Malware

Win32/PSW.Delf.CPR (file analysis)

Malware Removal

The Win32/PSW.Delf.CPR is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/PSW.Delf.CPR virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Executed a command line with /C or /R argument to terminate command shell on completion which can be used to hide execution
  • Sample contains Overlay data
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Checks adapter addresses which can be used to detect virtual network interfaces
  • Anomalous file deletion behavior detected (10+)
  • Dynamic (imported) function loading detected
  • At least one IP Address, Domain, or File Name was found in a crypto call
  • Performs HTTP requests potentially not found in PCAP.
  • Enumerates running processes
  • Expresses interest in specific running processes
  • Reads data out of its own binary image
  • A process created a hidden window
  • CAPE extracted potentially suspicious content
  • Authenticode signature is invalid
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Collects and encrypts information about the computer likely to send to C2 server
  • Installs itself for autorun at Windows startup
  • Installs itself for autorun at Windows startup
  • Exhibits behavior characteristics of BlackRemote/BlackRAT RAT
  • CAPE detected the DarkComet malware family
  • Attempts to modify proxy settings
  • Creates a copy of itself
  • Deletes executed files from disk
  • Harvests cookies for information gathering
  • Anomalous binary characteristics
  • Uses suspicious command line tools or Windows utilities

How to determine Win32/PSW.Delf.CPR?


File Info:

name: AF71B31AC33E4ED50552.mlw
path: /opt/CAPEv2/storage/binaries/10855cd8e2742db94da171a2a25c784f09cfba356b3a2381c96735e8b1795635
crc32: 0E392724
md5: af71b31ac33e4ed50552def3bf3b8105
sha1: 0eb265af375e8cb64bc97b1704f6ce9d55fd8d13
sha256: 10855cd8e2742db94da171a2a25c784f09cfba356b3a2381c96735e8b1795635
sha512: 57908d68b14b2b35341e4ac8ff11ace0ffefa256d8c572ba98184986d128928faefe5b351f066af3c0188cdc7898793390282055ecbbfc87d9c7fc4b6c755f6a
ssdeep: 24576:ZRmJkcoQricOIQxiZY1iaxzcj0oa4CdcstlneOVrPXJzyGEfeO7vRm16GpiOVEjY:2JZoQrbTFZY1iaxzcjHa4+zfvJPXJSfG
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1B175F122B9D69036C2B323B19E7EF769963D69360333D1DB23C82D615EA14416B39733
sha3_384: e39044f69b1ddbf7cf23f1380a3760ff4dba140e311bbbb2e6407b287423749c7fca1d1cb0ab0b937d46cd8a88d3c0ff
ep_bytes: e816900000e989feffffcccccccccc55
timestamp: 2012-01-29 21:32:28

Version Info:

FileDescription:
FileVersion: 3, 3, 8, 1
CompiledScript: AutoIt v3 Script: 3, 3, 8, 1
Translation: 0x0809 0x04b0

Win32/PSW.Delf.CPR also known as:

BkavW32.AIDetect.malware2
tehtrisGeneric.Malware
DrWebTrojan.PWS.Skyper.21
MicroWorld-eScanAIT:Trojan.GenericTKA.42
FireEyeGeneric.mg.af71b31ac33e4ed5
McAfeeGenericATG-FCQU!AF71B31AC33E
CylanceUnsafe
ZillyaTrojan.Injector.Win32.272867
SangforTrojan.Win32.Save.a
K7AntiVirusTrojan ( 700000111 )
K7GWTrojan ( 700000111 )
Cybereasonmalicious.ac33e4
BitDefenderThetaAI:Packer.8AFC3D0A18
CyrenW32/Coinminer.GN.gen!Eldorado
Elasticmalicious (high confidence)
ESET-NOD32Win32/PSW.Delf.CPR
APEXMalicious
ClamAVWin.Malware.DarkComet-9880498-1
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderAIT:Trojan.GenericTKA.42
AvastWin32:Malware-gen
Ad-AwareAIT:Trojan.GenericTKA.42
EmsisoftAIT:Trojan.GenericTKA.42 (B)
ComodoTrojWare.Win32.Injector.BZ@565i4g
BaiduAutoIt.Trojan.CoinMiner.a
VIPREAIT:Trojan.GenericTKA.42
McAfee-GW-EditionBehavesLike.Win32.Agent.tc
Trapminemalicious.high.ml.score
SophosML/PE-A
IkarusTrojan-Spy.FormBook
GDataAIT:Trojan.GenericTKA.42 (2x)
AviraTR/Drop.AutoIt.atq.5
MAXmalware (ai score=89)
Antiy-AVLTrojan/Generic.ASBOL.C6D6
MicrosoftTrojan:Win32/Wacatac.B!ml
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Agent.R91566
ALYacAIT:Trojan.GenericTKA.42
VBA32Trojan-Downloader.Autoit.gen
MalwarebytesAutoKMS.HackTool.Patcher.DDS
MaxSecureTrojan.Autoit.AZA
FortinetW32/CoinMiner.JR!tr
AVGWin32:Malware-gen
PandaTrj/Genetic.gen
CrowdStrikewin/malicious_confidence_100% (D)

How to remove Win32/PSW.Delf.CPR?

Win32/PSW.Delf.CPR removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment