VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
|
Threat Names: |
Gen:Variant.Razy.599308
Gen:Variant.Jaik.40100
|
captcha_visual.exe
Windows Exe (x86-32)
Created at 2020-10-28T09:06:00
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "15 seconds" to "10 seconds" to reveal dormant functionality.
Master Boot Record Changes
»
Sector Number | Sector Size | Actions |
---|---|---|
2063 | 512 Bytes |
...
|
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\captcha_visual.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x406850 |
Size Of Code | 0x7a00 |
Size Of Initialized Data | 0x16600 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-10-12 15:42:45+00:00 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x7804 | 0x7a00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.36 |
.rdata | 0x409000 | 0xd58 | 0xe00 | 0x7e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.05 |
.data | 0x40a000 | 0x13aac | 0x0 | 0x0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.ndata | 0x41e000 | 0x1651 | 0x1800 | 0x8c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.95 |
.rsrc | 0x420000 | 0x298 | 0x400 | 0xa400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.06 |
Imports (6)
»
MPR.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetEnumResourceW | 0x0 | 0x409144 | 0x945c | 0x825c | 0x1c |
WNetOpenEnumW | 0x0 | 0x409148 | 0x9460 | 0x8260 | 0x3d |
WNetCloseEnum | 0x0 | 0x40914c | 0x9464 | 0x8264 | 0x10 |
KERNEL32.dll (64)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetFileAttributesW | 0x0 | 0x409040 | 0x9358 | 0x8158 | 0x1ea |
CreateFileW | 0x0 | 0x409044 | 0x935c | 0x815c | 0x8f |
GetLastError | 0x0 | 0x409048 | 0x9360 | 0x8160 | 0x202 |
FindClose | 0x0 | 0x40904c | 0x9364 | 0x8164 | 0x12e |
DeviceIoControl | 0x0 | 0x409050 | 0x9368 | 0x8168 | 0xdd |
WaitForMultipleObjects | 0x0 | 0x409054 | 0x936c | 0x816c | 0x4f7 |
FindNextFileW | 0x0 | 0x409058 | 0x9370 | 0x8170 | 0x145 |
GetVolumeInformationW | 0x0 | 0x40905c | 0x9374 | 0x8174 | 0x2a7 |
CreateThread | 0x0 | 0x409060 | 0x9378 | 0x8178 | 0xb5 |
TryEnterCriticalSection | 0x0 | 0x409064 | 0x937c | 0x817c | 0x4ce |
Sleep | 0x0 | 0x409068 | 0x9380 | 0x8180 | 0x4b2 |
WriteFile | 0x0 | 0x40906c | 0x9384 | 0x8184 | 0x525 |
GetStdHandle | 0x0 | 0x409070 | 0x9388 | 0x8188 | 0x264 |
SetEndOfFile | 0x0 | 0x409074 | 0x938c | 0x818c | 0x453 |
SetFilePointerEx | 0x0 | 0x409078 | 0x9390 | 0x8190 | 0x467 |
ReadFile | 0x0 | 0x40907c | 0x9394 | 0x8194 | 0x3c0 |
GetFileSizeEx | 0x0 | 0x409080 | 0x9398 | 0x8198 | 0x1f1 |
MoveFileW | 0x0 | 0x409084 | 0x939c | 0x819c | 0x363 |
SetFileAttributesW | 0x0 | 0x409088 | 0x93a0 | 0x81a0 | 0x461 |
HeapAlloc | 0x0 | 0x40908c | 0x93a4 | 0x81a4 | 0x2cb |
GetCurrentProcess | 0x0 | 0x409090 | 0x93a8 | 0x81a8 | 0x1c0 |
HeapFree | 0x0 | 0x409094 | 0x93ac | 0x81ac | 0x2cf |
GetProcessHeap | 0x0 | 0x409098 | 0x93b0 | 0x81b0 | 0x24a |
GlobalAlloc | 0x0 | 0x40909c | 0x93b4 | 0x81b4 | 0x2b3 |
