VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
|
Threat Names: |
Trojan.Ransom.AIG
|
rknjoe.exe
Windows Exe (x86-32)
Created at 2020-04-02T12:44:00
Remarks
(0x0200001E): The maximum size of extracted files was exceeded. Some files may be missing in the report.
(0x0200001D): The maximum number of extracted files was exceeded. Some files may be missing in the report.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\rknjoe.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x791270 |
Size Of Code | 0x8000 |
Size Of Initialized Data | 0x28000 |
Size Of Uninitialized Data | 0x389000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2012-01-29 18:49:03+00:00 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0x389000 | 0x0 | 0x200 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x78a000 | 0x8000 | 0x7600 | 0x200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.82 |
.rsrc | 0x792000 | 0x28000 | 0x27e00 | 0x7800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.52 |
Imports (7)
»
KERNEL32.DLL (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | 0x0 | 0x7b9bf0 | 0x3b9bf0 | 0x2f3f0 | 0x0 |
GetProcAddress | 0x0 | 0x7b9bf4 | 0x3b9bf4 | 0x2f3f4 | 0x0 |
VirtualProtect | 0x0 | 0x7b9bf8 | 0x3b9bf8 | 0x2f3f8 | 0x0 |
VirtualAlloc | 0x0 | 0x7b9bfc | 0x3b9bfc | 0x2f3fc | 0x0 |
VirtualFree | 0x0 | 0x7b9c00 | 0x3b9c00 | 0x2f400 | 0x0 |
ExitProcess | 0x0 | 0x7b9c04 | 0x3b9c04 | 0x2f404 | 0x0 |
advapi32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegCloseKey | 0x0 | 0x7b9c0c | 0x3b9c0c | 0x2f40c | 0x0 |
comctl32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
InitCommonControls | 0x0 | 0x7b9c14 | 0x3b9c14 | 0x2f414 | 0x0 |
gdi32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreateFontIndirectA | 0x0 | 0x7b9c1c | 0x3b9c1c | 0x2f41c | 0x0 |
shell32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | 0x0 | 0x7b9c24 | 0x3b9c24 | 0x2f424 | 0x0 |
shlwapi.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
PathMatchSpecA | 0x0 | 0x7b9c2c | 0x3b9c2c | 0x2f42c | 0x0 |
user32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
EndPaint | 0x0 | 0x7b9c34 | 0x3b9c34 | 0x2f434 | 0x0 |
Memory Dumps (14)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | First Execution |
![]() |
32-bit | 0x00791270 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x00401F87 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x004013C2 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x00401665 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x004015E2 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x00401665 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x00401727 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x004013C2 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x00401665 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x004015E2 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x00401665 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x00401665 |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Content Changed |
![]() |
32-bit | 0x004010AA |
![]() |
![]() |
...
|
rknjoe.exe | 1 | 0x00400000 | 0x007B9FFF | Final Dump |
![]() |
32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.Ransom.AIG |
Malicious
|
C:\$Recycle.Bin\S-1-5-21-3388679973-3930757225-3770151564-1000\desktop.ini | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelLR.cab | Modified File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml.ZyNoXiOn | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PptLR.cab.ZyNoXiOn | Dropped File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PubLR.cab.ZyNoXiOn | Dropped File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\Setup.xml.ZyNoXiOn | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlkLR.cab | Modified File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\Setup.xml.ZyNoXiOn | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordLR.cab.ZyNoXiOn | Dropped File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.cab | Modified File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.xml.ZyNoXiOn | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.cab.ZyNoXiOn | Dropped File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.xml.ZyNoXiOn | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.cab | Modified File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.msi.ZyNoXiOn | Dropped File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.xml.ZyNoXiOn | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.msi | Modified File | Unknown |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.xml | Modified File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\OWOW32LR.cab | Modified File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Setup.xml.ZyNoXiOn | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfLR.cab.ZyNoXiOn | Dropped File | CAB |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\HOW TO DECRYPT FILES.txt | Dropped File | Text |
Unknown
|
...
|
»