Keylogger Packed with Open-Source C# Crypter | VTI
Try VMRay Analyzer
VTI SCORE: 96/100
Dynamic Analysis Report
Classification: Trojan, Dropper, Keylogger

62dcc35536fc49377722d40cf6fe4d924bd415aeb9a9036be067b25a306dd845 (SHA256)

muziko66.EXE

Windows Exe (x86-32)

Created at 2018-11-20 16:22:00

Notifications (2/3)

Some extracted files may be missing in the report since the maximum number of extracted files was reached during the analysis. You can increase the limit in the configuration settings.

The maximum number of reputation file hash requests (20 per analysis) was exceeded. As a result, the reputation status could not be queried for all file hashes. In order to get the reputation status for all file hashes, please increase the 'Max File Hash Requests' setting in the system configurations.

The operating system was rebooted during the analysis.

Severity Category Operation Classification
4/5
File System Known malicious file Trojan
4/5
Injection Writes into the memory of another running process -
  • "c:\users\ciihmnxmn6ps\appdata\local\utorrent.exe" modifies memory of "c:\windows\explorer.exe"
  • "c:\users\ciihmnxmn6ps\appdata\local\utorrent.exe" modifies memory of "c:\windows\syswow64\explorer.exe"
4/5
Injection Modifies control flow of another process -
  • "c:\users\ciihmnxmn6ps\appdata\local\utorrent.exe" creates thread in "c:\windows\syswow64\explorer.exe"
2/5
Anti Analysis Delays execution -
2/5
Anti Analysis Tries to detect virtual machine -
  • Possibly trying to detect VM via rdtsc.
2/5
File System Known suspicious file Trojan
1/5
Persistence Installs system startup script or application -
  • Adds "C:\Users\CIiHmnxMn6Ps\AppData\Local\winamp.exe" to Windows startup via registry.
  • Adds "C:\Windows\system32\install\svchost.exe" to Windows startup via registry.
  • Adds "C:\Users\CIiHmnxMn6Ps\AppData\Roaming\install\svchost.exe" to Windows startup via registry.
1/5
Process Creates process with hidden window -
  • The process "C:\Users\CIiHmnxMn6Ps\AppData\Local\uTorrent.exe" starts with hidden window.
1/5
Process Creates system object -
1/5
File System Modifies operating system directory -
  • Creates file "C:\Windows\system32\install\svchost.exe" in the OS directory.
  • Modifies file "C:\Windows\system32\install\svchost.exe" in the OS directory.
1/5
Process Creates a page with write and execute permissions -
  • Allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code.
1/5
Anti Analysis Resolves APIs dynamically -
1/5
Device Monitors keyboard input Keylogger
1/5
Information Stealing Reads system data -
1/5
Network Performs DNS request -
1/5
Static Unparsable sections in file -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\CIiHmnxMn6Ps\Desktop\muziko66.EXE.
1/5
PE Drops PE file Dropper
1/5
PE Executes dropped PE file -
  • Executes dropped file "C:\Users\CIiHmnxMn6Ps\AppData\Local\uTorrent.exe".
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image