Malicious
Classifications
Ransomware
Threat Names
Mal/Generic-S RedNet
Dynamic Analysis Report
Created on 2022-04-28T11:47:08+00:00
be88512c9250a558a3524e1c3bbd0299517cb0d6c3fb749c22df32033bf081e8.exe
Windows Exe (x86-32)
Remarks (1/1)
(0x02000046): The maximum binlog size was reached. The analysis was terminated prematurely.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\be88512c9250a558a3524e1c3bbd0299517cb0d6c3fb749c22df32033bf081e8.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x00400000 |
Entry Point | 0x0040CCEF |
Size Of Code | 0x00019800 |
Size Of Initialized Data | 0x0001D800 |
File Type | IMAGE_FILE_EXECUTABLE_IMAGE |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2020-02-22 07:21 (UTC+1) |
Version Information (7)
»
FileDescription | |
FileVersion | 2.1.0.0 |
InternalName | svchosta.exe |
LegalCopyright | |
OriginalFilename | svchosta.exe |
ProductVersion | 2.1.0.0 |
Assembly Version | 2.1.0.0 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x00401000 | 0x000196D8 | 0x00019800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.75 |
.rdata | 0x0041B000 | 0x00006DF2 | 0x00006E00 | 0x00019C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.44 |
.data | 0x00422000 | 0x000030C0 | 0x00001600 | 0x00020A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.26 |
.rsrc | 0x00426000 | 0x00015324 | 0x00015400 | 0x00022000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.99 |
Imports (4)
»
KERNEL32.dll (84)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RaiseException | - | 0x0041B000 | 0x00021618 | 0x00020218 | 0x0000035A |
GetLastError | - | 0x0041B004 | 0x0002161C | 0x0002021C | 0x000001E6 |
MultiByteToWideChar | - | 0x0041B008 | 0x00021620 | 0x00020220 | 0x0000031A |
lstrlenA | - | 0x0041B00C | 0x00021624 | 0x00020224 | 0x000004B5 |
InterlockedDecrement | - | 0x0041B010 | 0x00021628 | 0x00020228 | 0x000002BC |
GetProcAddress | - | 0x0041B014 | 0x0002162C | 0x0002022C | 0x00000220 |
LoadLibraryA | - | 0x0041B018 | 0x00021630 | 0x00020230 | 0x000002F1 |
FreeResource | - | 0x0041B01C | 0x00021634 | 0x00020234 | 0x0000014F |
SizeofResource | - | 0x0041B020 | 0x00021638 | 0x00020238 | 0x00000420 |
LockResource | - | 0x0041B024 | 0x0002163C | 0x0002023C | 0x00000307 |
LoadResource | - | 0x0041B028 | 0x00021640 | 0x00020240 | 0x000002F6 |
FindResourceA | - | 0x0041B02C | 0x00021644 | 0x00020244 | 0x00000136 |
GetModuleHandleA | - | 0x0041B030 | 0x00021648 | 0x00020248 | 0x000001F6 |
Module32Next | - | 0x0041B034 | 0x0002164C | 0x0002024C | 0x0000030F |
CloseHandle | - | 0x0041B038 | 0x00021650 | 0x00020250 | 0x00000043 |
Module32First | - | 0x0041B03C | 0x00021654 | 0x00020254 | 0x0000030D |
CreateToolhelp32Snapshot | - | 0x0041B040 | 0x00021658 | 0x00020258 | 0x000000AC |
GetCurrentProcessId | - | 0x0041B044 | 0x0002165C | 0x0002025C | 0x000001AA |
SetEndOfFile | - | 0x0041B048 | 0x00021660 | 0x00020260 | 0x000003CD |
GetStringTypeW | - | 0x0041B04C | 0x00021664 | 0x00020264 | 0x00000240 |
GetStringTypeA | - | 0x0041B050 | 0x00021668 | 0x00020268 | 0x0000023D |
LCMapStringW | - | 0x0041B054 | 0x0002166C | 0x0002026C | 0x000002E3 |
LCMapStringA | - | 0x0041B058 | 0x00021670 | 0x00020270 | 0x000002E1 |
GetLocaleInfoA | - | 0x0041B05C | 0x00021674 | 0x00020274 | 0x000001E8 |
CreateFileA | - | 0x0041B060 | 0x00021678 | 0x00020278 | 0x00000078 |
HeapFree | - | 0x0041B064 | 0x0002167C | 0x0002027C | 0x000002A1 |
GetProcessHeap | - | 0x0041B068 | 0x00021680 | 0x00020280 | 0x00000223 |
HeapAlloc | - | 0x0041B06C | 0x00021684 | 0x00020284 | 0x0000029D |
GetCommandLineA | - | 0x0041B070 | 0x00021688 | 0x00020288 | 0x0000016F |
HeapCreate | - | 0x0041B074 | 0x0002168C | 0x0002028C | 0x0000029F |
VirtualFree | - | 0x0041B078 | 0x00021690 | 0x00020290 | 0x00000457 |
DeleteCriticalSection | - | 0x0041B07C | 0x00021694 | 0x00020294 | 0x000000BE |
