VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: | - |
Threat Names: |
Gen:Heur.Ransom.Imps.1
Mal/Generic-S
|
WMIAPSRVR.EXE.exe
Windows Exe (x86-32)
Created at 2020-03-11T17:18:00
Remarks
(0x0200001E): The maximum size of extracted files was exceeded. Some files may be missing in the report.
(0x0200001D): The maximum number of extracted files was exceeded. Some files may be missing in the report.
Master Boot Record Changes
»
Sector Number | Sector Size | Actions |
---|---|---|
2063 | 512 Bytes |
...
|
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\WMIAPSRVR.EXE.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x403a6d |
Size Of Code | 0x3000 |
Size Of Initialized Data | 0x2b1600 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-03-02 15:37:11+00:00 |
Version Information (8)
»
CompanyName | Microsoft Corporation |
FileDescription | WMI Provider Host |
FileVersion | 6.1.7601.17514 (win7sp1_rtm.101119-1850) |
InternalName | Wmiprvse.exe |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | Wmiprvse.exe |
ProductName | Microsoft® Windows® Operating System |
ProductVersion | 6.1.7601.17514 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x2eca | 0x3000 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.09 |
.data | 0x404000 | 0x2b06d0 | 0x2b0600 | 0x3400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.98 |
.idata | 0x6b5000 | 0x6be | 0x800 | 0x2b3a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.69 |
.reloc | 0x6b6000 | 0x19c | 0x200 | 0x2b4200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 5.59 |
.rsrc | 0x6b7000 | 0x3f0 | 0x400 | 0x2b4400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.4 |
Imports (6)
»
SHLWAPI.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
wnsprintfW | 0x0 | 0x6b50e8 | 0x2b5274 | 0x2b3c74 | 0x16e |
StrStrW | 0x0 | 0x6b50ec | 0x2b5278 | 0x2b3c78 | 0x148 |
StrStrIW | 0x0 | 0x6b50f0 | 0x2b527c | 0x2b3c7c | 0x145 |
MPR.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetOpenEnumW | 0x0 | 0x6b50cc | 0x2b5258 | 0x2b3c58 | 0x3d |
WNetEnumResourceW | 0x0 | 0x6b50d0 | 0x2b525c | 0x2b3c5c | 0x1c |
WNetCloseEnum | 0x0 | 0x6b50d4 | 0x2b5260 | 0x2b3c60 | 0x10 |
KERNEL32.dll (37)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ReadFile | 0x0 | 0x6b5034 | 0x2b51c0 | 0x2b3bc0 | 0x3c0 |
GetLogicalDrives | 0x0 | 0x6b5038 | 0x2b51c4 | 0x2b3bc4 | 0x209 |
FindFirstFileW | 0x0 | 0x6b503c | 0x2b51c8 | 0x2b3bc8 | 0x139 |
GetFileSizeEx | 0x0 | 0x6b5040 | 0x2b51cc | 0x2b3bcc | 0x1f1 |
FindNextFileW | 0x0 | 0x6b5044 | 0x2b51d0 | 0x2b3bd0 | 0x145 |
lstrlenW | 0x0 | 0x6b5048 | 0x2b51d4 | 0x2b3bd4 | 0x54e |
WriteFile | 0x0 | 0x6b504c | 0x2b51d8 | 0x2b3bd8 | 0x525 |
ExpandEnvironmentStringsW | 0x0 | 0x6b5050 | 0x2b51dc | 0x2b3bdc | 0x11d |
TerminateProcess | 0x0 | 0x6b5054 | 0x2b51e0 | 0x2b3be0 | 0x4c0 |
GetUserDefaultLangID | 0x0 | 0x6b5058 | 0x2b51e4 | 0x2b3be4 | 0x29c |
GetModuleFileNameW | 0x0 | 0x6b505c | 0x2b51e8 | 0x2b3be8 | 0x214 |
WaitForMultipleObjects | 0x0 | 0x6b5060 | 0x2b51ec | 0x2b3bec | 0x4f7 |
GetTempPathW | 0x0 | 0x6b5064 | 0x2b51f0 | 0x2b3bf0 | 0x285 |
FindClose | 0x0 | 0x6b5068 | 0x2b51f4 | 0x2b3bf4 | 0x12e |
CreateFileW | 0x0 | 0x6b506c | 0x2b51f8 | 0x2b3bf8 | 0x8f |
HeapAlloc | 0x0 | 0x6b5070 | 0x2b51fc | 0x2b3bfc | 0x2cb |
CreateToolhelp32Snapshot | 0x0 | 0x6b5074 | 0x2b5200 | 0x2b3c00 | 0xbe |
GetLastError | 0x0 | 0x6b5078 | 0x2b5204 | 0x2b3c04 | 0x202 |
Process32NextW | 0x0 | 0x6b507c | 0x2b5208 | 0x2b3c08 | 0x398 |
lstrcatW | 0x0 | 0x6b5080 | 0x2b520c | 0x2b3c0c | 0x53f |
Process32FirstW | 0x0 | 0x6b5084 | 0x2b5210 | 0x2b3c10 | 0x396 |
CloseHandle | 0x0 | 0x6b5088 | 0x2b5214 | 0x2b3c14 | 0x52 |
GetWindowsDirectoryW | 0x0 | 0x6b508c | 0x2b5218 | 0x2b3c18 | 0x2af |
SetFilePointerEx | 0x0 | 0x6b5090 | 0x2b521c | 0x2b3c1c | 0x467 |
GetFileSize | 0x0 | 0x6b5094 | 0x2b5220 | 0x2b3c20 | 0x1f0 |
ExitProcess | 0x0 | 0x6b5098 | 0x2b5224 | 0x2b3c24 | 0x119 |
CreateProcessW | 0x0 | 0x6b509c | 0x2b5228 | 0x2b3c28 | 0xa8 |
