VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
Spyware
|
Threat Names: |
Gen:Variant.Razy.652974
|
ZFxQrq7MxhhEM2V2.exe
Windows Exe (x86-32)
Created at 2020-06-22T21:14:00
Remarks
(0x0200001E): The maximum size of extracted files was exceeded. Some files may be missing in the report.
(0x0200001D): The maximum number of extracted files was exceeded. Some files may be missing in the report.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ZFxQrq7MxhhEM2V2.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x407a10 |
Size Of Code | 0x11e00 |
Size Of Initialized Data | 0x8e00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-06-22 08:16:19+00:00 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x11c0f | 0x11e00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.62 |
.rdata | 0x413000 | 0x60d6 | 0x6200 | 0x12200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.84 |
.data | 0x41a000 | 0x1884 | 0xa00 | 0x18400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.12 |
.reloc | 0x41c000 | 0x10dc | 0x1200 | 0x18e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.43 |
Imports (6)
»
SHLWAPI.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StrStrIW | 0x0 | 0x4131ac | 0x188fc | 0x17afc | 0x14f |
MPR.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetGetConnectionW | 0x0 | 0x413180 | 0x188d0 | 0x17ad0 | 0x2b |
WNetCloseEnum | 0x0 | 0x413184 | 0x188d4 | 0x17ad4 | 0x17 |
WNetAddConnection2W | 0x0 | 0x413188 | 0x188d8 | 0x17ad8 | 0xd |
WNetOpenEnumW | 0x0 | 0x41318c | 0x188dc | 0x17adc | 0x44 |
WNetEnumResourceW | 0x0 | 0x413190 | 0x188e0 | 0x17ae0 | 0x23 |
RstrtMgr.DLL (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RmStartSession | 0x0 | 0x413198 | 0x188e8 | 0x17ae8 | 0xb |
RmEndSession | 0x0 | 0x41319c | 0x188ec | 0x17aec | 0x2 |
RmGetList | 0x0 | 0x4131a0 | 0x188f0 | 0x17af0 | 0x4 |
RmRegisterResources | 0x0 | 0x4131a4 | 0x188f4 | 0x17af4 | 0x6 |
KERNEL32.dll (91)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetConsoleMode | 0x0 | 0x413010 | 0x18760 | 0x17960 | 0x1fc |
GetConsoleCP | 0x0 | 0x413014 | 0x18764 | 0x17964 | 0x1ea |
FlushFileBuffers | 0x0 | 0x413018 | 0x18768 | 0x17968 | 0x19f |
HeapReAlloc | 0x0 | 0x41301c | 0x1876c | 0x1796c | 0x34c |
HeapSize | 0x0 | 0x413020 | 0x18770 | 0x17970 | 0x34e |
GetProcessHeap | 0x0 | 0x413024 | 0x18774 | 0x17974 | 0x2b4 |
LCMapStringW | 0x0 | 0x413028 | 0x18778 | 0x17978 | 0x3b1 |
ReadFile | 0x0 | 0x41302c | 0x1877c | 0x1797c | 0x473 |
WriteFile | 0x0 | 0x413030 | 0x18780 | 0x17980 | 0x612 |
TerminateProcess | 0x0 | 0x413034 | 0x18784 | 0x17984 | 0x58c |
WaitForSingleObject | 0x0 | 0x413038 | 0x18788 | 0x17988 | 0x5d7 |
CreateFileW | 0x0 | 0x41303c | 0x1878c | 0x1798c | 0xcb |
OpenProcess | 0x0 | 0x413040 | 0x18790 | 0x17990 | 0x40d |
SetFileAttributesW | 0x0 | 0x413044 | 0x18794 | 0x17994 | 0x51d |
CloseHandle | 0x0 | 0x413048 | 0x18798 | 0x17998 | 0x86 |
SetFilePointerEx | 0x0 | 0x41304c | 0x1879c | 0x1799c | 0x523 |
GetFileSize | 0x0 | 0x413050 | 0x187a0 | 0x179a0 | 0x24b |
GetCurrentProcessId | 0x0 | 0x413054 | 0x187a4 | 0x179a4 | 0x218 |
GetLogicalDrives | 0x0 | 0x413058 | 0x187a8 | 0x179a8 | 0x268 |
FindFirstFileW | 0x0 | 0x41305c | 0x187ac | 0x179ac | 0x180 |
FindFirstVolumeW | 0x0 | 0x413060 | 0x187b0 | 0x179b0 | 0x186 |
FindNextFileW | 0x0 | 0x413064 | 0x187b4 | 0x179b4 | 0x18c |
lstrlenW | 0x0 | 0x413068 | 0x187b8 | 0x179b8 | 0x63c |
