51bc3278...eee4 | VTI
Try VMRay Analyzer
VTI SCORE: 95/100
Dynamic Analysis Report
Classification: Trojan, Keylogger, Spyware

51bc32788b49aca2384cd07dce9f8ac63f07f52c27cf33c938e01c64c374eee4 (SHA256)

worldtime.exe

Windows Exe (x86-32)

Created at 2018-10-30 17:02:00

Severity Category Operation Classification
4/5
Injection Writes into the memory of another running process -
  • "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe" modifies memory of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" modifies memory of "c:\windows\explorer.exe"
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" modifies memory of "c:\windows\system32\svchost.exe"
4/5
Injection Modifies control flow of another process -
  • "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe" alters context of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" alters context of "c:\windows\explorer.exe"
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" alters context of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" creates thread in "c:\windows\explorer.exe"
3/5
Device Monitors keyboard input Keylogger
  • Installs system wide "WH_KEYBOARD_LL" hook(s) to monitor keystrokes.
2/5
File System Known suspicious file Trojan
1/5
Anti Analysis Resolves APIs dynamically -
1/5
Information Stealing Reads system data Spyware
1/5
Persistence Installs system startup script or application -
  • Adds "C:\Users\CIiHmnxMn6Ps\AppData\Roaming\adsldraw\autoclb.exe" to Windows startup via registry.
1/5
Process Creates process with hidden window -
  • The process "C:\Users\CIIHMN~1\AppData\Local\Temp\19FE\E47F.bat" starts with hidden window.
  • The process "C:\Windows\system32\svchost.exe" starts with hidden window.
1/5
Process Creates a page with write and execute permissions -
  • Allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code.
1/5
Process Creates system object -
  • Creates mutex with name "Local\{6C433A47-DB67-7E7B-C560-3F92C994E3E6}".
  • Creates mutex with name "Local\{FB999B87-1EC7-E503-005F-32E93403862D}".
  • Creates mutex with name "Local\{53667D0F-9637-FD89-3837-2A81EC5BFE45}".
1/5
Process Reads from memory of another process -
  • "c:\windows\system32\svchost.exe" reads from "c:\windows\explorer.exe".
1/5
Process Overwrites code -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image