VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
Dropper
|
Threat Names: |
Gen:Variant.MSILHeracles.10524
Gen:Variant.Razy.816873
|
8g4YJ5vYi5gsz9qg.exe
Windows Exe (x86-32)
Created at 2021-01-23T23:12:00
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "2 hours, 15 seconds" to "20 seconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\FD1HVy\Desktop\8g4YJ5vYi5gsz9qg.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x42f3d6 |
Size Of Code | 0x2d400 |
Size Of Initialized Data | 0x1400 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2039-08-13 06:22:46+00:00 |
Version Information (11)
»
Assembly Version | 1.0.0.0 |
Comments | - |
CompanyName | - |
FileDescription | SysWOW64 |
FileVersion | 1.0.0.0 |
InternalName | IZI.exe |
LegalCopyright | Copyright © 2020 |
LegalTrademarks | - |
OriginalFilename | IZI.exe |
ProductName | SysWOW64 |
ProductVersion | 1.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x2d3dc | 0x2d400 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.71 |
.rsrc | 0x430000 | 0x1008 | 0x1200 | 0x2d600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.77 |
.reloc | 0x432000 | 0xc | 0x200 | 0x2e800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x2f3ab | 0x2d5ab | 0x0 |
Memory Dumps (19)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
8g4yj5vyi5gsz9qg.exe | 1 | 0x00790000 | 0x007C3FFF | Relevant Image |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A02E000 | 0x7FFC6A02EFFF | First Execution |
![]() |
64-bit | 0x7FFC6A02E040 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A02E000 | 0x7FFC6A02EFFF | Content Changed |
![]() |
64-bit | 0x7FFC6A02ED60 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A182000 | 0x7FFC6A182FFF | First Execution |
![]() |
64-bit | 0x7FFC6A182000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A183000 | 0x7FFC6A183FFF | First Execution |
![]() |
64-bit | 0x7FFC6A183012 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A131000 | 0x7FFC6A131FFF | First Execution |
![]() |
64-bit | 0x7FFC6A131000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A184000 | 0x7FFC6A184FFF | First Execution |
![]() |
64-bit | 0x7FFC6A184060 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A185000 | 0x7FFC6A185FFF | First Execution |
![]() |
64-bit | 0x7FFC6A185020 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A186000 | 0x7FFC6A186FFF | First Execution |
![]() |
64-bit | 0x7FFC6A186000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A187000 | 0x7FFC6A187FFF | First Execution |
![]() |
64-bit | 0x7FFC6A187012 |
![]() |
![]() |
...
|
buffer | 1 | 0x1B342000 | 0x1B343FFF | First Execution |
![]() |
64-bit | 0x1B343BBC |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A188000 | 0x7FFC6A188FFF | First Execution |
![]() |
64-bit | 0x7FFC6A188060 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A189000 | 0x7FFC6A189FFF | First Execution |
![]() |
64-bit | 0x7FFC6A189020 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A18A000 | 0x7FFC6A18AFFF | First Execution |
![]() |
64-bit | 0x7FFC6A18A032 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A18B000 | 0x7FFC6A18BFFF | First Execution |
![]() |
64-bit | 0x7FFC6A18B000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A18C000 | 0x7FFC6A18CFFF | First Execution |
![]() |
64-bit | 0x7FFC6A18C040 |
![]() |
![]() |
...
