valkyrie logo
valkyrie logo
  • Download Threat Hunter Assessment Tool
DASHBOARD
  • Unknown File Hunter Scans
STATISTICS
SETTINGS
  • Summary
  • Static Analysis
  • Dynamic Analysis
  • Precise Detectors
  • File Details
Analyzing...
File Name:   Trojan.MSIL.Crypt.dnbp-929b9dcfc8a43721ece5cb448cb486fbf5f5ded0f290eb1973a1ade67a1fab10
SHA1:   c85530bfd84b61f2aaad539a348d3032b934f8a2
MD5:   630582ca84cc7d3b995c79cf19f67397
First Seen Date:  2023-07-26 19:36:44.507278 ( 2023-07-26 19:36:44.507278 )
Number of Clients Seen:   5
Last Analysis Date:  2023-07-26 20:45:10.873525 ( 2023-07-26 20:45:10.873525 )
Human Expert Analysis Result:   No human expert analysis verdict given to this sample yet.

Analysis Summary

Analysis Type Date Verdict
Signature Based Detection 2023-07-27 13:56:29.981506 Malware
Static Analysis Overall Verdict 2023-07-26 20:45:10.873525 No Threat Found help
Dynamic Analysis Overall Verdict 2023-07-26 20:45:10.873525 No Threat Found help
Precise Detectors Overall Verdict 2023-07-26 20:45:10.873525 No Match help

Static Analysis

Static Analysis Overall Verdict Result
No Threat Found help
Detector Result
Optional Header LoaderFlags field is valued illegal Clean
Non-ascii or empty section names detected Clean
Illegal size of optional Header Clean
Packer detection on signature database Unknown help
Based on the sections entropy check! file is possibly packed Clean
Timestamp value suspicious Suspicious
Header Checksum is zero! Clean
Enrty point is outside the 1st(.code) section! Binary is possibly packed Clean
Optional Header NumberOfRvaAndSizes field is valued illegal Clean
Anti-vm present Clean
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger Suspicious
TLS callback functions array detected Clean

Dynamic Analysis

Dynamic Analysis Overall Verdict Result
No Threat Found help
Suspicious Behaviors
Creates a child process
Writes to address space of another process
Uses a function clandestinely
Reads memory of another process
Opens a file in a system directory

Trojan.MSIL.Crypt.dnbp-929b9dcfc8a43721ece5cb448cb486fbf5f5ded0f290eb1973a1ade67a1fab10 tried to connect to some addresses pinned on the map below (click pins for more details):

Behavioral Information

LoadLibrary

MSCOREE.DLL

Kernel32.dll

ADVAPI32.dll

kernel32.dll

SHLWAPI.dll

C:\Windows\system32\ole32.dll

C:\Windows\system32\uxtheme.dll

C:\Windows\system32\shell32.dll

ole32.dll

comctl32.dll

C:\Windows\system32\shfolder.dll

C:\Windows\system32\Rstrtmgr.dll

C:\Windows\SysWOW64\bcryptprimitives.dll

C:\Users\win7\AppData\Local\Temp\is-ECSF5.tmp\isxdl.dll

wininet.dll

C:\Windows\system32\msi.dll

UxTheme.dll

IMM32.dll

C:\Windows\system32\imageres.dll

C:\Windows\system32\shlwapi.dll

C:\Windows\system32\RICHED20.DLL

CreateProcess

"C:\Users\win7\AppData\Local\Temp\is-ECSF5.tmp\dotnetchk.exe"

CreateMutex

<NULL>

Local\RstrMgr3887CAB8-533F-4C85-B0DC-3E5639F8D511

Local\RstrMgr-3887CAB8-533F-4C85-B0DC-3E5639F8D511-Session0000

OpenMutex

Local\MSCTF.Asm.MutexDefault1

DefaultTabtip-MainUI

WriteFile

C:\Users\win7\AppData\Local\Temp\is-ECSF5.tmp\isxdl.dll

C:\Users\win7\AppData\Local\Temp\is-ECSF5.tmp\_isetup\_setup64.tmp

C:\Users\win7\AppData\Local\Temp\is-ECSF5.tmp\dotnetchk.exe

C:\[uTrojan.MSIL.Crypt.dnbp-929b9dcfc8a43721ece5cb448cb486fbf5f5ded0f290eb1973a1ade67a1fab10]

ReadFile

C:\[uTrojan.MSIL.Crypt.dnbp-929b9dcfc8a43721ece5cb448cb486fbf5f5ded0f290eb1973a1ade67a1fab10]

C:\Windows\Fonts\staticcache.dat

QueryFilePath

C:\Users\win7\AppData\Local\Temp\is-ECSF5.tmp\dotnetchk.exe

C:\Users\win7\AppData\Local\Temp\is-IFO05.tmp\[uTrojan.MSIL.Crypt.tmp

C:\Windows\system32\MSCOREE.DLL

C:\Windows\syswow64\MSCTF.dll

C:\Windows\syswow64\USER32.dll

C:\Windows\system32\RICHED20.DLL

OpenRegistryKey

\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\M

\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Micro

\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFra

\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\LanguagePack\SurrogateFallback

\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft

\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion

\REGISTRY\MACHINE\SOFTWARE\Microsoft\.NETFramework

\REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NE

QueryProcessAddress

InternetReadFile

CreateRegistryKey

\REGISTRY\US

Precise Detectors Analysis Results

Detector Name Date Verdict Reason
Static Precise PUA Detector 1 2023-07-26 20:45:06.848929 No Match help NotDetected
Static Precise PUA Detector 4 2023-07-26 20:45:06.868639 No Match help NotDetected
Static Precise NI Detector 3 2023-07-26 20:45:06.966184 No Match help NotDetected
Static Precise PUA Detector 5 2023-07-26 20:45:06.968633 No Match help NotDetected
Static Precise Trojan Detector 1 2023-07-26 20:45:06.978987 No Match help NotDetected
Static Precise Trojan Detector 3 2023-07-26 20:45:06.972910 No Match help NotDetected
Static Precise PUA Detector 6 2023-07-26 20:45:07.045078 No Match help NotDetected
Static Precise Trojan Detector 12 2023-07-26 20:45:07.080607 No Match help NotDetected
Static Precise Virus Detector 1 2023-07-26 20:45:07.126898 No Match help NotDetected
Static Precise Virus Detector 2 2023-07-26 20:45:07.122608 No Match help NotDetected
Static Precise Trojan Detector 13 2023-07-26 20:45:07.181823 No Match help NotDetected
Static Precise PUA Detector 2 2023-07-26 20:45:07.175466 No Match help NotDetected

Advance Heuristics

No Advanced Heuristic Analysis Result Received

Detector Result

Additional File Information

Vendor Validation

Certificate Validation

PE Headers

Property Value

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy MD5

PE Imports

PE Exports

PE Resources

© Verdict Cloud, Xcitium, Inc. 2025. All rights reserved. v1.49.0-72-ENT
 
 
 
 
Loading...