Attached is the file . Lets analysis this ..
Upas advert:
VT Scan: https://www.virustotal.com/file/1e87d2c ... 341437412/
A forum for reverse engineering, OS internals and malware analysis
[1184]explorer.exe-->ntdll.dll-->NtDeleteValueKey, Type: Inline - RelativeJump 0x7C90D250-->01EF429C [unknown_code_page]
[1184]explorer.exe-->ntdll.dll-->NtEnumerateValueKey, Type: Inline - RelativeJump 0x7C90D2D0-->01EF4750 [unknown_code_page]
[1184]explorer.exe-->ntdll.dll-->NtOpenProcess, Type: Inline - RelativeJump 0x7C90D5E0-->01EF41D3 [unknown_code_page]
[1184]explorer.exe-->ntdll.dll-->NtQueryDirectoryFile, Type: Inline - RelativeJump 0x7C90D750-->01EF47E2 [unknown_code_page]
[1184]explorer.exe-->ntdll.dll-->NtQuerySystemInformation, Type: Inline - RelativeJump 0x7C90D910-->01EF44B0 [unknown_code_page]
[1184]explorer.exe-->ntdll.dll-->NtResumeThread, Type: Inline - RelativeJump 0x7C90DB20-->01EF41FE [unknown_code_page]
[1184]explorer.exe-->ntdll.dll-->NtSetInformationFile, Type: Inline - RelativeJump 0x7C90DC40-->01EF4518 [unknown_code_page]
[1184]explorer.exe-->ntdll.dll-->NtSetValueKey, Type: Inline - RelativeJump 0x7C90DDB0-->01EF437D [unknown_code_page]
[1184]explorer.exe-->ntdll.dll-->NtWriteFile, Type: Inline - RelativeJump 0x7C90DF60-->01EF45E4 [unknown_code_page]
7C90D2D0: E97B745085 jmp 01E14750h
7C90D2D5: BA0003FE7F mov edx, 7FFE0300h
7C90D2DA: FF12 call [edx]
7C90D2DC: C21800 retn 0018h
GetVolumeInformationW(&RootPathName, 0, 0, &VolumeSerialNumber, 0, 0, 0, 0);
if ( VolumeSerialNumber == 0xCD1A40 || sub_402999() == 1 )
{
MessageBoxA(0, "Think with your dipstick, Jimmy!", "ERROR_BRAIN_TOO_SMALL", 0x10u);
ExitProcess('dumb');
}
leeno wrote:Attached is the file . Lets analysis this ..more upass samples
leeno wrote:leeno wrote:Attached is the file . Lets analysis this ..more upass samples
leeno wrote:leeno wrote:leeno wrote:Attached is the file . Lets analysis this ..more upass samples