GetLogicalDrives | 0x0 | 0x4090a0 | 0x93b8 | 0x81b8 | 0x209 |
GetVersion | 0x0 | 0x4090a4 | 0x93bc | 0x81bc | 0x2a2 |
PeekNamedPipe | 0x0 | 0x4090a8 | 0x93c0 | 0x81c0 | 0x38d |
GetComputerNameW | 0x0 | 0x4090ac | 0x93c4 | 0x81c4 | 0x18f |
SetEvent | 0x0 | 0x4090b0 | 0x93c8 | 0x81c8 | 0x459 |
TerminateThread | 0x0 | 0x4090b4 | 0x93cc | 0x81cc | 0x4c1 |
GetProcAddress | 0x0 | 0x4090b8 | 0x93d0 | 0x81d0 | 0x245 |
LoadLibraryA | 0x0 | 0x4090bc | 0x93d4 | 0x81d4 | 0x33c |
CreateEventW | 0x0 | 0x4090c0 | 0x93d8 | 0x81d8 | 0x85 |
OpenProcess | 0x0 | 0x4090c4 | 0x93dc | 0x81dc | 0x380 |
GetFileType | 0x0 | 0x4090c8 | 0x93e0 | 0x81e0 | 0x1f3 |
GetModuleHandleA | 0x0 | 0x4090cc | 0x93e4 | 0x81e4 | 0x215 |
DuplicateHandle | 0x0 | 0x4090d0 | 0x93e8 | 0x81e8 | 0xe8 |
GetCurrentProcessId | 0x0 | 0x4090d4 | 0x93ec | 0x81ec | 0x1c1 |
ExitProcess | 0x0 | 0x4090d8 | 0x93f0 | 0x81f0 | 0x119 |
GetModuleHandleW | 0x0 | 0x4090dc | 0x93f4 | 0x81f4 | 0x218 |
GetCommandLineW | 0x0 | 0x4090e0 | 0x93f8 | 0x81f8 | 0x187 |
CreatePipe | 0x0 | 0x4090e4 | 0x93fc | 0x81fc | 0xa1 |
GetEnvironmentVariableW | 0x0 | 0x4090e8 | 0x9400 | 0x8200 | 0x1dc |
CreateProcessW | 0x0 | 0x4090ec | 0x9404 | 0x8204 | 0xa8 |
WaitForSingleObject | 0x0 | 0x4090f0 | 0x9408 | 0x8208 | 0x4f9 |
SetHandleInformation | 0x0 | 0x4090f4 | 0x940c | 0x820c | 0x470 |
GetLocaleInfoW | 0x0 | 0x4090f8 | 0x9410 | 0x8210 | 0x206 |
GetModuleFileNameW | 0x0 | 0x4090fc | 0x9414 | 0x8214 | 0x214 |
Process32FirstW | 0x0 | 0x409100 | 0x9418 | 0x8218 | 0x396 |
Process32NextW | 0x0 | 0x409104 | 0x941c | 0x821c | 0x398 |
CreateToolhelp32Snapshot | 0x0 | 0x409108 | 0x9420 | 0x8220 | 0xbe |
CreateDirectoryW | 0x0 | 0x40910c | 0x9424 | 0x8224 | 0x81 |
SetErrorMode | 0x0 | 0x409110 | 0x9428 | 0x8228 | 0x458 |
GetDriveTypeW | 0x0 | 0x409114 | 0x942c | 0x822c | 0x1d3 |
FindFirstFileW | 0x0 | 0x409118 | 0x9430 | 0x8230 | 0x139 |
CloseHandle | 0x0 | 0x40911c | 0x9434 | 0x8234 | 0x52 |
DeleteCriticalSection | 0x0 | 0x409120 | 0x9438 | 0x8238 | 0xd1 |
EnterCriticalSection | 0x0 | 0x409124 | 0x943c | 0x823c | 0xee |
TerminateProcess | 0x0 | 0x409128 | 0x9440 | 0x8240 | 0x4c0 |
GetExitCodeProcess | 0x0 | 0x40912c | 0x9444 | 0x8244 | 0x1df |
LeaveCriticalSection | 0x0 | 0x409130 | 0x9448 | 0x8248 | 0x339 |
InitializeCriticalSection | 0x0 | 0x409134 | 0x944c | 0x824c | 0x2e2 |
GlobalFree | 0x0 | 0x409138 | 0x9450 | 0x8250 | 0x2ba |
GetSystemWindowsDirectoryW | 0x0 | 0x40913c | 0x9454 | 0x8254 | 0x27c |
USER32.dll (24)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DialogBoxParamW | 0x0 | 0x409170 | 0x9488 | 0x8288 | 0xac |
ShowWindow | 0x0 | 0x409174 | 0x948c | 0x828c | 0x2e4 |
MessageBoxW | 0x0 | 0x409178 | 0x9490 | 0x8290 | 0x217 |
SetWindowTextA | 0x0 | 0x40917c | 0x9494 | 0x8294 | 0x2cf |
SendMessageW | 0x0 | 0x409180 | 0x9498 | 0x8298 | 0x280 |
EnableWindow | 0x0 | 0x409184 | 0x949c | 0x829c | 0xd8 |
UnregisterHotKey | 0x0 | 0x409188 | 0x94a0 | 0x82a0 | 0x30d |
GetWindowThreadProcessId | 0x0 | 0x40918c | 0x94a4 | 0x82a4 | 0x1a5 |
RegisterHotKey | 0x0 | 0x409190 | 0x94a8 | 0x82a8 | 0x25a |
GetWindowTextLengthW | 0x0 | 0x409194 | 0x94ac | 0x82ac | 0x1a3 |
CloseClipboard | 0x0 | 0x409198 | 0x94b0 | 0x82b0 | 0x49 |
GetWindowTextA | 0x0 | 0x40919c | 0x94b4 | 0x82b4 | 0x1a1 |
EmptyClipboard | 0x0 | 0x4091a0 | 0x94b8 | 0x82b8 | 0xd5 |
GetDlgItem | 0x0 | 0x4091a4 | 0x94bc | 0x82bc | 0x127 |
OpenClipboard | 0x0 | 0x4091a8 | 0x94c0 | 0x82c0 | 0x228 |
SetClipboardData | 0x0 | 0x4091ac | 0x94c4 | 0x82c4 | 0x28a |
wsprintfW | 0x0 | 0x4091b0 | 0x94c8 | 0x82c8 | 0x339 |
GetShellWindow | 0x0 | 0x4091b4 | 0x94cc | 0x82cc | 0x17a |
SetTimer | 0x0 | 0x4091b8 | 0x94d0 | 0x82d0 | 0x2c0 |
PostMessageW | 0x0 | 0x4091bc | 0x94d4 | 0x82d4 | 0x239 |
KillTimer | 0x0 | 0x4091c0 | 0x94d8 | 0x82d8 | 0x1e4 |
wsprintfA | 0x0 | 0x4091c4 | 0x94dc | 0x82dc | 0x338 |
SetWindowTextW | 0x0 | 0x4091c8 | 0x94e0 | 0x82e0 | 0x2d0 |
EndDialog | 0x0 | 0x4091cc | 0x94e4 | 0x82e4 | 0xda |
ADVAPI32.dll (15)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptAcquireContextW | 0x0 | 0x409000 | 0x9318 | 0x8118 | 0xb1 |
CryptSetKeyParam | 0x0 | 0x409004 | 0x931c | 0x811c | 0xcd |
CryptReleaseContext | 0x0 | 0x409008 | 0x9320 | 0x8120 | 0xcb |
CryptGenRandom | 0x0 | 0x40900c | 0x9324 | 0x8124 | 0xc1 |
CryptDestroyKey | 0x0 | 0x409010 | 0x9328 | 0x8128 | 0xb7 |
CryptDecrypt | 0x0 | 0x409014 | 0x932c | 0x812c | 0xb4 |
OpenProcessToken | 0x0 | 0x409018 | 0x9330 | 0x8130 | 0x1f7 |
GetTokenInformation | 0x0 | 0x40901c | 0x9334 | 0x8134 | 0x15a |
SetTokenInformation | 0x0 | 0x409020 | 0x9338 | 0x8138 | 0x2c2 |
DuplicateTokenEx | 0x0 | 0x409024 | 0x933c | 0x813c | 0xdf |
RegQueryValueExA | 0x0 | 0x409028 | 0x9340 | 0x8140 | 0x26d |
RegOpenKeyExA | 0x0 | 0x40902c | 0x9344 | 0x8144 | 0x260 |
RegCloseKey | 0x0 | 0x409030 | 0x9348 | 0x8148 | 0x230 |
CryptImportKey | 0x0 | 0x409034 | 0x934c | 0x814c | 0xca |
CryptEncrypt | 0x0 | 0x409038 | 0x9350 | 0x8150 | 0xba |
SHELL32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
(by ordinal) | 0x2a8 | 0x409154 | 0x946c | 0x826c | - |
CommandLineToArgvW | 0x0 | 0x409158 | 0x9470 | 0x8270 | 0x6 |
ShellExecuteExW | 0x0 | 0x40915c | 0x9474 | 0x8274 | 0x121 |
SHGetPathFromIDListW | 0x0 | 0x409160 | 0x9478 | 0x8278 | 0xd7 |
SHBrowseForFolderW | 0x0 | 0x409164 | 0x947c | 0x827c | 0x7b |
SHGetSpecialFolderPathW | 0x0 | 0x409168 | 0x9480 | 0x8280 | 0xe1 |
ole32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoInitialize | 0x0 | 0x4091d4 | 0x94ec | 0x82ec | 0x3e |
CoTaskMemFree | 0x0 | 0x4091d8 | 0x94f0 | 0x82f0 | 0x68 |
CoUninitialize | 0x0 | 0x4091dc | 0x94f4 | 0x82f4 | 0x6c |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
captcha_visual.exe | 1 | 0x00400000 | 0x00420FFF | Relevant Image |
![]() |
32-bit | 0x00402850 |
![]() |
![]() |
...
|
captcha_visual.exe | 1 | 0x00400000 | 0x00420FFF | Final Dump |
