TIME 2015-12-03 09:53:23
MD5 83780e63f48cb21bea3e734857892bc1
SHA256 b919b61737aad351b5b5842780bdb71ba2ace45b6e4bcea136b09f90461f5ae7
FILETYPE pe
ALERT True
LEVEL HIGH
CONFIDENCE 403
OTHER REPORTS [Virustotal] [ThreatExpert] [FireEye]
STARTED COMPLETED DURATION
2015-12-03 10:04:40 2015-12-03 10:04:48 0:00:08
TIME SOURCE FILENAME URL
2015-12-03 09:53:23 192.168.7.15 83780e63f48cb21bea3e734857892bc1.kaf
            
            ----------Parsing Warnings----------

Error parsing the import directory. Invalid Import data at RVA: 0xbb10 ('Invalid Import Table information. Both ILT and IAT appear to be broken.')

----------DOS_HEADER----------

[IMAGE_DOS_HEADER]
0x0        0x0   e_magic:                       0x5A4D    
0x2        0x2   e_cblp:                        0x90      
0x4        0x4   e_cp:                          0x3       
0x6        0x6   e_crlc:                        0x0       
0x8        0x8   e_cparhdr:                     0x4       
0xA        0xA   e_minalloc:                    0x0       
0xC        0xC   e_maxalloc:                    0xFFFF    
0xE        0xE   e_ss:                          0x0       
0x10       0x10  e_sp:                          0xB8      
0x12       0x12  e_csum:                        0x0       
0x14       0x14  e_ip:                          0x0       
0x16       0x16  e_cs:                          0x0       
0x18       0x18  e_lfarlc:                      0x40      
0x1A       0x1A  e_ovno:                        0x0       
0x1C       0x1C  e_res:                         
0x24       0x24  e_oemid:                       0x0       
0x26       0x26  e_oeminfo:                     0x0       
0x28       0x28  e_res2:                        
0x3C       0x3C  e_lfanew:                      0xB8      

----------NT_HEADERS----------

[IMAGE_NT_HEADERS]
0xB8       0x0   Signature:                     0x4550    

----------FILE_HEADER----------

[IMAGE_FILE_HEADER]
0xBC       0x0   Machine:                       0x14C     
0xBE       0x2   NumberOfSections:              0x3       
0xC0       0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
0xC4       0x8   PointerToSymbolTable:          0x0       
0xC8       0xC   NumberOfSymbols:               0x0       
0xCC       0x10  SizeOfOptionalHeader:          0xE0      
0xCE       0x12  Characteristics:               0x10F     
Flags: IMAGE_FILE_LOCAL_SYMS_STRIPPED, IMAGE_FILE_32BIT_MACHINE, IMAGE_FILE_EXECUTABLE_IMAGE, IMAGE_FILE_LINE_NUMS_STRIPPED, IMAGE_FILE_RELOCS_STRIPPED

----------OPTIONAL_HEADER----------

[IMAGE_OPTIONAL_HEADER]
0xD0       0x0   Magic:                         0x10B     
0xD2       0x2   MajorLinkerVersion:            0x6       
0xD3       0x3   MinorLinkerVersion:            0x0       
0xD4       0x4   SizeOfCode:                    0xB000    
0xD8       0x8   SizeOfInitializedData:         0x5000    
0xDC       0xC   SizeOfUninitializedData:       0x0       
0xE0       0x10  AddressOfEntryPoint:           0x1100    
0xE4       0x14  BaseOfCode:                    0x1000    
0xE8       0x18  BaseOfData:                    0xC000    
0xEC       0x1C  ImageBase:                     0x400000  
0xF0       0x20  SectionAlignment:              0x1000    
0xF4       0x24  FileAlignment:                 0x1000    
0xF8       0x28  MajorOperatingSystemVersion:   0x4       
0xFA       0x2A  MinorOperatingSystemVersion:   0x0       
0xFC       0x2C  MajorImageVersion:             0x9       
0xFE       0x2E  MinorImageVersion:             0x0       
0x100      0x30  MajorSubsystemVersion:         0x4       
0x102      0x32  MinorSubsystemVersion:         0x0       
0x104      0x34  Reserved1:                     0x0       
0x108      0x38  SizeOfImage:                   0x11000   
0x10C      0x3C  SizeOfHeaders:                 0x1000    
0x110      0x40  CheckSum:                      0x10088   
0x114      0x44  Subsystem:                     0x2       
0x116      0x46  DllCharacteristics:            0x0       
0x118      0x48  SizeOfStackReserve:            0x100000  
0x11C      0x4C  SizeOfStackCommit:             0x1000    
0x120      0x50  SizeOfHeapReserve:             0x100000  
0x124      0x54  SizeOfHeapCommit:              0x1000    
0x128      0x58  LoaderFlags:                   0x0       
0x12C      0x5C  NumberOfRvaAndSizes:           0x10      
DllCharacteristics: 

