Downloader Spyware Backdoor
XWorm Mal/HTMLGen-A Troj/RAT-FJ
Created on 2025-01-15T19:08:47+00:00
fcmth.bat
Remarks (2/3)
(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.
(0x02000050): This analysis has been updated with the latest reputation and static analysis results from the original analysis with the ID #24019913.
(0x0200000E): The overall sleep time of all monitored processes was truncated from "1 minute" to "10 seconds" to reveal dormant functionality.
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
Batch_Obfuscator | File obfuscated by batch-obfuscator | - |
4/5
|
...
|
C:\Users\kEecfMwgj\AppData\Roaming\ApplicationFrameHost.exe | Downloaded File | Binary |
Malicious
|
...
|
Verdict |
Malicious
|
Image Base | 0x00400000 |
Entry Point | 0x00412B0E |
Size Of Code | 0x00010C00 |
Size Of Initialized Data | 0x00000800 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2025-01-15 19:09 (UTC+1) |
FileDescription | |
FileVersion | 1.0.0.0 |
InternalName | XClient.exe |
LegalCopyright | |
OriginalFilename | XClient.exe |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x00010B14 | 0x00010C00 | 0x00000200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.01 |
.rsrc | 0x00414000 | 0x000004CE | 0x00000600 | 0x00010E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.73 |
.reloc | 0x00416000 | 0x0000000C | 0x00000200 | 0x00011400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x00012AE0 | 0x00010CE0 | 0x00000000 |
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
microsoftaccount.exe | 7 | 0x010B0000 | 0x010C7FFF | Relevant Image | 64-bit | - |
...
|
||
microsoftaccount.exe | 7 | 0x010B0000 | 0x010C7FFF | Final Dump | 64-bit | - |
...
|
||
buffer | 7 | 0x1BB8B000 | 0x1BB8FFFF | First Network Behavior | 64-bit | - |
...
|
||
buffer | 7 | 0x1B5BE000 | 0x1B5BFFFF | First Network Behavior | 64-bit | - |
...
|
||
buffer | 7 | 0x1B1BA000 | 0x1B1BFFFF | First Network Behavior | 64-bit | - |
...
|
||
buffer | 7 | 0x1AC9F000 | 0x1ACAFFFF | First Network Behavior | 64-bit | - |
...
|
||
buffer | 7 | 0x1A7BD000 | 0x1A7BFFFF | First Network Behavior | 64-bit | - |
...
|
||
buffer | 7 | 0x00254000 | 0x0025FFFF | First Network Behavior | 64-bit | - |
...
|
||
microsoftaccount.exe | 7 | 0x010B0000 | 0x010C7FFF | First Network Behavior | 64-bit | - |
...
|
||
applicationframehost.exe | 18 | 0x00950000 | 0x00967FFF | Relevant Image | 64-bit | - |
...
|
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
XWorm_Strings | XWorm strings | Spyware |
5/5
|
...
|
XWorm_Decryption_Routine | XWorm decryption routine | Spyware |
5/5
|
...
|
C:\Users\kEecfMwgj\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ApplicationFrameHost.lnk | Dropped File | Shortcut |
Clean
|
...
|