lstrcpyW | 0x0 | 0x6b50a0 | 0x2b522c | 0x2b3c2c | 0x548 |
GetTempFileNameW | 0x0 | 0x6b50a4 | 0x2b5230 | 0x2b3c30 | 0x283 |
lstrcmpiW | 0x0 | 0x6b50a8 | 0x2b5234 | 0x2b3c34 | 0x545 |
lstrcmpW | 0x0 | 0x6b50ac | 0x2b5238 | 0x2b3c38 | 0x542 |
MoveFileW | 0x0 | 0x6b50b0 | 0x2b523c | 0x2b3c3c | 0x363 |
HeapFree | 0x0 | 0x6b50b4 | 0x2b5240 | 0x2b3c40 | 0x2cf |
lstrlenA | 0x0 | 0x6b50b8 | 0x2b5244 | 0x2b3c44 | 0x54d |
GetProcessHeap | 0x0 | 0x6b50bc | 0x2b5248 | 0x2b3c48 | 0x24a |
OpenProcess | 0x0 | 0x6b50c0 | 0x2b524c | 0x2b3c4c | 0x380 |
CreateThread | 0x0 | 0x6b50c4 | 0x2b5250 | 0x2b3c50 | 0xb5 |
USER32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SystemParametersInfoW | 0x0 | 0x6b50f8 | 0x2b5284 | 0x2b3c84 | 0x2ec |
ADVAPI32.dll (12)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetSidSubAuthorityCount | 0x0 | 0x6b5000 | 0x2b518c | 0x2b3b8c | 0x158 |
GetSidSubAuthority | 0x0 | 0x6b5004 | 0x2b5190 | 0x2b3b90 | 0x157 |
OpenProcessToken | 0x0 | 0x6b5008 | 0x2b5194 | 0x2b3b94 | 0x1f7 |
CryptGenRandom | 0x0 | 0x6b500c | 0x2b5198 | 0x2b3b98 | 0xc1 |
CryptReleaseContext | 0x0 | 0x6b5010 | 0x2b519c | 0x2b3b9c | 0xcb |
GetTokenInformation | 0x0 | 0x6b5014 | 0x2b51a0 | 0x2b3ba0 | 0x15a |
CryptDestroyKey | 0x0 | 0x6b5018 | 0x2b51a4 | 0x2b3ba4 | 0xb7 |
CryptAcquireContextA | 0x0 | 0x6b501c | 0x2b51a8 | 0x2b3ba8 | 0xb0 |
CryptEncrypt | 0x0 | 0x6b5020 | 0x2b51ac | 0x2b3bac | 0xba |
CryptImportKey | 0x0 | 0x6b5024 | 0x2b51b0 | 0x2b3bb0 | 0xca |
CryptExportKey | 0x0 | 0x6b5028 | 0x2b51b4 | 0x2b3bb4 | 0xbf |
CryptGenKey | 0x0 | 0x6b502c | 0x2b51b8 | 0x2b3bb8 | 0xc0 |
SHELL32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SHGetFolderPathW | 0x0 | 0x6b50dc | 0x2b5268 | 0x2b3c68 | 0xc3 |
ShellExecuteW | 0x0 | 0x6b50e0 | 0x2b526c | 0x2b3c6c | 0x122 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
wmiapsrvr.exe.exe | 1 | 0x00B40000 | 0x00DF7FFF | Relevant Image |
![]() |
32-bit | 0x00B42FC0 |
![]() |
![]() |
...
|
wmiapsrvr.exe.exe | 1 | 0x00B40000 | 0x00DF7FFF | Final Dump |
![]() |
32-bit | 0x00B434B6 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Heur.Ransom.Imps.1 |
Malicious
|
\\?\C:\$Recycle.Bin\S-1-5-21-3388679973-3930757225-3770151564-1000\desktop.ini.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\Boot\BCD.LOG1.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\Boot\BCD.LOG2.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelLR.cab.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.msi | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.msi.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PptLR.cab.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.msi.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PubLR.cab.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\Setup.xml.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlkLR.cab | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.msi | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\Setup.xml.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordLR.cab.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.msi | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.cab | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.msi.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.xml.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.cab | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.msi.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.cab | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.msi.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.msi | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.msi | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.xml.horseleader | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\OWOW32LR.cab | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming\_uninstalling_.png | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\#Decrypt#.txt | Dropped File | Text |
Unknown
|
...
|
»