----------PE Sections----------

[IMAGE_SECTION_HEADER]
0x1B0      0x0   Name:                          .text
0x1B8      0x8   Misc:                          0xAC3C    
0x1B8      0x8   Misc_PhysicalAddress:          0xAC3C    
0x1B8      0x8   Misc_VirtualSize:              0xAC3C    
0x1BC      0xC   VirtualAddress:                0x1000    
0x1C0      0x10  SizeOfRawData:                 0xB000    
0x1C4      0x14  PointerToRawData:              0x1000    
0x1C8      0x18  PointerToRelocations:          0x0       
0x1CC      0x1C  PointerToLinenumbers:          0x0       
0x1D0      0x20  NumberOfRelocations:           0x0       
0x1D2      0x22  NumberOfLinenumbers:           0x0       
0x1D4      0x24  Characteristics:               0x60000020
Flags: IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Entropy: 4.847022 (Min=0.0, Max=8.0)
MD5     hash: f6a162f5383bb7335bcb7a415129f1e4
SHA-1   hash: 428fae97b7cf85506c0713d18b2caf7e8009b330
SHA-256 hash: 5283b42ff44e8056a2c94df2e63847aaa1206b6f0fa9c8af737e3f2bb7f50100
SHA-512 hash: d3f974e05a52e57ee6fab85cf5967e8c44cd03cd24b27041dc6215e771088a2e58a2a9c1f363e0a53d6102040f96ccfd7b95d3448c708cb89ac16b48d50c5bd2

[IMAGE_SECTION_HEADER]
0x1D8      0x0   Name:                          .data
0x1E0      0x8   Misc:                          0x1E44    
0x1E0      0x8   Misc_PhysicalAddress:          0x1E44    
0x1E0      0x8   Misc_VirtualSize:              0x1E44    
0x1E4      0xC   VirtualAddress:                0xC000    
0x1E8      0x10  SizeOfRawData:                 0x0       
0x1EC      0x14  PointerToRawData:              0x0       
0x1F0      0x18  PointerToRelocations:          0x0       
0x1F4      0x1C  PointerToLinenumbers:          0x0       
0x1F8      0x20  NumberOfRelocations:           0x0       
0x1FA      0x22  NumberOfLinenumbers:           0x0       
0x1FC      0x24  Characteristics:               0xC0000040
Flags: IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
Entropy: 0.000000 (Min=0.0, Max=8.0)
MD5     hash: d41d8cd98f00b204e9800998ecf8427e
SHA-1   hash: da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA-256 hash: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA-512 hash: cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

[IMAGE_SECTION_HEADER]
0x200      0x0   Name:                          .rsrc
0x208      0x8   Misc:                          0x2B6C    
0x208      0x8   Misc_PhysicalAddress:          0x2B6C    
0x208      0x8   Misc_VirtualSize:              0x2B6C    
0x20C      0xC   VirtualAddress:                0xE000    
0x210      0x10  SizeOfRawData:                 0x3000    
0x214      0x14  PointerToRawData:              0xC000    
0x218      0x18  PointerToRelocations:          0x0       
0x21C      0x1C  PointerToLinenumbers:          0x0       
0x220      0x20  NumberOfRelocations:           0x0       
0x222      0x22  NumberOfLinenumbers:           0x0       
0x224      0x24  Characteristics:               0x40000040
Flags: IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
Entropy: 3.929374 (Min=0.0, Max=8.0)
MD5     hash: c6f3496ca6eae236d1babe2d9e079197
SHA-1   hash: 9cedcefd3427f1f0ab16a3e7464a91f1bed939d4
SHA-256 hash: f76514e8a95cec7a317fca3504de15b1b104b790f9a9d4c82f833059a1d0de76
SHA-512 hash: 0c5a288cbfed4bf435d5fca67edebc883031ecfb74603e656c19489eb5cc78c905aff24bd6ae647c1b36b974d51877d75e0dd98b6bbad8da06f021a9f57be8a7

