valkyrie logo
valkyrie logo
  • Download Threat Hunter Assessment Tool
DASHBOARD
  • Unknown File Hunter Scans
STATISTICS
SETTINGS
  • Summary
  • Static Analysis
  • Dynamic Analysis
  • Precise Detectors
  • Human Expert Analysis
  • File Details
Analyzing...
File Name:   virussign.com_61a842239918df7a3f160f433bf750e0.exe
SHA1:   3b6779ad0ca05cd82c7448c259711cb2f3ad2add
MD5:   61a842239918df7a3f160f433bf750e0
First Seen Date:  2024-11-10 15:27:33.994456 ( 2024-11-10 15:27:33.994456 )
Number of Clients Seen:   3
Last Analysis Date:  2024-11-11 08:20:39.531146 ( 2024-11-11 08:20:39.531146 )
Human Expert Analysis Date:  2024-11-11 08:20:38.965444 ( 2024-11-11 08:20:38.965444 )
Human Expert Analysis Result:   Malware

Analysis Summary

Analysis Type Date Verdict
Signature Based Detection 2024-11-10 18:21:27.275650 Malware
Static Analysis Overall Verdict 2024-11-11 08:20:39.531146 No Threat Found help
Dynamic Analysis Overall Verdict 2024-11-11 08:20:39.531146 No Threat Found help
Precise Detectors Overall Verdict 2024-11-11 08:20:39.531146 No Match help
Human Expert Analysis Overall Verdict 2024-11-11 08:20:38.965444 Malware

Static Analysis

Static Analysis Overall Verdict Result
No Threat Found help
Detector Result
Optional Header LoaderFlags field is valued illegal Clean
Non-ascii or empty section names detected Clean
Illegal size of optional Header Clean
Packer detection on signature database Unknown help
Based on the sections entropy check! file is possibly packed Clean
Timestamp value suspicious Clean
Header Checksum is zero! Suspicious
Enrty point is outside the 1st(.code) section! Binary is possibly packed Clean
Optional Header NumberOfRvaAndSizes field is valued illegal Clean
Anti-vm present Clean
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger Clean
TLS callback functions array detected Clean

Dynamic Analysis

Dynamic Analysis Overall Verdict Result
No Threat Found help
Suspicious Behaviors
Creates a child process
Writes to address space of another process
Uses a function clandestinely
Reads memory of another process
Opens a file in a system directory
Has no visible windows

virussign.com_61a842239918df7a3f160f433bf750e0.exe tried to connect to some addresses pinned on the map below (click pins for more details):

Behavioral Information

CopyFile

{"lpNewFileName": "C:\\Windows\\system32\\vodmntrnmkpzlbv.exe", "lpExistingFileName": "C:\\virussign.com_61a842239918df7a3f160f433bf750e0.exe"}

{"lpNewFileName": "C:\\Windows\\system32\\ixwvmfcfmx.exe", "lpExistingFileName": "C:\\virussign.com_61a842239918df7a3f160f433bf750e0.exe"}

{"lpNewFileName": "C:\\Windows\\system32\\mikbpxnu.exe", "lpExistingFileName": "C:\\virussign.com_61a842239918df7a3f160f433bf750e0.exe"}

{"lpNewFileName": "C:\\Windows\\system32\\fuvmermpyxmqf.exe", "lpExistingFileName": "C:\\virussign.com_61a842239918df7a3f160f433bf750e0.exe"}

QueryFilePath

C:\Windows\SysWOW64\fuvmermpyxmqf.exe

C:\virussign.com_61a842239918df7a3f160f433bf750e0.exe

C:\Windows\system32\PROPSYS.dll

LowerChar

.rtf

document

CreateMutex

<NULL>

ReadFile

C:\Windows\SysWOW64\fuvmermpyxmqf.exe

C:\Windows\system32\ixwvmfcfmx.exe

C:\Windows\system32\vodmntrnmkpzlbv.exe

C:\Windows\system32\mikbpxnu.exe

C:\Windows\system32\fuvmermpyxmqf.exe

C:\Users\win7\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000010.db

C:\Users\win7\Desktop\desktop.ini

WriteFile

C:\Windows\system32\mikbpxnu.exe

C:\Windows\system32\vodmntrnmkpzlbv.exe

C:\Windows\mydoc.rtf

C:\Windows\system32\ixwvmfcfmx.exe

C:\Windows\system32\fuvmermpyxmqf.exe

CreateProcess

ixwvmfcfmx.exe

vodmntrnmkpzlbv.exe

mikbpxnu.exe

fuvmermpyxmqf.exe

LoadLibrary

kernel32.dll

uxtheme.dll

comctl32.dll

ole32.dll

ADVAPI32.dll

SHELL32.dll

UxTheme.dll

IMM32.dll

API-MS-Win-Core-LocalRegistry-L1-1-0.dll

propsys.dll

ntmarta.dll

C:\Windows\system32\sfc.dll

QueryProcessAddress

IsDebuggerPresent

Precise Detectors Analysis Results

Detector Name Date Verdict Reason
Static Precise PUA Detector 1 2024-11-10 15:27:29.027310 No Match help NotDetected
Static Precise PUA Detector 4 2024-11-10 15:27:29.034335 No Match help NotDetected
Static Precise NI Detector 3 2024-11-10 15:27:29.107543 No Match help NotDetected
Static Precise PUA Detector 5 2024-11-10 15:27:29.129019 No Match help NotDetected
Static Precise Trojan Detector 1 2024-11-10 15:27:29.136321 No Match help NotDetected
Static Precise Trojan Detector 3 2024-11-10 15:27:29.136539 No Match help NotDetected
Static Precise PUA Detector 6 2024-11-10 15:27:29.166033 No Match help NotDetected
Static Precise Trojan Detector 12 2024-11-10 15:27:29.202855 No Match help NotDetected
Static Precise Virus Detector 1 2024-11-10 15:27:29.245787 No Match help NotDetected
Static Precise Virus Detector 2 2024-11-10 15:27:29.248504 No Match help NotDetected
Static Precise Trojan Detector 13 2024-11-10 15:27:29.295856 No Match help NotDetected
Static Precise PUA Detector 2 2024-11-10 15:27:29.304534 No Match help NotDetected

Advance Heuristics

No Advanced Heuristic Analysis Result Received

Detector Result

Human Expert Analysis Results

Analysis Start Date:   2024-11-11 06:12:12.634481 ( 2024-11-11 06:12:12.634481 )
Analysis End Date:  2024-11-11 08:20:38.965444 ( 2024-11-11 08:20:38.965444 )
File Upload Date:  2024-11-10 15:27:17.975318 ( 2024-11-10 15:27:17.975318 )
Update Date:  2024-11-11 08:20:39.358227 ( 2024-11-11 08:20:39.358227 )
Human Expert Analyst Feedback:  
Verdict:   Malware
Malware Family:  
Malware Type:   Worm

Additional File Information

Vendor Validation

Certificate Validation

PE Headers

Property Value

File Paths

File Path on Client Seen Count
virussign.com_61a842239918df7a3f160f433bf750e0.exe 1

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy MD5

PE Imports

PE Exports

PE Resources

© Verdict Cloud, Xcitium, Inc. 2025. All rights reserved. v1.49.0-72-ENT
 
 
 
 
Loading...