Malicious
Classifications
Spyware Downloader Injector Exploit
Threat Names
RedLine RedLine.A Mal/Generic-S
Dynamic Analysis Report
Created on 2024-06-24T16:43:17+00:00
Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.doc
Word Document
Remarks (1/1)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "5 minutes" to "10 seconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\kEecfMwgj\Desktop\Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.doc | Sample File | Word Document |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
Names | Mal/Generic-S |
Office Information
»
Creator | Modexcomm |
Last Modified By | Modexcomm |
Revision | 7 |
Create Time | 2023-03-27 22:13 (UTC) |
Modify Time | 2023-08-16 13:25 (UTC) |
Application | Microsoft Office Word |
App Version | 12.0000 |
Template | Normal.dotm |
Document Security | NONE |
Editing Time | 19.0 |
Page Count | 7 |
Line Count | 150 |
Paragraph Count | 42 |
Word Count | 3177 |
Character Count | 18113 |
Chars With Spaces | 21248 |
ScaleCrop | False |
SharedDoc | False |
Document Content Snippet
»
dMBCBESONDERHEDE BESONDERHEDE VIR HIERDIE MAANDDRAENDE NR. HOEV30208 NBC DRAAG 30 STK30308 NBC DRAAG 6 STK32007X NBC DRAAG 74 STK33005 NBC wat 5 stelle dra52799 / 800U (25877/21) NBC wat 30 PCS dra6001 NBC wat 100 stuks dra6004 NBC wat 180 stuks dra6006 NBC wat 30 PCS dra6011 C3 NBC wat 10 stuks dra6202 NBC wat 280 stuks dra6203 NBC DRAAG 330 STK6205 (Stel) NBC DRAER 224 STK6205ZZ NBC DRAAG 8 STELS6207 NBC DRAER 32 STK6207N NBC wat 10 stuks dra6207ZZ NBC DRAER 52 STK6209 NBC wat 24 stuks dra6209N NBC wat 10 stuks dra6211 NBC met 26 st6212 NBC met 24 st6213 C3 NBC wat 20 stuks dra6215 C3 NBC wat 10 stuks dra628RSS NBC wat 120 stuks dra6300 NBC wat 180 stuks dra6304 (Kit) NBC DRAER 4 STK6307ZZ NBC wat 10 stuks dra6308 C3 NBC DRAAG 40 STK6308ZZ NBC wat 10 stuks dra6311 NBC wat 10 stuks dra6312 NBC wat 10 stuks dra6312ZZ C3 NBC DRAER 6 STK6902 C3 NBC wat 20 stuks draLM48548 / 510 NBC DRAER 96 STKNJ309 NBC DRAER 6 STK1988/1922 (NSPP01) .NC 706304.BEARING SET (NPP02) 11230209 (NSPP01) .NC 20 |
Extracted URLs (1)
»
URL | WHOIS Data | Reputation Status | Recursively Submitted | Actions |
---|---|---|---|---|
https://universalmovies.top/notorious.doc |
Show WHOIS
|
Malicious
|
- |
...
|
C:\Users\kEecfMwgj\AppData\Roaming\notorious53209.exe | Downloaded File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x0051F090 |
Size Of Code | 0x00057000 |
Size Of Initialized Data | 0x00047000 |
Size Of Uninitialized Data | 0x000C8000 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2024-06-24 07:38 (UTC) |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x00401000 | 0x000C8000 | 0x00000000 | 0x00000400 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x004C9000 | 0x00057000 | 0x00056400 | 0x00000400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.94 |
.rsrc | 0x00520000 | 0x00047000 | 0x00046C00 | 0x00056800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.42 |
Imports (18)
»
KERNEL32.DLL (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | - | 0x005668C0 | 0x001668C0 | 0x0009D0C0 | 0x00000000 |
GetProcAddress | - | 0x005668C4 | 0x001668C4 | 0x0009D0C4 | 0x00000000 |
VirtualProtect | - | 0x005668C8 | 0x001668C8 | 0x0009D0C8 | 0x00000000 |
VirtualAlloc | - | 0x005668CC | 0x001668CC | 0x0009D0CC | 0x00000000 |
VirtualFree | - | 0x005668D0 | 0x001668D0 | 0x0009D0D0 | 0x00000000 |
ExitProcess | - | 0x005668D4 | 0x001668D4 | 0x0009D0D4 | 0x00000000 |
ADVAPI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetAce | - | 0x005668DC | 0x001668DC | 0x0009D0DC | 0x00000000 |
COMCTL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ImageList_Remove | - | 0x005668E4 | 0x001668E4 | 0x0009D0E4 | 0x00000000 |
COMDLG32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetOpenFileNameW | - | 0x005668EC | 0x001668EC | 0x0009D0EC | 0x00000000 |
GDI32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LineTo | - | 0x005668F4 | 0x001668F4 | 0x0009D0F4 | 0x00000000 |
IPHLPAPI.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
IcmpSendEcho | - | 0x005668FC | 0x001668FC | 0x0009D0FC | 0x00000000 |
MPR.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetUseConnectionW | - | 0x00566904 | 0x00166904 | 0x0009D104 | 0x00000000 |
ole32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoGetObject | - | 0x0056690C | 0x0016690C | 0x0009D10C | 0x00000000 |
OLEAUT32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VariantInit | 0x00000008 | 0x00566914 | 0x00166914 | 0x0009D114 | - |
PSAPI.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetProcessMemoryInfo | - | 0x0056691C | 0x0016691C | 0x0009D11C | 0x00000000 |
SHELL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DragFinish | - | 0x00566924 | 0x00166924 | 0x0009D124 | 0x00000000 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetDC | - | 0x0056692C | 0x0016692C | 0x0009D12C | 0x00000000 |
USERENV.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadUserProfileW | - | 0x00566934 | 0x00166934 | 0x0009D134 | 0x00000000 |
UxTheme.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
IsThemeActive | - | 0x0056693C | 0x0016693C | 0x0009D13C | 0x00000000 |
VERSION.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VerQueryValueW | - | 0x00566944 | 0x00166944 | 0x0009D144 | 0x00000000 |
WININET.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
FtpOpenFileW | - | 0x0056694C | 0x0016694C | 0x0009D14C | 0x00000000 |
WINMM.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
timeGetTime | - | 0x00566954 | 0x00166954 | 0x0009D154 | 0x00000000 |
WSOCK32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
