Analyzing...
|
File Name:   filedata
SHA1:   c596d3996b782414fa812a12d91ac6a23e393efd
MD5:   615ca56d988022b8a0d46a6865467413
First Seen Date:  2017-06-17 22:12:21.604456 ( )
Number of Clients Seen:   2
Last Analysis Date:  2017-06-17 22:12:21.604456 ( )
Human Expert Analysis Result:   No human expert analysis verdict given to this sample yet.
Analysis Summary
Analysis Type | Date | Verdict | |
---|---|---|---|
Signature Based Detection | 2018-11-04 06:48:13.835125 | Malware | |
Static Analysis Overall Verdict | 2017-06-17 22:12:21.604456 | No Threat Found | help |
Dynamic Analysis Overall Verdict | 2017-06-17 22:12:21.604456 | No Threat Found | help |
Precise Detectors Overall Verdict | 2017-06-17 22:12:21.604456 | No Match | help |
Static Analysis
Static Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Detector | Result | |
---|---|---|
Optional Header LoaderFlags field is valued illegal | Clean | |
Non-ascii or empty section names detected | Clean | |
Illegal size of optional Header | Clean | |
Packer detection on signature database | Unknown | help |
Based on the sections entropy check! file is possibly packed | Clean | |
Timestamp value suspicious | Suspicious | |
Header Checksum is zero! | Clean | |
Enrty point is outside the 1st(.code) section! Binary is possibly packed | Clean | |
Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
Anti-vm present | Clean | |
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Suspicious | |
TLS callback functions array detected | Clean |
Dynamic Analysis
Dynamic Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Suspicious Behaviors | |
---|---|
Opens a file in a system directory |
Behavioral Information
{"h_key": "80000001", "samDesired": "2001f", "Reserved": "0", "lpSecurityAttributes": "0", "lpdwDisposition": "18fdcc", "dwOptions": "1", "lpClass": "<NULL>", "phkResult": "18fde0", "lpSubKey": "Software\\Microsoft\\RestartManager\\Session0000"}
{"h_key": "80000001", "samDesired": "2001f", "Reserved": "0", "lpSecurityAttributes": "0", "lpdwDisposition": "18fdec", "dwOptions": "1", "lpClass": "<NULL>", "phkResult": "18fdf0", "lpSubKey": "Software\\Microsoft\\RestartManager\\Session0000"}
{"h_key": "80000001", "samDesired": "2001f", "Reserved": "0", "lpSecurityAttributes": "0", "lpdwDisposition": "18fdfc", "dwOptions": "1", "lpClass": "<NULL>", "phkResult": "18fe00", "lpSubKey": "Software\\Microsoft\\RestartManager\\Session0000"}
150
144
120
114
15c
14c
164
C:\Users\win7\AppData\Local\Temp\is-L0DTS.tmp\filedata.tmp
C:\Windows\syswow64\MSCTF.dll
C:\Windows\syswow64\USER32.dll
Plane4
Plane5
Plane6
Plane7
Plane1
Plane2
Plane3
Plane8
Plane9
WaitToKillServiceTimeout
RegisteredOrganization
CommonFilesDir
Disable
DataFilePath
Plane16
Plane14
Plane15
Plane12
Plane13
Plane10
Plane11
RegisteredOwner
ProgramFilesDir
{"Reserved": "0", "hKey": "150", "lpData": "2f38f8", "dwType": "3", "lpValueName": "SessionHash", "cbData": "20"}
{"Reserved": "0", "hKey": "14c", "lpData": "18fe28", "dwType": "4", "lpValueName": "Sequence", "cbData": "4"}
{"Reserved": "0", "hKey": "150", "lpData": "2f43e8", "dwType": "3", "lpValueName": "Owner", "cbData": "c"}
{"lDistanceToMove": "1366d9", "dwMoveMethod": "0", "lpDistanceToMoveHigh": "18fe84", "hFile": "114"}
{"lDistanceToMove": "0", "dwMoveMethod": "1", "lpDistanceToMoveHigh": "18fe80", "hFile": "114"}
{"lDistanceToMove": "138064", "dwMoveMethod": "0", "lpDistanceToMoveHigh": "18fe68", "hFile": "114"}
{"lDistanceToMove": "0", "dwMoveMethod": "1", "lpDistanceToMoveHigh": "18fe78", "hFile": "114"}
{"lDistanceToMove": "137e74", "dwMoveMethod": "0", "lpDistanceToMoveHigh": "18fe68", "hFile": "114"}
{"dwCreationDisposition": "3", "path": "C:\\filedata", "dwDesiredAccess": "80000000", "dwShareMode": "1"}