----------Directories----------

[IMAGE_DIRECTORY_ENTRY_EXPORT]
0x130      0x0   VirtualAddress:                0x0       
0x134      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_IMPORT]
0x138      0x0   VirtualAddress:                0xBAD4    
0x13C      0x4   Size:                          0x3C      
[IMAGE_DIRECTORY_ENTRY_RESOURCE]
0x140      0x0   VirtualAddress:                0xE000    
0x144      0x4   Size:                          0x2B6C    
[IMAGE_DIRECTORY_ENTRY_EXCEPTION]
0x148      0x0   VirtualAddress:                0x0       
0x14C      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_SECURITY]
0x150      0x0   VirtualAddress:                0x0       
0x154      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_BASERELOC]
0x158      0x0   VirtualAddress:                0x0       
0x15C      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_DEBUG]
0x160      0x0   VirtualAddress:                0x0       
0x164      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_COPYRIGHT]
0x168      0x0   VirtualAddress:                0x0       
0x16C      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_GLOBALPTR]
0x170      0x0   VirtualAddress:                0x0       
0x174      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_TLS]
0x178      0x0   VirtualAddress:                0x0       
0x17C      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG]
0x180      0x0   VirtualAddress:                0x0       
0x184      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT]
0x188      0x0   VirtualAddress:                0x228     
0x18C      0x4   Size:                          0x34      
[IMAGE_DIRECTORY_ENTRY_IAT]
0x190      0x0   VirtualAddress:                0x1000    
0x194      0x4   Size:                          0x68      
[IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT]
0x198      0x0   VirtualAddress:                0x0       
0x19C      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR]
0x1A0      0x0   VirtualAddress:                0x0       
0x1A4      0x4   Size:                          0x0       
[IMAGE_DIRECTORY_ENTRY_RESERVED]
0x1A8      0x0   VirtualAddress:                0x0       
0x1AC      0x4   Size:                          0x0       

----------Version Information----------

[VS_VERSIONINFO]
0xC1E0     0x0   Length:                        0x200     
0xC1E2     0x2   ValueLength:                   0x34      
0xC1E4     0x4   Type:                          0x0       

[VS_FIXEDFILEINFO]
0xC208     0x0   Signature:                     0xFEEF04BD
0xC20C     0x4   StrucVersion:                  0x10000   
0xC210     0x8   FileVersionMS:                 0x90000   
0xC214     0xC   FileVersionLS:                 0x0       
0xC218     0x10  ProductVersionMS:              0x90000   
0xC21C     0x14  ProductVersionLS:              0x0       
0xC220     0x18  FileFlagsMask:                 0x0       
0xC224     0x1C  FileFlags:                     0x0       
0xC228     0x20  FileOS:                        0x4       
0xC22C     0x24  FileType:                      0x1       
0xC230     0x28  FileSubtype:                   0x0       
0xC234     0x2C  FileDateMS:                    0x0       
0xC238     0x30  FileDateLS:                    0x0       

[VarFileInfo]
0xC23C     0x0   Length:                        0x44      
0xC23E     0x2   ValueLength:                   0x0       
0xC240     0x4   Type:                          0x0       

  [Var]
  0xC25C     0x0   Length:                        0x24      
  0xC25E     0x2   ValueLength:                   0x4       
  0xC260     0x4   Type:                          0x0       
    Translation: 0x0409 0x04b0

[StringFileInfo]
0xC280     0x0   Length:                        0x160     
0xC282     0x2   ValueLength:                   0x0       
0xC284     0x4   Type:                          0x1       

  [StringTable]
  0xC2A4     0x0   Length:                        0x13C     
  0xC2A6     0x2   ValueLength:                   0x0       
  0xC2A8     0x4   Type:                          0x1       
  LangID: 040904B0

    InternalName: 4
    FileVersion: 9.00
    CompanyName: loplkjyhtg
    ProductName: njuhgtrfdc\x505
    ProductVersion: 9.00
    OriginalFilename: 4.exe

----------Imported symbols----------

[IMAGE_IMPORT_DESCRIPTOR]
0xBAD4     0x0   OriginalFirstThunk:            0xBB10    
0xBAD4     0x0   Characteristics:               0xBB10    
0xBAD8     0x4   TimeDateStamp:                 0xFFFFFFFF [Sun Feb  7 06:28:15 2106 UTC]
0xBADC     0x8   ForwarderChain:                0xFFFFFFFF
0xBAE0     0xC   Name:                          0xBB86    
0xBAE4     0x10  FirstThunk:                    0x1000    

KERNEL32.DLL.SetErrorMode Hint[0] Bound: 0x7DD731F2
KERNEL32.DLL.SetFileAttributesA Hint[0] Bound: 0x7DD8DC4E

