Malicious
Classifications
Wiper Ransomware PUA Spyware
Threat Names
Mal/Generic-S
Dynamic Analysis Report
Created on 2022-02-09T05:47:00
bd764fe2f9734d5ac56933ce68df0a175bfa98dc0266ae3cd3a5c963267ea77e.exe
Windows Exe (x86-32)
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "1 minute, 28 seconds" to "10 seconds" to reveal dormant functionality.
Master Boot Record Changes
»
Sector Number | Sector Size | Actions |
---|---|---|
0 | 512 Bytes |
...
|
2048 | 512 Bytes |
...
|
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\bd764fe2f9734d5ac56933ce68df0a175bfa98dc0266ae3cd3a5c963267ea77e.exe | Sample File | Binary |
malicious
|
...
|
»
File Reputation Information
»
Verdict |
suspicious
|
Names | Mal/Generic-S |
Classification | PUA |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x407712 |
Size Of Code | 0x14600 |
Size Of Initialized Data | 0x38c00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2021-06-09 12:22:35+00:00 |
Sections (6)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x145b8 | 0x14600 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.73 |
.rdata | 0x416000 | 0xb774 | 0xb800 | 0x14a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.97 |
.data | 0x422000 | 0x5634 | 0x800 | 0x20200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.01 |
_RDATA | 0x428000 | 0x2608 | 0x2800 | 0x20a00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.08 |
.rsrc | 0x42b000 | 0x23a80 | 0x23c00 | 0x23200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.67 |
.reloc | 0x44f000 | 0x176c | 0x1800 | 0x46e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.65 |
Imports (6)
»
WINMM.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
waveOutWrite | - | 0x41620c | 0x20e1c | 0x1f81c | 0xbd |
waveOutUnprepareHeader | - | 0x416210 | 0x20e20 | 0x1f820 | 0xbc |
waveOutReset | - | 0x416214 | 0x20e24 | 0x1f824 | 0xb7 |
waveOutOpen | - | 0x416218 | 0x20e28 | 0x1f828 | 0xb4 |
waveOutPrepareHeader | - | 0x41621c | 0x20e2c | 0x1f82c | 0xb6 |
KERNEL32.dll (82)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
Sleep | - | 0x41604c | 0x20c5c | 0x1f65c | 0x4b2 |
GetLastError | - | 0x416050 | 0x20c60 | 0x1f660 | 0x202 |
lstrcatW | - | 0x416054 | 0x20c64 | 0x1f664 | 0x53f |
DeleteFileW | - | 0x416058 | 0x20c68 | 0x1f668 | 0xd6 |
CloseHandle | - | 0x41605c | 0x20c6c | 0x1f66c | 0x52 |
LoadLibraryW | - | 0x416060 | 0x20c70 | 0x1f670 | 0x33f |
CreateThread | - | 0x416064 | 0x20c74 | 0x1f674 | 0xb5 |
GetProcAddress | - | 0x416068 | 0x20c78 | 0x1f678 | 0x245 |
LocalFree | - | 0x41606c | 0x20c7c | 0x1f67c | 0x348 |
CreateProcessW | - | 0x416070 | 0x20c80 | 0x1f680 | 0xa8 |
