Analyzing...
|
File Name:   fee4143866c153a465d7d83b231b3e51.dat
SHA1:   67f5975c42cfd0fb0cbedc3bb67174c2c0172ed9
MD5:   40d4df6b69297cddac0326ce5d882eb1
First Seen Date:  2017-01-14 15:49:10.554584 ( )
Number of Clients Seen:   4
Last Analysis Date:  2017-01-14 15:49:10.554584 ( )
Human Expert Analysis Date:  2017-01-22 12:42:29.459420 ( )Human Expert Analysis Result:   Malware
Analysis Summary
Analysis Type | Date | Verdict | |
---|---|---|---|
Signature Based Detection | 2017-01-14 15:49:10.554584 | Malware | |
Static Analysis Overall Verdict | 2017-01-14 15:49:10.554584 | Highly Suspicious | |
Dynamic Analysis Overall Verdict | 2017-01-14 15:49:10.554584 | Highly Suspicious | |
Human Expert Analysis Overall Verdict | 2017-01-22 12:42:29.459420 | Malware |
Static Analysis
Static Analysis Overall Verdict | Result |
---|---|
Highly Suspicious |
Detector | Result | |
---|---|---|
Optional Header LoaderFlags field is valued illegal | Clean | |
Non-ascii or empty section names detected | Clean | |
Illegal size of optional Header | Clean | |
Packer detection on signature database | Unknown | help |
Based on the sections entropy check! file is possibly packed | Clean | |
Timestamp value suspicious | Clean | |
Header Checksum is zero! | Suspicious | |
Enrty point is outside the 1st(.code) section! Binary is possibly packed | Clean | |
Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
Anti-vm present | Clean | |
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Suspicious | |
TLS callback functions array detected | Clean |
Dynamic Analysis
Dynamic Analysis Overall Verdict | Result |
---|---|
Highly Suspicious |
Suspicious Behaviors | |
---|---|
Opens a file in a system directory | |
Has no visible windows |
Behavioral Information
C:\fee4143866c153a465d7d83b231b3e51.dat
C:\
C:\Windows
C:\Users\win7\AppData\Local\Microsoft\Windows\Caches\cversions.1.db
C:\Users\win7\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000008.db
C:\fee4143866c153a465d7d83b231b3e51.dat
C:\Users\win7\AppData\Local\Temp\apple-touch-icon-128x128.png
C:\Users\win7\AppData\Local\Temp\hip_reload.png
C:\Users\win7\AppData\Local\Temp\apple-touch-icon-120x120.png
C:\Users\win7\AppData\Local\Temp\feed
C:\Users\win7\AppData\Local\Temp\wait_animation.gif
C:\Users\win7\AppData\Local\Temp\apple-touch-icon.png
C:\Users\win7\AppData\Local\Temp\iPPPvdAt6d
C:\Users\win7\AppData\Local\Temp\o7KjDEh72.OLBQGD0AFmfCj
t 'C:\Users\win7\AppData\Local\Temp\o7KjDEh72.OLBQGD0AFmfCj'
C:\Users\win7\AppData\Local\Temp\nsc6A25.tmp\System.dll
C:\Windows\system32\UXTHEME.dll
C:\Windows\system32\USERENV.dll
C:\Windows\system32\SETUPAPI.dll
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
advapi32.dll
C:\Windows\system32\APPHELP.dll
C:\Windows\system32\PROPSYS.dll
ADVAPI32.dll
propsys.dll
C:\Windows\system32\DWMAPI.dll
C:\Windows\system32\CRYPTBASE.dll
C:\Windows\system32\OLEACC.dll
OLEACCRC.DLL
C:\Windows\system32\CLBCATQ.dll
C:\Windows\system32\SHFOLDER.dll
ole32.dll
comctl32.dll
SHELL32.dll
ntmarta.dll
C:\Users\win7\AppData\Local\Temp\nsc6A25.tmp\System.dll
<NULL>
C:\Users\win7\AppData\Local\Temp\nss69E6.tmp
C:\Users\win7\AppData\Local\Temp\nsc6A25.tmp
Precise Detectors Analysis Results
No Detector Result Received
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Human Expert Analysis Results
Analysis Start Date:   2017-01-22 10:41:23.973572 ( )
Analysis End Date:  2017-01-22 12:42:29.459420 ( )
File Upload Date:  2017-01-14 15:49:10.701653 ( )
Update Date:  2017-01-22 12:42:29.466078 ( )
Human Expert Analyst Feedback:   Malware
Verdict:   Malware
Malware Family:   Trojware.Win32.Injector
Malware Type:   Trojan Generic
Additional File Information
Property | Value |
---|
Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
---|