Malicious
Classifications
Spyware Injector
Threat Names
AgentTesla AgentTesla.v3 Mal/Generic-S
Dynamic Analysis Report
Created on 2024-11-30T08:14:07+00:00
c8GJy5ypctxsh2cr.exe
Windows Exe (x86-32)
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\c8GJy5ypctxsh2cr.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x00521F70 |
Size Of Code | 0x00055000 |
Size Of Initialized Data | 0x0004A000 |
Size Of Uninitialized Data | 0x000CD000 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2024-11-25 00:42 (UTC+1) |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x00401000 | 0x000CD000 | 0x00000000 | 0x00000400 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x004CE000 | 0x00055000 | 0x00054200 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.94 |
.rsrc | 0x00523000 | 0x0004A000 | 0x00049C00 | 0x00054600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.49 |
Imports (18)
»
KERNEL32.DLL (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | - | 0x0056C89C | 0x0016C89C | 0x0009DE9C | 0x00000000 |
GetProcAddress | - | 0x0056C8A0 | 0x0016C8A0 | 0x0009DEA0 | 0x00000000 |
VirtualProtect | - | 0x0056C8A4 | 0x0016C8A4 | 0x0009DEA4 | 0x00000000 |
VirtualAlloc | - | 0x0056C8A8 | 0x0016C8A8 | 0x0009DEA8 | 0x00000000 |
VirtualFree | - | 0x0056C8AC | 0x0016C8AC | 0x0009DEAC | 0x00000000 |
ExitProcess | - | 0x0056C8B0 | 0x0016C8B0 | 0x0009DEB0 | 0x00000000 |
ADVAPI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
AddAce | - | 0x0056C8B8 | 0x0016C8B8 | 0x0009DEB8 | 0x00000000 |
COMCTL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ImageList_Remove | - | 0x0056C8C0 | 0x0016C8C0 | 0x0009DEC0 | 0x00000000 |
COMDLG32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetSaveFileNameW | - | 0x0056C8C8 | 0x0016C8C8 | 0x0009DEC8 | 0x00000000 |
GDI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LineTo | - | 0x0056C8D0 | 0x0016C8D0 | 0x0009DED0 | 0x00000000 |
IPHLPAPI.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
IcmpSendEcho | - | 0x0056C8D8 | 0x0016C8D8 | 0x0009DED8 | 0x00000000 |
MPR.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetUseConnectionW | - | 0x0056C8E0 | 0x0016C8E0 | 0x0009DEE0 | 0x00000000 |
ole32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoGetObject | - | 0x0056C8E8 | 0x0016C8E8 | 0x0009DEE8 | 0x00000000 |
OLEAUT32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VariantInit | 0x00000008 | 0x0056C8F0 | 0x0016C8F0 | 0x0009DEF0 | - |
PSAPI.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetProcessMemoryInfo | - | 0x0056C8F8 | 0x0016C8F8 | 0x0009DEF8 | 0x00000000 |
SHELL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DragFinish | - | 0x0056C900 | 0x0016C900 | 0x0009DF00 | 0x00000000 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetDC | - | 0x0056C908 | 0x0016C908 | 0x0009DF08 | 0x00000000 |
USERENV.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadUserProfileW | - | 0x0056C910 | 0x0016C910 | 0x0009DF10 | 0x00000000 |
UxTheme.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
IsThemeActive | - | 0x0056C918 | 0x0016C918 | 0x0009DF18 | 0x00000000 |
VERSION.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VerQueryValueW | - | 0x0056C920 | 0x0016C920 | 0x0009DF20 | 0x00000000 |
WININET.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
FtpOpenFileW | - | 0x0056C928 | 0x0016C928 | 0x0009DF28 | 0x00000000 |
WINMM.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
timeGetTime | - | 0x0056C930 | 0x0016C930 | 0x0009DF30 | 0x00000000 |
WSOCK32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
socket | 0x00000017 | 0x0056C938 | 0x0016C938 | 0x0009DF38 | - |
Memory Dumps (24)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | First Execution | 32-bit | 0x014E1F70 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013E6AC0 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013DF08B |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x0143197B |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013C2322 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013D4800 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013DC75A |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013C3BD9 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013EE4C8 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x01434F16 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013C9048 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x01409CAB |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013CE8D0 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013CF030 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x01424EDD |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013CFE30 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013D097E |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x01407F2F |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x0140690B |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x013EB043 |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Content Changed | 32-bit | 0x01420D09 |
...