SetThreadPriority | 0x0 | 0x41306c | 0x187bc | 0x179bc | 0x55e |
lstrlenA | 0x0 | 0x413070 | 0x187c0 | 0x179c0 | 0x63b |
FindClose | 0x0 | 0x413074 | 0x187c4 | 0x179c4 | 0x175 |
Sleep | 0x0 | 0x413078 | 0x187c8 | 0x179c8 | 0x57d |
lstrcatW | 0x0 | 0x41307c | 0x187cc | 0x179cc | 0x62d |
CreateThread | 0x0 | 0x413080 | 0x187d0 | 0x179d0 | 0xf3 |
SetVolumeMountPointW | 0x0 | 0x413084 | 0x187d4 | 0x179d4 | 0x574 |
FindVolumeClose | 0x0 | 0x413088 | 0x187d8 | 0x179d8 | 0x198 |
GetVolumePathNamesForVolumeNameW | 0x0 | 0x41308c | 0x187dc | 0x179dc | 0x324 |
lstrcpyW | 0x0 | 0x413090 | 0x187e0 | 0x179e0 | 0x636 |
FindNextVolumeW | 0x0 | 0x413094 | 0x187e4 | 0x179e4 | 0x191 |
lstrcmpiW | 0x0 | 0x413098 | 0x187e8 | 0x179e8 | 0x633 |
GetTickCount | 0x0 | 0x41309c | 0x187ec | 0x179ec | 0x307 |
lstrcmpW | 0x0 | 0x4130a0 | 0x187f0 | 0x179f0 | 0x630 |
MoveFileW | 0x0 | 0x4130a4 | 0x187f4 | 0x179f4 | 0x3eb |
GetDriveTypeW | 0x0 | 0x4130a8 | 0x187f8 | 0x179f8 | 0x22f |
EnterCriticalSection | 0x0 | 0x4130ac | 0x187fc | 0x179fc | 0x131 |
ReleaseSemaphore | 0x0 | 0x4130b0 | 0x18800 | 0x17a00 | 0x4b4 |
LeaveCriticalSection | 0x0 | 0x4130b4 | 0x18804 | 0x17a04 | 0x3bd |
InitializeCriticalSection | 0x0 | 0x4130b8 | 0x18808 | 0x17a08 | 0x35e |
DeleteCriticalSection | 0x0 | 0x4130bc | 0x1880c | 0x17a0c | 0x110 |
CreateSemaphoreW | 0x0 | 0x4130c0 | 0x18810 | 0x17a10 | 0xec |
WriteConsoleW | 0x0 | 0x4130c4 | 0x18814 | 0x17a14 | 0x611 |
WaitForMultipleObjects | 0x0 | 0x4130c8 | 0x18818 | 0x17a18 | 0x5d5 |
QueryPerformanceCounter | 0x0 | 0x4130cc | 0x1881c | 0x17a1c | 0x44d |
UnhandledExceptionFilter | 0x0 | 0x4130d0 | 0x18820 | 0x17a20 | 0x5ad |
SetUnhandledExceptionFilter | 0x0 | 0x4130d4 | 0x18824 | 0x17a24 | 0x56d |
GetCurrentProcess | 0x0 | 0x4130d8 | 0x18828 | 0x17a28 | 0x217 |
IsProcessorFeaturePresent | 0x0 | 0x4130dc | 0x1882c | 0x17a2c | 0x386 |
DecodePointer | 0x0 | 0x4130e0 | 0x18830 | 0x17a30 | 0x109 |
GetCurrentThreadId | 0x0 | 0x4130e4 | 0x18834 | 0x17a34 | 0x21c |
GetSystemTimeAsFileTime | 0x0 | 0x4130e8 | 0x18838 | 0x17a38 | 0x2e9 |
InitializeSListHead | 0x0 | 0x4130ec | 0x1883c | 0x17a3c | 0x363 |
IsDebuggerPresent | 0x0 | 0x4130f0 | 0x18840 | 0x17a40 | 0x37f |
GetStartupInfoW | 0x0 | 0x4130f4 | 0x18844 | 0x17a44 | 0x2d0 |
GetModuleHandleW | 0x0 | 0x4130f8 | 0x18848 | 0x17a48 | 0x278 |
RtlUnwind | 0x0 | 0x4130fc | 0x1884c | 0x17a4c | 0x4d3 |
GetLastError | 0x0 | 0x413100 | 0x18850 | 0x17a50 | 0x261 |
SetLastError | 0x0 | 0x413104 | 0x18854 | 0x17a54 | 0x532 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x413108 | 0x18858 | 0x17a58 | 0x35f |
TlsAlloc | 0x0 | 0x41310c | 0x1885c | 0x17a5c | 0x59e |
TlsGetValue | 0x0 | 0x413110 | 0x18860 | 0x17a60 | 0x5a0 |
TlsSetValue | 0x0 | 0x413114 | 0x18864 | 0x17a64 | 0x5a1 |
TlsFree | 0x0 | 0x413118 | 0x18868 | 0x17a68 | 0x59f |
FreeLibrary | 0x0 | 0x41311c | 0x1886c | 0x17a6c | 0x1ab |
GetProcAddress | 0x0 | 0x413120 | 0x18870 | 0x17a70 | 0x2ae |
LoadLibraryExW | 0x0 | 0x413124 | 0x18874 | 0x17a74 | 0x3c3 |
RaiseException | 0x0 | 0x413128 | 0x18878 | 0x17a78 | 0x462 |
GetStdHandle | 0x0 | 0x41312c | 0x1887c | 0x17a7c | 0x2d2 |
GetModuleFileNameW | 0x0 | 0x413130 | 0x18880 | 0x17a80 | 0x274 |
ExitProcess | 0x0 | 0x413134 | 0x18884 | 0x17a84 | 0x15e |
GetModuleHandleExW | 0x0 | 0x413138 | 0x18888 | 0x17a88 | 0x277 |
HeapFree | 0x0 | 0x41313c | 0x1888c | 0x17a8c | 0x349 |
HeapAlloc | 0x0 | 0x413140 | 0x18890 | 0x17a90 | 0x345 |
