Malicious
Classifications
Spyware Injector
Threat Names
RedLine RedLine.A Trojan.GenericKDZ.79353
Dynamic Analysis Report
Created on 2021-10-29T14:55:00
9642554127816b22f13288b6ae6b06f4ca66f04d1e8073bded6ad065f6147abd.exe
Windows Exe (x86-32)
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\9642554127816b22f13288b6ae6b06f4ca66f04d1e8073bded6ad065f6147abd.exe | Sample File | Binary |
malicious
|
...
|
»
AV Matches (1)
»
Threat Name | Verdict |
---|---|
Trojan.GenericKDZ.79353 |
malicious
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0xa077e4 |
Size Of Code | 0x23400 |
Size Of Initialized Data | 0x2ae00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2021-10-27 11:08:29+00:00 |
Version Information (7)
»
CompanyName | NVIDIA Corporation |
FileDescription | NVIDIA Notification |
FileVersion | 73.3683.1933.5 |
InternalName | NVIDIA Notification |
LegalCopyright | (C) 2017-2021 NVIDIA Corporation. All rights reserved. |
ProductName | NVIDIA Notification |
ProductVersion | rel_03_23/6986037 |
Sections (7)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x21fc2 | 0x22000 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.65 |
.biJ1zjw | 0x423000 | 0x1326 | 0x0 | 0x0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.rdata | 0x425000 | 0xebb8 | 0xec00 | 0x22400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.7 |
.data | 0x434000 | 0x1cf8 | 0x1000 | 0x31000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.03 |
.iQWIeij | 0x436000 | 0x269436 | 0x0 | 0x0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.0 |
.iQWIeij | 0x6a0000 | 0x3f6610 | 0x3f6800 | 0x32000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.92 |
.rsrc | 0xa97000 | 0x53d | 0x600 | 0x428800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.85 |
Imports (7)
»
KERNEL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
Sleep | - | 0x905000 | 0x5b9164 | 0x34b164 | 0x0 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShowWindow | - | 0x905008 | 0x5b916c | 0x34b16c | 0x0 |
WTSAPI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WTSSendMessageW | - | 0x905010 | 0x5b9174 | 0x34b174 | 0x0 |
KERNEL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VirtualQuery | - | 0x905018 | 0x5b917c | 0x34b17c | 0x0 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetProcessWindowStation | - | 0x905020 | 0x5b9184 | 0x34b184 | 0x0 |
KERNEL32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LocalAlloc | - | 0x905028 | 0x5b918c | 0x34b18c | 0x0 |
LocalFree | - | 0x90502c | 0x5b9190 | 0x34b190 | 0x0 |
GetModuleFileNameW | - | 0x905030 | 0x5b9194 | 0x34b194 | 0x0 |
GetProcessAffinityMask | - | 0x905034 | 0x5b9198 | 0x34b198 | 0x0 |
SetProcessAffinityMask | - | 0x905038 | 0x5b919c | 0x34b19c | 0x0 |
SetThreadAffinityMask | - | 0x90503c | 0x5b91a0 | 0x34b1a0 | 0x0 |
Sleep | - | 0x905040 | 0x5b91a4 | 0x34b1a4 | 0x0 |
ExitProcess | - | 0x905044 | 0x5b91a8 | 0x34b1a8 | 0x0 |
FreeLibrary | - | 0x905048 | 0x5b91ac | 0x34b1ac | 0x0 |
LoadLibraryA | - | 0x90504c | 0x5b91b0 | 0x34b1b0 | 0x0 |
GetModuleHandleA | - | 0x905050 | 0x5b91b4 | 0x34b1b4 | 0x0 |
GetProcAddress | - | 0x905054 | 0x5b91b8 | 0x34b1b8 | 0x0 |
USER32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetProcessWindowStation | - | 0x90505c | 0x5b91c0 | 0x34b1c0 | 0x0 |
GetUserObjectInformationW | - | 0x905060 | 0x5b91c4 | 0x34b1c4 | 0x0 |
Memory Dumps (15)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
9642554127816b22f13288b6ae6b06f4ca66f04d1e8073bded6ad065f6147abd.exe | 1 | 0x00400000 | 0x00A97FFF | Relevant Image | 32-bit | 0x00999BAF |
...
|
|||
buffer | 1 | 0x001E0000 | 0x001E0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x001E0000 | 0x001E0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x00BA0000 | 0x00BA0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x00BA0000 | 0x00BA0FFF | First Execution | 32-bit | 0x00BA0015 |
...
|
|||
buffer | 1 | 0x00BB0000 | 0x00BB0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x00BB0000 | 0x00BB0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x00BD0000 | 0x00BD0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x00BD0000 | 0x00BD0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x00BE0000 | 0x00BE0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x00BE0000 | 0x00BE0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x00BF0000 | 0x00BF0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x00BF0000 | 0x00BF0FFF | Content Changed | 32-bit | - |
...
|
|||
buffer | 1 | 0x0019F710 | 0x0019FE8D | First Execution | 32-bit | 0x0019F891 |
...
|
|||
buffer | 1 | 0x00C00000 | 0x00C1DFFF | Content Changed | 32-bit | - |
...
|
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmpC80C.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmpCCEF.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmpCCFF.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmpCD10.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmpCD40.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmpCD50.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmpCD61.tmp | Dropped File | ZIP |
clean
|
...
|
»