[IMAGE_IMPORT_DESCRIPTOR]
0xBAE8     0x0   OriginalFirstThunk:            0xBB1C    
0xBAE8     0x0   Characteristics:               0xBB1C    
0xBAEC     0x4   TimeDateStamp:                 0xFFFFFFFF [Sun Feb  7 06:28:15 2106 UTC]
0xBAF0     0x8   ForwarderChain:                0xFFFFFFFF
0xBAF4     0xC   Name:                          0xBB78    
0xBAF8     0x10  FirstThunk:                    0x100C    

MSVBVM60.DLL Ordinal[585] (Imported by Ordinal) Bound: 0x72A1CC01
MSVBVM60.DLL Ordinal[586] (Imported by Ordinal) Bound: 0x72A1CC0C
MSVBVM60.DLL Ordinal[587] (Imported by Ordinal) Bound: 0x72A1CC4D
MSVBVM60.DLL Ordinal[516] (Imported by Ordinal) Bound: 0x72A270B7
MSVBVM60.DLL Ordinal[556] (Imported by Ordinal) Bound: 0x72A1C89D
MSVBVM60.DLL Ordinal[598] (Imported by Ordinal) Bound: 0x72A0E0F7
MSVBVM60.DLL Ordinal[631] (Imported by Ordinal) Bound: 0x72A26FE2
MSVBVM60.DLL Ordinal[632] (Imported by Ordinal) Bound: 0x72A2702F
MSVBVM60.DLL.EVENT_SINK_AddRef Hint[0] Bound: 0x72A09B74
MSVBVM60.DLL.DllFunctionCall Hint[0] Bound: 0x7294A0FD
MSVBVM60.DLL.EVENT_SINK_Release Hint[0] Bound: 0x72A09B87
MSVBVM60.DLL.EVENT_SINK_QueryInterface Hint[0] Bound: 0x72A09A85
MSVBVM60.DLL.__vbaExceptHandler Hint[0] Bound: 0x72A247DF
MSVBVM60.DLL Ordinal[608] (Imported by Ordinal) Bound: 0x72A20F56
MSVBVM60.DLL Ordinal[717] (Imported by Ordinal) Bound: 0x72A28FE9
MSVBVM60.DLL.ProcCallEngine Hint[0] Bound: 0x72A3D05D
MSVBVM60.DLL Ordinal[535] (Imported by Ordinal) Bound: 0x72A1C85D
MSVBVM60.DLL Ordinal[644] (Imported by Ordinal) Bound: 0x72A1DE99
MSVBVM60.DLL Ordinal[578] (Imported by Ordinal) Bound: 0x72A161F8
MSVBVM60.DLL Ordinal[100] (Imported by Ordinal) Bound: 0x729435A4
MSVBVM60.DLL Ordinal[616] (Imported by Ordinal) Bound: 0x72A26D9A
MSVBVM60.DLL Ordinal[543] (Imported by Ordinal) Bound: 0x72A11C50

----------Bound imports----------

[IMAGE_BOUND_IMPORT_DESCRIPTOR]
0x228      0x0   TimeDateStamp:                 0x4A5BDBDE [Tue Jul 14 01:14:06 2009 UTC]
0x22C      0x4   OffsetModuleName:              0x18      
0x22E      0x6   NumberOfModuleForwarderRefs:   0x0       
DLL: KERNEL32.DLL

[IMAGE_BOUND_IMPORT_DESCRIPTOR]
0x230      0x0   TimeDateStamp:                 0x4A5BDA6C [Tue Jul 14 01:07:56 2009 UTC]
0x234      0x4   OffsetModuleName:              0x25      
0x236      0x6   NumberOfModuleForwarderRefs:   0x0       
DLL: MSVBVM60.DLL

