Play interactive tourEdit tour
Analysis Report CL-Eye-Driver-5.3.0.0341-Emuline.exe
Overview
General Information
Detection
Score: | 20 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 40% |
Compliance
Score: | 17 |
Range: | 0 - 100 |
Signatures
Uses cmd line tools excessively to alter registry or file data
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to read device registry values (via SetupAPI)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the driver directory
Creates files inside the system directory
DLL planting / hijacking vulnerabilities found
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
EXE planting / hijacking vulnerabilities found
Enables driver privileges
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains strange resources
Queries device information via Setup API
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
Analysis Advice |
---|
Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox |
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--") |
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior |
Startup |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
Source: | Code function: | 7_2_00467E7F | |
Source: | Code function: | 7_2_0046644E | |
Source: | Code function: | 7_2_00461A5B | |
Source: | Code function: | 7_2_00468163 | |
Source: | Code function: | 7_2_00462B61 | |
Source: | Code function: | 7_2_00463272 | |
Source: | Code function: | 7_2_00463C7E | |
Source: | Code function: | 7_2_004682C8 | |
Source: | Code function: | 7_2_00465CD6 | |
Source: | Code function: | 7_2_004681D0 | |
Source: | Code function: | 7_2_004622DB | |
Source: | Code function: | 7_2_00462FF4 | |
Source: | Code function: | 7_2_004617F3 | |
Source: | Code function: | 7_2_00462BFA | |
Source: | Code function: | 7_2_00462390 | |
Source: | Code function: | 7_2_004632A1 | |
Source: | Code function: | 7_2_004681A9 | |
Source: | Code function: | 22_2_003F7E7F | |
Source: | Code function: | 22_2_003F3C7E | |
Source: | Code function: | 22_2_003F3272 | |
Source: | Code function: | 22_2_003F8163 | |
Source: | Code function: | 22_2_003F2B61 | |
Source: | Code function: | 22_2_003F1A5B | |
Source: | Code function: | 22_2_003F644E | |
Source: | Code function: | 22_2_003F81A9 | |
Source: | Code function: | 22_2_003F32A1 | |
Source: | Code function: | 22_2_003F2390 | |
Source: | Code function: | 22_2_003F2BFA | |
Source: | Code function: | 22_2_003F2FF4 | |
Source: | Code function: | 22_2_003F17F3 | |
Source: | Code function: | 22_2_003F22DB | |
Source: | Code function: | 22_2_003F5CD6 | |
Source: | Code function: | 22_2_003F81D0 | |
Source: | Code function: | 22_2_003F82C8 | |
Source: | Code function: | 24_2_00147E7F | |
Source: | Code function: | 24_2_00141A5B | |
Source: | Code function: | 24_2_0014644E | |
Source: | Code function: | 24_2_00143272 | |
Source: | Code function: | 24_2_00143C7E | |
Source: | Code function: | 24_2_00142B61 | |
Source: | Code function: | 24_2_00148163 | |
Source: | Code function: | 24_2_00142390 | |
Source: | Code function: | 24_2_001432A1 | |
Source: | Code function: | 24_2_001481A9 | |
Source: | Code function: | 24_2_00145CD6 | |
Source: | Code function: | 24_2_001481D0 | |
Source: | Code function: | 24_2_001422DB | |
Source: | Code function: | 24_2_001482C8 | |
Source: | Code function: | 24_2_00142FF4 | |
Source: | Code function: | 24_2_001417F3 | |
Source: | Code function: | 24_2_00142BFA |
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior |
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior |
Compliance: |
---|
DLL planting / hijacking vulnerabilities found | Show sources |
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior | ||
Source: | DLL: | Jump to behavior |
EXE planting / hijacking vulnerabilities found | Show sources |
Source: | EXE: | Jump to behavior | ||
Source: | EXE: | Jump to behavior |
Uses 32bit PE files | Show sources |
Source: | Static PE information: |
Found installer window with terms and condition text | Show sources |
Source: | Window detected: |