dba40065...3ae4 | VTI
Try VMRay Analyzer
VTI SCORE: 95/100
Dynamic Analysis Report
Classification: Keylogger, Spyware, Downloader

dba40065b6efc6ae10e26ba608817ff04bdbc976e07016d78d0b4a63492e3ae4 (SHA256)

educat.exe

Windows Exe (x86-32)

Created at 2018-11-06 11:23:00

Notifications (2/3)

The maximum number of reputation file hash requests (20 per analysis) was exceeded. As a result, the reputation status could not be queried for all file hashes. In order to get the reputation status for all file hashes, please increase the 'Max File Hash Requests' setting in the system configurations.

The operating system was rebooted during the analysis.

Severity Category Operation Classification
4/5
Injection Writes into the memory of another running process -
  • "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe" modifies memory of "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe"
  • "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe" modifies memory of "c:\windows\system32\svchost.exe"
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" modifies memory of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" modifies memory of "c:\windows\explorer.exe"
4/5
Injection Modifies control flow of another process -
  • "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe" alters context of "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe"
  • "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe" alters context of "c:\windows\system32\svchost.exe"
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" alters context of "c:\windows\system32\svchost.exe"
  • "c:\windows\system32\svchost.exe" alters context of "c:\windows\explorer.exe"
  • "c:\windows\system32\svchost.exe" creates thread in "c:\windows\explorer.exe"
3/5
Device Monitors keyboard input Keylogger
  • Installs system wide "WH_KEYBOARD_LL" hook(s) to monitor keystrokes.
2/5
Anti Analysis Makes direct system call to possibly evade hooking based sandboxes -
  • Makes a direct system call to "NtUnmapViewOfSection".
  • Makes a direct system call to "NtCreateSection".
  • Makes a direct system call to "NtMapViewOfSection".
  • Makes a direct system call to "NtWriteVirtualMemory".
  • Makes a direct system call to "NtResumeThread".
2/5
Injection Writes into the memory of a process running from a created or modified executable -
  • "c:\users\ciihmnxmn6ps\desktop\educat.exe" modifies memory of "c:\users\ciihmnxmn6ps\desktop\educat.exe"
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" modifies memory of "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe"
2/5
Injection Modifies control flow of a process running from a created or modified executable -
  • "c:\users\ciihmnxmn6ps\desktop\educat.exe" alters context of "c:\users\ciihmnxmn6ps\desktop\educat.exe"
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" alters context of "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe"
1/5
Process Creates process with hidden window -
  • The process "C:\Users\CIiHmnxMn6Ps\Desktop\educat.exe" starts with hidden window.
  • The process "C:\Users\CIIHMN~1\AppData\Local\Temp\74EE\11F7.bat" starts with hidden window.
  • The process "C:\Users\CIIHMN~1\AppData\Roaming\adsldraw\autoclb.exe" starts with hidden window.
  • The process "C:\Windows\system32\svchost.exe" starts with hidden window.
