Malicious
Classifications
-
Threat Names
-
Dynamic Analysis Report
Created on 2024-10-31T10:58:42+00:00
defOff.exe
Windows Exe (x86-32)
Remarks (1/1)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "2 hours, 20 minutes, 36 seconds" to "4 seconds" to reveal dormant functionality.
Remarks
(0x0200005D): 986 additional dumps with the reason "Content Changed" and a total of 2306 MB were skipped because the respective maximum limit was reached.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\OqXZRaykm\Desktop\defOff.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x0069E000 |
Size Of Code | 0x00002400 |
Size Of Initialized Data | 0x00000800 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-10-15 17:58 (UTC) |
Version Information (11)
»
Comments | - |
CompanyName | - |
FileDescription | defOff |
FileVersion | 1.0.0.0 |
InternalName | defOff.exe |
LegalCopyright | Copyright © 2023 |
LegalTrademarks | - |
OriginalFilename | defOff.exe |
ProductName | defOff |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
0x00402000 | 0x00004000 | 0x00001200 | 0x00002000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.78 | |
.rsrc | 0x00406000 | 0x0000059C | 0x00000600 | 0x00003200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.04 |
.idata | 0x00408000 | 0x00002000 | 0x00000200 | 0x00003800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.93 |
fstwwbmp | 0x0040A000 | 0x00292000 | 0x00290200 | 0x00003A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.54 |
ximdardy | 0x0069C000 | 0x00002000 | 0x00000400 | 0x00293C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.15 |
.taggant | 0x0069E000 | 0x00004000 | 0x00002200 | 0x00294000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.78 |
Imports (1)
»
kernel32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
lstrcpy | - | 0x00408034 | 0x0000802C | 0x0000382C | 0x00000000 |
Memory Dumps (48)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | First Execution | 32-bit | 0x009EE000 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x0075D15B |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x0075E68B |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x007604ED |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x007D3628 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x0083C3C7 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008C8425 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x0075DE0F |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008CB000 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008D2DDA |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008D7BBC |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x0075E000 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008D3684 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008D2E42 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008DC7EE |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x0075DE0F |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008E4003 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x007EC450 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x007CCBEA |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x007A360F |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x00776AA1 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x0079D000 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008ED28C |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008C3000 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008F5167 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008ED292 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x007EADFB |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x0075F08B |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008FC83F |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x008FDB6A |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x00909199 |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x009152CD |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Content Changed | 32-bit | 0x00915000 |
...
|
||
user32.dll | 1 | 0x764E0000 | 0x76673FFF | First Execution | 32-bit | 0x765058D0 |
...
|
||
advapi32.dll | 1 | 0x767D0000 | 0x76848FFF | First Execution | 32-bit | 0x767EF320 |
...
|
||
ntdll.dll | 1 | 0x77590000 | 0x77731FFF | First Execution | 32-bit | 0x775D52C0 |
...
|
||
shlwapi.dll | 1 | 0x76E80000 | 0x76EC4FFF | First Execution | 32-bit | 0x76E9A0A0 |
...
|
||
mscoree.dll | 1 | 0x700F0000 | 0x70141FFF | First Execution | 32-bit | 0x7011F100 |
...
|
||
mscoreei.dll | 1 | 0x6FB70000 | 0x6FBFCFFF | First Execution | 32-bit | 0x6FB7FA20 |
...
|
||
kernel.appcore.dll | 1 | 0x75140000 | 0x7514EFFF | First Execution | 32-bit | 0x75143A50 |
...
|
||
version.dll | 1 | 0x74AE0000 | 0x74AE7FFF | First Execution | 32-bit | 0x74AE15C0 |
...
|
||
clr.dll | 1 | 0x6F3C0000 | 0x6FB6FFFF | First Execution | 32-bit | 0x6F5317C0 |
...
|
||
rpcrt4.dll | 1 | 0x76420000 | 0x764D9FFF | First Execution | 32-bit | 0x76449507 |
...
|
||
combase.dll | 1 | 0x757C0000 | 0x75A3FFFF | First Execution | 32-bit | 0x7583CD05 |
...
|
||
clrjit.dll | 1 | 0x6DE70000 | 0x6DEF8FFF | First Execution | 32-bit | 0x6DE751D0 |
...
|
||
sechost.dll | 1 | 0x76180000 | 0x761F4FFF | First Execution | 32-bit | 0x76197ABD |
...
|
||
buffer | 1 | 0x045F0000 | 0x045F0FFF | Marked Executable | 32-bit | - |
...
|
||
defoff.exe | 1 | 0x00750000 | 0x009F1FFF | Process Termination | 32-bit | - |
...
|
C:\Users\OqXZRaykm\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\defOff.exe.log | Dropped File | Unknown |
Clean
|
...
|
»