Malicious
Classifications
Spyware Injector
Threat Names
AgentTesla AgentTesla.v4
Dynamic Analysis Report
Created on 2024-06-10T07:06:57+00:00
2023081921.exe
Windows Exe (x86-64)
Remarks (1/1)
(0x02000008): One or more processes crashed during the analysis. Analysis results may be incomplete.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\kEecfMwgj\Desktop\2023081921.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x00400000 |
Size Of Code | 0x00242E71 |
Size Of Initialized Data | 0x00006032 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_AMD64 |
Compile Timestamp | 2096-02-04 11:38 (UTC) |
Version Information (11)
»
Comments | Update from Java t |
CompanyName | Update from Java |
FileDescription | Update from Java |
FileVersion | 1.0.0.0 |
InternalName | NorthAmericaUpdate.exe |
LegalCopyright | Copyright © 2024 |
LegalTrademarks | - |
OriginalFilename | NorthAmericaUpdate.exe |
ProductName | Update from Java |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Sections (2)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00402000 | 0x00242E71 | 0x00243000 | 0x00000200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 3.1 |
.rsrc | 0x00646000 | 0x0000604E | 0x00006200 | 0x00243200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.63 |
Memory Dumps (25)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
2023081921.exe | 1 | 0x00BF0000 | 0x00E3DFFF | Relevant Image | 64-bit | - |
...
|
||
buffer | 1 | 0x00AC0000 | 0x00AF9FFF | Reflectively Loaded .NET Assembly | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Reflectively Loaded .NET Assembly | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
buffer | 1 | 0x1B350000 | 0x1B3DEFFF | Marked Executable | 64-bit | - |
...
|
||
2023081921.exe | 1 | 0x00BF0000 | 0x00E3DFFF | Process Termination | 64-bit | - |
...
|
e74fdc72000449bdd24e559d7db4a16b831037dcaf9ed213ad5a6d7199f30158 | Extracted File | Image |
Clean
|
...
|
»