  • The process "C:\Users\CIiHmnxMn6Ps\AppData\Roaming\adsldraw\autoclb.exe" starts with hidden window.
  • The process "cmd /C "systeminfo.exe > C:\Users\CIIHMN~1\AppData\Local\Temp\19E9.bin1"" starts with hidden window.
  • The process "makecab.exe /F "C:\Users\CIIHMN~1\AppData\Local\Temp\1A70.bin"" starts with hidden window.
  • The process "cmd /C "echo -------- >> C:\Users\CIIHMN~1\AppData\Local\Temp\19E9.bin1"" starts with hidden window.
  • The process "cmd /C "net view >> C:\Users\CIIHMN~1\AppData\Local\Temp\19E9.bin1"" starts with hidden window.
  • The process "cmd /C "nslookup 127.0.0.1 >> C:\Users\CIIHMN~1\AppData\Local\Temp\19E9.bin1"" starts with hidden window.
1/5
Process Reads from memory of another process -
  • "c:\users\ciihmnxmn6ps\desktop\educat.exe" reads from "C:\Users\CIiHmnxMn6Ps\Desktop\educat.exe".
  • "c:\users\ciihmn~1\appdata\roaming\adsldraw\autoclb.exe" reads from "C:\Users\CIIHMN~1\AppData\Roaming\adsldraw\autoclb.exe".
  • "c:\users\ciihmnxmn6ps\appdata\roaming\adsldraw\autoclb.exe" reads from "C:\Users\CIiHmnxMn6Ps\AppData\Roaming\adsldraw\autoclb.exe".
  • "c:\windows\system32\svchost.exe" reads from "c:\windows\explorer.exe".
1/5
Information Stealing Reads system data Spyware
1/5
Persistence Installs system startup script or application -
  • Adds "C:\Users\CIiHmnxMn6Ps\AppData\Roaming\adsldraw\autoclb.exe" to Windows startup via registry.
1/5
Process Creates a page with write and execute permissions -
  • Allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code.
1/5
Anti Analysis Resolves APIs dynamically -
1/5
Process Creates system object -
  • Creates mutex with name "Local\{6C433A47-DB67-7E7B-C560-3F92C994E3E6}".
  • Creates mutex with name "Local\{FB999B87-1EC7-E503-005F-32E93403862D}".
  • Creates mutex with name "Local\{53667D0F-9637-FD89-3837-2A81EC5BFE45}".
1/5
File System Creates an unusually large number of files -
1/5
Process Overwrites code -
1/5
Static Unparsable sections in file -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\CIiHmnxMn6Ps\Desktop\educat.exe.
1/5
Network Downloads data Downloader
  • URL "HTTP://niperola.com/images/t6PwZYW0/cwkgo0TWfMQHPzKoEhmhJLv/8xMTE7Bjb3/6yiIg6baAjQrmWmCu/oaAKJTAh4aj_/2FdUbObIyhn/toBDPBWCqqthMV/_2Fi6S58Tlr8_2Fc9EnJI/0JJFxlEUO4PkOIv1/mxmKqNdu6KajDSE/8RmL8TP2Um0tgLQM0J/q4I5r7_2B/BO0SxznfuPly89dHTrGO/Jp3FDd.gif".
  • URL "HTTP://niperola.com/images/Sdr0veeuxIs423cs/Tnd8mVY43F4Qywc/WFq_2BFq4udNXnLEI2/5yYbo8vUX/ULdIWHIiDOgCDHKlSdf3/B7HpHHGg3GOf8WqKrA6/TIQoZxKGHkt3LMqIHtwgl_/2BMJVT34_2F7R/orrQrI0V/AN4ZHJmhdykJRQp3JPz37jX/OoN9d1bleg/mH9QzEoevwxCrl6nn/Hi6TCdygympm/FY8i_2Fz1zb/uDNd_2Bho/8_2B.bmp".
1/5
Network Connects to HTTP server -
  • URL "niperola.com/images/t6PwZYW0/cwkgo0TWfMQHPzKoEhmhJLv/8xMTE7Bjb3/6yiIg6baAjQrmWmCu/oaAKJTAh4aj_/2FdUbObIyhn/toBDPBWCqqthMV/_2Fi6S58Tlr8_2Fc9EnJI/0JJFxlEUO4PkOIv1/mxmKqNdu6KajDSE/8RmL8TP2Um0tgLQM0J/q4I5r7_2B/BO0SxznfuPly89dHTrGO/Jp3FDd.gif".
  • URL "niperola.com/images/Sdr0veeuxIs423cs/Tnd8mVY43F4Qywc/WFq_2BFq4udNXnLEI2/5yYbo8vUX/ULdIWHIiDOgCDHKlSdf3/B7HpHHGg3GOf8WqKrA6/TIQoZxKGHkt3LMqIHtwgl_/2BMJVT34_2F7R/orrQrI0V/AN4ZHJmhdykJRQp3JPz37jX/OoN9d1bleg/mH9QzEoevwxCrl6nn/Hi6TCdygympm/FY8i_2Fz1zb/uDNd_2Bho/8_2B.bmp".
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image