FreeLibrary | - | 0x416074 | 0x20c84 | 0x1f684 | 0x162 |
CopyFileW | - | 0x416078 | 0x20c88 | 0x1f688 | 0x75 |
lstrcpyW | - | 0x41607c | 0x20c8c | 0x1f68c | 0x548 |
lstrcmpW | - | 0x416080 | 0x20c90 | 0x1f690 | 0x542 |
GetCurrentThreadId | - | 0x416084 | 0x20c94 | 0x1f694 | 0x1c5 |
HeapAlloc | - | 0x416088 | 0x20c98 | 0x1f698 | 0x2cb |
GetProcessHeap | - | 0x41608c | 0x20c9c | 0x1f69c | 0x24a |
CreateMutexW | - | 0x416090 | 0x20ca0 | 0x1f6a0 | 0x9e |
WaitForSingleObject | - | 0x416094 | 0x20ca4 | 0x1f6a4 | 0x4f9 |
TerminateThread | - | 0x416098 | 0x20ca8 | 0x1f6a8 | 0x4c1 |
HeapFree | - | 0x41609c | 0x20cac | 0x1f6ac | 0x2cf |
HeapSize | - | 0x4160a0 | 0x20cb0 | 0x1f6b0 | 0x2d4 |
GetStringTypeW | - | 0x4160a4 | 0x20cb4 | 0x1f6b4 | 0x269 |
GetFileType | - | 0x4160a8 | 0x20cb8 | 0x1f6b8 | 0x1f3 |
GetLogicalDriveStringsW | - | 0x4160ac | 0x20cbc | 0x1f6bc | 0x208 |
LCMapStringW | - | 0x4160b0 | 0x20cc0 | 0x1f6c0 | 0x32d |
FreeEnvironmentStringsW | - | 0x4160b4 | 0x20cc4 | 0x1f6c4 | 0x161 |
GetEnvironmentStringsW | - | 0x4160b8 | 0x20cc8 | 0x1f6c8 | 0x1da |
GetCommandLineW | - | 0x4160bc | 0x20ccc | 0x1f6cc | 0x187 |
GetCommandLineA | - | 0x4160c0 | 0x20cd0 | 0x1f6d0 | 0x186 |
GetCPInfo | - | 0x4160c4 | 0x20cd4 | 0x1f6d4 | 0x172 |
GetOEMCP | - | 0x4160c8 | 0x20cd8 | 0x1f6d8 | 0x237 |
IsValidCodePage | - | 0x4160cc | 0x20cdc | 0x1f6dc | 0x30a |
FindFirstFileExW | - | 0x4160d0 | 0x20ce0 | 0x1f6e0 | 0x134 |
SetFileAttributesW | - | 0x4160d4 | 0x20ce4 | 0x1f6e4 | 0x461 |
CreateFileW | - | 0x4160d8 | 0x20ce8 | 0x1f6e8 | 0x8f |
FindClose | - | 0x4160dc | 0x20cec | 0x1f6ec | 0x12e |
GetTempPathW | - | 0x4160e0 | 0x20cf0 | 0x1f6f0 | 0x285 |
GetModuleFileNameW | - | 0x4160e4 | 0x20cf4 | 0x1f6f4 | 0x214 |
RemoveDirectoryW | - | 0x4160e8 | 0x20cf8 | 0x1f6f8 | 0x403 |
WriteFile | - | 0x4160ec | 0x20cfc | 0x1f6fc | 0x525 |
GetCurrentProcess | - | 0x4160f0 | 0x20d00 | 0x1f700 | 0x1c0 |
FindNextFileW | - | 0x4160f4 | 0x20d04 | 0x1f704 | 0x145 |
FindFirstFileW | - | 0x4160f8 | 0x20d08 | 0x1f708 | 0x139 |
WriteConsoleW | - | 0x4160fc | 0x20d0c | 0x1f70c | 0x524 |
ReadFile | - | 0x416100 | 0x20d10 | 0x1f710 | 0x3c0 |
HeapReAlloc | - | 0x416104 | 0x20d14 | 0x1f714 | 0x2d2 |
DecodePointer | - | 0x416108 | 0x20d18 | 0x1f718 | 0xca |
FlushFileBuffers | - | 0x41610c | 0x20d1c | 0x1f71c | 0x157 |
GetConsoleCP | - | 0x416110 | 0x20d20 | 0x1f720 | 0x19a |
GetConsoleMode | - | 0x416114 | 0x20d24 | 0x1f724 | 0x1ac |
SetFilePointerEx | - | 0x416118 | 0x20d28 | 0x1f728 | 0x467 |
SetStdHandle | - | 0x41611c | 0x20d2c | 0x1f72c | 0x487 |
