Try VMRay Platform
Malicious
Classifications

Backdoor Injector Downloader

Threat Names

AsyncRAT DnlibLoader Mal/HTMLGen-A

Remarks (2/2)

(0x00600018): Static Analysis failed to analyze the sample due to an error. Check the sample_static_analysis.log file for further information.

(0x02000050): This analysis has been updated with the latest reputation and static analysis results from the original analysis with the ID #17994119.

Virtual Machine Information

Namewin7_64_sp1_en_mso2016
Descriptionwindows 7 (64bit SP1 -EN- MSO_2016)
Architecturex86 64-bit
Operating SystemWindows 7
Kernel Version6.1.7601.18741 (2e37f962-d699-492c-aaf3-f9f4e9770b1d)
Network Scheme NameLocal Gateway
Network Config NameLocal Gateway

Platform Information

Platform Version2024.4.1
Dynamic Engine Version2024.4.1 / 2024-10-11 04:10 (UTC+)
Static Engine Version2024.4.1.0 / 2024-10-11 03:10 (UTC+)
AV Exceptions Version2024.4.1.18 / 2024-10-18 12:10 (UTC+)
Link Detonation Heuristics Version2024.4.1.21 / 2024-10-25 08:10 (UTC+)
Config Extractors Version2024.4.1.21 / 2024-10-25 08:10 (UTC+)
Smart Memory Dumping Rules2024.4.1.18 / 2024-10-18 12:10 (UTC+)
Signature Trust Store Version2024.4.1.3 / 2024-08-31 15:08 (UTC+)
VMRay Threat Identifiers Version2024.4.1.22 / 2024-10-28 08:10 (UTC+)
YARA Built-in Ruleset Version2024.4.1.21

Anti Virus Information

Software Information

Adobe Acrobat Reader VersionNot installed
Microsoft Office2016
Microsoft Office Version16.0.4266.1001
Hangul OfficeNot installed
Hangul Office VersionNot installed
Internet Explorer Version8.0.7601.17514
Chrome VersionNot installed
Firefox VersionNot installed
Flash VersionNot installed
Java Version8.0.1710.11

System Information

Sample DirectoryC:\Users\kEecfMwgj\Desktop
Computer NameQ9IATRKPRH
User DomainQ9IATRKPRH
User NamekEecfMwgj
User ProfileC:\Users\kEecfMwgj
Temp DirectoryC:\Users\KEECFM~1\AppData\Local\Temp
System RootC:\Windows

Randomly Created Artifacts

This section provides information about processes and files that were created before the analysis was started. This is one of many steps designed to make the analysis system look more realistic and prevent evasion by environment aware malware. The number of randomly generated artifacts can be changed in the configuration.

»
Processes (20)
»
Files (293)

Customized Created Artifacts

Similar to Randomly Created Artifacts, this section lists the pre-configured files and processes that were created on the account of randomly generated artifacts, to ensure a more realistic environment.

»
Processes (43)
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image