----------Resource directory----------

[IMAGE_RESOURCE_DIRECTORY]
0xC000     0x0   Characteristics:               0x0       
0xC004     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
0xC008     0x8   MajorVersion:                  0xA754    
0xC00A     0xA   MinorVersion:                  0x0       
0xC00C     0xC   NumberOfNamedEntries:          0x0       
0xC00E     0xE   NumberOfIdEntries:             0x3       
  Id: [0x503] (-)
  [IMAGE_RESOURCE_DIRECTORY_ENTRY]
  0xC010     0x0   Name:                          0x50503   
  0xC014     0x4   OffsetToData:                  0x80000058
    [IMAGE_RESOURCE_DIRECTORY]
    0xC058     0x0   Characteristics:               0x0       
    0xC05C     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
    0xC060     0x8   MajorVersion:                  0xA754    
    0xC062     0xA   MinorVersion:                  0x0       
    0xC064     0xC   NumberOfNamedEntries:          0x0       
    0xC066     0xE   NumberOfIdEntries:             0x6       
      Id: [0x7531]
      [IMAGE_RESOURCE_DIRECTORY_ENTRY]
      0xC068     0x0   Name:                          0x7531    
      0xC06C     0x4   OffsetToData:                  0x80000140
        [IMAGE_RESOURCE_DIRECTORY]
        0xC140     0x0   Characteristics:               0x0       
        0xC144     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
        0xC148     0x8   MajorVersion:                  0xA754    
        0xC14A     0xA   MinorVersion:                  0x0       
        0xC14C     0xC   NumberOfNamedEntries:          0x0       
        0xC14E     0xE   NumberOfIdEntries:             0x1       
        \--- LANG [0,0][LANG_NEUTRAL,SUBLANG_NEUTRAL]
          [IMAGE_RESOURCE_DIRECTORY_ENTRY]
          0xC150     0x0   Name:                          0x0       
          0xC154     0x4   OffsetToData:                  0x1C8     
            [IMAGE_RESOURCE_DATA_ENTRY]
            0xC1C8     0x0   OffsetToData:                  0x10884   
            0xC1CC     0x4   Size:                          0x2E8     
            0xC1D0     0x8   CodePage:                      0x4B0     
            0xC1D4     0xC   Reserved:                      0x0       
      Id: [0x7532]
      [IMAGE_RESOURCE_DIRECTORY_ENTRY]
      0xC070     0x0   Name:                          0x7532    
      0xC074     0x4   OffsetToData:                  0x80000128
        [IMAGE_RESOURCE_DIRECTORY]
        0xC128     0x0   Characteristics:               0x0       
        0xC12C     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
        0xC130     0x8   MajorVersion:                  0xA754    
        0xC132     0xA   MinorVersion:                  0x0       
        0xC134     0xC   NumberOfNamedEntries:          0x0       
        0xC136     0xE   NumberOfIdEntries:             0x1       
        \--- LANG [0,0][LANG_NEUTRAL,SUBLANG_NEUTRAL]
          [IMAGE_RESOURCE_DIRECTORY_ENTRY]
          0xC138     0x0   Name:                          0x0       
          0xC13C     0x4   OffsetToData:                  0x1B8     
            [IMAGE_RESOURCE_DATA_ENTRY]
            0xC1B8     0x0   OffsetToData:                  0xFFDC    
            0xC1BC     0x4   Size:                          0x8A8     
            0xC1C0     0x8   CodePage:                      0x4B0     
            0xC1C4     0xC   Reserved:                      0x0       
      Id: [0x7533]
      [IMAGE_RESOURCE_DIRECTORY_ENTRY]
      0xC078     0x0   Name:                          0x7533    
      0xC07C     0x4   OffsetToData:                  0x80000110
        [IMAGE_RESOURCE_DIRECTORY]
        0xC110     0x0   Characteristics:               0x0       
        0xC114     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
        0xC118     0x8   MajorVersion:                  0xA754    
        0xC11A     0xA   MinorVersion:                  0x0       
        0xC11C     0xC   NumberOfNamedEntries:          0x0       
        0xC11E     0xE   NumberOfIdEntries:             0x1       
        \--- LANG [0,0][LANG_NEUTRAL,SUBLANG_NEUTRAL]
          [IMAGE_RESOURCE_DIRECTORY_ENTRY]
          0xC120     0x0   Name:                          0x0       
          0xC124     0x4   OffsetToData:                  0x1A8     
            [IMAGE_RESOURCE_DATA_ENTRY]
            0xC1A8     0x0   OffsetToData:                  0xFEB4    
            0xC1AC     0x4   Size:                          0x128     
            0xC1B0     0x8   CodePage:                      0x4B0     
            0xC1B4     0xC   Reserved:                      0x0       
      Id: [0x7534]
      [IMAGE_RESOURCE_DIRECTORY_ENTRY]
      0xC080     0x0   Name:                          0x7534    
      0xC084     0x4   OffsetToData:                  0x800000F8
        [IMAGE_RESOURCE_DIRECTORY]
        0xC0F8     0x0   Characteristics:               0x0       
        0xC0FC     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
        0xC100     0x8   MajorVersion:                  0xA754    
        0xC102     0xA   MinorVersion:                  0x0       
        0xC104     0xC   NumberOfNamedEntries:          0x0       
        0xC106     0xE   NumberOfIdEntries:             0x1       
        \--- LANG [0,0][LANG_NEUTRAL,SUBLANG_NEUTRAL]
          [IMAGE_RESOURCE_DIRECTORY_ENTRY]
          0xC108     0x0   Name:                          0x0       
          0xC10C     0x4   OffsetToData:                  0x198     
            [IMAGE_RESOURCE_DATA_ENTRY]
            0xC198     0x0   OffsetToData:                  0xF00C    
            0xC19C     0x4   Size:                          0xEA8     
            0xC1A0     0x8   CodePage:                      0x4B0     
            0xC1A4     0xC   Reserved:                      0x0       
      Id: [0x7535]
      [IMAGE_RESOURCE_DIRECTORY_ENTRY]
      0xC088     0x0   Name:                          0x7535    
      0xC08C     0x4   OffsetToData:                  0x800000E0
        [IMAGE_RESOURCE_DIRECTORY]
        0xC0E0     0x0   Characteristics:               0x0       
        0xC0E4     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
        0xC0E8     0x8   MajorVersion:                  0xA754    
        0xC0EA     0xA   MinorVersion:                  0x0       
        0xC0EC     0xC   NumberOfNamedEntries:          0x0       
        0xC0EE     0xE   NumberOfIdEntries:             0x1       
        \--- LANG [0,0][LANG_NEUTRAL,SUBLANG_NEUTRAL]
          [IMAGE_RESOURCE_DIRECTORY_ENTRY]
          0xC0F0     0x0   Name:                          0x0       
          0xC0F4     0x4   OffsetToData:                  0x188     
            [IMAGE_RESOURCE_DATA_ENTRY]
            0xC188     0x0   OffsetToData:                  0xE9A4    
            0xC18C     0x4   Size:                          0x668     
            0xC190     0x8   CodePage:                      0x4B0     
            0xC194     0xC   Reserved:                      0x0       
      Id: [0x7536]
      [IMAGE_RESOURCE_DIRECTORY_ENTRY]
      0xC090     0x0   Name:                          0x7536    
      0xC094     0x4   OffsetToData:                  0x800000C8
        [IMAGE_RESOURCE_DIRECTORY]
        0xC0C8     0x0   Characteristics:               0x0       
        0xC0CC     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
        0xC0D0     0x8   MajorVersion:                  0xA754    
        0xC0D2     0xA   MinorVersion:                  0x0       
        0xC0D4     0xC   NumberOfNamedEntries:          0x0       
        0xC0D6     0xE   NumberOfIdEntries:             0x1       
        \--- LANG [0,0][LANG_NEUTRAL,SUBLANG_NEUTRAL]
          [IMAGE_RESOURCE_DIRECTORY_ENTRY]
          0xC0D8     0x0   Name:                          0x0       
          0xC0DC     0x4   OffsetToData:                  0x178     
            [IMAGE_RESOURCE_DATA_ENTRY]
            0xC178     0x0   OffsetToData:                  0xE43C    
            0xC17C     0x4   Size:                          0x568     
            0xC180     0x8   CodePage:                      0x4B0     
            0xC184     0xC   Reserved:                      0x0       

