Malicious
Classifications
Spyware Injector
Threat Names
FormBook XLoader
Dynamic Analysis Report
Created on 2025-01-24T13:31:00+00:00
Product List -Pictures-Specifications-pdf.exe
Windows Exe (x86-32)
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "11 minutes, 55 seconds" to "317.0 milliseconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\kEecfMwgj\AppData\Roaming\pyXtVwnfNqei.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x004AC672 |
Size Of Code | 0x000AA800 |
Size Of Initialized Data | 0x00001200 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2025-01-24 05:16 (UTC+1) |
Version Information (11)
»
Comments | PDF document |
CompanyName | Adobe Reader |
FileDescription | Microsoft PDF Document |
FileVersion | 2.0.0.781 |
InternalName | zOvu.exe |
LegalCopyright | Adobe Inc. All rights reserved |
LegalTrademarks | PDF document |
OriginalFilename | zOvu.exe |
ProductName | Adobe Reader |
ProductVersion | 2.0.0.781 |
Assembly Version | 2.0.0.781 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x000AA678 | 0x000AA800 | 0x00000200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.69 |
.rsrc | 0x004AE000 | 0x00000E88 | 0x00001000 | 0x000AAA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.33 |
.reloc | 0x004B0000 | 0x0000000C | 0x00000200 | 0x000ABA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x000AC648 | 0x000AA848 | 0x00000000 |
Digital Signature Information
»
Verification Status | Failed |
Certificate: Simon Tatham
»
Issued by | Simon Tatham |
Parent Certificate | COMODO RSA Code Signing CA |
Country Name | GB |
Valid From | 2018-11-13 01:00 (UTC+1) |
Valid Until | 2021-11-09 00:59 (UTC+1) |
Algorithm | sha256_rsa |
Serial Number | 7C 11 18 CB BA DC 95 DA 37 52 C4 6E 47 A2 74 38 |
Thumbprint | 5B 9E 27 3C F1 19 41 FD 8C 6B E3 F0 38 C4 79 7B BE 88 42 68 |
Certificate: COMODO RSA Code Signing CA
»
Issued by | COMODO RSA Code Signing CA |
Parent Certificate | COMODO RSA Certification Authority |
Country Name | GB |
Valid From | 2013-05-09 02:00 (UTC+2) |
Valid Until | 2028-05-09 01:59 (UTC+2) |
Algorithm | sha384_rsa |
Serial Number | 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF |
Thumbprint | B6 9E 75 2B BE 88 B4 45 82 00 A7 C0 F4 F5 B3 CC E6 F3 5B 47 |
Certificate: COMODO RSA Certification Authority
»
Issued by | COMODO RSA Certification Authority |
Country Name | GB |
Valid From | 2010-01-19 01:00 (UTC+1) |
Valid Until | 2038-01-19 00:59 (UTC+1) |
Algorithm | sha384_rsa |
Serial Number | 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D |
Thumbprint | AF E5 D2 44 A8 D1 19 42 30 FF 47 9F E2 F8 97 BB CD 7A 8C B4 |
Memory Dumps (7)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
product list -pictures-specifications-pdf.exe | 1 | 0x00360000 | 0x00411FFF | Relevant Image | 32-bit | - |
...
|
||
buffer | 1 | 0x00340000 | 0x00357FFF | Reflectively Loaded .NET Assembly | 32-bit | - |
...
|
||
product list -pictures-specifications-pdf.exe | 1 | 0x00360000 | 0x00411FFF | Final Dump | 32-bit | - |
...
|
||
product list -pictures-specifications-pdf.exe | 1 | 0x00360000 | 0x00411FFF | Process Termination | 32-bit | - |
...
|
||
pyxtvwnfnqei.exe | 39 | 0x00D40000 | 0x00DF1FFF | Relevant Image | 32-bit | - |
...
|
||
buffer | 39 | 0x00B10000 | 0x00B27FFF | Reflectively Loaded .NET Assembly | 32-bit | - |
...
|
||
pyxtvwnfnqei.exe | 39 | 0x00D40000 | 0x00DF1FFF | Process Termination | 32-bit | - |
...
|
c:\users\keecfmwgj\appdata\local\gdipfontcachev1.dat | Dropped File | Stream |
Clean
|
...
|
»
c:\users\keecfmwgj\appdata\local\gdipfontcachev1.dat | Dropped File | Stream |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp32A3.tmp | Dropped File | Text |
Clean
|
...
|
»
561153de6542ee6624227fa63d6a2e166edd8cb5880b57b9c97856cba2809558 | Extracted File | Image |
Clean
|
...
|
»