PUP.MSIL.Brute.BBY

Analysis Report

General information

Family Name: PUP.MSIL.Brute.BBY
Signature status: No Signature

Known Samples

MD5: 38109e56e13f6b8a2d676d51984517a5
SHA1: c1aad21edc5d8859fb905f5a63e3ef5b0a144eb5
SHA256: AE790290BEC64A919451C27E62F99FC7F5626AFA02B7E452D74AFF67E1A89314
File Size: 170.50 KB, 170496 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description Monitor
File Version 1.0.0.0
Internal Name Monitor.exe
Legal Copyright Copyright © 2019
Original Filename Monitor.exe
Product Name Monitor
Product Version 1.0.0.0

File Traits

  • .NET
  • .sdata
  • x86

Block Information

Total Blocks: 70
Potentially Malicious Blocks: 2
Whitelisted Blocks: 59
Unknown Blocks: 9

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? x ? 0 ? ? ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.FacebookHack.WS
  • MSIL.Flooder.C
  • MSIL.KillProc.GB
  • MSIL.PSW.Agent.LQ
  • MSIL.Spy.Agent.XG
Show More
  • PSW.Agent.BM

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\windows\appcompat\programs\amcache.hve Read Data,Read Control,Write Data
c:\windows\appcompat\programs\amcache.hve Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\software\microsoft\tip\aggregateresults::data 馐ʊ耀ŚT隞̃耀꧌Цȳ RegNtPreCreateKey

Windows API Usage

Category API
User Data Access
  • GetUserObjectInformation
Anti Debug
  • IsDebuggerPresent
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory
Process Shell Execute
  • CreateProcess
Encryption Used
  • BCryptOpenAlgorithmProvider

Shell Command Execution

C:\Windows\Microsoft.NET\Framework\v2.0.50727\\dw20.exe dw20.exe -x -s 848

Trending

Most Viewed

Loading...