EP_X0FF wrote:Attached sample downloaded before server block.
codfullhdxavi.exe is now detected as Trojan:Win32/LockScreen.AO
Code: Select all
Report generated with Buster Sandbox Analyzer 1.87 at 19:08:55 on 06/02/2013
[ General information ]
* Analysis duration: 00:00:15
* File name: c:\m\test\codfullhdxavi.exe
* File length: 1738240 bytes
* File signature (PEiD): PureBasic 4.x -> Neil Hodgson *
* File signature (Exeinfo): *** Unknown EXE - Checksum is Set - Std Compiler section [DebuG]
* File type: EXE
* TLS hooks: NO
* File entropy: 7.99646 (99.9558%)
* ssdeep signature: 49152:muTQnzVZm8qkgjKb2zrgy1B4yE/eGh0RF2NPwwg:J4zK7kKSUgy1Ch0K
* Adobe Malware Classifier: Unknown
* Digital signature: Unsigned
* MD5 hash: cc7285b763449cf42ea3bcad37aa76fb
* SHA1 hash: f128e0cd6ee65efd2a9673f3a1cb2d745688b709
* SHA256 hash: 763d064c10fdc3a22b31197ed47f6093fbb1409ab899afa630e62330277b24aa
[ Changes to filesystem ]
* No changes
[ Changes to registry ]
* Creates value "Shell=C:\M\TEST\codfullhdxavi.EXE" in key HKEY_CURRENT_USER\software\Microsoft\Windows NT\CurrentVersion\Winlogon
binary data=43003A005C004D005C0054004500530054005C0063006F006400660075006C006C006800640078006100760069002E004500580045000000
[ Network services ]
* No changes
[ Process/window/string information ]
* Gets input locale identifiers.
* Checks for debuggers.
* Installs a hook procedure that monitors keystroke messages.
* Locks screen.