|
Analyzing...
|
File Name:   DesktopLayer.exe
SHA1:   b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
MD5:   ff5e1f27193ce51eec318714ef038bef
First Seen Date:  2016-03-04 04:08:20.349353 ( )
Number of Clients Seen:   70
Last Analysis Date:  2020-10-06 19:07:11.071304 ( )
Human Expert Analysis Date:  2019-04-10 13:46:29.315601 ( )Human Expert Analysis Result:   Malware
Analysis Summary
| Analysis Type | Date | Verdict | |
|---|---|---|---|
| Signature Based Detection | 2020-10-05 04:01:23.503868 | Malware | |
| Static Analysis Overall Verdict | 2020-10-05 04:01:30.186025 | No Threat Found | help |
| Dynamic Analysis Overall Verdict | 2020-10-06 19:07:11.071304 | No Threat Found | help |
| Precise Detectors Overall Verdict | 2020-10-06 19:07:11.071304 | No Match | help |
| Human Expert Analysis Overall Verdict | 2019-04-10 13:46:29.315601 | Malware | |
Static Analysis
| Static Analysis Overall Verdict | Result |
|---|---|
| No Threat Found | help |
| Detector | Result | |
|---|---|---|
| Optional Header LoaderFlags field is valued illegal | Clean | |
| Non-ascii or empty section names detected | Clean | |
| Illegal size of optional Header | Clean | |
| Packer detection on signature database | Unknown | help |
| Based on the sections entropy check! file is possibly packed | Suspicious | |
| Timestamp value suspicious | Clean | |
| Header Checksum is zero! | Suspicious | |
| Enrty point is outside the 1st(.code) section! Binary is possibly packed | Suspicious | |
| Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
| Anti-vm present | Clean | |
| The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Clean | |
| TLS callback functions array detected | Clean | |
Packer detection on signature database
UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
Dynamic Analysis
| Dynamic Analysis Overall Verdict | Result |
|---|---|
| No Threat Found | help |
| Suspicious Behaviors | |
|---|---|
| Creates a child process | |
| Writes to address space of another process | |
| Uses a function clandestinely | |
| Reads memory of another process | |
| Has no visible windows | |
Behavioral Information
KyUffThOkYwRRtgPP
KERNEL32.DLL
SHELL32.DLL
USER32.DLL
advapi32.dll
-33363537-
ReadProcessMemory
WriteProcessMemory
CreateProcessA
ShellExecuteExW
C:\Program Files\Internet Explorer\iexplore.exe
Precise Detectors Analysis Results
| Detector Name | Date | Verdict | Reason | |
|---|---|---|---|---|
| Static Precise PUA Detector 1 | 2020-10-06 19:07:08.009455 | No Match | help | NotDetected |
| Static Precise PUA Detector 4 | 2020-10-06 19:07:08.050645 | No Match | help | NotDetected |
| Static Precise NI Detector 3 | 2020-10-06 19:07:08.089733 | No Match | help | NotDetected |
| Static Precise PUA Detector 5 | 2020-10-06 19:07:08.102577 | No Match | help | NotDetected |
| Static Precise Trojan Detector 1 | 2020-10-06 19:07:08.105232 | No Match | help | NotDetected |
| Static Precise Trojan Detector 3 | 2020-10-06 19:07:08.105180 | No Match | help | NotDetected |
| Static Precise PUA Detector 6 | 2020-10-06 19:07:08.122692 | No Match | help | NotDetected |
| Static Precise Trojan Detector 12 | 2020-10-06 19:07:08.132405 | No Match | help | NotDetected |
| Static Precise Virus Detector 1 | 2020-10-06 19:07:08.190362 | No Match | help | NotDetected |
| Static Precise Virus Detector 2 | 2020-10-06 19:07:08.204317 | No Match | help | NotDetected |
| Static Precise Trojan Detector 13 | 2020-10-06 19:07:08.216249 | No Match | help | NotDetected |
| Static Precise PUA Detector 2 | 2020-10-06 19:07:08.225986 | No Match | help | NotDetected |
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Human Expert Analysis Results
Analysis Start Date:   2019-04-10 10:07:36.288534 ( )
Analysis End Date:  2019-04-10 13:46:29.315601 ( )
File Upload Date:  2019-04-10 07:26:30.649078 ( )
Update Date:  2019-04-10 13:58:48.602200 ( )
Human Expert Analyst Feedback:  
Verdict:   Malware
Malware Family:  
Malware Type:   0
Additional File Information
| Property | Value |
|---|
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
|---|