|
buffer | 1 | 0x1B344000 | 0x1B344FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x1FB90000 | 0x1FB96FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
8g4yj5vyi5gsz9qg.exe | 1 | 0x00790000 | 0x007C3FFF | Process Termination |
![]() |
64-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.MSILHeracles.10524 |
Malicious
|
C:\Windows\System32\WormLocker2.0.exe | Dropped File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x41d83e |
Size Of Code | 0x1ba00 |
Size Of Initialized Data | 0x1400 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2063-06-26 00:03:00+00:00 |
Version Information (11)
»
Assembly Version | 1.0.0.0 |
Comments | - |
CompanyName | - |
FileDescription | WormLocker2.0 |
FileVersion | 1.0.0.0 |
InternalName | WormLocker2.0.exe |
LegalCopyright | Copyright © 2020 |
LegalTrademarks | - |
OriginalFilename | WormLocker2.0.exe |
ProductName | WormLocker2.0 |
ProductVersion | 1.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x1b84c | 0x1ba00 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.84 |
.rsrc | 0x41e000 | 0x1040 | 0x1200 | 0x1bc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.8 |
.reloc | 0x420000 | 0xc | 0x200 | 0x1ce00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x1d813 | 0x1ba13 | 0x0 |
Memory Dumps (20)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
wormlocker2.0.exe | 5 | 0x00B40000 | 0x00B61FFF | Relevant Image |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A02E000 | 0x7FFC6A02EFFF | First Execution |
![]() |
64-bit | 0x7FFC6A02E040 |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A185000 | 0x7FFC6A185FFF | First Execution |
![]() |
64-bit | 0x7FFC6A185040 |
![]() |
![]() |
...
|
buffer | 5 | 0x1B7D2000 | 0x1B7D3FFF | First Execution |
![]() |
64-bit | 0x1B7D3CBC |
![]() |
![]() |
...
|
wormlocker2.0.exe | 5 | 0x00B40000 | 0x00B61FFF | Final Dump |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 5 | 0x1B7D4000 | 0x1B7D4FFF | First Execution |
![]() |
64-bit | 0x1B7D407C |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A187000 | 0x7FFC6A187FFF | First Execution |
![]() |
64-bit | 0x7FFC6A187012 |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A188000 | 0x7FFC6A188FFF | First Execution |
![]() |
64-bit | 0x7FFC6A188060 |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A189000 | 0x7FFC6A189FFF | First Execution |
![]() |
64-bit | 0x7FFC6A189020 |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A133000 | 0x7FFC6A133FFF | First Execution |
![]() |
64-bit | 0x7FFC6A133040 |
![]() |
![]() |
...
|
buffer | 5 | 0x1B7D2000 | 0x1B7D3FFF | Content Changed |
![]() |
64-bit | 0x1B7D3ADC |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A187000 | 0x7FFC6A187FFF | Content Changed |
![]() |
64-bit | 0x7FFC6A187CE0 |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A185000 | 0x7FFC6A185FFF | Content Changed |
![]() |
64-bit | 0x7FFC6A185740 |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A188000 | 0x7FFC6A188FFF | Content Changed |
![]() |
64-bit | 0x7FFC6A188060 |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A02E000 | 0x7FFC6A02EFFF | Content Changed |
![]() |
64-bit | 0x7FFC6A02E900 |
![]() |
![]() |
...
|
buffer | 5 | 0x1B7D4000 | 0x1B7D4FFF | Content Changed |
![]() |
64-bit | 0x1B7D407C |
![]() |
![]() |
...
|
buffer | 5 | 0x1B7D5000 | 0x1B7D6FFF | First Execution |
![]() |
64-bit | 0x1B7D540C |
![]() |
![]() |
...
|
buffer | 5 | 0x7FFC6A189000 | 0x7FFC6A189FFF | Content Changed |
![]() |
64-bit | 0x7FFC6A1899C0 |
![]() |
![]() |
...
