VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Spyware
|
Threat Names: |
FormBook
Trojan.GenericKDZ.70241
Gen:Variant.Babar.21405
|
mFO4ED9hfrpsSO4O.exe
Windows Exe (x86-32)
Created at 2020-09-22T01:40:00
Remarks (1/1)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "41 seconds" to "10 seconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\FD1HVy\Desktop\mFO4ED9hfrpsSO4O.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4db37a |
Size Of Code | 0xd9400 |
Size Of Initialized Data | 0x800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-09-21 19:18:00+00:00 |
Version Information (11)
»
Assembly Version | 2.1.1.9 |
Comments | kamaz |
CompanyName | Kamaz Limited |
FileDescription | Mandora` |
FileVersion | 1.7.8.9 |
InternalName | lIJ.exe |
LegalCopyright | STL international LTD |
LegalTrademarks | TT® |
OriginalFilename | lIJ.exe |
ProductName | chair |
ProductVersion | 1.7.8.9 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0xd9380 | 0xd9400 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.72 |
.reloc | 0x4dc000 | 0xc | 0x200 | 0xd9600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
.rsrc | 0x4de000 | 0x580 | 0x600 | 0xd9800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.51 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0xdb348 | 0xd9548 | 0x0 |
Memory Dumps (45)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
mfo4ed9hfrpsso4o.exe | 1 | 0x00EB0000 | 0x00F8FFFF | Relevant Image |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05C70400 | 0x05CF4BFF | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05C70178 | 0x05C7017F | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05C701A0 | 0x05C701A7 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05C701C8 | 0x05C701CF | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05C701F0 | 0x05C701F7 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05C70218 | 0x05C7021F | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF54FE | 0x05CF5508 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF54F2 | 0x05CF54FC | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF4C00 | 0x05CF4C47 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF550C | 0x05CF550F | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5530 | 0x05CF5537 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5538 | 0x05CF553B | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF553C | 0x05CF5543 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5544 | 0x05CF5547 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5548 | 0x05CF554B | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF554C | 0x05CF554F | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5550 | 0x05CF5557 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5558 | 0x05CF555B | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF555C | 0x05CF5563 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5564 | 0x05CF5567 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5568 | 0x05CF556B | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF556C | 0x05CF5573 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5574 | 0x05CF5577 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5578 | 0x05CF557B | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF557C | 0x05CF5583 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5584 | 0x05CF5587 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5588 | 0x05CF558B | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF558C | 0x05CF5593 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5594 | 0x05CF5597 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF5598 | 0x05CF559B | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF559C | 0x05CF559F | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF55A0 | 0x05CF55A7 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF55A8 | 0x05CF55AB | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF55AC | 0x05CF55AF | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF55B0 | 0x05CF55B7 | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF55B8 | 0x05CF55BB | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x05CF55BC | 0x05CF55BF | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 6 | 0x00400000 | 0x0042DFFF | First Execution |
![]() |
32-bit | 0x0041ED10 |
![]() |
![]() |
...
|
mfo4ed9hfrpsso4o.exe | 6 | 0x007D0000 | 0x008AFFFF | Relevant Image |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 6 | 0x00E00000 | 0x00E13FFF | First Execution |
![]() |
32-bit | 0x00E00000 |
![]() |
![]() |
...
|
buffer | 6 | 0x01660000 | 0x01763FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 7 | 0x06120000 | 0x06223FFF | Content Changed |
![]() |
64-bit | 0x061810E2 |
![]() |
![]() |
...
|
buffer | 6 | 0x00E40000 | 0x00E5DFFF | Image In Buffer |
![]() |
32-bit | - |
![]() |
![]() |
...
|
buffer | 8 | 0x00A40000 | 0x00A5DFFF | First Execution |
![]() |
32-bit | 0x00A49870 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.GenericKDZ.70241 |
Malicious
|
C:\Users\FD1HVy\AppData\Local\Temp\DB1 | Dropped File | Sqlite |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
c:\users\fd1hvy\appdata\local\microsoft\windows\inetcache\counters2.dat | Modified File | Stream |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogrc.ini | Dropped File | Stream |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogri.ini | Dropped File | Stream |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogrg.ini | Dropped File | Stream |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogrv.ini | Dropped File | Stream |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogim.jpeg | Dropped File | Image |
Unknown
|
...
|
»
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlog.ini | Dropped File | Unknown |
Not Queried
|
...
|
»