Analyzing...
|
File Name:   pestudio.exe
SHA1:   58a0c1b9b119fe996450d1be3e95740bd4b1e0b5
MD5:   acc0312fc392b170498facbd64c2f925
First Seen Date:  2017-04-25 06:22:49.569739 ( )
Number of Clients Seen:   3
Last Analysis Date:  2017-04-25 06:22:49.569739 ( )
Human Expert Analysis Result:   No human expert analysis verdict given to this sample yet.
Analysis Summary
Analysis Type | Date | Verdict | |
---|---|---|---|
Signature Based Detection | 2017-04-25 06:22:49.569739 | Clean | |
Static Analysis Overall Verdict | 2017-04-25 06:22:49.569739 | No Threat Found | help |
Dynamic Analysis Overall Verdict | 2017-04-25 06:22:49.569739 | No Threat Found | help |
Precise Detectors Overall Verdict | 2017-04-25 06:22:49.569739 | No Match | help |
Static Analysis
Static Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Detector | Result | |
---|---|---|
Optional Header LoaderFlags field is valued illegal | Clean | |
Non-ascii or empty section names detected | Clean | |
Illegal size of optional Header | Clean | |
Packer detection on signature database | Unknown | help |
Based on the sections entropy check! file is possibly packed | Clean | |
Timestamp value suspicious | Clean | |
Header Checksum is zero! | Clean | |
Enrty point is outside the 1st(.code) section! Binary is possibly packed | Clean | |
Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
Anti-vm present | Suspicious | |
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Clean | |
TLS callback functions array detected | Clean |
Dynamic Analysis
Dynamic Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Suspicious Behaviors | |
---|---|
Modifies Windows policies | |
Opens a file in a system directory | |
Uses a function clandestinely |
Behavioral Information
C:\pestudio.exe
C:\Windows\syswow64\USER32.dll
C:\Windows\syswow64\MSCTF.dll
NoRun
NoDrives
RestrictRun
NoNetConnectDisconnect
NoRecentDocsHistory
NoClose
Disable
DataFilePath
Plane1
Plane2
Plane3
Plane4
Plane5
Plane6
Plane7
Plane8
Plane9
Plane10
Plane11
Plane12
Plane13
Plane14
Plane15
Plane16
C:\Windows\Fonts\staticcache.dat
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Software\Microsoft\Windows\CurrentVersion\Policies\Network
Software\Microsoft\Windows\CurrentVersion\Policies\Comdlg32
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLink
SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0
SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback
Tahoma
Local\MSCTF.Asm.MutexDefault1
kernel32
shell32
user32
peparser
UxTheme.dll
comctl32.dll
IMM32.dll
ADVAPI32.dll
C:\Windows\system32\ole32.dll
ShellExecuteW
Precise Detectors Analysis Results
Detector Name | Date | Verdict | Reason | |
---|---|---|---|---|
Uninstaller FP Detector | 2017-04-25 06:22:50.146087 | No Match | help | No match. |
Yara Rule Static Malware Detector | 2017-04-25 06:22:50.138800 | No Match | help | No match. |
Static Precise PUA Detector 1 | 2017-04-25 06:22:50.149782 | No Match | help | NotDetected |
Static Precise Virus Detector | 2017-04-25 06:22:50.150476 | No Match | help | NotDetected |
Static Precise Trojan Detector | 2017-04-25 06:22:50.153066 | No Match | help | NotDetected |
Malicious Url Detector | 2017-04-25 06:23:13.399711 | No Match | help | No match. |
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Additional File Information
Property | Value |
---|
Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
---|