|
||
buffer | 1 | 0x00EE2870 | 0x00EE606F | First Execution | 32-bit | 0x00EE4C20 |
...
|
||
buffer | 1 | 0x012A0000 | 0x012D6FFF | Image In Buffer | 32-bit | - |
...
|
||
c8gjy5ypctxsh2cr.exe | 1 | 0x013C0000 | 0x0152CFFF | Process Termination | 32-bit | - |
...
|
C:\Users\RDhJ0CNFevzX\AppData\Roaming\yGbzOMp\yGbzOMp.exe | Dropped File | Binary |
Clean
Known to be clean.
|
...
|
»
File Reputation Information
»
Verdict |
Clean
Known to be clean.
|
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x004082FE |
Size Of Code | 0x00006400 |
Size Of Initialized Data | 0x00000C00 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_CUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2016-07-14 21:51 (UTC+2) |
Version Information (10)
»
CompanyName | Microsoft Corporation |
FileDescription | Microsoft .NET Services Installation Utility |
FileVersion | 4.6.1590.0 built by: NETFXREL2 |
InternalName | RegSvcs.exe |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | RegSvcs.exe |
ProductName | Microsoft® .NET Framework |
ProductVersion | 4.6.1590.0 |
Comments | Flavor=Retail |
PrivateBuild | DDBLD400 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x00006304 | 0x00006400 | 0x00000200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.09 |
.rsrc | 0x0040A000 | 0x00000938 | 0x00000A00 | 0x00006600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.36 |
.reloc | 0x0040C000 | 0x0000000C | 0x00000200 | 0x00007000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.06 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x00402000 | 0x000082D4 | 0x000064D4 | 0x00000000 |
Digital Signature Information
»
Verification Status | Valid |
Certificate: Microsoft Corporation
»
Issued by | Microsoft Corporation |
Parent Certificate | Microsoft Code Signing PCA |
Country Name | US |
Valid From | 2015-06-04 19:42 (UTC+2) |
Valid Until | 2016-09-04 19:42 (UTC+2) |
Algorithm | sha1_rsa |
Serial Number | 33 00 00 01 0A 2C 79 AE D7 79 7B A6 AC 00 01 00 00 01 0A |
Thumbprint | 3B DA 32 3E 55 2D B1 FD E5 F4 FB EE 75 D6 D5 B2 B1 87 EE DC |
Certificate: Microsoft Code Signing PCA
»
Issued by | Microsoft Code Signing PCA |
Country Name | US |
Valid From | 2010-09-01 00:19 (UTC+2) |
Valid Until | 2020-09-01 00:29 (UTC+2) |
Algorithm | sha1_rsa |
Serial Number | 61 33 26 1A 00 00 00 00 00 31 |
Thumbprint | 3C AF 9B A2 DB 55 70 CA F7 69 42 FF 99 10 1B 99 38 88 E2 57 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
ygbzomp.exe | 7 | 0x009B0000 | 0x009BDFFF | Relevant Image | 32-bit | - |
...
|
||
ygbzomp.exe | 7 | 0x009B0000 | 0x009BDFFF | Process Termination | 32-bit | - |
...
|
C:\Users\RDHJ0C~1\AppData\Local\Temp\harrowment | Dropped File | Stream |
Clean
|
...
|
»
C:\Users\RDHJ0C~1\AppData\Local\Temp\autB27C.tmp | Dropped File | Stream |
Clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmpF5ED.tmp | Dropped File | Empty |
Clean
|
...
|
»