Malicious
Classifications
Spyware
Threat Names
XWorm
Dynamic Analysis Report
Created on 2025-01-11T10:15:03+00:00
magamed.exe
Windows Exe (x86-32)
Remarks (1/1)
(0x02000008): One or more processes crashed during the analysis. Analysis results may be incomplete.
Remarks
(0x0200005D): 122 additional dumps with the reason "Content Changed" and a total of 424 MB were skipped because the respective maximum limit was reached.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\OqXZRaykm\Desktop\magamed.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x004087CE |
Size Of Code | 0x00013200 |
Size Of Initialized Data | 0x00020000 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2025-01-11 07:45 (UTC+1) |
Version Information (7)
»
FileDescription | |
FileVersion | 1.0.0.0 |
InternalName | magamed.exe |
LegalCopyright | |
OriginalFilename | magamed.exe |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
0x00402000 | 0x00014000 | 0x0000CC00 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.99 | |
0x00416000 | 0x00020000 | 0x00000000 | 0x0000D000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 | |
0x00436000 | 0x00002000 | 0x00000200 | 0x0000D000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.28 | |
.rsrc | 0x00438000 | 0x00020000 | 0x0001FE00 | 0x0000D200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 6.17 |
0x00458000 | 0x00280000 | 0x0002BA00 | 0x0002D000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 8.0 | |
fuckyou | 0x006D8000 | 0x000E4000 | 0x000E3000 | 0x00058A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.99 |
Imports (8)
»
kernel32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetModuleHandleA | - | 0x006D80D4 | 0x002D80D4 | 0x00058AD4 | 0x00000000 |
GetProcAddress | - | 0x006D80D8 | 0x002D80D8 | 0x00058AD8 | 0x00000000 |
ExitProcess | - | 0x006D80DC | 0x002D80DC | 0x00058ADC | 0x00000000 |
LoadLibraryA | - | 0x006D80E0 | 0x002D80E0 | 0x00058AE0 | 0x00000000 |
user32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
MessageBoxA | - | 0x006D80E8 | 0x002D80E8 | 0x00058AE8 | 0x00000000 |
advapi32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegCloseKey | - | 0x006D80F0 | 0x002D80F0 | 0x00058AF0 | 0x00000000 |
oleaut32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | - | 0x006D80F8 | 0x002D80F8 | 0x00058AF8 | 0x00000000 |
gdi32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CreateFontA | - | 0x006D8100 | 0x002D8100 | 0x00058B00 | 0x00000000 |
shell32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteA | - | 0x006D8108 | 0x002D8108 | 0x00058B08 | 0x00000000 |
version.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetFileVersionInfoA | - | 0x006D8110 | 0x002D8110 | 0x00058B10 | 0x00000000 |
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x006D8118 | 0x002D8118 | 0x00058B18 | 0x00000000 |
Memory Dumps (31)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | First Execution | 32-bit | 0x00AE87CE |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00C9B56C |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00C9F31C |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00C9BAD0 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00D9F24C |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00CA55D0 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B3BF6B |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B47C74 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B8C148 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B8BD50 |
...
|
||
buffer | 1 | 0x00550000 | 0x00550FFF | Content Changed | 32-bit | - |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B8E2F8 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B8FF40 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B940C4 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B91A20 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00BBDA50 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00BBA228 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B96BAC |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00BC0B44 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00DA3EA0 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00BE5138 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00BE93C4 |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00B3BE3C |
...
|
||
buffer | 1 | 0x00A90000 | 0x00A90FFF | Content Changed | 32-bit | - |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Content Changed | 32-bit | 0x00C1BA90 |
...
|
||
buffer | 1 | 0x02674000 | 0x02687FFF | First Execution | 32-bit | 0x02684650 |
...
|
||
buffer | 1 | 0x02440000 | 0x02567FFF | First Execution | 32-bit | 0x024D34C4 |
...
|
||
buffer | 1 | 0x02820000 | 0x028C7FFF | First Execution | 32-bit | 0x02820034 |
...
|
||
buffer | 1 | 0x005A0000 | 0x005A0FFF | Marked Executable | 32-bit | - |
...
|
||
buffer | 1 | 0x00990000 | 0x00A8FFFF | Marked Executable | 32-bit | - |
...
|
||
magamed.exe | 1 | 0x00AE0000 | 0x00E9BFFF | Process Termination | 32-bit | - |
...
|
0607c3e673c884419dabe28df35738e649ad63efce71d42ac8d54dcc80665d1b | Extracted File | Image |
Clean
|
»