Attempts to repeatedly call a single API many times in order to delay analysis time
- Spam:
- 8e9b60a1eaef572e2955edf359350aadea5a86cc122e5d152d094cc6f063edff.exe (2844) called API GetCursorPos 553122 times
Checks for the presence of known devices from debuggers and forensic tools
- File:
- \??\SICE
- File:
- \??\NTICE
Detects Sandboxie through the presence of a library
Detects VMWare through the in instruction feature
PID |
API |
Arguments |
2700 |
__exception__ |
- stacktrace:
- [u'BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x7dd733ca', u'RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x7dea9ed2', u'RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x7dea9ea5']
- exception:
- {u'instruction_r': u'ed b8 01 00 00 00 eb 13 8b 44 24 0c c7 80 b8 00', u'symbol': u'8e9b60a1eaef572e2955edf359350aadea5a86cc122e5d152d094cc6f063edff+0x78cc', u'instruction': u'in eax, dx', u'module': u'8e9b60a1eaef572e2955edf359350aadea5a86cc122e5d152d094cc6f063edff.exe', u'exception_code': u'0xc0000096', u'offset': 30924, u'address': u'0x4078cc'}
- registers:
- {u'esp': 1638184, u'edi': 0, u'eax': 1447909480, u'ebp': 1638280, u'edx': 22104, u'ebx': 1013774098, u'esi': 0, u'ecx': 10}
|
This sample is detected by clamav as: Win.Spyware.Banker-3114
- Description:
- Win.Spyware.Banker-3114
One or more AV tool detects this sample as malicious: Trojan:Win32/Tiggre!rfn
- Description:
- Trojan:Win32/Tiggre!rfn
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
Repeatedly searches for a not-found process, you may want to run a web browser during analysis
PID |
API |
Arguments |
2700 |
Process32NextW |
- snapshot_handle:
- 0x000000c8
- process_name:
- 8e9b60a1eaef572e2955edf359350aadea5a86cc122e5d152d094cc6f063edff.exe
- process_identifier:
- 2740
|
One or more of the buffers contains an embedded PE file
- Buffer:
- Buffer with sha1: 41f7b7df2f7810ab8ea7ae2a0b391c5364cc320a
Executed a process and injected code into it, probably while unpacking
PID |
API |
Arguments |
2748 |
CreateProcessInternalW |
- thread_identifier:
- 2704
- thread_handle:
- 0x00000100
- process_identifier:
- 2700
- current_directory:
- filepath:
- track:
- 1
- command_line:
- C:\Users\Virtual\AppData\Local\Temp\8e9b60a1eaef572e2955edf359350aadea5a86cc122e5d152d094cc6f063edff.exe
- filepath_r:
- stack_pivoted:
- 0
- creation_flags:
- 4
- inherit_handles:
- 0
- process_handle:
- 0x00000104
|
2748 |
NtGetContextThread |
- thread_handle:
- 0x00000100
|
2748 |
NtUnmapViewOfSection |
- base_address:
- 0x00400000
- region_size:
- 4096
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
NtAllocateVirtualMemory |
- process_identifier:
- 2700
- region_size:
- 307200
- stack_dep_bypass:
- 0
- stack_pivoted:
- 0
- heap_dep_bypass:
- 0
- protection:
- 64
- base_address:
- 0x00400000
- allocation_type:
- 12288
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x00400000
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x00401000
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x0040a000
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x0040b000
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x0040c000
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x0040d000
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x0040e000
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x0040f000
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x00410000
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
WriteProcessMemory |
- buffer:
- base_address:
- 0x7efde008
- process_identifier:
- 2700
- process_handle:
- 0x00000104
|
2748 |
NtSetContextThread |
- registers:
- {u'eip': 2112356804, u'esp': 1638384, u'edi': 0, u'eax': 4233312, u'ebp': 0, u'edx': 0, u'ebx': 2130567168, u'esi': 0, u'ecx': 0}
- thread_handle:
- 0x00000100
- process_identifier:
- 2700
|
2748 |
NtResumeThread |
- thread_handle:
- 0x00000100
- suspend_count:
- 1
- process_identifier:
- 2700
|
Unconventionial language used in binary resources
- Language:
- Arabic (Saudi Arabia)
The executable has PE anomalies (could be a false positive)
Allocates read-write-execute memory (usually to unpack itself)
PID |
API |
Arguments |
2748 |
NtAllocateVirtualMemory |
- process_identifier:
- 2596
- region_size:
- 12288
- stack_dep_bypass:
- 0
- stack_pivoted:
- 0
- heap_dep_bypass:
- 0
- protection:
- 64
- base_address:
- 0x002e0000
- allocation_type:
- 4096
- process_handle:
- 0xffffffff
|
2748 |
NtAllocateVirtualMemory |
- process_identifier:
- 2596
- region_size:
- 4096
- stack_dep_bypass:
- 0
- stack_pivoted:
- 0
- heap_dep_bypass:
- 0
- protection:
- 64
- base_address:
- 0x00320000
- allocation_type:
- 4096
- process_handle:
- 0xffffffff
|
The binary likely contains encrypted or compressed data.
- Section:
- CODE, at virtual address 0x00001000
- Entropy:
- 7.99973984913
- Description:
- A section with a high entropy has been found
- Entropy:
- 0.660420215786
- Description:
- Overall entropy of this PE file is high
Contains obfuscated control-flow to defeat static analysis.
More than %50 of the external calls do not go through the import address table
This sample contains high entropy sections
- Section:
- CODE, at virtual address 0x00001000
- Entropy:
- 7.99973984913
Anomalous binary characteristics
- Anomaly:
- Timestamp on binary predates the release date of the OS version it requires by at least a year
Presents an Authenticode digital signature
- Generic:
- PECompact 2.xx --> BitSum Technologies