|---|
Creates a child process | |
Uses a function clandestinely | |
Reads memory of another process | |
Opens a file in a system directory | |
Has no visible windows |
Behavioral Information
Local\MSCTF.Asm.MutexDefault1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\DUser.dll
C:\[uVk.com.exe]
C:\Windows\SysWOW64\ieframe.dll
C:\Windows\syswow64\shlwapi.DLL
C:\Windows\syswow64\MSCTF.dll
C:\Windows\syswow64\USER32.dll
CreateUriCacheSize
EnablePunycode
FrameTabWindow
FrameMerging
SessionMerging
AdminTabProcs
TabProcGrowth
ShortcutBehavior
Disable
DataFilePath
Plane1
Plane2
Plane3
Plane4
Plane5
Plane6
Plane7
Plane8
Plane9
Plane10
Plane11
Plane12
Plane13
Plane14
Plane15
Plane16
C:\Users\win7\AppData\Local\Temp\E903.tmp\Vk.com.bat
\??\C:\Windows\SysWOW64\ieframe.dll
http://www.kproxyserver.com/
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\Fonts\staticcache.dat
http://aradero.ru/1
http://fastbuh.ru/2
http://recker.ru/3
http://arendadorogo.ru/2
http://serqus.ru/2
autoexec.bat
Kproxyserver.url
Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Microsoft\Windows\CurrentVersion\Internet Settings
Software\Policies\Microsoft\Internet Explorer\Main\FeatureControl
Software\Microsoft\Internet Explorer\Main\FeatureControl
FEATURE_ALLOW_REVERSE_SOLIDUS_IN_USERINFO_KB932562
Software\Microsoft\Internet Explorer\Main
Software\Policies\Microsoft\Internet Explorer\Main
Software\Policies\Microsoft\Internet Explorer\TabbedBrowsing
Software\Microsoft\Internet Explorer\TabbedBrowsing
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLink
SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0
SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback
Tahoma
<NULL>
"C:\Program Files\Internet Explorer\iexplore.exe" http://www.kproxyserver.com/
"C:\Program Files\Internet Explorer\iexplore.exe" http://aradero.ru/1
"C:\Program Files\Internet Explorer\iexplore.exe" http://fastbuh.ru/2
"C:\Program Files\Internet Explorer\iexplore.exe" http://recker.ru/3
"C:\Program Files\Internet Explorer\iexplore.exe" http://arendadorogo.ru/2
"C:\Program Files\Internet Explorer\iexplore.exe" http://serqus.ru/2
ADVAPI32.dll
SHELL32.dll
comctl32.dll
ole32.dll
propsys.dll
C:\Windows\SysWOW64\ieframe.dll
kernel32.dll
api-ms-win-downlevel-ole32-l1-1-0.dll
urlmon.dll
api-ms-win-downlevel-shlwapi-l2-1-0.dll
PROPSYS.dll
OLEAUT32.dll
iertutil.dll
USER32.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
ntdll.dll
DUser.dll
C:\Windows\SysWOW64\DUser.dll
user32.dll
UxTheme.dll
dwmapi.dll
C:\Windows\system32\xmllite.dll
imageres.dll
C:\Windows\system32\ole32.dll
C:\Windows\syswow64\MSCTF.dll
OLEAUT32.DLL
Kproxyserver.url
C:\Users\win7\AppData\Local\Temp\E903.tmp\Vk.com.bat
C:\Users\win7\AppData\Local\Temp\E914.tmp
ShellExecuteExW
IsDebuggerPresent
Precise Detectors Analysis Results
Detector Name | Date | Verdict | Reason | |
---|---|---|---|---|
Uninstaller FP Detector | 2017-05-09 09:10:41.735995 | No Match | help | No match. |
Yara Rule Static Malware Detector | 2017-05-09 09:10:41.733891 | No Match | help | No match. |
Static Precise PUA Detector 1 | 2017-05-09 09:10:41.730842 | No Match | help | NotDetected |
Static Precise Virus Detector | 2017-05-09 09:10:41.732071 | No Match | help | NotDetected |
Static Precise Trojan Detector | 2017-05-09 09:10:41.733156 | No Match | help | NotDetected |
Malicious Url Detector | 2017-05-09 09:11:24.623082 | No Match | help | No match. |
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Human Expert Analysis Results
Analysis Start Date:   2016-01-20 22:55:52.054086 ( )
Analysis End Date:  2016-01-20 23:21:47.150890 ( )
File Upload Date:  2016-01-20 20:33:26.541156 ( )
Update Date:  2016-01-20 23:21:47.150894 ( )
Human Expert Analyst Feedback:   Trojan/Startpage
Verdict:   Malware
Additional File Information
Property | Value |
---|
Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
---|