valkyrie logo
valkyrie logo
  • Download Threat Hunter Assessment Tool
DASHBOARD
  • Unknown File Hunter Scans
STATISTICS
SETTINGS
  • Summary
  • Static Analysis
  • Dynamic Analysis
  • Precise Detectors
  • Human Expert Analysis
  • File Details
Analyzing...
File Name:   6c7a2124b7076383f577eb0042f9ea917b2b4066
SHA1:   6c7a2124b7076383f577eb0042f9ea917b2b4066
MD5:   8432070440b9827f88a75bef7e65dd60
First Seen Date:  2024-10-09 06:33:18.614680 ( 2024-10-09 06:33:18.614680 )
Number of Clients Seen:   3
Last Analysis Date:  2024-10-09 14:40:15.364575 ( 2024-10-09 14:40:15.364575 )
Human Expert Analysis Date:  2024-10-09 14:39:52.064805 ( 2024-10-09 14:39:52.064805 )
Human Expert Analysis Result:   Malware

Analysis Summary

Analysis Type Date Verdict
Signature Based Detection 2024-10-09 14:40:15.364575 Malware
Static Analysis Overall Verdict 2024-10-09 14:40:15.364575 No Match help
Dynamic Analysis Overall Verdict 2024-10-09 14:40:15.364575 Highly Suspicious
Precise Detectors Overall Verdict 2024-10-09 14:40:15.364575 No Match help
Human Expert Analysis Overall Verdict 2024-10-09 14:39:52.064805 Malware

Static Analysis

Static Analysis Overall Verdict Result
Detector Result
Optional Header LoaderFlags field is valued illegal Clean
Non-ascii or empty section names detected Clean
Illegal size of optional Header Clean
Packer detection on signature database Unknown help
Based on the sections entropy check! file is possibly packed Clean
Timestamp value suspicious Clean
Header Checksum is zero! Suspicious
Enrty point is outside the 1st(.code) section! Binary is possibly packed Clean
Optional Header NumberOfRvaAndSizes field is valued illegal Clean
Anti-vm present Clean
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger Suspicious
TLS callback functions array detected Clean

Dynamic Analysis

Dynamic Analysis Overall Verdict Result
Highly Suspicious
Suspicious Behaviors
Creates a child process
Writes to address space of another process
Logs user key strokes
Reads memory of another process
Opens a file in a system directory
Has no visible windows

6c7a2124b7076383f577eb0042f9ea917b2b4066 tried to connect to some addresses pinned on the map below (click pins for more details):

Behavioral Information

QueryFilePath

C:\6c7a2124b7076383f577eb0042f9ea917b2b4066

C:\Windows\system32\RichEd20.DLL

C:\Windows\SysWOW64\ieframe.dll

C:\Windows\system32\propsys.dll

LowerChar

.exe

program

file

CreateProcess

"C:\Windows\System32\cmd.exe" /c move Tall Tall.bat & Tall.bat

ReadFile

C:\Users\win7\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x0000000000000010.db

C:\Users\win7\Desktop\desktop.ini

C:\6c7a2124b7076383f577eb0042f9ea917b2b4066

DeleteFile

C:\Users\win7\AppData\Local\Temp\nsnD11.tmp

WriteFile

C:\Users\win7\AppData\Local\Temp\Norwegian

C:\Users\win7\AppData\Local\Temp\Booty

C:\Users\win7\AppData\Local\Temp\Picking

C:\Users\win7\AppData\Local\Temp\Awareness

C:\Users\win7\AppData\Local\Temp\Distributor

C:\Users\win7\AppData\Local\Temp\Tours

C:\Users\win7\AppData\Local\Temp\Mysql

C:\Users\win7\AppData\Local\Temp\Tall

CreateMutex

<NULL>

Local\ZonesCacheCounterMutex

Local\ZonesLockedCacheCounterMutex

LoadLibrary

imm32.dll

SHFOLDER

ole32.dll

comctl32.dll

ADVAPI32.dll

SHELL32.dll

API-MS-Win-Core-LocalRegistry-L1-1-0.dll

propsys.dll

ntmarta.dll

RichEd20

C:\Windows\SysWOW64\ieframe.dll

kernel32.dll

Secur32.dll

API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL

OLEAUT32.dll

OpenRegistryKey

\REGISTRY\MACHINE\SOFTWARE\Microsoft\Win

\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN

\REGISTRY\MACHINE\SOFTWARE\Wow64

\REGISTRY\USER\.DEFAULT\Control Panel\Desktop

Precise Detectors Analysis Results

Detector Name Date Verdict Reason
Static Precise PUA Detector 1 2024-10-09 06:32:47.713445 No Match help NotDetected
Static Precise PUA Detector 4 2024-10-09 06:32:47.709595 No Match help NotDetected
Static Precise NI Detector 3 2024-10-09 06:32:47.766073 No Match help NotDetected
Static Precise PUA Detector 5 2024-10-09 06:32:47.832371 No Match help NotDetected
Static Precise Trojan Detector 1 2024-10-09 06:32:48.005922 No Match help NotDetected
Static Precise Trojan Detector 3 2024-10-09 06:32:47.981743 No Match help NotDetected
Static Precise PUA Detector 6 2024-10-09 06:32:48.094531 No Match help NotDetected
Static Precise Trojan Detector 12 2024-10-09 06:32:48.063401 No Match help NotDetected
Static Precise Virus Detector 1 2024-10-09 06:32:48.277617 No Match help NotDetected
Static Precise Virus Detector 2 2024-10-09 06:32:48.233850 No Match help NotDetected
Static Precise Trojan Detector 13 2024-10-09 06:32:48.279351 No Match help NotDetected
Static Precise PUA Detector 2 2024-10-09 06:32:48.291296 No Match help NotDetected

Advance Heuristics

No Advanced Heuristic Analysis Result Received

Detector Result

Human Expert Analysis Results

Analysis Start Date:   2024-10-09 08:33:53.986639 ( 2024-10-09 08:33:53.986639 )
Analysis End Date:  2024-10-09 14:39:52.064805 ( 2024-10-09 14:39:52.064805 )
File Upload Date:  2024-10-09 07:31:47.877377 ( 2024-10-09 07:31:47.877377 )
Update Date:  2024-10-09 14:40:14.762533 ( 2024-10-09 14:40:14.762533 )
Human Expert Analyst Feedback:  
Verdict:   Malware
Malware Family:   Trojware
Malware Type:   Trojan Generic

Additional File Information

Vendor Validation

Certificate Validation

PE Headers

Property Value

File Paths

File Path on Client Seen Count
file/to/path 1

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy MD5

PE Imports

PE Exports

PE Resources

© Verdict Cloud, Xcitium, Inc. 2025. All rights reserved. v1.49.0-72-ENT
 
 
 
 
Loading...