|
buffer | 5 | 0x1B7B0000 | 0x1B7B6FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
wormlocker2.0.exe | 5 | 0x00B40000 | 0x00B61FFF | Process Termination |
![]() |
64-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Razy.816873 |
Malicious
|
C:\Windows\System32\LogonUItrue.exe | Dropped File | Binary |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
PE Information
»
Image Base | 0x140000000 |
Entry Point | 0x140001960 |
Size Of Code | 0x1200 |
Size Of Initialized Data | 0x2800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.amd64 |
Compile Timestamp | 2078-12-15 06:02:44+00:00 |
Version Information (8)
»
CompanyName | Microsoft Corporation |
FileDescription | Windows Logon User Interface Host |
FileVersion | 10.0.15063.0 (WinBuild.160101.0800) |
InternalName | logonui.exe |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | logonui.exe |
ProductName | Microsoft® Windows® Operating System |
ProductVersion | 10.0.15063.0 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x140001000 | 0x1018 | 0x1200 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.8 |
.rdata | 0x140003000 | 0xf6e | 0x1000 | 0x1600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.25 |
.data | 0x140004000 | 0x614 | 0x200 | 0x2600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.32 |
.pdata | 0x140005000 | 0x204 | 0x400 | 0x2800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.21 |
.rsrc | 0x140006000 | 0x920 | 0xa00 | 0x2c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.41 |
.reloc | 0x140007000 | 0x28 | 0x200 | 0x3600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.56 |
Imports (10)
»
msvcrt.dll (17)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
?terminate@@YAXXZ | 0x0 | 0x1400031f8 | 0x3af8 | 0x20f8 | 0x2f |
_commode | 0x0 | 0x140003200 | 0x3b00 | 0x2100 | 0xd2 |
_fmode | 0x0 | 0x140003208 | 0x3b08 | 0x2108 | 0x127 |
_wcmdln | 0x0 | 0x140003210 | 0x3b10 | 0x2110 | 0x382 |
__C_specific_handler | 0x0 | 0x140003218 | 0x3b18 | 0x2118 | 0x57 |
__setusermatherr | 0x0 | 0x140003220 | 0x3b20 | 0x2120 | 0x90 |
_cexit | 0x0 | 0x140003228 | 0x3b28 | 0x2128 | 0xc1 |
_exit | 0x0 | 0x140003230 | 0x3b30 | 0x2130 | 0x10e |
exit | 0x0 | 0x140003238 | 0x3b38 | 0x2138 | 0x432 |
__set_app_type | 0x0 | 0x140003240 | 0x3b40 | 0x2140 | 0x8e |
__wgetmainargs | 0x0 | 0x140003248 | 0x3b48 | 0x2148 | 0x9d |
_amsg_exit | 0x0 | 0x140003250 | 0x3b50 | 0x2150 | 0xae |
_XcptFilter | 0x0 | 0x140003258 | 0x3b58 | 0x2158 | 0x55 |
wcsncmp | 0x0 | 0x140003260 | 0x3b60 | 0x2160 | 0x50b |
wcschr | 0x0 | 0x140003268 | 0x3b68 | 0x2168 | 0x501 |
_initterm | 0x0 | 0x140003270 | 0x3b70 | 0x2170 | 0x17d |
wcstoul | 0x0 | 0x140003278 | 0x3b78 | 0x2178 | 0x51b |
api-ms-win-core-processthreads-l1-1-2.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetCurrentThreadId | 0x0 | 0x140003168 | 0x3a68 | 0x2068 | 0x11 |
GetCurrentProcessId | 0x0 | 0x140003170 | 0x3a70 | 0x2070 | 0xd |
GetStartupInfoW | 0x0 | 0x140003178 | 0x3a78 | 0x2078 | 0x20 |
TerminateProcess | 0x0 | 0x140003180 | 0x3a80 | 0x2080 | 0x4d |
SetPriorityClass | 0x0 | 0x140003188 | 0x3a88 | 0x2088 | 0x39 |
GetCurrentProcess | 0x0 | 0x140003190 | 0x3a90 | 0x2090 | 0xc |
api-ms-win-core-com-l1-1-1.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoCreateInstance | 0x0 | 0x140003108 | 0x3a08 | 0x2008 | 0x9 |
CoUninitialize | 0x0 | 0x140003110 | 0x3a10 | 0x2010 | 0x44 |
CoInitializeEx | 0x0 | 0x140003118 | 0x3a18 | 0x2018 | 0x28 |
api-ms-win-core-heap-l2-1-0.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LocalFree | 0x0 | 0x140003140 | 0x3a40 | 0x2040 | 0x3 |
LocalAlloc | 0x0 | 0x140003148 | 0x3a48 | 0x2048 | 0x2 |
api-ms-win-core-synch-l1-2-0.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
