Analyzing...
|
File Name:   2.exe
SHA1:   d56677b0c50350e73c7f910f8763468ee726a0b0
MD5:   526bbf279cb6ea1c7a8a6d1255d8cc88
First Seen Date:  2017-03-26 17:32:22.188946 ( )
Number of Clients Seen:   5
Last Analysis Date:  2017-03-26 17:32:22.188946 ( )
Human Expert Analysis Date:  2017-04-12 12:16:11.124734 ( )Human Expert Analysis Result:   Malware
Analysis Summary
Analysis Type | Date | Verdict | |
---|---|---|---|
Signature Based Detection | 2017-03-26 17:32:22.188946 | Malware | |
Static Analysis Overall Verdict | 2017-03-26 17:32:22.188946 | Highly Suspicious | |
Dynamic Analysis Overall Verdict | 2017-03-26 17:32:22.188946 | Highly Suspicious | |
Precise Detectors Overall Verdict | 2017-03-26 17:32:22.188946 | No Match | help |
Human Expert Analysis Overall Verdict | 2017-04-12 12:16:11.124734 | Malware |
Static Analysis
Static Analysis Overall Verdict | Result |
---|---|
Highly Suspicious |
Detector | Result | |
---|---|---|
Optional Header LoaderFlags field is valued illegal | Clean | |
Non-ascii or empty section names detected | Clean | |
Illegal size of optional Header | Clean | |
Packer detection on signature database | Unknown | help |
Based on the sections entropy check! file is possibly packed | Suspicious | |
Timestamp value suspicious | Clean | |
Header Checksum is zero! | Clean | |
Enrty point is outside the 1st(.code) section! Binary is possibly packed | Clean | |
Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
Anti-vm present | Clean | |
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Clean | |
TLS callback functions array detected | Clean |
Dynamic Analysis
Dynamic Analysis Overall Verdict | Result |
---|---|
Highly Suspicious |
Suspicious Behaviors | |
---|---|
Operation successfully finished. |
Behavioral Information
comctl32.dll
RASMONTR.DLL
C:\Windows\SysWOW64\odbcint.dll
MSVCRT.DLL
NSHWFP.DLL
DHCPCMONITOR.DLL
Dhcpcsvc.dll
Dhcpqec.dll
WSHELPER.DLL
NSHHTTP.DLL
FWCFG.DLL
AUTHFWCFG.DLL
IFMON.DLL
API-MS-Win-Core-LocalRegistry-L1-1-0.dll
NETIOHLP.DLL
WHHELPER.DLL
shlwapi.dll
urlmon.dll
user32.dll
version.dll
ws2_32.dll
CRYPTSP.dll
ADVAPI32.dll
CRYPTBASE.dll
CurrentBuildNumber
Upgrade
MachineGuid
C:\Windows\system32\rsaenh.dll
C:\[u2.exe]
C:\Users\win7\AppData\Local\Temp\c4b6765a\c53d.tmp
SOFTWARE\Microsoft\NetSh
SOFTWARE\Microsoft\BidInterface\Loader
SOFTWARE\ODBC\ODBC.INI\ODBC
SOFTWARE\Microsoft\Windows NT\CurrentVersion
System\Setup
SOFTWARE\Microsoft\Cryptography
RasPbFile
<NULL>
Global\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7
shell.{4859FB8B-3068-D0D3-16B3-A57A9572E3D5}
C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
C:\Windows\SysWOW64\ODBC32.dll
C:\Windows\system32\credui.dll
C:\Windows\SysWOW64\QUtil.dll
C:\Windows\SysWOW64\netsh.exe
C:\[u2.exe]
Precise Detectors Analysis Results
Detector Name | Date | Verdict | Reason | |
---|---|---|---|---|
Static Precise PUA Detector 1 | 2017-03-26 17:31:59.483313 | No Match | help | NotDetected |
Precise URL Detector | 2017-03-26 17:32:22.167668 | No Match | help | Can not found url connection in data |
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Human Expert Analysis Results
Analysis Start Date:   2017-03-26 18:54:51.099070 ( )
Analysis End Date:  2017-04-12 12:16:11.124734 ( )
File Upload Date:  2017-03-26 17:32:23.384946 ( )
Update Date:  2017-04-12 12:16:11.129875 ( )
Human Expert Analyst Feedback:   Malware
Verdict:   Malware
Malware Family:   TrojWare.Win32.Agent
Malware Type:   Trojan Generic
Additional File Information
Property | Value |
---|
Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
---|