|
Analyzing...
|
File Name:   Universal.exe
SHA1:   51d010300332d5cca70a023994e06e399f15bb31
MD5:   ee400b3d5f9803cc595ac1162d02c825
First Seen Date:  2017-01-14 22:51:27.905011 ( )
Number of Clients Seen:   4
Last Analysis Date:  2017-01-14 22:51:27.905011 ( )
Human Expert Analysis Date:  2017-01-27 10:32:35.541933 ( )Human Expert Analysis Result:   PUA
Analysis Summary
| Analysis Type | Date | Verdict | |
|---|---|---|---|
| Signature Based Detection | 2017-01-14 22:51:27.905011 | Malware | |
| Static Analysis Overall Verdict | 2017-01-14 22:51:27.905011 | Highly Suspicious | |
| Dynamic Analysis Overall Verdict | 2017-01-14 22:51:27.905011 | No Threat Found | help |
| Human Expert Analysis Overall Verdict | 2017-01-27 10:32:35.541933 | PUA | |
Static Analysis
| Static Analysis Overall Verdict | Result |
|---|---|
| Highly Suspicious |
| Detector | Result | |
|---|---|---|
| Optional Header LoaderFlags field is valued illegal | Clean | |
| Non-ascii or empty section names detected | Clean | |
| Illegal size of optional Header | Clean | |
| Packer detection on signature database | Unknown | help |
| Based on the sections entropy check! file is possibly packed | Suspicious | |
| Timestamp value suspicious | Clean | |
| Header Checksum is zero! | Suspicious | |
| Enrty point is outside the 1st(.code) section! Binary is possibly packed | Suspicious | |
| Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
| Anti-vm present | Clean | |
| The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Suspicious | |
| TLS callback functions array detected | Clean | |
Dynamic Analysis
| Dynamic Analysis Overall Verdict | Result |
|---|---|
| No Threat Found | help |
| Suspicious Behaviors | |
|---|---|
| Opens a file in a system directory | |
| Writes to address space of another process | |
| Has no visible windows | |
Behavioral Information
C:\Universal.exe
C:\Windows\syswow64\USER32.dll
C:\Windows\syswow64\MSCTF.dll
Disable
DataFilePath
Plane1
Plane2
Plane3
Plane4
Plane5
Plane6
Plane7
Plane8
Plane9
Plane10
Plane11
Plane12
Plane13
Plane14
Plane15
Plane16
C:\
C:\Windows\Fonts\staticcache.dat
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLink
SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0
SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback
Tahoma
Local\MSCTF.Asm.MutexDefault1
catch1.dll
ADVAPI32.dll
comctl32.dll
UxTheme.dll
imageres.dll
C:\Windows\system32\ole32.dll
C:\Windows\syswow64\MSCTF.dll
OLEAUT32.DLL
Precise Detectors Analysis Results
No Detector Result Received
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Human Expert Analysis Results
Analysis Start Date:   2017-01-27 07:52:52.124930 ( )
Analysis End Date:  2017-01-27 10:32:35.541933 ( )
File Upload Date:  2017-01-14 22:51:28.056165 ( )
Update Date:  2017-01-27 10:32:35.547097 ( )
Human Expert Analyst Feedback:   Gamehack
Verdict:   PUA
Malware Family:   Application.Win32.Agent
Malware Type:   Virus
Additional File Information
| Property | Value |
|---|
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
|---|