connect | 0x00000004 | 0x0056695C | 0x0016695C | 0x0009D15C | - |
Memory Dumps (38)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | First Execution | 32-bit | 0x012DF090 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011ED812 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011F4D6B |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011EC845 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011E6DAE |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011C1000 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011C4AD2 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011C77C7 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011C3CA8 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011CF8CF |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011C2649 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011C5A64 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011F0738 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x01229393 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011C69CA |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011FE45A |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x0122768B |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011D0A8D |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011CA000 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x0120220E |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011EE000 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011CE580 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x0123474D |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011D2123 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011C31CE |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011CB381 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x01204E46 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011CD260 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011FF22E |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x01241917 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011CE580 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011CB381 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x011E9BEC |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x0123E237 |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Content Changed | 32-bit | 0x01241917 |
...
|
||
buffer | 6 | 0x00550000 | 0x00553FFF | First Execution | 32-bit | 0x005523B0 |
...
|
||
buffer | 6 | 0x00560000 | 0x00577FFF | Dump Rule: RedLineConfig | 32-bit | - |
...
|
||
notorious53209.exe | 6 | 0x011C0000 | 0x01326FFF | Process Termination | 32-bit | - |
...
|
C:\Users\KEECFM~1\AppData\Local\Temp\Keily | Dropped File | Stream |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp9A2A.tmp | Dropped File | ZIP |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp99EB.tmp | Dropped File | ZIP |
Clean
|
...
|
»
C:\Users\KEECFM~1\AppData\Local\Temp\aut6BD1.tmp | Dropped File | Stream |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp9A4C.tmp | Dropped File | ZIP |
Clean
|
...
|
»
C:\Users\KEECFM~1\AppData\Local\Temp\lophophorine | Dropped File | Text |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp993B.tmp | Dropped File | Unknown |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp9A3B.tmp | Dropped File | ZIP |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp997B.tmp | Dropped File | Unknown |
Clean
|
...
|
»
C:\Users\KEECFM~1\AppData\Local\Temp\aut6E04.tmp | Dropped File | Stream |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp98DC.tmp | Dropped File | ZIP |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp99DA.tmp | Dropped File | ZIP |
Clean
|
...
|
»
C:\Users\kEecfMwgj\AppData\Local\Temp\tmp998B.tmp | Dropped File | Stream |
Clean
|
...
|
»
bf89362748b9e66c11aaa49ddf83b1665fe038d04225b36de4f26cffc11a0f3d | Downloaded File | RTF |
Clean
|
...
|
»
Office Information
»
Document Content Snippet
»
44345958please click Enable editing from the yellow bar above.The independent auditors’ opinion says the financial statements are fairly stated in accordance with the basis of accounting used by your organization. So why are the auditors giving you that other letter In an audit of financial statements, professional standards require that auditors obtain an understanding of internal controls to the extent necessary to plan the audit. Auditors use this understanding of internal controls to assess the risk of material misstatement of the financial statements and to design appropriate audit procedures to minimize that risk.The definition of good internal controls is that they allow errors and other misstatements to be prevented or detected and corrected by (the nonprofit’s) employees in the normal course of performing their duties. If the auditors detect an unexpected material misstatement during your audit, it could indicate that your internal controls are not functioning properly. Conver |
262d95391c07f588b9c11c58cfa50001b9580cfd8adc021e5914f5f22cd62c3a | Downloaded File | Text |
Clean
|
...
|
»
54dec80fc8344b4123d4fe9981b1338e947822e758b62eda47b8ec39a582fbfb | Downloaded File | Text |
Clean
|
...
|
»
43580270910ee9931690af4be61798afb0081c5d3e8026220d6054284a435902 | Downloaded File | Unknown |
Clean
|
...
|
»
86df651850a7cf084bff38e62aca1a54d165735533e3b182a0224e3a80f5c9c9 | Downloaded File | Text |
Clean
|
...
|
»
c7effe833dabd5a007460d8fcd17f5b36284c933be0f9d40a8a65fb68d102dcd | Downloaded File | Text |
Clean
|
...
|
»
59fb57baf1ed70984221ca94cd509b46a1242a99092ec0c05585c2b58c74ccf5 | Downloaded File | Text |
Clean
|
...
|
»
b5fabd4fcbcdda3d96752c9703daca8118bcc6392838d464cb1f510c858d020d | Extracted File | Image |
Clean
|
...
|
»