Windows Analysis Report
SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe

Overview

General Information

Sample name: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe
Analysis ID: 1431434
MD5: ffb4c4458546447f3bee304de21cd2eb
SHA1: 002c2f32ee46dacb422e75f687d8f74690184d31
SHA256: 2e823662bd36d30faea424591d4bf1557224007d9ee859917bb769a45cd4c0c6
Tags: exe
Infos:

Detection

Score: 24
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Creates files in alternative data streams (ADS)
AV process strings found (often used to terminate AV products)
Creates files inside the system directory
Detected potential crypto function
Found potential string decryption / allocating functions
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Registry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall Jump to behavior
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://aia.startssl.com/certs/sub.class2.code.ca.crt0#
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://blog.aloaha.com
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://crl.startssl.com/crtc2-crl.crl0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://crl.startssl.com/sfsca.crl0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://ocsp.startssl.com/sub/class2/code/ca0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://ocsp.thawte.com0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://www.aloaha.com/shop-en/aloaha-smart-login.php
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://www.aloaha.com/shop-en/aloaha-smart-login.php$Leaving
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2470982431.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2214764796.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.1992240817.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2407966143.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.1896431358.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.1928775661.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2181469819.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2342547839.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2247901875.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2311192642.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2118500796.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.1928655788.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.1960719350.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2533960764.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2279753063.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2023977033.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2087013980.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2023817636.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000002.2637451643.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2565522617.00000000007B1000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000003.2439512762.00000000007B1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.aloaha.com/shop-en/aloaha-smart-login.phpslator.dll945.exe:2172
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://www.aloaha.com/wi-software-en/uprade-your-aloaha-pdf-suite.php
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://www.startssl.com/0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://www.startssl.com/intermediate.pdf0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://www.startssl.com/policy.pdf0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://www.startssl.com/policy.pdf04
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://www.startssl.com/sfsca.crl0
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe String found in binary or memory: http://www.startssl.com/sfsca.crt0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe File created: C:\Windows\FalseUserPass.ini Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Code function: 0_2_004BDCB0 0_2_004BDCB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Code function: 0_2_004AC9C0 0_2_004AC9C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Code function: 0_2_004B4E60 0_2_004B4E60
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Code function: 0_2_004C5070 0_2_004C5070
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Code function: 0_2_004E3370 0_2_004E3370
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Code function: 0_2_004E8F90 0_2_004E8F90
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Code function: String function: 00523470 appears 33 times
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Static PE information: invalid certificate
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000000.1377279706.0000000000550000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamecredentialprovider.exe vs SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Binary or memory string: OriginalFilenamecredentialprovider.exe vs SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engine Classification label: sus24.evad.winEXE@1/4@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe File created: C:\Users\user\Desktop\FalseUserPass.ini:SmartLogin.txt Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Mutant created: NULL
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe File created: C:\Users\user~1\AppData\Local\Temp\~DF7FC1D6B129264C8B.TMP Jump to behavior
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe File read: C:\Windows\FalseUserPass.ini Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: msvbvm60.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: vb6zz.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: scrrun.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: winscard.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe File written: C:\Windows\FalseUserPass.ini Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Registry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall Jump to behavior
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Static file information: File size 1772168 > 1048576
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x14c000
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Code function: 0_2_004085C4 push es; ret 0_2_004085C5
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Code function: 0_2_00404206 push eax; iretd 0_2_00404231

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe File created: C:\Users\user\Desktop\FalseUserPass.ini:SmartLogin.txt Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe Binary or memory string: Shell_TrayWnd
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000002.2637034256.0000000000469000.00000020.00000001.01000000.00000003.sdmp Binary or memory string: ClamTray.exe
Source: SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, SecuriteInfo.com.BScope.Trojan.Diple.31685.13945.exe, 00000000.00000002.2637034256.0000000000469000.00000020.00000001.01000000.00000003.sdmp Binary or memory string: ClamWin.exe
No contacted IP infos