2b277c41...90cf | VTI
Try VMRay Analyzer
VTI SCORE: 98/100
Dynamic Analysis Report
Classification: Trojan, Keylogger, Spyware

2b277c411944cb25bf454ad5dc38d32e8eed45eac058304982c15646720990cf (SHA256)

beckky.exe

Windows Exe (x86-32)

Created at 2018-10-24 12:43:00

Severity Category Operation Classification
4/5
File System Known malicious file Trojan
4/5
Injection Writes into the memory of another running process -
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" modifies memory of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" modifies memory of "c:\windows\explorer.exe"
4/5
Injection Modifies control flow of another process -
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" alters context of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" alters context of "c:\windows\explorer.exe"
  • "c:\windows\system32\svchost.exe" creates thread in "c:\windows\explorer.exe"
3/5
Device Monitors keyboard input Keylogger
  • Installs system wide "WH_KEYBOARD_LL" hook(s) to monitor keystrokes.
1/5
Anti Analysis Resolves APIs dynamically -
1/5
Information Stealing Reads system data Spyware
1/5
Persistence Installs system startup script or application -
  • Adds "C:\Users\CIiHmnxMn6Ps\AppData\Roaming\adsldraw\autoclb.exe" to Windows startup via registry.
1/5
Process Creates process with hidden window -
  • The process "C:\Users\CIIHMN~1\AppData\Local\Temp\D232\4099.bat" starts with hidden window.
  • The process "C:\Windows\system32\svchost.exe" starts with hidden window.
1/5
Process Creates a page with write and execute permissions -
  • Allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code.
1/5
Process Creates system object -
  • Creates mutex with name "Local\{6C433A47-DB67-7E7B-C560-3F92C994E3E6}".
  • Creates mutex with name "Local\{FB999B87-1EC7-E503-005F-32E93403862D}".
  • Creates mutex with name "Local\{53667D0F-9637-FD89-3837-2A81EC5BFE45}".
1/5
Process Reads from memory of another process -
  • "c:\windows\system32\svchost.exe" reads from "c:\windows\explorer.exe".
1/5
Process Overwrites code -
1/5
Process Process crashed -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image