GetACP | - | 0x416120 | 0x20d30 | 0x1f730 | 0x168 |
GetModuleHandleExW | - | 0x416124 | 0x20d34 | 0x1f734 | 0x217 |
UnhandledExceptionFilter | - | 0x416128 | 0x20d38 | 0x1f738 | 0x4d3 |
SetUnhandledExceptionFilter | - | 0x41612c | 0x20d3c | 0x1f73c | 0x4a5 |
TerminateProcess | - | 0x416130 | 0x20d40 | 0x1f740 | 0x4c0 |
IsProcessorFeaturePresent | - | 0x416134 | 0x20d44 | 0x1f744 | 0x304 |
QueryPerformanceCounter | - | 0x416138 | 0x20d48 | 0x1f748 | 0x3a7 |
GetCurrentProcessId | - | 0x41613c | 0x20d4c | 0x1f74c | 0x1c1 |
GetSystemTimeAsFileTime | - | 0x416140 | 0x20d50 | 0x1f750 | 0x279 |
InitializeSListHead | - | 0x416144 | 0x20d54 | 0x1f754 | 0x2e7 |
IsDebuggerPresent | - | 0x416148 | 0x20d58 | 0x1f758 | 0x300 |
GetStartupInfoW | - | 0x41614c | 0x20d5c | 0x1f75c | 0x263 |
GetModuleHandleW | - | 0x416150 | 0x20d60 | 0x1f760 | 0x218 |
RtlUnwind | - | 0x416154 | 0x20d64 | 0x1f764 | 0x418 |
SetLastError | - | 0x416158 | 0x20d68 | 0x1f768 | 0x473 |
EnterCriticalSection | - | 0x41615c | 0x20d6c | 0x1f76c | 0xee |
LeaveCriticalSection | - | 0x416160 | 0x20d70 | 0x1f770 | 0x339 |
DeleteCriticalSection | - | 0x416164 | 0x20d74 | 0x1f774 | 0xd1 |
InitializeCriticalSectionAndSpinCount | - | 0x416168 | 0x20d78 | 0x1f778 | 0x2e3 |
TlsAlloc | - | 0x41616c | 0x20d7c | 0x1f77c | 0x4c5 |
TlsGetValue | - | 0x416170 | 0x20d80 | 0x1f780 | 0x4c7 |
TlsSetValue | - | 0x416174 | 0x20d84 | 0x1f784 | 0x4c8 |
TlsFree | - | 0x416178 | 0x20d88 | 0x1f788 | 0x4c6 |
LoadLibraryExW | - | 0x41617c | 0x20d8c | 0x1f78c | 0x33e |
RaiseException | - | 0x416180 | 0x20d90 | 0x1f790 | 0x3b1 |
GetStdHandle | - | 0x416184 | 0x20d94 | 0x1f794 | 0x264 |
MultiByteToWideChar | - | 0x416188 | 0x20d98 | 0x1f798 | 0x367 |
WideCharToMultiByte | - | 0x41618c | 0x20d9c | 0x1f79c | 0x511 |
ExitProcess | - | 0x416190 | 0x20da0 | 0x1f7a0 | 0x119 |
USER32.dll (26)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetMessageW | - | 0x4161a0 | 0x20db0 | 0x1f7b0 | 0x15d |
DispatchMessageW | - | 0x4161a4 | 0x20db4 | 0x1f7b4 | 0xaf |
SetTimer | - | 0x4161a8 | 0x20db8 | 0x1f7b8 | 0x2bb |
TranslateMessage | - | 0x4161ac | 0x20dbc | 0x1f7bc | 0x2fc |
EnumDisplayMonitors | - | 0x4161b0 | 0x20dc0 | 0x1f7c0 | 0xe6 |
GetWindowRect | - | 0x4161b4 | 0x20dc4 | 0x1f7c4 | 0x19c |
GetDC | - | 0x4161b8 | 0x20dc8 | 0x1f7c8 | 0x121 |
EnumChildWindows | - | 0x4161bc | 0x20dcc | 0x1f7cc | 0xdf |
CallNextHookEx | - | 0x4161c0 | 0x20dd0 | 0x1f7d0 | 0x1c |
GetSystemMetrics | - | 0x4161c4 | 0x20dd4 | 0x1f7d4 | 0x17e |
SetWindowTextW | - | 0x4161c8 | 0x20dd8 | 0x1f7d8 | 0x2cb |
DrawIcon | - | 0x4161cc | 0x20ddc | 0x1f7dc | 0xc7 |
