Score: | 7 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Cryptography: |
|
---|
Uses Microsoft's Enhanced Cryptographic Provider |
Source: |
Code function: |
0_2_0108E904 | |
Source: |
Code function: |
0_2_010A92BD | |
Source: |
Code function: |
0_2_010A943B | |
Source: |
Code function: |
0_2_0108E461 | |
Source: |
Code function: |
0_2_0108E7DB |
Compliance: |
|
---|
Uses 32bit PE files |
Source: |
Static PE information: |
PE / OLE file has a valid certificate |
Source: |
Static PE information: |
Contains modern PE file flags such as dynamic base (ASLR) or NX |
Source: |
Static PE information: |
Binary contains paths to debug symbols |
Source: |
Binary string: |
Source: |
Code function: |
0_2_010AF88F | |
Source: |
Code function: |
0_2_0108F13C | |
Source: |
Code function: |
0_2_010B1B88 | |
Source: |
Code function: |
0_2_010B1A40 | |
Source: |
Code function: |
0_2_01061ECD |
Source: |
Code function: |
0_2_010AC825 |
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
System Summary: |
|
---|
Contains functionality to launch a process as a different user |
Source: |
Code function: |
0_2_0109AF4A |
Contains functionality to shutdown / reboot the system |
Source: |
Code function: |
0_2_0109AE63 |
Creates files inside the system directory |
Source: |
File created: |
Jump to behavior |
Deletes files inside the Windows folder |
Source: |
File deleted: |
Jump to behavior |
Detected potential crypto function |
Source: |
Code function: |
0_2_010A032C | |
Source: |
Code function: |
0_2_01079B38 | |
Source: |
Code function: |
0_2_010E635C | |
Source: |
Code function: |
0_2_0108DD6F | |
Source: |
Code function: |
0_2_0110659A | |
Source: |
Code function: |
0_2_010E1DE8 | |
Source: |
Code function: |
0_2_010A1C32 | |
Source: |
Code function: |
0_2_0107BFD8 | |
Source: |
Code function: |
0_2_011066BA |
Found potential string decryption / allocating functions |
PE file contains strange resources |
Source: |
Static PE information: |
Sample file is different than original file name gathered from version info |
Source: |
Binary or memory string: |
Uses 32bit PE files |
Source: |
Static PE information: |
Source: |
Classification label: |
Source: |
Code function: |
0_2_010735AC |
Source: |
Code function: |
0_2_0109AE63 |
Source: |
Code function: |
0_2_0109B3B0 |
Source: |
Code function: |
0_2_010A53EE |
Source: |
Code function: |
0_2_010628D2 |
Source: |
File created: |
Jump to behavior |
Source: |
File created: |
Jump to behavior |
Source: |
Static PE information: |
Source: |
File read: |
Jump to behavior |
Source: |
Key opened: |
Jump to behavior |
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
||
Source: |
String found in binary or memory: |
Source: |
Key value queried: |
Jump to behavior |
Source: |
File written: |
Jump to behavior |
Source: |
Static PE information: |
Source: |
Static file information: |
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
Source: |
Static PE information: |
Source: |
Static PE information: |
Source: |
Binary string: |
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
||
Source: |
Static PE information: |
Data Obfuscation: |
|
---|
Contains functionality to dynamically determine API calls |
Source: |
Code function: |
0_2_01086846 |
Uses code obfuscation techniques (call, push, ret) |
Source: |
Code function: |
0_2_010C8BF4 |
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior | ||
Source: |
Process information set: |
Jump to behavior |
Malware Analysis System Evasion: |
|
---|
May sleep (evasive loops) to hinder dynamic analysis |
Source: |
Thread sleep count: |
Jump to behavior | ||
Source: |
Thread sleep count: |
Jump to behavior | ||
Source: |
Thread sleep count: |
Jump to behavior | ||
Source: |
Thread sleep time: |
Jump to behavior |
Sample execution stops while process was sleeping (likely an evasion) |
Source: |
Last function: |
||
Source: |
Last function: |
Source: |
Code function: |
0_2_010AF88F | |
Source: |
Code function: |
0_2_0108F13C | |
Source: |
Code function: |
0_2_010B1B88 | |
Source: |
Code function: |
0_2_010B1A40 | |
Source: |
Code function: |
0_2_01061ECD |
Source: |
Code function: |
0_2_010A3FCD |
Anti Debugging: |
|
---|
Contains functionality to check if a debugger is running (IsDebuggerPresent) |
Source: |
Code function: |
0_2_010E433E |
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError) |
Source: |
Code function: |
0_2_010AE34F |
Contains functionality to dynamically determine API calls |
Source: |
Code function: |
0_2_01086846 |
Contains functionality to read the PEB |
Source: |
Code function: |
0_2_010FB87B | |
Source: |
Code function: |
0_2_010FB8BF | |
Source: |
Code function: |
0_2_010F3437 |
Contains functionality which may be used to detect a debugger (GetProcessHeap) |
Source: |
Code function: |
0_2_0108F7A9 |
Source: |
Code function: |
0_2_010E433E | |
Source: |
Code function: |
0_2_010C8DF0 |
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
||
Source: |
Binary or memory string: |
Language, Device and Operating System Detection: |
|
---|
Contains functionality to query CPU information (cpuid) |
Source: |
Code function: |
0_2_0107ACEC |
Contains functionality to query locales information (e.g. system language) |
Source: |
Code function: |
0_2_01101136 | |
Source: |
Code function: |
0_2_0110098F | |
Source: |
Code function: |
0_2_0110130B | |
Source: |
Code function: |
0_2_01100D1D | |
Source: |
Code function: |
0_2_010FA578 | |
Source: |
Code function: |
0_2_01100C37 | |
Source: |
Code function: |
0_2_01100C82 | |
Source: |
Code function: |
0_2_010F9FBF |
Queries the volume information (name, serial number etc) of a device |
Source: |
Queries volume information: |
Jump to behavior |
Source: |
Code function: |
0_2_010C93AD |
Source: |
Code function: |
0_2_010FB359 |
No contacted IP infos |
---|