Sleep | 0x0 | 0x1400031d0 | 0x3ad0 | 0x20d0 | 0x2d |
api-ms-win-core-errorhandling-l1-1-1.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
UnhandledExceptionFilter | 0x0 | 0x140003128 | 0x3a28 | 0x2028 | 0x11 |
SetUnhandledExceptionFilter | 0x0 | 0x140003130 | 0x3a30 | 0x2030 | 0xf |
api-ms-win-core-libraryloader-l1-2-0.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetModuleHandleW | 0x0 | 0x140003158 | 0x3a58 | 0x2058 | 0x14 |
api-ms-win-core-profile-l1-1-0.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
QueryPerformanceCounter | 0x0 | 0x1400031a0 | 0x3aa0 | 0x20a0 | 0x0 |
api-ms-win-core-sysinfo-l1-2-1.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetTickCount | 0x0 | 0x1400031e0 | 0x3ae0 | 0x20e0 | 0x18 |
GetSystemTimeAsFileTime | 0x0 | 0x1400031e8 | 0x3ae8 | 0x20e8 | 0x14 |
api-ms-win-core-rtlsupport-l1-2-0.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RtlLookupFunctionEntry | 0x0 | 0x1400031b0 | 0x3ab0 | 0x20b0 | 0x9 |
RtlVirtualUnwind | 0x0 | 0x1400031b8 | 0x3ab8 | 0x20b8 | 0xf |
RtlCaptureContext | 0x0 | 0x1400031c0 | 0x3ac0 | 0x20c0 | 0x2 |
C:\Users\FD1HVy\Desktop\-Q1btNNAQT.jpg | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\-R9qX18qt uvQrw.png | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\5jiGLsAS51cw.pdf | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\6D5GybDLA.xlsx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\783SVZBUM4K35WHm3eRE.wav | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\8g4YJ5vYi5gsz9qg.exe | Modified File | Stream |
Unknown
|
...
|
»
Memory Dumps (19)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
8g4yj5vyi5gsz9qg.exe | 1 | 0x00790000 | 0x007C3FFF | Relevant Image |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A02E000 | 0x7FFC6A02EFFF | First Execution |
![]() |
64-bit | 0x7FFC6A02E040 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A02E000 | 0x7FFC6A02EFFF | Content Changed |
![]() |
64-bit | 0x7FFC6A02ED60 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A182000 | 0x7FFC6A182FFF | First Execution |
![]() |
64-bit | 0x7FFC6A182000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A183000 | 0x7FFC6A183FFF | First Execution |
![]() |
64-bit | 0x7FFC6A183012 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A131000 | 0x7FFC6A131FFF | First Execution |
![]() |
64-bit | 0x7FFC6A131000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A184000 | 0x7FFC6A184FFF | First Execution |
![]() |
64-bit | 0x7FFC6A184060 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A185000 | 0x7FFC6A185FFF | First Execution |
![]() |
64-bit | 0x7FFC6A185020 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A186000 | 0x7FFC6A186FFF | First Execution |
![]() |
64-bit | 0x7FFC6A186000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A187000 | 0x7FFC6A187FFF | First Execution |
![]() |
64-bit | 0x7FFC6A187012 |
![]() |
![]() |
...
|
buffer | 1 | 0x1B342000 | 0x1B343FFF | First Execution |
![]() |
64-bit | 0x1B343BBC |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A188000 | 0x7FFC6A188FFF | First Execution |
![]() |
64-bit | 0x7FFC6A188060 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A189000 | 0x7FFC6A189FFF | First Execution |
![]() |
64-bit | 0x7FFC6A189020 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A18A000 | 0x7FFC6A18AFFF | First Execution |
![]() |
64-bit | 0x7FFC6A18A032 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A18B000 | 0x7FFC6A18BFFF | First Execution |
![]() |
64-bit | 0x7FFC6A18B000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FFC6A18C000 | 0x7FFC6A18CFFF | First Execution |
![]() |
64-bit | 0x7FFC6A18C040 |
![]() |
![]() |
...