![]() |
32-bit | 0x00408610 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Razy.599308 |
Malicious
|
c:\windows\system32\logfiles\scm\5f5a18eb-dc73-4e45-a11c-b59043598412 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\2470470f-2634-478e-b181-571e98a789bb | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\7afcc0ca-7121-422a-ab45-b0e8d599ff08 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\logfiles\scm\b2945f6a-2378-4a2d-a700-f64d33f40fe5 | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\system.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\application.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\security.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-kernel-whea%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-grouppolicy%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-user profile service%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-offlinefiles%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-branchcachesmb%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-dhcpv6-client%4admin.evtx | Modified File | Stream |
Unknown
|
...
|
»
c:\windows\system32\winevt\logs\microsoft-windows-terminalservices-localsessionmanager%4operational.evtx | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\80l Y.pps.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\9tXOTB6cCqaPF.png.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\BfLJ-qJ.odp.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\bYmDuT2Ba.m4a.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\C4P_ngTwnzZZoM\i oNgTBn.csv.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\FD1vIXwTkAV.gif.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\fKh p\OUbB8Nw.bmp.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\fKh p\qnAgUAAuMSkT3L.bmp.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\gjhUgLL.jpg.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\j3JyUbK.doc.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\KBDfGIul9lKj5bzlyj.jpg.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\LtxycJwYc8aiI.xlsx.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\NFMf.gif.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Po53K6XUyzjsd4PBoD_.jpg.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\RwTVxn7lStVnd_WKK.jpg.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\sINUfMi95MsWn.m4a.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\vBXWRkjqa.swf.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\VEOSuKZMb2iFfRfNLI.jpg.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\W7RXP9kYuvmTV.gif.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\wu4Z6746em5wpqR.swf.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Y6o3bM eaIX_bwj.png.[4B2E4630].[garantos@mailfence.com].captcha | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\build note.txt | Dropped File | Text |
Unknown
|
...
|
»