VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: | - |
Threat Names: | - |
TOUfuwC8NKj1u2xe.exe
Windows Exe (x86-32)
Created at 2020-06-27T13:07:00
Remarks (2/2)
(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\TOUfuwC8NKj1u2xe.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x401497 |
Size Of Code | 0xe600 |
Size Of Initialized Data | 0x1722e00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-11-30 04:43:59+00:00 |
Version Information (3)
»
Copright | Copright (C) 2020, kac |
InternalNaked | anizepug.im |
ProductVersions | 2.27.48 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0xe43b | 0xe600 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.77 |
.rdata | 0x410000 | 0x7bc8a | 0x7be00 | 0xea00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.99 |
.data | 0x48c000 | 0x1667494 | 0x1a00 | 0x8a800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.7 |
.tls | 0x1af4000 | 0x32009 | 0x32200 | 0x8c200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.vufo | 0x1b27000 | 0x400 | 0x400 | 0xbe400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rsrc | 0x1b28000 | 0x7bc0 | 0x7c00 | 0xbe800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.08 |
Imports (1)
»
KERNEL32.dll (89)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetTickCount | 0x0 | 0x410000 | 0x8b4ac | 0x89eac | 0x293 |
FindNextVolumeMountPointA | 0x0 | 0x410004 | 0x8b4b0 | 0x89eb0 | 0x148 |
EnumTimeFormatsA | 0x0 | 0x410008 | 0x8b4b4 | 0x89eb4 | 0x110 |
GetUserDefaultLangID | 0x0 | 0x41000c | 0x8b4b8 | 0x89eb8 | 0x29c |
GetProcessTimes | 0x0 | 0x410010 | 0x8b4bc | 0x89ebc | 0x252 |
ReadFile | 0x0 | 0x410014 | 0x8b4c0 | 0x89ec0 | 0x3c0 |
IsBadStringPtrA | 0x0 | 0x410018 | 0x8b4c4 | 0x89ec4 | 0x2f8 |
SetConsoleTitleA | 0x0 | 0x41001c | 0x8b4c8 | 0x89ec8 | 0x447 |
GlobalUnlock | 0x0 | 0x410020 | 0x8b4cc | 0x89ecc | 0x2c5 |
GetTempPathW | 0x0 | 0x410024 | 0x8b4d0 | 0x89ed0 | 0x285 |
LCMapStringA | 0x0 | 0x410028 | 0x8b4d4 | 0x89ed4 | 0x32b |
SetComputerNameW | 0x0 | 0x41002c | 0x8b4d8 | 0x89ed8 | 0x42a |
GetTapeStatus | 0x0 | 0x410030 | 0x8b4dc | 0x89edc | 0x281 |
BuildCommDCBW | 0x0 | 0x410034 | 0x8b4e0 | 0x89ee0 | 0x3d |
LoadLibraryA | 0x0 | 0x410038 | 0x8b4e4 | 0x89ee4 | 0x33c |
LocalAlloc | 0x0 | 0x41003c | 0x8b4e8 | 0x89ee8 | 0x344 |
WritePrivateProfileStringA | 0x0 | 0x410040 | 0x8b4ec | 0x89eec | 0x52a |
SetCommMask | 0x0 | 0x410044 | 0x8b4f0 | 0x89ef0 | 0x424 |
GetProcessAffinityMask | 0x0 | 0x410048 | 0x8b4f4 | 0x89ef4 | 0x246 |
VirtualProtect | 0x0 | 0x41004c | 0x8b4f8 | 0x89ef8 | 0x4ef |
