General Information |
|---|
| Analysis ID: | 34362 |
| Start time: | 15:53:33 |
| Start date: | 19/08/2013 |
| Overall analysis duration: | 0h 3m 49s |
| Report type: | full |
| Sample file name: | cc9fab2465a279b9424da3a09df7c8d5_undefined.exe |
| Cookbook file name: | Do not randomize VM detection artifacts.jbs |
| Analysis system description: | XP SP3 (Office 2003 SP2, Java 1.6.0, Acrobat Reader 9.3.4, Internet Explorer 8) |
| Number of analysed new started processes analysed: | 1 |
| Number of new started drivers analysed: | 0 |
| Number of existing processes analysed: | 0 |
| Number of existing drivers analysed: | 0 |
| Number of injected processes analysed: | 0 |
| HCA enabled: | true |
| HCA success: | true, ratio: 66% |
Detection |
|---|
| Strategy | Detection | Index | Report FP/FN | |
|---|---|---|---|---|
| Threshold | malicious | 0.040 | ||
Signature Overview |
|---|
Boot Survival: |
|---|
| Creates an autostart registry key | Show sources | ||
Remote Access Functionality: |
|---|
| Opens a port and listens for incoming connection (possibly a backdoor) | Show sources | ||
Persistence and Installation Behavior: |
|---|
| Drops PE files | Show sources | ||
| Drops PE files to the user directory (C:\Documents and Settings\) | Show sources | ||
Data Obfuscation: |
|---|
| Binary may include packed or encrypted data | Show sources | ||
| PE file contains an invalid checksum | Show sources | ||
| PE sections with suspicious entropy found | Show sources | ||
Spreading: |
|---|
| Contains functionality to enumerate / list files inside a directory | Show sources | ||
System Summary: |
|---|
| Creates files inside the user directory | Show sources | ||
Anti Debugging: |
|---|
| Contains functionality for execution timing, often used to detect debuggers | Show sources | ||
| Found dropped PE file which has not been started or loaded | Show sources | ||
Virtual Machine Detection: |
|---|
| Contains functionality to enumerate / list files inside a directory | Show sources | ||
| Queries a list of all running processes | Show sources | ||
| Contains capabilities to detect virtual machines | Show sources | ||
Screenshot |
|---|
Startup |
|---|
|
Created / dropped Files |
|---|
| File Path | Hashes |
|---|---|
| C:\Documents and Settings\All Users\svchost.exe |
|
Contacted Domains |
|---|
| No contacted domains info |
|---|
Contacted IPs |
|---|
| No contacted IP infos |
|---|
Static File Info |
|---|
| File type: | Users\admin\Desktop\34362\sample/cc9fab2465a279b9424da3a09df7c8d5_undefined.exe; PE32 executable for MS Windows (GUI) Intel 80386 32-bit |
| File name: | cc9fab2465a279b9424da3a09df7c8d5_undefined.exe |
| File size: | 17920 |
| MD5: | cc9fab2465a279b9424da3a09df7c8d5 |
| SHA1: | de0fca6f868d48ccf6b5580301d73a44ebe07669 |
| SHA256: | 45c0598e3db3b7a0a194bf6de78c8454bca2b5895a1bc511665d0e22243397e4 |
| SHA512: | fdc478b37449ad98609fe311a86053ac107d1c76be6f2062386f0bed2696fff38675c80773693aac846e138d29238bd01f79d0d189aed66720fa1aba9fd07b29 |
Static PE Info |
|---|
| General | |
|---|---|
| Entrypoint: | 0x401b0e |
| Entrypoint Section: | .text |
| Imagebase: | 0x400000 |
| Subsystem: | windows gui |
| Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
| DLL Characteristics: | |
| Time Stamp: | 0x520BC2BC [Wed Aug 14 17:47:40 2013 UTC] |
| TLS Callbacks: | |
| Imports |
|---|
| DLL | Import |
|---|---|
| kernel32.dll | CloseHandle |
| Sections |
|---|
| Name | Virtual Address | Virtual Size | Raw Size | Entropy |
|---|---|---|---|---|
| .text | 0x1000 | 0x41f2 | 0x4200 | 7.89478992105 |
| .rdata | 0x6000 | 0x54 | 0x200 | 0.597307255749 |
Network Behavior |
|---|
| No network behavior found |
|---|
Code Manipulation Behavior |
|---|
System Behavior |
|---|
| General |
|---|
| Start time: | 09:49:58 |
| Start date: | 24/01/2012 |
| Path: | C:\cc9fab2465a279b9424da3a09df7c8d5_undefined.exe |
| Wow64 process (32bit): | false |
| Commandline: | unknown |
| Imagebase: | 0x400000 |
| File size: | 17920 bytes |
| MD5 hash: | CC9FAB2465A279B9424DA3A09DF7C8D5 |
Disassembly |
|---|
Code Analysis |
|---|
| Executed Functions |
|---|
| APIs |
| Strings |
| Memory Dump Source |
|
|
| APIs |
| Memory Dump Source |
|
|
| Strings |
| Memory Dump Source |
|
| Non-executed Functions |
|---|
| APIs |
| Strings |
| Memory Dump Source |
|
|