{"dwCreationDisposition": "2", "path": "C:\\Users\\win7\\AppData\\Local\\Temp\\is-HL653.tmp\\_isetup\\_setup64.tmp", "dwDesiredAccess": "c0000000", "dwShareMode": "0"}
{"dwCreationDisposition": "2", "path": "C:\\Users\\win7\\AppData\\Local\\Temp\\is-HL653.tmp\\_isetup\\_shfoldr.dll", "dwDesiredAccess": "c0000000", "dwShareMode": "0"}
{"dwCreationDisposition": "3", "path": "C:\\Windows\\Fonts\\staticcache.dat", "dwDesiredAccess": "80000000", "dwShareMode": "5"}
{"hKey": "164", "phkResult": "0", "lpSubKey": "Verdana"}
{"hKey": "80000002", "phkResult": "0", "lpSubKey": "Software\\Microsoft\\RestartManager"}
{"hKey": "80000002", "phkResult": "0", "lpSubKey": "Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Peni_is1"}
{"hKey": "80000002", "phkResult": "0", "lpSubKey": "System\\CurrentControlSet\\Control"}
{"hKey": "80000001", "phkResult": "0", "lpSubKey": "Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Peni_is1"}
{"hKey": "164", "phkResult": "0", "lpSubKey": "MS Sans Serif"}
{"hKey": "80000002", "phkResult": "0", "lpSubKey": "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontLink\\SystemLink"}
{"hKey": "80000002", "phkResult": "0", "lpSubKey": "Software\\Microsoft\\Windows\\CurrentVersion"}
{"hKey": "164", "phkResult": "0", "lpSubKey": "Tahoma"}
{"hKey": "80000002", "phkResult": "0", "lpSubKey": "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\DataStore_V1.0"}
{"hKey": "80000002", "phkResult": "0", "lpSubKey": "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\LanguagePack\\SurrogateFallback"}
{"hKey": "80000002", "phkResult": "0", "lpSubKey": "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion"}
Local\RstrMgr3887CAB8-533F-4C85-B0DC-3E5639F8D511
Local\RstrMgr-3887CAB8-533F-4C85-B0DC-3E5639F8D511-Session0000
<NULL>
Local\MSCTF.Asm.MutexDefault1
DefaultTabtip-MainUI
{"nNumberOfBytesToWrite": "5b10", "lpOverlapped": "0", "lpBuffer": "4b32c4", "lpNumberOfBytesWritten": "18fdc4", "hFile": "120"}
{"nNumberOfBytesToWrite": "1800", "lpOverlapped": "0", "lpBuffer": "4b1ac4", "lpNumberOfBytesWritten": "18fdbc", "hFile": "120"}
C:\Windows\system32\ole32.dll
C:\Windows\syswow64\MSCTF.dll
uxtheme.dll
shell32.dll
ADVAPI32.dll
ole32.dll
comctl32.dll
C:\Users\win7\AppData\Local\Temp\is-HL653.tmp\_isetup\_shfoldr.dll
shfolder.dll
Rstrtmgr.dll
C:\Windows\SysWOW64\bcryptprimitives.dll
UxTheme.dll
IMM32.dll
C:\Windows\system32\imageres.dll
C:\Windows\system32\shell32.dll
C:\Windows\system32\shlwapi.dll
OLEAUT32.DLL
Precise Detectors Analysis Results
Detector Name | Date | Verdict | Reason | |
---|---|---|---|---|
Uninstaller FP Detector | 2017-06-17 22:11:56.402607 | No Match | help | No match. |
Yara Rule Static Malware Detector | 2017-06-17 22:11:56.434413 | No Match | help | No match. |
Static Precise PUA Detector 1 | 2017-06-17 22:11:56.417219 | No Match | help | NotDetected |
Static Precise Virus Detector | 2017-06-17 22:11:56.442233 | No Match | help | NotDetected |
Static Precise Trojan Detector | 2017-06-17 22:11:56.433615 | No Match | help | NotDetected |
Static Precise PUA Detector 2 | 2017-06-17 22:11:56.435133 | No Match | help | No match. |
Static Precise PUA Detector 3 | 2017-06-17 22:11:56.432918 | No Match | help | No match. |
Static Precise Virus Detector 2 | 2017-06-17 22:11:56.431059 | No Match | help | No match. |
Static Precise Trojan Detector 2 | 2017-06-17 22:11:56.432116 | No Match | help | No match. |
Static Precise Trojan Detector 3 | 2017-06-17 22:11:56.419172 | No Match | help | No match. |
Malicious Url Detector | 2017-06-17 22:12:21.580299 | No Match | help | No match. |
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Additional File Information
Property | Value |
---|
Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
---|