Malicious
Classifications
Ransomware Virus
Threat Names
CryptoLocker PetiteVirus Mal/HTMLGen-A
Dynamic Analysis Report
Created on 2025-04-03T00:45:44+00:00
G5NW8TTWbyYGaxWc.exe
Windows Exe (x86-32)
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\G5NW8TTWbyYGaxWc.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
PE Information
»
Image Base | 0x00500000 |
Entry Point | 0x005037A0 |
Size Of Code | 0x00002A00 |
Size Of Initialized Data | 0x00002D4E |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2013-10-02 14:54 (UTC+2) |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
0x00501000 | 0x00005000 | 0x00002A00 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.79 | |
.rsrc | 0x00506000 | 0x00003000 | 0x00002C00 | 0x00002E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.98 |
.reloc | 0x00509000 | 0x00001000 | 0x00000000 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.0 |
petite | 0x0050A000 | 0x0000014E | 0x0000014E | 0x00005A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.82 |
Imports (3)
»
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
MessageBoxA | - | 0x0050A0F8 | 0x0000A0F8 | 0x00005AF8 | 0x00000000 |
wsprintfA | - | 0x0050A0FC | 0x0000A0FC | 0x00005AFC | 0x00000000 |
kernel32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ExitProcess | - | 0x0050A104 | 0x0000A104 | 0x00005B04 | 0x00000000 |
GetModuleHandleA | - | 0x0050A108 | 0x0000A108 | 0x00005B08 | 0x00000000 |
GetProcAddress | - | 0x0050A10C | 0x0000A10C | 0x00005B0C | 0x00000000 |
VirtualProtect | - | 0x0050A110 | 0x0000A110 | 0x00005B10 | 0x00000000 |
VirtualAlloc | - | 0x0050A114 | 0x0000A114 | 0x00005B14 | 0x00000000 |
VirtualFree | - | 0x0050A118 | 0x0000A118 | 0x00005B18 | 0x00000000 |
LoadLibraryA | - | 0x0050A11C | 0x0000A11C | 0x00005B1C | 0x00000000 |
gdi32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreateFontIndirectA | - | 0x0050A124 | 0x0000A124 | 0x00005B24 | 0x00000000 |
Memory Dumps (12)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
g5nw8ttwbyygaxwc.exe | 1 | 0x00500000 | 0x0050AFFF | Relevant Image |
![]() |
32-bit | - |
![]() |
...
|
buffer | 1 | 0x001E0000 | 0x001E2FFF | First Execution |
![]() |
32-bit | 0x001E0000 |
![]() |
...
|
g5nw8ttwbyygaxwc.exe | 1 | 0x00500000 | 0x0050AFFF | Content Changed |
![]() |
32-bit | 0x00501000 |
![]() |
...
|
buffer | 1 | 0x001E0000 | 0x001E2FFF | Content Changed |
![]() |
32-bit | - |
![]() |
...
|
buffer | 1 | 0x00610000 | 0x00615FFF | First Execution |
![]() |
32-bit | 0x00610009 |
![]() |
...
|
buffer | 1 | 0x00640000 | 0x00645FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
...
|
buffer | 1 | 0x00640000 | 0x00645FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
...
|
buffer | 1 | 0x00640000 | 0x00645FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
...
|
buffer | 1 | 0x00640000 | 0x00645FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
...
|
buffer | 1 | 0x00640000 | 0x00645FFF | First Execution |
![]() |
32-bit | 0x00641020 |
![]() |
...
|
buffer | 1 | 0x02080048 | 0x0208B243 | Image In Buffer |
![]() |
32-bit | - |
![]() |
...
|
g5nw8ttwbyygaxwc.exe | 1 | 0x00500000 | 0x0050AFFF | Process Termination |
![]() |
32-bit | - |
![]() |
...
|
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
CryptoLocker_rule2 | CryptoLocker ransomware | Ransomware |
5/5
|
...
