Analyzing...
|
File Name:   FreeTorrentDownload.exe
SHA1:   f9efdd9bb6aabc39f55aa3c2e1d527e28874cdde
MD5:   50dd8546845de0150128744eefdb2921
First Seen Date:  2016-02-07 19:59:15.414300 ( )
Number of Clients Seen:   9
Last Analysis Date:  2017-01-09 11:27:56.950980 ( )
Human Expert Analysis Date:  2016-02-08 09:00:31.124180 ( )Human Expert Analysis Result:   PUA
Analysis Summary
Analysis Type | Date | Verdict | |
---|---|---|---|
Signature Based Detection | 2017-01-09 11:27:56.950980 | Malware | |
Static Analysis Overall Verdict | 2017-01-09 11:27:56.950980 | Highly Suspicious | |
Dynamic Analysis Overall Verdict | 2017-01-09 11:27:56.950980 | No Threat Found | help |
Human Expert Analysis Overall Verdict | 2016-02-08 09:00:31.124180 | PUA |
Static Analysis
Static Analysis Overall Verdict | Result |
---|---|
Highly Suspicious |
Detector | Result | |
---|---|---|
Optional Header LoaderFlags field is valued illegal | Clean | |
Non-ascii or empty section names detected | Clean | |
Illegal size of optional Header | Clean | |
Packer detection on signature database | Unknown | help |
Based on the sections entropy check! file is possibly packed | Clean | |
Timestamp value suspicious | Clean | |
Header Checksum is zero! | Clean | |
Enrty point is outside the 1st(.code) section! Binary is possibly packed | Suspicious | |
Optional Header NumberOfRvaAndSizes field is valued illegal | Clean | |
Anti-vm present | Clean | |
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger | Clean | |
TLS callback functions array detected | Clean |
Dynamic Analysis
Dynamic Analysis Overall Verdict | Result |
---|---|
No Threat Found | help |
Suspicious Behaviors | |
---|---|
Opens a file in a system directory |
Behavioral Information
C:\Users\win7\AppData\Local\Temp\is-DSRME.tmp\FreeTorrentDownload.tmp
C:\Windows\syswow64\MSCTF.dll
C:\Windows\syswow64\USER32.dll
reeTorrentDownload
reetorrentdownload
MS Shell Dlg 2
Disable
DataFilePath
Plane1
Plane2
Plane3
Plane4
Plane5
Plane6
Plane7
Plane8
Plane9
Plane10
Plane11
Plane12
Plane13
Plane14
Plane15
Plane16
C:\FreeTorrentDownload.exe
C:\Users\win7\AppData\Local\Temp\Setup Log 2017-01-09 #001.txt
C:\Windows\Fonts\staticcache.dat
Software\CodeGear\Locales
Software\Borland\Locales
Software\Borland\Delphi\Locales
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes
System\CurrentControlSet\Control\Keyboard Layouts\041F0409
System\CurrentControlSet\Control\Keyboard Layouts\04090409
SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontLink\SystemLink
SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\DataStore_V1.0
SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback
Tahoma
Software\Microsoft\Windows\CurrentVersion\Uninstall\Free Torrent Download_is1
Local\MSCTF.Asm.MutexDefault1
C:\Users\win7\AppData\Local\Temp\is-DSRME.tmp\FreeTorrentDownload.ENU
C:\Users\win7\AppData\Local\Temp\is-DSRME.tmp\FreeTorrentDownload.EN
imm32.dll
uxtheme.dll
shell32.dll
C:\Windows\system32\ole32.dll
ADVAPI32.dll
comctl32.dll
UxTheme.dll
Precise Detectors Analysis Results
No Detector Result Received
Advance Heuristics
No Advanced Heuristic Analysis Result Received
Human Expert Analysis Results
Analysis Start Date:   2016-02-08 02:57:05.102328 ( )
Analysis End Date:  2016-02-08 09:00:31.124180 ( )
File Upload Date:  2016-02-07 20:19:10.145418 ( )
Update Date:  2016-02-08 09:00:31.124186 ( )
Human Expert Analyst Feedback:   PUA
Verdict:   PUA
Additional File Information
Property | Value |
---|
Name | Virtual Address | Virtual Size | Raw Size | Entropy | MD5 |
---|