VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: | - |
Threat Names: | - |
WAQro5oWEZAnSlij.exe
Windows Exe (x86-32)
Created at 2020-10-14T09:16:00
Remarks
(0x0200000C): The maximum memory dump size was exceeded. Some dumps may be missing in the report.
Master Boot Record Changes
»
Sector Number | Sector Size | Actions |
---|---|---|
2063 | 512 Bytes |
...
|
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\WAQro5oWEZAnSlij.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x403e82 |
Size Of Code | 0x5600 |
Size Of Initialized Data | 0x800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-10-12 21:30:56+00:00 |
Packer | BobSoft Mini Delphi -> BoB / BobSoft |
Version Information (11)
»
Assembly Version | 1.0.0.0 |
Comments | - |
CompanyName | - |
FileDescription | Artemis |
FileVersion | 1.0.0.0 |
InternalName | Artemis.exe |
LegalCopyright | Copyright © 2020 |
LegalTrademarks | - |
OriginalFilename | Artemis.exe |
ProductName | Artemis |
ProductVersion | 1.0.0.0 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
- | 0x402000 | 0x6000 | 0x3000 | 0x400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.91 |
- | 0x408000 | 0x2000 | 0x0 | 0x3400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
- | 0x40a000 | 0x2000 | 0x200 | 0x3400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.33 |
.rsrc | 0x40c000 | 0x2000 | 0x600 | 0x3600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.02 |
- | 0x40e000 | 0x27e000 | 0x2ba00 | 0x3c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 8.0 |
.data | 0x68c000 | 0xd6000 | 0xd5200 | 0x2f600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.97 |
Imports (8)
»
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetModuleHandleA | 0x0 | 0x68c0d4 | 0x28c0d4 | 0x2f6d4 | 0x0 |
GetProcAddress | 0x0 | 0x68c0d8 | 0x28c0d8 | 0x2f6d8 | 0x0 |
ExitProcess | 0x0 | 0x68c0dc | 0x28c0dc | 0x2f6dc | 0x0 |
LoadLibraryA | 0x0 | 0x68c0e0 | 0x28c0e0 | 0x2f6e0 | 0x0 |
user32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
MessageBoxA | 0x0 | 0x68c0e8 | 0x28c0e8 | 0x2f6e8 | 0x0 |
advapi32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegCloseKey | 0x0 | 0x68c0f0 | 0x28c0f0 | 0x2f6f0 | 0x0 |
oleaut32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x68c0f8 | 0x28c0f8 | 0x2f6f8 | 0x0 |
gdi32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreateFontA | 0x0 | 0x68c100 | 0x28c100 | 0x2f700 | 0x0 |
shell32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x68c108 | 0x28c108 | 0x2f708 | 0x0 |
version.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetFileVersionInfoA | 0x0 | 0x68c110 | 0x28c110 | 0x2f710 | 0x0 |
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x68c118 | 0x28c118 | 0x2f718 | 0x0 |
Memory Dumps (33)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | First Execution |
![]() |
32-bit | 0x013C3E82 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01530B74 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x0153531C |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x014E00B8 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x013D2354 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x013DCD9C |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x0142214C |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01421D54 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01425E64 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01453974 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x013F5000 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x0147B05C |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01490F5C |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x014B2F8C |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x014BB700 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x013FB7C0 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01422348 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01549095 |
![]() |
![]() |
...
|
buffer | 1 | 0x00AE0000 | 0x00BDFFFF | Content Changed |
![]() |
32-bit | - |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01425C9C |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x015565EA |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x015541D0 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x0154F863 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01421BB8 |
![]() |
![]() |
...
|
buffer | 1 | 0x00AF4000 | 0x00B17FFF | Content Changed |
![]() |
32-bit | - |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x0140F8B8 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x014891B8 |
![]() |
![]() |
...
|
buffer | 1 | 0x00B24000 | 0x00B33FFF | Content Changed |
![]() |
32-bit | - |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x01544C9E |
![]() |
![]() |
...
|
buffer | 1 | 0x00B14000 | 0x00B23FFF | Content Changed |
![]() |
32-bit | - |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x015465B2 |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x0153635C |
![]() |
![]() |
...
|
waqro5owezanslij.exe | 1 | 0x013C0000 | 0x01721FFF | Content Changed |
![]() |
32-bit | 0x014DDF5C |
![]() |
![]() |
...
|
C:\ProgramData\Adobe\Acrobat\10.0\Replicate\Security\directories.acrodata.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Adobe\ARM\Reader_10.0.0\AdbeRdrSecUpd10111.msp.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelLR.cab.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files (x86)\Adobe\Reader 10.0\Benioku.htm.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Text |
Unknown
|
...
|
»
C:\Program Files\Common Files\DESIGNER\MSADDNDR.DLL | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.msi.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files (x86)\Adobe\Reader 10.0\Berime.htm.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Text |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\Program Files (x86)\Adobe\Reader 10.0\IrakHau.htm.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Text |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\DW\DBGHELP.DLL | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\GDIPFONTCACHEV1.DAT | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\Program Files (x86)\Adobe\Reader 10.0\Leame.htm.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Text |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE | Modified File | Stream |
Unknown
|
...
|
»
C:\ProgramData\Adobe\ARM\Reader_10.0.0\AdbeRdrUpd10110_MUI.msp.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files (x86)\Adobe\Reader 10.0\LeesMij.htm.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Text |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\DW\DWTRIG20.EXE.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Acrobat\10.0\AdobeCMapFnt10.lst | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.msi.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files (x86)\Adobe\Reader 10.0\Leggimi.htm.id-9C354B42.[khalate@tutanota.com].artemis | Dropped File | Text |
Unknown
|
...
|
»
C:\Program Files (x86)\Adobe\Reader 10.0\LeiaMe.htm | Modified File | Text |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Acrobat\10.0\AdobeSysFnt10.lst | Modified File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.CNT | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\Adobe\Acrobat\10.0\info-decrypt.hta | Dropped File | Text |
Unknown
|
...
|
»
Embedded URLs (2)
»
URL | First Seen | Categories | Threat Names | Reputation Status | WHOIS Data | Actions |
---|---|---|---|---|---|---|
https://localbitcoins.com/buy_bitcoins | - | - | - |
Unknown
|
Not Queried
|
...
|
http://www.coindesk.com/information/how-can-i-buy-bitcoins/ | - | - | - |
Unknown
|
Not Queried
|
...
|