Analyzing...
|
File Name:   None
SHA1:   3e2b1deff52c9cc532a9bb044944789d5d4863ac
MD5:   None
First Seen Date:  2017-12-09 02:53:47.032502 ( )
Number of Clients Seen:   4
Last Analysis Date:  2017-12-09 02:53:47.032502 ( )
Human Expert Analysis Date:  2017-12-20 12:53:27.858868 ( )Human Expert Analysis Result:   PUA
Analysis Summary
Analysis Type | Date | Verdict | |
---|---|---|---|
Signature Based Detection | 2017-12-09 02:53:47.032502 | PUA | |
Static Analysis Overall Verdict | 2017-12-09 02:53:47.032502 | No Threat Found | help |
Precise Detectors Overall Verdict | 2017-12-09 02:53:47.032502 | No Match | help |
Human Expert Analysis Overall Verdict | 2017-12-20 12:53:27.858868 | PUA |
Static Analysis
Static Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Detector | Result | |
---|---|---|
Optional Header LoaderFlags field is valued illegal | Clean | |
Non-ascii or empty section names detected | Clean | |
Illegal size of optional Header | Clean | |
Packer detection on signature database | Unknown | help |
Based on the sections entropy check! file is possibly packed | Clean | |
Timestamp value suspicious | Suspicious | |
Header Checksum is zero! | Clean | |
Enrty point is outside the 1st(.code) section! Binary is possibly packed | Suspicious | |
Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
Anti-vm present | Clean | |
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Suspicious | |
TLS callback functions array detected | Clean |
Packer detection on signature database
Microsoft Visual Basic v5.0/v6.0
Dynamic Analysis
Dynamic Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Suspicious Behaviors | |
---|---|
Opens a file in a system directory | |
Has no visible windows |
Behavioral Information
shell32.dll
ADVAPI32.dll
comctl32.dll
UxTheme.dll
imageres.dll
C:\Windows\system32\ole32.dll
C:\Windows\syswow64\MSCTF.dll
OLEAUT32.DLL
C:\Windows\Fonts\staticcache.dat
C:\Users\win7\AppData\Local\Temp\is-K9MRO.tmp\None.tmp
Local\MSCTF.Asm.MutexDefault1
C:\Users\win7\AppData\Local\Temp\is-K9MRO.tmp\None.tmp
C:\Windows\syswow64\USER32.dll
C:\Windows\syswow64\MSCTF.dll
HKEY_LOCAL_MACHINESOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback
HKEY_LOCAL_MACHINESOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0
HKEY_LOCAL_MACHINESOFTWARE\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLink
Precise Detectors Analysis Results
Detector Name | Date | Verdict | Reason | |
---|---|---|---|---|
Static Precise PUA Detector 1 | 2017-12-09 02:53:31.569018 | No Match | help | NotDetected |
Static Precise Virus Detector | 2017-12-09 02:53:31.569721 | No Match | help | NotDetected |
Static Precise Trojan Detector | 2017-12-09 02:53:31.594959 | No Match | help | NotDetected |
Static Precise Adware InstallCore Detector 1 | 2017-12-09 02:53:31.594665 | No Match | help | NotDetected |
Static Precise Trojan Detector 2 | 2017-12-09 02:53:31.607044 | No Match | help | NotDetected |
Static Precise Trojan Detector 3 | 2017-12-09 02:53:31.595245 | No Match | help | NotDetected |
Static Precise Trojan Generic Cryptor Detector 1 | 2017-12-09 02:53:31.606199 | No Match | help | NotDetected |
Static Precise Virus Detector 2 | 2017-12-09 02:53:31.595386 | No Match | help | NotDetected |
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Human Expert Analysis Results
Analysis Start Date:   2017-12-19 12:37:31.006129 ( )
Analysis End Date:  2017-12-20 12:53:27.858868 ( )
File Upload Date:  2017-12-19 08:48:00.197525 ( )
Update Date:  2017-12-20 12:53:27.865246 ( )
Human Expert Analyst Feedback:  
Verdict:   PUA
Malware Family:  
Malware Type:   0
Additional File Information
Property | Value |
---|
Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
---|