DestroyCursor | - | 0x4161d0 | 0x20de0 | 0x1f7e0 | 0xa2 |
ShowWindow | - | 0x4161d4 | 0x20de4 | 0x1f7e4 | 0x2df |
GetCursorInfo | - | 0x4161d8 | 0x20de8 | 0x1f7e8 | 0x11f |
RedrawWindow | - | 0x4161dc | 0x20dec | 0x1f7ec | 0x24a |
MoveWindow | - | 0x4161e0 | 0x20df0 | 0x1f7f0 | 0x21b |
UnhookWindowsHookEx | - | 0x4161e4 | 0x20df4 | 0x1f7f4 | 0x300 |
EnumWindows | - | 0x4161e8 | 0x20df8 | 0x1f7f8 | 0xf2 |
mouse_event | - | 0x4161ec | 0x20dfc | 0x1f7fc | 0x331 |
SetWindowsHookExW | - | 0x4161f0 | 0x20e00 | 0x1f800 | 0x2cf |
SetCursorPos | - | 0x4161f4 | 0x20e04 | 0x1f804 | 0x28a |
ReleaseDC | - | 0x4161f8 | 0x20e08 | 0x1f808 | 0x265 |
EnableWindow | - | 0x4161fc | 0x20e0c | 0x1f80c | 0xd8 |
MessageBoxW | - | 0x416200 | 0x20e10 | 0x1f810 | 0x215 |
ExitWindowsEx | - | 0x416204 | 0x20e14 | 0x1f814 | 0xf5 |
GDI32.dll (10)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DeleteDC | - | 0x416020 | 0x20c30 | 0x1f630 | 0xe3 |
CreatePen | - | 0x416024 | 0x20c34 | 0x1f634 | 0x4b |
Ellipse | - | 0x416028 | 0x20c38 | 0x1f638 | 0xed |
DeleteObject | - | 0x41602c | 0x20c3c | 0x1f63c | 0xe6 |
CreateSolidBrush | - | 0x416030 | 0x20c40 | 0x1f640 | 0x54 |
BitBlt | - | 0x416034 | 0x20c44 | 0x1f644 | 0x13 |
SelectObject | - | 0x416038 | 0x20c48 | 0x1f648 | 0x277 |
CreateDIBSection | - | 0x41603c | 0x20c4c | 0x1f64c | 0x35 |
CreateCompatibleDC | - | 0x416040 | 0x20c50 | 0x1f650 | 0x30 |
StretchBlt | - | 0x416044 | 0x20c54 | 0x1f654 | 0x2b3 |
ADVAPI32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LookupPrivilegeValueW | - | 0x416000 | 0x20c10 | 0x1f610 | 0x197 |
AdjustTokenPrivileges | - | 0x416004 | 0x20c14 | 0x1f614 | 0x1f |
AllocateAndInitializeSid | - | 0x416008 | 0x20c18 | 0x1f618 | 0x20 |
SetEntriesInAclW | - | 0x41600c | 0x20c1c | 0x1f61c | 0x2a6 |
SetNamedSecurityInfoW | - | 0x416010 | 0x20c20 | 0x1f620 | 0x2b1 |
OpenProcessToken | - | 0x416014 | 0x20c24 | 0x1f624 | 0x1f7 |
FreeSid | - | 0x416018 | 0x20c28 | 0x1f628 | 0x120 |
SHELL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteW | - | 0x416198 | 0x20da8 | 0x1f7a8 | 0x122 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
bd764fe2f9734d5ac56933ce68df0a175bfa98dc0266ae3cd3a5c963267ea77e.exe | 1 | 0x01190000 | 0x011E0FFF | Relevant Image | 32-bit | 0x01198000 |
...
|
||
bd764fe2f9734d5ac56933ce68df0a175bfa98dc0266ae3cd3a5c963267ea77e.exe | 1 | 0x01190000 | 0x011E0FFF | Process Termination | 32-bit | - |
...
|
C:\Users\RDHJ0C~1\AppData\Local\Temp\卝祛覚梌櫛筻痋荵審蟉胰词積擭穀縰.txt | Dropped File | Stream |
clean
|
...
|
»
a2aafd999059ca980a170d576ebdca95e75d11d7f1c26e2e09bb57a66b988f75 | Embedded File | Image |
clean
|
...
|
»