|
C:\Users\RDHJ0C~1\AppData\Local\Temp\misid.exe | Dropped File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x00500000 |
Entry Point | 0x005037A0 |
Size Of Code | 0x00002A00 |
Size Of Initialized Data | 0x00002D4E |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2013-10-02 14:54 (UTC+2) |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
0x00501000 | 0x00005000 | 0x00002A00 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.79 | |
.rsrc | 0x00506000 | 0x00003000 | 0x00002C00 | 0x00002E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.98 |
.reloc | 0x00509000 | 0x00001000 | 0x00000000 | 0x00000000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.0 |
petite | 0x0050A000 | 0x0000014E | 0x0000014E | 0x00005A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.82 |
Imports (3)
»
user32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
MessageBoxA | - | 0x0050A0F8 | 0x0000A0F8 | 0x00005AF8 | 0x00000000 |
wsprintfA | - | 0x0050A0FC | 0x0000A0FC | 0x00005AFC | 0x00000000 |
kernel32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ExitProcess | - | 0x0050A104 | 0x0000A104 | 0x00005B04 | 0x00000000 |
GetModuleHandleA | - | 0x0050A108 | 0x0000A108 | 0x00005B08 | 0x00000000 |
GetProcAddress | - | 0x0050A10C | 0x0000A10C | 0x00005B0C | 0x00000000 |
VirtualProtect | - | 0x0050A110 | 0x0000A110 | 0x00005B10 | 0x00000000 |
VirtualAlloc | - | 0x0050A114 | 0x0000A114 | 0x00005B14 | 0x00000000 |
VirtualFree | - | 0x0050A118 | 0x0000A118 | 0x00005B18 | 0x00000000 |
LoadLibraryA | - | 0x0050A11C | 0x0000A11C | 0x00005B1C | 0x00000000 |
gdi32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreateFontIndirectA | - | 0x0050A124 | 0x0000A124 | 0x00005B24 | 0x00000000 |
Memory Dumps (18)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
misid.exe | 2 | 0x00500000 | 0x0050AFFF | Relevant Image |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x001E0000 | 0x001E2FFF | First Execution |
![]() |
32-bit | 0x001E0000 |
![]() |
...
|
misid.exe | 2 | 0x00500000 | 0x0050AFFF | Content Changed |
![]() |
32-bit | 0x00501000 |
![]() |
...
|
buffer | 2 | 0x001E0000 | 0x001E2FFF | Content Changed |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x00510000 | 0x00515FFF | First Execution |
![]() |
32-bit | 0x00510009 |
![]() |
...
|
buffer | 2 | 0x00630000 | 0x00635FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x00630000 | 0x00635FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x00630000 | 0x00635FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x00630000 | 0x00635FFF | Marked Executable |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x00630000 | 0x00635FFF | First Execution |
![]() |
32-bit | 0x00631020 |
![]() |
...
|
buffer | 2 | 0x0019A000 | 0x0019FFFF | First Network Behavior |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x001F0000 | 0x001F5FFF | First Network Behavior |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x00510000 | 0x00515FFF | First Network Behavior |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x00630000 | 0x00635FFF | First Network Behavior |
![]() |
32-bit | - |
![]() |
...
|
buffer | 2 | 0x02000000 | 0x0212FFFF | First Network Behavior |
![]() |
32-bit | - |
![]() |
...
|
misid.exe | 2 | 0x00500000 | 0x0050AFFF | First Network Behavior |
![]() |
32-bit | - |
![]() |
...
|
counters.dat | 2 | 0x00640000 | 0x00640FFF | First Network Behavior |
![]() |
32-bit | - |
![]() |
...
|
misid.exe | 2 | 0x00500000 | 0x0050AFFF | Process Termination |
![]() |
32-bit | - |
![]() |
...
|
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
CryptoLocker_rule2 | CryptoLocker ransomware | Ransomware |
5/5
|
...
|
c:\users\rdhj0cnfevzx\appdata\local\temp\misids.exe | Downloaded File | HTML |
Clean
Known to be clean.
|
...
|
»
File Reputation Information
»
Verdict |
Clean
Known to be clean.
|
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\counters.dat | Modified File | Stream |
Clean
|
...
|
»