|
Analyzing...
|
File Name:   4DUi5.exe
SHA1:   586712b64964d9be1aef27f01e5aa7e545012e3f
MD5:   794a556c1a98f70673a5ba3ed791382f
First Seen Date:  2016-12-28 17:41:12.461495 ( )
Number of Clients Seen:   4
Last Analysis Date:  2017-01-09 02:24:21.709887 ( )
Human Expert Analysis Date:  2017-01-09 01:47:47.693297 ( )Human Expert Analysis Result:   Malware
Analysis Summary
| Analysis Type | Date | Verdict | |
|---|---|---|---|
| Signature Based Detection | 2017-01-09 02:24:21.709887 | Malware | |
| Static Analysis Overall Verdict | 2017-01-09 02:24:21.709887 | Highly Suspicious | |
| Dynamic Analysis Overall Verdict | 2017-01-09 02:24:21.709887 | Highly Suspicious | |
| Human Expert Analysis Overall Verdict | 2017-01-09 01:47:47.693297 | Malware | |
Static Analysis
| Static Analysis Overall Verdict | Result |
|---|---|
| Highly Suspicious |
| Detector | Result | |
|---|---|---|
| Optional Header LoaderFlags field is valued illegal | Clean | |
| Non-ascii or empty section names detected | Clean | |
| Illegal size of optional Header | Clean | |
| Packer detection on signature database | Unknown | help |
| Based on the sections entropy check! file is possibly packed | Clean | |
| Timestamp value suspicious | Clean | |
| Header Checksum is zero! | Clean | |
| Enrty point is outside the 1st(.code) section! Binary is possibly packed | Clean | |
| Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
| Anti-vm present | Clean | |
| The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Suspicious | |
| TLS callback functions array detected | Clean | |
Dynamic Analysis
| Dynamic Analysis Overall Verdict | Result |
|---|---|
| Highly Suspicious |
| Suspicious Behaviors | |
|---|---|
| Injects code to another process | |
| Modifies context of another process | |
| Creates a child process | |
| Writes to address space of another process | |
| Uses a function clandestinely | |
| Reads memory of another process | |
| Opens a file in a system directory | |
| Has no visible windows | |
Behavioral Information
C:\Windows\system32\UXTHEME.dll
C:\Windows\system32\USERENV.dll
C:\Windows\system32\SETUPAPI.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
advapi32.dll
C:\Windows\system32\APPHELP.dll
C:\Windows\system32\PROPSYS.dll
ADVAPI32.dll
propsys.dll
C:\Windows\system32\DWMAPI.dll
C:\Windows\system32\CRYPTBASE.dll
C:\Windows\system32\OLEACC.dll
OLEACCRC.DLL
C:\Windows\system32\CLBCATQ.dll
C:\Windows\system32\SHFOLDER.dll
ole32.dll
comctl32.dll
SHELL32.dll
ntmarta.dll
C:\Users\win7\AppData\Local\Temp\nswA338.tmp\System.dll
CRYPTSP.dll
CRYPTBASE.dll
C:\
C:\Windows
C:\Users\win7\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
C:\Users\win7\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000008.db
C:\4DUi5.exe
C:\Users\win7\AppData\Local\Temp\nsbA2BA.tmp
C:\Users\win7\AppData\Local\Temp\pxl.gif
C:\Users\win7\AppData\Local\Temp\css_Ody3Rnnxl1jUn-gSkZfNONZA3PvWask0tHZzQnHYUIU.css
C:\Users\win7\AppData\Local\Temp\ico_twitter.gif
C:\Users\win7\AppData\Local\Temp\nav-global_company663523761.png
C:\Users\win7\AppData\Local\Temp\girls.pr
thjqualifications hjqualifications'C:\Users\win7\AppData\Local\Temphjqualifications\girls.pr'
t hjqualifications'C:\Users\win7\AppData\Local\Temphjqualifications\girls.pr'
t 'C:\Users\win7\AppData\Local\Temphjqualifications\girls.pr'
t 'C:\Users\win7\AppData\Local\Temp\girls.pr'
C:\Users\win7\AppData\Local\Temp\nswA338.tmp\System.dll
C:\Windows\SysWOW64\ntdll.dll
C:\Windows\system32\rsaenh.dll
<NULL>
"C:/4DUi5.exe"
C:\4DUi5.exe
C:\Users\win7\AppData\Local\Temp\nsmA2AA.tmp
C:\Users\win7\AppData\Local\Temp\nswA338.tmp
Precise Detectors Analysis Results
No Detector Result Received
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Human Expert Analysis Results
Analysis Start Date:   2017-01-09 01:42:16.754661 ( )
Analysis End Date:  2017-01-09 01:47:47.693297 ( )
File Upload Date:  2016-12-28 17:41:14.547325 ( )
Update Date:  2017-01-09 01:47:47.699428 ( )
Human Expert Analyst Feedback:   Trojan.Ransom
Verdict:   Malware
Malware Family:   Trojan.Ransom
Malware Type:   Trojan Generic
Additional File Information
| Property | Value |
|---|
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
|---|