GetCurrentProcessId | 0x0 | 0x410050 | 0x8b4fc | 0x89efc | 0x1c1 |
GlobalAddAtomW | 0x0 | 0x410054 | 0x8b500 | 0x89f00 | 0x2b2 |
OpenFileMappingA | 0x0 | 0x410058 | 0x8b504 | 0x89f04 | 0x378 |
LocalFree | 0x0 | 0x41005c | 0x8b508 | 0x89f08 | 0x348 |
DebugActiveProcessStop | 0x0 | 0x410060 | 0x8b50c | 0x89f0c | 0xc6 |
lstrlenA | 0x0 | 0x410064 | 0x8b510 | 0x89f10 | 0x54d |
CreateTimerQueue | 0x0 | 0x410068 | 0x8b514 | 0x89f14 | 0xbc |
GetLastError | 0x0 | 0x41006c | 0x8b518 | 0x89f18 | 0x202 |
UnregisterWait | 0x0 | 0x410070 | 0x8b51c | 0x89f1c | 0x4da |
EncodePointer | 0x0 | 0x410074 | 0x8b520 | 0x89f20 | 0xea |
DecodePointer | 0x0 | 0x410078 | 0x8b524 | 0x89f24 | 0xca |
GetCommandLineW | 0x0 | 0x41007c | 0x8b528 | 0x89f28 | 0x187 |
HeapSetInformation | 0x0 | 0x410080 | 0x8b52c | 0x89f2c | 0x2d3 |
GetStartupInfoW | 0x0 | 0x410084 | 0x8b530 | 0x89f30 | 0x263 |
TerminateProcess | 0x0 | 0x410088 | 0x8b534 | 0x89f34 | 0x4c0 |
GetCurrentProcess | 0x0 | 0x41008c | 0x8b538 | 0x89f38 | 0x1c0 |
UnhandledExceptionFilter | 0x0 | 0x410090 | 0x8b53c | 0x89f3c | 0x4d3 |
SetUnhandledExceptionFilter | 0x0 | 0x410094 | 0x8b540 | 0x89f40 | 0x4a5 |
IsDebuggerPresent | 0x0 | 0x410098 | 0x8b544 | 0x89f44 | 0x300 |
IsProcessorFeaturePresent | 0x0 | 0x41009c | 0x8b548 | 0x89f48 | 0x304 |
EnterCriticalSection | 0x0 | 0x4100a0 | 0x8b54c | 0x89f4c | 0xee |
LeaveCriticalSection | 0x0 | 0x4100a4 | 0x8b550 | 0x89f50 | 0x339 |
Sleep | 0x0 | 0x4100a8 | 0x8b554 | 0x89f54 | 0x4b2 |
HeapSize | 0x0 | 0x4100ac | 0x8b558 | 0x89f58 | 0x2d4 |
GetProcAddress | 0x0 | 0x4100b0 | 0x8b55c | 0x89f5c | 0x245 |
GetModuleHandleW | 0x0 | 0x4100b4 | 0x8b560 | 0x89f60 | 0x218 |
ExitProcess | 0x0 | 0x4100b8 | 0x8b564 | 0x89f64 | 0x119 |
WriteFile | 0x0 | 0x4100bc | 0x8b568 | 0x89f68 | 0x525 |
GetStdHandle | 0x0 | 0x4100c0 | 0x8b56c | 0x89f6c | 0x264 |
GetModuleFileNameW | 0x0 | 0x4100c4 | 0x8b570 | 0x89f70 | 0x214 |
FreeEnvironmentStringsW | 0x0 | 0x4100c8 | 0x8b574 | 0x89f74 | 0x161 |
GetEnvironmentStringsW | 0x0 | 0x4100cc | 0x8b578 | 0x89f78 | 0x1da |
SetHandleCount | 0x0 | 0x4100d0 | 0x8b57c | 0x89f7c | 0x46f |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x4100d4 | 0x8b580 | 0x89f80 | 0x2e3 |
GetFileType | 0x0 | 0x4100d8 | 0x8b584 | 0x89f84 | 0x1f3 |
DeleteCriticalSection | 0x0 | 0x4100dc | 0x8b588 | 0x89f88 | 0xd1 |
TlsAlloc | 0x0 | 0x4100e0 | 0x8b58c | 0x89f8c | 0x4c5 |
TlsGetValue | 0x0 | 0x4100e4 | 0x8b590 | 0x89f90 | 0x4c7 |
TlsSetValue | 0x0 | 0x4100e8 | 0x8b594 | 0x89f94 | 0x4c8 |
