VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
Dropper
|
Threat Names: |
Trojan.GenericKD.43687145
|
taskstl.exe
Windows Exe (x86-32)
Created at 2020-08-20T06:35:00
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\taskstl.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x770532 |
Size Of Code | 0x36e600 |
Size Of Initialized Data | 0xa00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2068-03-22 05:56:50+00:00 |
Version Information (11)
»
Assembly Version | 2.9.0.0 |
Comments | NOPE DESCRIPTION! |
CompanyName | - |
FileDescription | Boring of Project for Bomb of Extracting Files |
FileVersion | 2.0.0.0 |
InternalName | TPF2.exe |
LegalCopyright | Copyright (C) 2020 |
LegalTrademarks | - |
OriginalFilename | TPF2.exe |
ProductName | Extracted file | F |
ProductVersion | 2.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x36e538 | 0x36e600 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 1.22 |
.rsrc | 0x772000 | 0x620 | 0x800 | 0x36e800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.48 |
.reloc | 0x774000 | 0xc | 0x200 | 0x36f000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x370508 | 0x36e708 | 0x0 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
taskstl.exe | 1 | 0x001F0000 | 0x00565FFF | Relevant Image |
![]() |
32-bit | - |
![]() |
![]() |
...
|
taskstl.exe | 1 | 0x001F0000 | 0x00565FFF | Process Termination |
![]() |
32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.GenericKD.43687145 |
Malicious
|
c:\users\5p5nrgjn0js halpmcxz\appdata\local\gdipfontcachev1.dat | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2489579128.bat.ehre | Dropped File | Batch |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\@Please_Read_Me@.exe | Dropped File | Binary |
Unknown
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x74c186 |
Size Of Code | 0x34a200 |
Size Of Initialized Data | 0x11200 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2044-12-17 04:40:35+00:00 |
Version Information (11)
»
Assembly Version | 1.0.0.0 |
Comments | Bomb Extracted |
CompanyName | - |
FileDescription | Please Read Me! |
FileVersion | 1.0.0.0 |
InternalName | TapPiF.exe |
LegalCopyright | Copyright © 2020 |
LegalTrademarks | - |
OriginalFilename | TapPiF.exe |
ProductName | WANNA TO DECRYPT | First Versions of this |
ProductVersion | 1.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x34a18c | 0x34a200 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.99 |
.rsrc | 0x74e000 | 0x10ed8 | 0x11000 | 0x34a400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.63 |
.reloc | 0x760000 | 0xc | 0x200 | 0x35b400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x34c15a | 0x34a35a | 0x0 |
Memory Dumps (11)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
@please_read_me@.exe | 4 | 0x009F0000 | 0x00D51FFF | Relevant Image |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | First Execution |
![]() |
32-bit | 0x04DCB2F6 |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | Content Changed |
![]() |
32-bit | 0x04DCB3D6 |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | Content Changed |
![]() |
32-bit | 0x04DCB3D6 |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | Content Changed |
![]() |
32-bit | 0x04DCB3D6 |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | Content Changed |
![]() |
32-bit | 0x04DCB3D6 |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | Content Changed |
![]() |
32-bit | 0x04DCB3D6 |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | Content Changed |
![]() |
32-bit | 0x04DCB3D6 |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | Content Changed |
![]() |
32-bit | 0x04DCB3D6 |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | Content Changed |
![]() |
32-bit | 0x04DCB3D6 |
![]() |
![]() |
...
|
buffer | 4 | 0x04DC5000 | 0x04DCBFFF | Content Changed |
![]() |
32-bit | 0x04DCB3D6 |
![]() |
![]() |
...
|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\note.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Temp\CHGcWP.vbs | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\s.ehre | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\-PvSV.mp3.ehre | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\01k2-Y9NP.mp3.ehre | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\6xKMhYNoI.pptx.ehre | Dropped File | ZIP |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\b-NXXCxd7GQK 4Y.ods.ehre | Dropped File | ZIP |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\B2-k yYNrZ ptEyZ3lU.bmp.ehre | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\bW39cGBSIb.png.ehre | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ebjC-D3KcLwivDK5 hk.bmp.ehre | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\f4DVO5jwK5eUmzj.mp4.ehre | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\FxJHzk_kcIm-ZGH2.wav.ehre | Dropped File | Audio |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\HC_QTh.pptx.ehre | Dropped File | ZIP |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\JOh3A.ods.ehre | Dropped File | ZIP |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\oAQrJprHV9kG.wav.ehre | Dropped File | Audio |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\rN vGeE8rTjcG.bmp.ehre | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\rQb78KrFgwNqmx0s.jpg.ehre | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\w_wtkv35.flv.ehre | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ZdAZ.wav.ehre | Dropped File | Audio |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\zI1D6HCDMGIQg.mp4.ehre | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\_ivN9i.pptx.ehre | Dropped File | ZIP |
Unknown
|
...
|
»