0 Members and 1 Guest are viewing this topic.
Xandora is a service for analyzing malware.Submit your Windows executable and receive an analysis report telling you what it does.
Joedoc is a novel automated runtime system for detecting exploits in applications running on end-user systems.In its beta state it currently detects PDF exploits for Acrobat Reader 7.0.5, 8.1.2, 9.0 and 9.2.To check if your pdf contains any malicious content follow the instructions below: 1. Add your pdfs (with .pdf extension) to a zip and protect the zip with the password "infected". 2. Send your zip file to submit@joedoc.org as an email attachement. 3. Wait for the result which is sent back after a short while.By submitting data to Joedoc you agree to the following terms and conditions.Be patient we are currently adding features to detect exploits for Internet Explorer 8.0 and 9.0 as well as Microsoft Office documents.
JoeDochttp://joedoc.org/QuoteJoedoc is a novel automated runtime system for detecting exploits in applications running on end-user systems.In its beta state it currently detects PDF exploits for Acrobat Reader 7.0.5, 8.1.2, 9.0 and 9.2.To check if your pdf contains any malicious content follow the instructions below: 1. Add your pdfs (with .pdf extension) to a zip and protect the zip with the password "infected". 2. Send your zip file to submit@joedoc.org as an email attachement. 3. Wait for the result which is sent back after a short while.By submitting data to Joedoc you agree to the following terms and conditions.Be patient we are currently adding features to detect exploits for Internet Explorer 8.0 and 9.0 as well as Microsoft Office documents.
We can accept any type of file including executables, documents, spreadsheets, presentations, compiled help files, database packages, PDF, images, emails, or archives. You can also submit a file from a remote web address.Our scanning system will automatically process and email you back a report about your submitted files. Occasionally we may contact you for more information about particularly interesting samples, together we can help make the internet a safer place for everyone.For your convenience, you can also forward your malware samples by email to hereyougo@vicheck.ca . Please try to include the full email headers wherever possible (you may need to view headers then copy and paste them into the forwarded message.)
View PDF objects as hex/text, PDF dissector and inspector, scan for known exploits (CVE-2007-5659, CVE-2009-0927, CVE-2008-2992, CVE-2009-4324, CVE-2009-1493, CVE-2010-0188 and embedded /Action commands), process PDF compression (FlateDecode, ASCIIHexDecode, LZWDecode, ASCII85Decode, RunLengthDecode), encryption (128 bit AESV2), and obfuscation (unicode, Hex, fromCharCode). Browse objects.
Does anyone know what was used to produce this report? Seems like a nice little tool!
.__ ___. _____ _____ | | \_ |__ ____ ___ ___ / \ \__ \ | | | __ \ / _ \\ \/ / | Y Y \ / __ \_| |__| \_\ \( <_> )> < |__|_| /(____ /|____/|___ / \____//__/\_ \ \/ \/ \/ \/ =====Sample Summary=====File name: sample.exeMD5: 439C24E6CA0CD8CE7986F834B83A70FCSHA1: A002376D70F119E2DFA6EE2FC50389565A767065SHA256: DFD5F008815BE4735799BD05515C7B3130224AE3A965BF3704290583295A41E1=====Major Threats=====[Create file in sensitive path] C:\flash.exe=====Behavior Details=====Create process:sample.exe --> C:\WINDOWS\system32\cmd.execmd.exe --> C:\WINDOWS\system32\reg.exesample.exe --> C:\WINDOWS\system32\ntvdm.exeCreate remote thread:sample.exe --> cmd.execmd.exe --> reg.exesample.exe --> ntvdm.exeCreate file:sample.exe --> C:\WINDOWS\TEMP\HXVsB.batsample.exe --> C:\flash.exentvdm.exe --> C:\WINDOWS\TEMP\scs3.tmpntvdm.exe --> C:\WINDOWS\TEMP\scs4.tmpDelete file:sample.exe --> C:\WINDOWS\Temp\HXVsB.batntvdm.exe --> C:\WINDOWS\Temp\scs3.tmpntvdm.exe --> C:\WINDOWS\Temp\scs4.tmpCreate key:sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folderssample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folderssample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Softwaresample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoftsample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windowssample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersionsample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Explorersample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folderssample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Foldersreg.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Multimedia\Audioreg.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Multimedia\Audio Compression Managerreg.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Multimedia\Audio Compression Manager\MSACMreg.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Multimedia\Audio Compression Manager\Priority v4.00reg.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Runsample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\000000000004548dsample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Blockedsample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Blockedsample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cachedsample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cachedsample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Internet Settingssample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Visual Basicsample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Visual Basic\6.0Set value key:sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed [0B E5 62 E5 B9 F0 31 EF ...]sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed [F4 88 48 6C 27 F7 42 30 ...]sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed [7A 3E 68 8B E6 73 24 75 ...]sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed [42 80 88 9C 4D 6D EB 0B ...]sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed [01 66 20 39 AE 97 DC 28 ...]sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed [9F 9C 41 0F 46 15 A5 E3 ...]sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed [2B E5 64 F7 57 D9 C1 0F ...]sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed [D7 8C AB 02 A8 DB E5 CC ...]sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Personal ["D:\Backup\我的文档"]sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Common Documents ["C:\Documents and Settings\All Users\Documents"]sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Desktop ["C:\Documents and Settings\Administrator\桌面"]sample.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Common Desktop ["C:\Documents and Settings\All Users\桌面"]sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass [0x1]sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName [0x1]sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet [0x1]sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache ["C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files"]sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cookies ["C:\Documents and Settings\Administrator\Cookies"]sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\WINDOWS\TEMP\HXVsB.bat ["HXVsB"]reg.exe --> \REGISTRY\MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed [CD 36 74 BD CB 46 EE A1 ...]reg.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\CurrentVersion\Run\flash ["\flash.exe"]sample.exe --> \REGISTRY\USER\S-1-5-21-1177238915-1647877149-2147093213-500\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\flash.exe ["flash"]
Malwr.com is a free malware analysis service.It allows you to analyze suspicious files and extract information on their process and network behavior while being executed. It's built on top of an open source malware analysis system called Cuckoo Sandbox, which is developed and maintained by the same people behind this website: http://cuckoobox.org/