  Id: [0xE] (RT_GROUP_ICON)
  [IMAGE_RESOURCE_DIRECTORY_ENTRY]
  0xC018     0x0   Name:                          0xE       
  0xC01C     0x4   OffsetToData:                  0x80000040
    [IMAGE_RESOURCE_DIRECTORY]
    0xC040     0x0   Characteristics:               0x0       
    0xC044     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
    0xC048     0x8   MajorVersion:                  0xA754    
    0xC04A     0xA   MinorVersion:                  0x0       
    0xC04C     0xC   NumberOfNamedEntries:          0x0       
    0xC04E     0xE   NumberOfIdEntries:             0x1       
      Id: [0x1]
      [IMAGE_RESOURCE_DIRECTORY_ENTRY]
      0xC050     0x0   Name:                          0x1       
      0xC054     0x4   OffsetToData:                  0x800000B0
        [IMAGE_RESOURCE_DIRECTORY]
        0xC0B0     0x0   Characteristics:               0x0       
        0xC0B4     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
        0xC0B8     0x8   MajorVersion:                  0xA754    
        0xC0BA     0xA   MinorVersion:                  0x0       
        0xC0BC     0xC   NumberOfNamedEntries:          0x0       
        0xC0BE     0xE   NumberOfIdEntries:             0x1       
        \--- LANG [0,0][LANG_NEUTRAL,SUBLANG_NEUTRAL]
          [IMAGE_RESOURCE_DIRECTORY_ENTRY]
          0xC0C0     0x0   Name:                          0x0       
          0xC0C4     0x4   OffsetToData:                  0x168     
            [IMAGE_RESOURCE_DATA_ENTRY]
            0xC168     0x0   OffsetToData:                  0xE3E0    
            0xC16C     0x4   Size:                          0x5C      
            0xC170     0x8   CodePage:                      0x4B0     
            0xC174     0xC   Reserved:                      0x0       