|
buffer | 1 | 0x1B344000 | 0x1B344FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x1FB90000 | 0x1FB96FFF | Marked Executable |
![]() |
64-bit | - |
![]() |
![]() |
...
|
8g4yj5vyi5gsz9qg.exe | 1 | 0x00790000 | 0x007C3FFF | Process Termination |
![]() |
64-bit | - |
![]() |
![]() |
...
|
C:\Users\FD1HVy\Desktop\aAOxpPBgR6hc.wav | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\AZTWSqU.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\B2Px0LCOjxIu PPh7hDJ.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\bmu7titX2no.mp3 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\D6Yt.mp3 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\D8fB.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\eMfraDDsfi.m4a | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\F3pGdhW_LtYTRGqIv8.docx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\fY9EtI1To8GFNfUe8L.mp3 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\G1arb1fmSpiHf-oAIpM5.mp4 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\i45PsiITjh_SeDKe.docx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\iFXrA2.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\iGcyw6tHGnuYa.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\j1vV.flv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\kjJi.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\LHbaE3zUi_VGyfB5.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\n8tA1vtRF.pptx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\n_CE2UyUTD8hhgp1UNk.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\oywBt0_fLo2nM lPSO.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Pk87oz1B8x0DUr0T_S.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\SvNPBM-.gif | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\uFzk8u5NnfgLNoYtCu.flv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\VJvL6tO0ETnQke-rP9e.odt | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\VsezaQBBYQ18K1I.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\vTwtJ4Yn9Z2M.gif | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\W0nPkuSy3WYXP1R2S.mp4 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\wb1N5W.mp4 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\X EakLD0TYMH1T.gif | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\yA5RhtAAB12zR.mp3 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\YJ1hhGAE6yj-Y.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\z2TwaHe fR3G.swf | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\ZJ7 uJ.flv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\-VozkKaIANbyfaf2PF.swf | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\8KnL.m4a | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\boCy7zpuGQHKnY7zpp.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\gl9EW8kB8hZkMWu.docx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\Gs8x9.jpg | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\NcdRYDpzm_y0yX.mkv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\NM5P64Qloz5o2Pc6maz.avi | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\PXeSuBVYnDKe9j.gif | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\qHQvcOjYY.csv | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\Re7VDVuURVwl9kR.bmp | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\xc1cEbR_hV5v.pps | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\FD1HVy\Desktop\Z Yv6OX_JjRd88R_\ytqlJrGd cBCL6XP7F.mp4 | Modified File | Stream |
Unknown
|
...
|
»
C:\Windows\System32\LogonUIinf.exe | Dropped File | Binary |
Unknown
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x40f492 |
Size Of Code | 0xd600 |
Size Of Initialized Data | 0x800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2071-02-21 01:51:10+00:00 |
Version Information (11)
»
Assembly Version | 1.0.0.0 |
Comments | - |
CompanyName | - |
FileDescription | wormlogon |
FileVersion | 1.0.0.0 |
InternalName | wormlogon.exe |
LegalCopyright | Copyright © 2020 |
LegalTrademarks | - |
OriginalFilename | wormlogon.exe |
ProductName | wormlogon |
ProductVersion | 1.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0xd498 | 0xd600 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.77 |
.rsrc | 0x410000 | 0x5ac | 0x600 | 0xd800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.06 |
.reloc | 0x412000 | 0xc | 0x200 | 0xde00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0xf467 | 0xd667 | 0x0 |
C:\Windows\System32\ransom_voice.vbs | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\Downloads\worm_tool.sys | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\FD1HVy\Downloads\worm_tool.sys | Dropped File | Stream |
Unknown
|
...
|
»