Loading ...

General Information

Analysis ID:34362
Start time:15:53:33
Start date:19/08/2013
Overall analysis duration:0h 3m 49s
Report type:full
Sample file name:cc9fab2465a279b9424da3a09df7c8d5_undefined.exe
Cookbook file name:Do not randomize VM detection artifacts.jbs
Analysis system description:XP SP3 (Office 2003 SP2, Java 1.6.0, Acrobat Reader 9.3.4, Internet Explorer 8)
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
HCA enabled:true
HCA success:true, ratio: 66%


Detection

StrategyDetectionIndexReport FP/FN
Threshold malicious0.040


Signature Overview

Boot Survival:

Creates an autostart registry keyShow sources

Remote Access Functionality:

Opens a port and listens for incoming connection (possibly a backdoor)Show sources

Persistence and Installation Behavior:

Drops PE filesShow sources
Drops PE files to the user directory (C:\Documents and Settings\)Show sources

Data Obfuscation:

Binary may include packed or encrypted dataShow sources
PE file contains an invalid checksumShow sources
PE sections with suspicious entropy foundShow sources

Spreading:

Contains functionality to enumerate / list files inside a directoryShow sources

System Summary:

Creates files inside the user directoryShow sources

Anti Debugging:

Contains functionality for execution timing, often used to detect debuggersShow sources
Found dropped PE file which has not been started or loadedShow sources

Virtual Machine Detection:

Contains functionality to enumerate / list files inside a directoryShow sources
Queries a list of all running processesShow sources
Contains capabilities to detect virtual machinesShow sources

Screenshot

Startup

  • system is xp
  • cleanup

Created / dropped Files

File PathHashes
C:\Documents and Settings\All Users\svchost.exe
  • MD5: CC9FAB2465A279B9424DA3A09DF7C8D5
  • SHA: DE0FCA6F868D48CCF6B5580301D73A44EBE07669
  • SHA-256: 45C0598E3DB3B7A0A194BF6DE78C8454BCA2B5895A1BC511665D0E22243397E4
  • SHA-512: FDC478B37449AD98609FE311A86053AC107D1C76BE6F2062386F0BED2696FFF38675C80773693AAC846E138D29238BD01F79D0D189AED66720FA1ABA9FD07B29

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

Static File Info

File type:Users\admin\Desktop\34362\sample/cc9fab2465a279b9424da3a09df7c8d5_undefined.exe; PE32 executable for MS Windows (GUI) Intel 80386 32-bit
File name:cc9fab2465a279b9424da3a09df7c8d5_undefined.exe
File size:17920
MD5:cc9fab2465a279b9424da3a09df7c8d5
SHA1:de0fca6f868d48ccf6b5580301d73a44ebe07669
SHA256:45c0598e3db3b7a0a194bf6de78c8454bca2b5895a1bc511665d0e22243397e4
SHA512:fdc478b37449ad98609fe311a86053ac107d1c76be6f2062386f0bed2696fff38675c80773693aac846e138d29238bd01f79d0d189aed66720fa1aba9fd07b29

Static PE Info

General
Entrypoint:0x401b0e
Entrypoint Section:.text
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x520BC2BC [Wed Aug 14 17:47:40 2013 UTC]
TLS Callbacks:
Imports
DLLImport
kernel32.dllCloseHandle
Sections
NameVirtual AddressVirtual SizeRaw SizeEntropy
.text0x10000x41f20x42007.89478992105
.rdata0x60000x540x2000.597307255749

Network Behavior

No network behavior found

Code Manipulation Behavior

System Behavior

General
Start time:09:49:58
Start date:24/01/2012
Path:C:\cc9fab2465a279b9424da3a09df7c8d5_undefined.exe
Wow64 process (32bit):false
Commandline:unknown
Imagebase:0x400000
File size:17920 bytes
MD5 hash:CC9FAB2465A279B9424DA3A09DF7C8D5

Disassembly

Code Analysis

< >
    Executed Functions
    APIs
    • RegQueryValueExA.ADVAPI32(?,A9290135,?,B039ADFE,?,C13A7AD3), ref: 00401E23
    • RegCloseKey.ADVAPI32(?), ref: 00401E4B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1116336410.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1116323972.00400000.00000002.sdmp
    • Associated: 00000000.00000002.1116349927.00403000.00000080.sdmp
    • Associated: 00000000.00000002.1116365858.00406000.00000002.sdmp
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1116336410.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1116323972.00400000.00000002.sdmp
    • Associated: 00000000.00000002.1116349927.00403000.00000080.sdmp
    • Associated: 00000000.00000002.1116365858.00406000.00000002.sdmp
    Strings
    • %ALLUSERSPROFILE%\svchost.exe, xrefs: 7FFA00F4
    • SOFTWARE\Microsoft\Windows\CurrentVersion\Run, xrefs: 7FFA012F
    • Software\Microsoft\Windows\CurrentVersion\Run, xrefs: 7FFA014E
    • SunJavaUpdateSched, xrefs: 7FFA0173
    • D, xrefs: 7FFA0205
    • cmd.exe, xrefs: 7FFA0236
    Memory Dump Source
    • Source File: 00000000.00000002.1116938755.7FFA0000.00000040.sdmp, Offset: 7FFA0000, based on PE: false
    Non-executed Functions
    APIs
    • RegQueryValueExA.ADVAPI32(?,A9290135,?,B039ADFE,?,C13A7AD3), ref: 00401E23
    • RegCloseKey.ADVAPI32(?), ref: 00401E4B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000000.653846084.00401000.00000080.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000000.653825209.00400000.00000002.sdmp
    • Associated: 00000000.00000000.653876204.00406000.00000002.sdmp