Malicious
Classifications
Ransomware Wiper
Threat Names
Trojan.GenericKD.46036754
Dynamic Analysis Report
Created on 2021-04-07T08:41:00
ClubHouse.exe
Windows Exe (x86-32)
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\ClubHouse.exe | Sample File | Binary |
malicious
|
...
|
»
AV Matches (1)
»
Threat Name | Verdict |
---|---|
Trojan.GenericKD.46036754 |
malicious
|
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x519c8e |
Size Of Code | 0x117e00 |
Size Of Initialized Data | 0x5b000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2021-04-06 17:23:26+00:00 |
Version Information (11)
»
Comments | - |
CompanyName | Oklahoma Tire & Supply Company |
FileDescription | ApplicationFusion |
FileVersion | 1.7.9.11 |
InternalName | SoapDuration.exe |
LegalCopyright | Oklahoma Tire & Supply Company © 2021 |
LegalTrademarks | - |
OriginalFilename | SoapDuration.exe |
ProductName | ApplicationFusion |
ProductVersion | 1.7.9.11 |
Assembly Version | 1.7.8.11 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x117c94 | 0x117e00 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 7.06 |
.rsrc | 0x51a000 | 0x5ad6a | 0x5ae00 | 0x118000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.73 |
.reloc | 0x576000 | 0xc | 0x200 | 0x172e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x402000 | 0x119c64 | 0x117e64 | 0x0 |
Digital Signature Information
»
Verification Status | Failed |
Verification Error | The signature hash does not match the file contents |
Certificate: Signal Messenger, LLC
»
Issued by | Signal Messenger, LLC |
Parent Certificate | Entrust Extended Validation Code Signing CA - EVCS1 |
Country Name | US |
Valid From | 2020-08-04 20:36 (UTC+2) |
Valid Until | 2023-08-04 20:36 (UTC+2) |
Algorithm | sha256_rsa |
Serial Number | 20 E5 A3 07 97 EF EB 90 99 4A 2C 99 E9 DB 46 68 |
Thumbprint | 8C 9A 0B 5C 85 2E C7 03 D8 3E F7 BF BC EB 54 B7 96 07 37 59 |
Certificate: Entrust Extended Validation Code Signing CA - EVCS1
»
Issued by | Entrust Extended Validation Code Signing CA - EVCS1 |
Country Name | US |
Valid From | 2015-06-10 15:42 (UTC+2) |
Valid Until | 2030-11-10 15:12 (UTC+1) |
Algorithm | sha256_rsa |
Serial Number | 87 82 52 60 00 00 00 00 51 D3 73 D9 |
Thumbprint | 64 B8 F1 ED EF 40 D7 D2 86 02 B6 B9 17 1A FF 11 4E 12 A6 46 |
Memory Dumps (29)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
clubhouse.exe | 1 | 0x00400000 | 0x00577FFF | Relevant Image | 32-bit | - |
...
|
|||
buffer | 1 | 0x05050178 | 0x0505017F | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050501A0 | 0x050501A7 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050501C8 | 0x050501CF | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050BDF5E | 0x050BDF68 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050BDF52 | 0x050BDF5C | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x05050208 | 0x0505024F | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x05098670 | 0x05098673 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x05098694 | 0x0509869B | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x0509869C | 0x0509869F | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986A0 | 0x050986A7 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986A8 | 0x050986AB | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986AC | 0x050986AF | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986B0 | 0x050986B3 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986B4 | 0x050986BB | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986BC | 0x050986BF | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986C0 | 0x050986C7 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986C8 | 0x050986CB | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986CC | 0x050986CF | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986D0 | 0x050986D7 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986D8 | 0x050986DB | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986DC | 0x050986DF | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986E0 | 0x050986E7 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x050986F0 | 0x050986F7 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x05098704 | 0x0509870B | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x05098714 | 0x0509871B | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x0509871C | 0x0509871F | Marked Executable | 32-bit | - |
...
|
|||
buffer | 1 | 0x05098720 | 0x05098723 | Marked Executable | 32-bit | - |
...
|
|||
buffer | 2 | 0x00400000 | 0x00577FFF | Image In Buffer | 32-bit | - |
...
|
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmp8757.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmp8D62.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmp8D73.tmp | Dropped File | Unknown |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmp8D84.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmp8D94.tmp | Dropped File | ZIP |
clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Temp\tmp8DA5.tmp | Dropped File | ZIP |
clean
|
...
|
»