  Id: [0x10] (RT_VERSION)
  [IMAGE_RESOURCE_DIRECTORY_ENTRY]
  0xC020     0x0   Name:                          0x10      
  0xC024     0x4   OffsetToData:                  0x80000028
    [IMAGE_RESOURCE_DIRECTORY]
    0xC028     0x0   Characteristics:               0x0       
    0xC02C     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
    0xC030     0x8   MajorVersion:                  0xA754    
    0xC032     0xA   MinorVersion:                  0x0       
    0xC034     0xC   NumberOfNamedEntries:          0x0       
    0xC036     0xE   NumberOfIdEntries:             0x1       
      Id: [0x1]
      [IMAGE_RESOURCE_DIRECTORY_ENTRY]
      0xC038     0x0   Name:                          0x1       
      0xC03C     0x4   OffsetToData:                  0x80000098
        [IMAGE_RESOURCE_DIRECTORY]
        0xC098     0x0   Characteristics:               0x0       
        0xC09C     0x4   TimeDateStamp:                 0x54C56891 [Sun Jan 25 22:05:05 2015 UTC]
        0xC0A0     0x8   MajorVersion:                  0xA754    
        0xC0A2     0xA   MinorVersion:                  0x0       
        0xC0A4     0xC   NumberOfNamedEntries:          0x0       
        0xC0A6     0xE   NumberOfIdEntries:             0x1       
        \--- LANG [9,1][LANG_ENGLISH,SUBLANG_ENGLISH_US]
          [IMAGE_RESOURCE_DIRECTORY_ENTRY]
          0xC0A8     0x0   Name:                          0x409     
          0xC0AC     0x4   OffsetToData:                  0x158     
            [IMAGE_RESOURCE_DATA_ENTRY]
            0xC158     0x0   OffsetToData:                  0xE1E0    
            0xC15C     0x4   Size:                          0x200     
            0xC160     0x8   CodePage:                      0x4B0     
            0xC164     0xC   Reserved:                      0x0       



            
	  
High7
Process
  • check_hide_file  - Check set file attribute hide behavior. detail>>

    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    action :
    SetInformationFile
    FileName :
    \Device\HarddiskVolume1\Documents and Settings\sys\Application Data\Microsoft\{47410F40-4DD8-44C6-B2D3-FE2213A135AE}\e71274c5.exe
  • injection_run  - Check process injection behavior - accurate detail>>

    process :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
    action :
    ProcessInjection
    BaseAddress :
    4198400
    BufferSize :
    100352
    FileName :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
  • injection_data  - Allocate Execution memory in foreign processes detail>>

    process :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
    Protect :
    64
    ProcessHandle :
    1936
    FileName :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
  • injection_data  - Injects a PE file into a foreign processes detail>>

    Buffer :
    Binary('\xb8\xe0\x02\x00~\xe0\x02\x00h\xe0\x02\x00N\xe0\x02\x002\xe0\x02\x00\x1a\xe0\x02\x00\x10\xe0\x02\x00\xfc\xdf\x02\x00\xe4\xdf\x02\x00\xcc\xdf\x02\x00\xd8\xe0\x02\x00\xee\xe0\x02\x00\xfe\xe0\x02\x00\x9a\xe0\x02\x00\x16\xe1\x02\x00\x00\x00\x00\x00T\xe2\x02\x00F\xe2\x02\x004\xe2\x02\x00\x1a\xe2\
    FileName :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
    process :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
    sig :
    BCDDA
    ProcessHandle :
    1936
    BufferSize :
    82944
Network
  • check_listen_high_port  - System process has been listening on a port. detail>>

    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    listen_port :
    TCP: 32767
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    listen_port :
    TCP: 32768
  • sys_proc_connect_network  - System process connects to network (likely due to code injection or exploit). detail>>

    process :
    \Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
    connect :
    [u'10.0.2.3:53']
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    connect :
    [u'23.253.126.58:80']
Filesys
  • benign_process_drops_pe  - Benign windows process drops PE files detail>>

