Windows Analysis Report
Yu4oufkUC8.exe

Overview

General Information

Sample name: Yu4oufkUC8.exe
renamed because original name is a hash value
Original sample name: 28d2c70bb31fc2be17ff15f5c07eea5f373563970ec210b3af343444222ef167.exe
Analysis ID: 1543065
MD5: a15f95b58098883533e018a0f90564bb
SHA1: 4f09e4c7171ee03f47c0954dd24335d19412aca8
SHA256: 28d2c70bb31fc2be17ff15f5c07eea5f373563970ec210b3af343444222ef167
Tags: exegurt-duna-uauser-JAMESWT_MHT
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: Yu4oufkUC8.exe Avira: detected
Source: Yu4oufkUC8.exe ReversingLabs: Detection: 32%
Source: Yu4oufkUC8.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Yu4oufkUC8.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: dccw.pdbGCTL source: Yu4oufkUC8.exe
Source: Binary string: dccw.pdb source: Yu4oufkUC8.exe
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F3EDC2 GetObjectW,GetLastError,GetWindowRect,GetLastError,GetDC,GetLastError,CreateCompatibleDC,GetLastError,SelectObject,CreateCompatibleDC,GetLastError,SetStretchBltMode,GetLastError,CreateCompatibleBitmap,GetLastError,SelectObject,StretchBlt,GetLastError,SendMessageW,DeleteObject,ReleaseDC,DeleteDC,DeleteDC,DeleteObject, 0_2_00F3EDC2
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F36166 0_2_00F36166
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F35245 0_2_00F35245
Source: Yu4oufkUC8.exe Binary or memory string: OriginalFilename vs Yu4oufkUC8.exe
Source: Yu4oufkUC8.exe, 00000000.00000002.1399178924.0000000000F43000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamedccw.exej% vs Yu4oufkUC8.exe
Source: Yu4oufkUC8.exe, 00000000.00000000.1397182904.0000000000F43000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamedccw.exej% vs Yu4oufkUC8.exe
Source: Yu4oufkUC8.exe Binary or memory string: OriginalFilenamedccw.exej% vs Yu4oufkUC8.exe
Source: Yu4oufkUC8.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engine Classification label: mal56.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F4002C FormatMessageW,LocalFree,GetLastError, 0_2_00F4002C
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F40138 CoCreateInstance,SysAllocString,WinSqmAddToStream,SysFreeString, 0_2_00F40138
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F3596D LoadLibraryExW,FindResourceExW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary, 0_2_00F3596D
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\DCCW Startup Mutex
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Command line argument: strg 0_2_00F33BBD
Source: Yu4oufkUC8.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Yu4oufkUC8.exe ReversingLabs: Detection: 32%
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: dxva2.dll Jump to behavior
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: mscms.dll Jump to behavior
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: coloradapterclient.dll Jump to behavior
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: duser.dll Jump to behavior
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: atlthunk.dll Jump to behavior
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Section loaded: textshaping.dll Jump to behavior
Source: Yu4oufkUC8.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Yu4oufkUC8.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Yu4oufkUC8.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Yu4oufkUC8.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Yu4oufkUC8.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Yu4oufkUC8.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Yu4oufkUC8.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Yu4oufkUC8.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: dccw.pdbGCTL source: Yu4oufkUC8.exe
Source: Binary string: dccw.pdb source: Yu4oufkUC8.exe
Source: Yu4oufkUC8.exe Static PE information: real checksum: 0x2100c should be: 0x71b58
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F40DD1 push ecx; ret 0_2_00F40DE4
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F31D0C pushad ; retf 0_2_00F31D0D
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe API coverage: 5.2 %
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F3F7EE mov esi, dword ptr fs:[00000030h] 0_2_00F3F7EE
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F3F8CD GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree, 0_2_00F3F8CD
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F40A80 SetUnhandledExceptionFilter, 0_2_00F40A80
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F407FD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00F407FD
Source: C:\Users\user\Desktop\Yu4oufkUC8.exe Code function: 0_2_00F40CC9 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 0_2_00F40CC9
No contacted IP infos