4c603d76...4e89 | VTI
Try VMRay Analyzer
VTI SCORE: 94/100
Dynamic Analysis Report
Classification: Keylogger, Spyware

4c603d763a2b79e36492413ff788e1dd795bc09c67b2f4eccad5f339ebe44e89 (SHA256)

nstpeer.exe

Windows Exe (x86-32)

Created at 2018-11-01 09:56:00

Severity Category Operation Classification
4/5
Injection Writes into the memory of another running process -
  • "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe" modifies memory of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" modifies memory of "c:\windows\explorer.exe"
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" modifies memory of "c:\windows\system32\svchost.exe"
4/5
Injection Modifies control flow of another process -
  • "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe" alters context of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" alters context of "c:\windows\explorer.exe"
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" alters context of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" creates thread in "c:\windows\explorer.exe"
3/5
Device Monitors keyboard input Keylogger
  • Installs system wide "WH_KEYBOARD_LL" hook(s) to monitor keystrokes.
2/5
Device Sends control codes to connected devices -
1/5
Anti Analysis Resolves APIs dynamically -
1/5
Information Stealing Reads system data Spyware
1/5
Persistence Installs system startup script or application -
  • Adds "C:\Users\CIiHmnxMn6Ps\AppData\Roaming\adsldraw\autoclb.exe" to Windows startup via registry.
1/5
Process Creates process with hidden window -
  • The process "C:\Users\CIIHMN~1\AppData\Local\Temp\AC4C\ADA6.bat" starts with hidden window.
  • The process "C:\Windows\system32\svchost.exe" starts with hidden window.
1/5
Process Creates a page with write and execute permissions -
  • Allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code.
1/5
Process Creates system object -
  • Creates mutex with name "Local\{6C433A47-DB67-7E7B-C560-3F92C994E3E6}".
  • Creates mutex with name "Local\{FB999B87-1EC7-E503-005F-32E93403862D}".
  • Creates mutex with name "Local\{53667D0F-9637-FD89-3837-2A81EC5BFE45}".
1/5
Process Reads from memory of another process -
  • "c:\windows\system32\svchost.exe" reads from "c:\windows\explorer.exe".
1/5
Process Overwrites code -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image