Malicious
Classifications
-
Threat Names
Mal/Generic-S
Dynamic Analysis Report
Created on 2023-04-22T15:54:03+00:00
78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe
Windows Exe (x86-32)
Remarks (2/2)
(0x02000046): The maximum binlog size was reached. The analysis was terminated prematurely.
(0x0200000E): The overall sleep time of all monitored processes was truncated from "5 minutes, 10 seconds" to "10 seconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\kEecfMwgj\Desktop\78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x00401160 |
Size Of Code | 0x00000600 |
Size Of Initialized Data | 0x0001D400 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2020-07-24 13:21 (UTC) |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00401000 | 0x000005EC | 0x00000600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x00402000 | 0x00000216 | 0x00000400 | 0x00000A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.77 |
enc | 0x00403000 | 0x0001CE00 | 0x0001CE00 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 8.0 |
.reloc | 0x00420000 | 0x00000040 | 0x00000200 | 0x0001DC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 1.0 |
Imports (1)
»
KERNEL32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetCommandLineA | - | 0x00402000 | 0x00002180 | 0x00000B80 | 0x000001D6 |
ExitProcess | - | 0x00402004 | 0x00002184 | 0x00000B84 | 0x0000015E |
LoadLibraryA | - | 0x00402008 | 0x00002188 | 0x00000B88 | 0x000003C1 |
GetProcAddress | - | 0x0040200C | 0x0000218C | 0x00000B8C | 0x000002AE |
GetCurrentProcessId | - | 0x00402010 | 0x00002190 | 0x00000B90 | 0x00000218 |
GetModuleHandleA | - | 0x00402014 | 0x00002194 | 0x00000B94 | 0x00000275 |
Memory Dumps (10)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe | 1 | 0x002C0000 | 0x002E0FFF | Relevant Image |
![]() |
32-bit | - |
![]() |
...
|
buffer | 1 | 0x00020000 | 0x0003FFFF | First Execution |
![]() |
32-bit | 0x00023ED1 |
![]() |
...
|
buffer | 1 | 0x00020000 | 0x0003FFFF | Content Changed |
![]() |
32-bit | 0x000214ED |
![]() |
...
|
buffer | 1 | 0x00020000 | 0x0003FFFF | Content Changed |
![]() |
32-bit | 0x0002AE74 |
![]() |
...
|
buffer | 1 | 0x00020000 | 0x0003FFFF | Content Changed |
![]() |
32-bit | 0x00029000 |
![]() |
...
|
buffer | 1 | 0x00020000 | 0x0003FFFF | Content Changed |
![]() |
32-bit | 0x000226F1 |
![]() |
...
|
buffer | 1 | 0x00020000 | 0x0003FFFF | Content Changed |
![]() |
32-bit | 0x00028012 |
![]() |
...
|
buffer | 1 | 0x00020000 | 0x0003FFFF | Content Changed |
![]() |
32-bit | 0x00029000 |
![]() |
...
|
buffer | 1 | 0x00020000 | 0x0003FFFF | Content Changed |
![]() |
32-bit | 0x00027AE8 |
![]() |
...
|
78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff.exe | 1 | 0x002C0000 | 0x002E0FFF | Final Dump |
![]() |
32-bit | - |
![]() |
...
|
\\?\c:\recovery\d327d5c2-7147-11eb-9862-d731c5aaa7a9\boot.sdi.mb8g3x4139 | Dropped File | Stream |
Clean
|
...
|
»
\\?\c:\users\default\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000002.regtrans-ms.mb8g3x4139 | Dropped File | Stream |
Clean
|
...
|
»
\\?\c:\users\default\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000001.regtrans-ms.mb8g3x4139 | Dropped File | Stream |
Clean
|
...
|
»
\\?\c:\users\default\NTUSER.DAT.LOG1.mb8g3x4139 | Dropped File | Stream |
Clean
|
...
|
»
\\?\c:\users\default\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TM.blf.mb8g3x4139 | Dropped File | Stream |
Clean
|
...
|
»
\\?\c:\recovery\d327d5c2-7147-11eb-9862-d731c5aaa7a9\Winre.wim | Modified File | Stream |
Clean
|
...
|
»