TlsFree | 0x0 | 0x4100ec | 0x8b598 | 0x89f98 | 0x4c6 |
InterlockedIncrement | 0x0 | 0x4100f0 | 0x8b59c | 0x89f9c | 0x2ef |
SetLastError | 0x0 | 0x4100f4 | 0x8b5a0 | 0x89fa0 | 0x473 |
GetCurrentThreadId | 0x0 | 0x4100f8 | 0x8b5a4 | 0x89fa4 | 0x1c5 |
InterlockedDecrement | 0x0 | 0x4100fc | 0x8b5a8 | 0x89fa8 | 0x2eb |
HeapCreate | 0x0 | 0x410100 | 0x8b5ac | 0x89fac | 0x2cd |
QueryPerformanceCounter | 0x0 | 0x410104 | 0x8b5b0 | 0x89fb0 | 0x3a7 |
GetSystemTimeAsFileTime | 0x0 | 0x410108 | 0x8b5b4 | 0x89fb4 | 0x279 |
RaiseException | 0x0 | 0x41010c | 0x8b5b8 | 0x89fb8 | 0x3b1 |
HeapFree | 0x0 | 0x410110 | 0x8b5bc | 0x89fbc | 0x2cf |
RtlUnwind | 0x0 | 0x410114 | 0x8b5c0 | 0x89fc0 | 0x418 |
GetCPInfo | 0x0 | 0x410118 | 0x8b5c4 | 0x89fc4 | 0x172 |
GetACP | 0x0 | 0x41011c | 0x8b5c8 | 0x89fc8 | 0x168 |
GetOEMCP | 0x0 | 0x410120 | 0x8b5cc | 0x89fcc | 0x237 |
IsValidCodePage | 0x0 | 0x410124 | 0x8b5d0 | 0x89fd0 | 0x30a |
MultiByteToWideChar | 0x0 | 0x410128 | 0x8b5d4 | 0x89fd4 | 0x367 |
HeapAlloc | 0x0 | 0x41012c | 0x8b5d8 | 0x89fd8 | 0x2cb |
HeapReAlloc | 0x0 | 0x410130 | 0x8b5dc | 0x89fdc | 0x2d2 |
LoadLibraryW | 0x0 | 0x410134 | 0x8b5e0 | 0x89fe0 | 0x33f |
WideCharToMultiByte | 0x0 | 0x410138 | 0x8b5e4 | 0x89fe4 | 0x511 |
GetConsoleCP | 0x0 | 0x41013c | 0x8b5e8 | 0x89fe8 | 0x19a |
GetConsoleMode | 0x0 | 0x410140 | 0x8b5ec | 0x89fec | 0x1ac |
FlushFileBuffers | 0x0 | 0x410144 | 0x8b5f0 | 0x89ff0 | 0x157 |
LCMapStringW | 0x0 | 0x410148 | 0x8b5f4 | 0x89ff4 | 0x32d |
GetStringTypeW | 0x0 | 0x41014c | 0x8b5f8 | 0x89ff8 | 0x269 |
CloseHandle | 0x0 | 0x410150 | 0x8b5fc | 0x89ffc | 0x52 |
WriteConsoleW | 0x0 | 0x410154 | 0x8b600 | 0x8a000 | 0x524 |
SetFilePointer | 0x0 | 0x410158 | 0x8b604 | 0x8a004 | 0x466 |
SetStdHandle | 0x0 | 0x41015c | 0x8b608 | 0x8a008 | 0x487 |
CreateFileW | 0x0 | 0x410160 | 0x8b60c | 0x8a00c | 0x8f |
Memory Dumps (3)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
buffer | 1 | 0x01D1F4D8 | 0x01D9848A | First Execution |
![]() |
32-bit | 0x01D1F4D8 |
![]() |
![]() |
...
|
buffer | 1 | 0x01B30000 | 0x01C49FFF | First Execution |
![]() |
32-bit | 0x01B30000 |
![]() |
![]() |
...
|
buffer | 1 | 0x01B30000 | 0x01C49FFF | Content Changed |
![]() |
32-bit | 0x01B304F6 |
![]() |
![]() |
...
|
c:\users\5p5nrgjn0js halpmcxz\appdata\roaming\microsoft\windows\cookies\5p5nrgjn0js_halpmcxz@myip[1].txt | Dropped File | Text |
Unknown
|
...
|
»
c:\users\5p5nrgjn0js halpmcxz\appdata\roaming\microsoft\windows\cookies\5p5nrgjn0js_halpmcxz@myip[2].txt | Dropped File | Text |
Unknown
|
...
|
»