    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    action :
    CreateFile
    FileName :
    \??\C:\WINDOWS\system32\ntdll.dll
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    action :
    CreateFile
    FileName :
    \??\C:\Documents and Settings\sys\Application Data\Microsoft\{47410F40-4DD8-44C6-B2D3-FE2213A135AE}\e71274c5.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    action :
    CreateFile
    FileName :
    \??\C:\WINDOWS\System32\wininet.dll
Medium3
Process
  • injection_data  - Injects data into foreign processes detail>>

    process :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
    ProcessHandle :
    84
    FileName :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    232
    FileName :
    System
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    228
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\smss.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    240
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\csrss.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    236
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\winlogon.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    244
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\services.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    248
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\lsass.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    252
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    256
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    260
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    264
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    268
    FileName :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    272
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    276
    FileName :
    \Device\HarddiskVolume1\WINDOWS\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    280
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\alg.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    284
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\wscntfy.exe
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    ProcessHandle :
    288
    FileName :
    \Device\HarddiskVolume1\WINDOWS\system32\conime.exe
  • injection_data  - Injects encryption data into a foreign processes detail>>

    Buffer :
    Binary('\xe9K\x00\x00\x00\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xba\x04\x01\x00\x003\xc08\x01t\x0cA\x83\xea\x01u\xf6\xb8W\x00\x07\x80\xc3\x85\xd2u\x05\xb8W\x00\x07\x80\xc3\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc3\xc0\xc3\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xccVW
    FileName :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
    process :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
    sig :
    C
    ProcessHandle :
    1936
    BufferSize :
    100352
    Buffer :
    Binary('c|w{\xf2ko\xc50\x01g+\xfe\xd7\xabv\xca\x82\xc9}\xfaYG\xf0\xad\xd4\xa2\xaf\x9c\xa4r\xc0\xb7\xfd\x93&6?\xf7\xcc4\xa5\xe5\xf1q\xd81\x15\x04\xc7#\xc3\x18\x96\x05\x9a\x07\x12\x80\xe2\xeb\'\xb2u\t\x83,\x1a\x1bnZ\xa0R;\xd6\xb3)\xe3/\x84S\xd1\x00\xed \xfc\xb1[j\xcb\xbe9JLX\xcf\xd0\xef\xaa\xfbCM3\x85
    FileName :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
    process :
    \Device\HarddiskVolume1\Kingfisher\Kingfisher_83780e63f48cb21bea3e734857892bc1.exe
    sig :
    C
    ProcessHandle :
    1936
    BufferSize :
    46592
Tamper
  • tamper_startup_run  - Creates multiple autostart registry keys or starup file. detail>>

    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    threshold :
    2
    counts :
    2
    key or file :
    [u'\\REGISTRY\\USER\\S-1-5-21-57989841-117609710-1409082233-1003\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\e71274c5',
     u'\\REGISTRY\\MACHINE\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\\e71274c5']
Low3
Tamper
  • tamper_startup_run  - tamper run startup key value in registry or start folder detail>>

    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    value :
    C:\Documents and Settings\sys\Application Data\Microsoft\{47410F40-4DD8-44C6-B2D3-FE2213A135AE}\e71274c5.exe
    key :
    \REGISTRY\USER\S-1-5-21-57989841-117609710-1409082233-1003\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\e71274c5
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    value :
    C:\Documents and Settings\sys\Application Data\Microsoft\{47410F40-4DD8-44C6-B2D3-FE2213A135AE}\e71274c5.exe
    key :
    \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\e71274c5
Config
  • security_config  - Change security policy config. detail>>

    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    value :
    0
    key :
    \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\HARDWARE PROFILES\0001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ProxyEnable
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    value :
    1
    key :
    \REGISTRY\USER\S-1-5-21-57989841-117609710-1409082233-1003\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP\IntranetName
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    value :
    1
    key :
    \REGISTRY\USER\S-1-5-21-57989841-117609710-1409082233-1003\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP\ProxyBypass
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    value :
    0
    key :
    \REGISTRY\USER\S-1-5-21-57989841-117609710-1409082233-1003\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ProxyEnable
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    value :
    1
    key :
    \REGISTRY\USER\S-1-5-21-57989841-117609710-1409082233-1003\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP\UNCAsIntranet
Filesys
  • check_file_sysdir  - Checking Create file in Windows system directory detail>>

    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    action :
    CreateFile
    FileName :
    \??\C:\WINDOWS\system32\ntdll.dll
    process :
    \Device\HarddiskVolume1\WINDOWS\explorer.exe
    action :
    CreateFile
    FileName :
    \??\C:\WINDOWS\System32\wininet.dll