FindFirstFileExW | 0x0 | 0x413144 | 0x18894 | 0x17a94 | 0x17b |
IsValidCodePage | 0x0 | 0x413148 | 0x18898 | 0x17a98 | 0x38b |
GetACP | 0x0 | 0x41314c | 0x1889c | 0x17a9c | 0x1b2 |
GetOEMCP | 0x0 | 0x413150 | 0x188a0 | 0x17aa0 | 0x297 |
GetCPInfo | 0x0 | 0x413154 | 0x188a4 | 0x17aa4 | 0x1c1 |
GetCommandLineA | 0x0 | 0x413158 | 0x188a8 | 0x17aa8 | 0x1d6 |
GetCommandLineW | 0x0 | 0x41315c | 0x188ac | 0x17aac | 0x1d7 |
MultiByteToWideChar | 0x0 | 0x413160 | 0x188b0 | 0x17ab0 | 0x3ef |
WideCharToMultiByte | 0x0 | 0x413164 | 0x188b4 | 0x17ab4 | 0x5fe |
GetEnvironmentStringsW | 0x0 | 0x413168 | 0x188b8 | 0x17ab8 | 0x237 |
FreeEnvironmentStringsW | 0x0 | 0x41316c | 0x188bc | 0x17abc | 0x1aa |
SetStdHandle | 0x0 | 0x413170 | 0x188c0 | 0x17ac0 | 0x54a |
GetFileType | 0x0 | 0x413174 | 0x188c4 | 0x17ac4 | 0x24e |
GetStringTypeW | 0x0 | 0x413178 | 0x188c8 | 0x17ac8 | 0x2d7 |
USER32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
wsprintfA | 0x0 | 0x4131b4 | 0x18904 | 0x17b04 | 0x3dc |
wsprintfW | 0x0 | 0x4131b8 | 0x18908 | 0x17b08 | 0x3dd |
ADVAPI32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptGenRandom | 0x0 | 0x413000 | 0x18750 | 0x17950 | 0xd2 |
CryptReleaseContext | 0x0 | 0x413004 | 0x18754 | 0x17954 | 0xdc |
CryptAcquireContextA | 0x0 | 0x413008 | 0x18758 | 0x17958 | 0xc1 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
zfxqrq7mxhhem2v2.exe | 1 | 0x002F0000 | 0x0030DFFF | Relevant Image |
![]() |
32-bit | 0x002F8000 |
![]() |
![]() |
...
|
zfxqrq7mxhhem2v2.exe | 1 | 0x002F0000 | 0x0030DFFF | Process Termination |
![]() |
32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Razy.652974 |
Malicious
|
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.msi | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelLR.cab.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.msi | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.msi.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PptLR.cab.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\Setup.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PubLR.cab | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlkLR.cab.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\Setup.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\Setup.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.msi.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.msi.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordLR.cab | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.msi.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.cab | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.msi | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.msi.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.cab.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.msi.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.cab.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Setup.xml.lolkek | Dropped File | Binary |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.xml.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.msi | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\OWOW32LR.cab | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfoPathMUI.msi.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfLR.cab.lolkek | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\ProgramData\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\en-US\LOLKEK.txt | Dropped File | Text |
Unknown
|
...
|
»