LeaveCriticalSection | - | 0x0041B080 | 0x00021698 | 0x00020298 | 0x000002EF |
EnterCriticalSection | - | 0x0041B084 | 0x0002169C | 0x0002029C | 0x000000D9 |
VirtualAlloc | - | 0x0041B088 | 0x000216A0 | 0x000202A0 | 0x00000454 |
HeapReAlloc | - | 0x0041B08C | 0x000216A4 | 0x000202A4 | 0x000002A4 |
HeapSize | - | 0x0041B090 | 0x000216A8 | 0x000202A8 | 0x000002A6 |
TerminateProcess | - | 0x0041B094 | 0x000216AC | 0x000202AC | 0x0000042D |
GetCurrentProcess | - | 0x0041B098 | 0x000216B0 | 0x000202B0 | 0x000001A9 |
UnhandledExceptionFilter | - | 0x0041B09C | 0x000216B4 | 0x000202B4 | 0x0000043E |
SetUnhandledExceptionFilter | - | 0x0041B0A0 | 0x000216B8 | 0x000202B8 | 0x00000415 |
IsDebuggerPresent | - | 0x0041B0A4 | 0x000216BC | 0x000202BC | 0x000002D1 |
GetModuleHandleW | - | 0x0041B0A8 | 0x000216C0 | 0x000202C0 | 0x000001F9 |
Sleep | - | 0x0041B0AC | 0x000216C4 | 0x000202C4 | 0x00000421 |
ExitProcess | - | 0x0041B0B0 | 0x000216C8 | 0x000202C8 | 0x00000104 |
WriteFile | - | 0x0041B0B4 | 0x000216CC | 0x000202CC | 0x0000048D |
GetStdHandle | - | 0x0041B0B8 | 0x000216D0 | 0x000202D0 | 0x0000023B |
GetModuleFileNameA | - | 0x0041B0BC | 0x000216D4 | 0x000202D4 | 0x000001F4 |
WideCharToMultiByte | - | 0x0041B0C0 | 0x000216D8 | 0x000202D8 | 0x0000047A |
GetConsoleCP | - | 0x0041B0C4 | 0x000216DC | 0x000202DC | 0x00000183 |
GetConsoleMode | - | 0x0041B0C8 | 0x000216E0 | 0x000202E0 | 0x00000195 |
ReadFile | - | 0x0041B0CC | 0x000216E4 | 0x000202E4 | 0x00000368 |
TlsGetValue | - | 0x0041B0D0 | 0x000216E8 | 0x000202E8 | 0x00000434 |
TlsAlloc | - | 0x0041B0D4 | 0x000216EC | 0x000202EC | 0x00000432 |
TlsSetValue | - | 0x0041B0D8 | 0x000216F0 | 0x000202F0 | 0x00000435 |
TlsFree | - | 0x0041B0DC | 0x000216F4 | 0x000202F4 | 0x00000433 |
InterlockedIncrement | - | 0x0041B0E0 | 0x000216F8 | 0x000202F8 | 0x000002C0 |
SetLastError | - | 0x0041B0E4 | 0x000216FC | 0x000202FC | 0x000003EC |
GetCurrentThreadId | - | 0x0041B0E8 | 0x00021700 | 0x00020300 | 0x000001AD |
FlushFileBuffers | - | 0x0041B0EC | 0x00021704 | 0x00020304 | 0x00000141 |
SetFilePointer | - | 0x0041B0F0 | 0x00021708 | 0x00020308 | 0x000003DF |
SetHandleCount | - | 0x0041B0F4 | 0x0002170C | 0x0002030C | 0x000003E8 |
GetFileType | - | 0x0041B0F8 | 0x00021710 | 0x00020310 | 0x000001D7 |
GetStartupInfoA | - | 0x0041B0FC | 0x00021714 | 0x00020314 | 0x00000239 |
RtlUnwind | - | 0x0041B100 | 0x00021718 | 0x00020318 | 0x00000392 |
FreeEnvironmentStringsA | - | 0x0041B104 | 0x0002171C | 0x0002031C | 0x0000014A |
GetEnvironmentStrings | - | 0x0041B108 | 0x00021720 | 0x00020320 | 0x000001BF |
FreeEnvironmentStringsW | - | 0x0041B10C | 0x00021724 | 0x00020324 | 0x0000014B |
GetEnvironmentStringsW | - | 0x0041B110 | 0x00021728 | 0x00020328 | 0x000001C1 |
QueryPerformanceCounter | - | 0x0041B114 | 0x0002172C | 0x0002032C | 0x00000354 |
GetTickCount | - | 0x0041B118 | 0x00021730 | 0x00020330 | 0x00000266 |
GetSystemTimeAsFileTime | - | 0x0041B11C | 0x00021734 | 0x00020334 | 0x0000024F |
InitializeCriticalSectionAndSpinCount | - | 0x0041B120 | 0x00021738 | 0x00020338 | 0x000002B5 |
GetCPInfo | - | 0x0041B124 | 0x0002173C | 0x0002033C | 0x0000015B |
GetACP | - | 0x0041B128 | 0x00021740 | 0x00020340 | 0x00000152 |
GetOEMCP | - | 0x0041B12C | 0x00021744 | 0x00020344 | 0x00000213 |
IsValidCodePage | - | 0x0041B130 | 0x00021748 | 0x00020348 | 0x000002DB |
CompareStringA | - | 0x0041B134 | 0x0002174C | 0x0002034C | 0x00000052 |
CompareStringW | - | 0x0041B138 | 0x00021750 | 0x00020350 | 0x00000055 |
SetEnvironmentVariableA | - | 0x0041B13C | 0x00021754 | 0x00020354 | 0x000003D0 |
WriteConsoleA | - | 0x0041B140 | 0x00021758 | 0x00020358 | 0x00000482 |
GetConsoleOutputCP | - | 0x0041B144 | 0x0002175C | 0x0002035C | 0x00000199 |
WriteConsoleW | - | 0x0041B148 | 0x00021760 | 0x00020360 | 0x0000048C |
SetStdHandle | - | 0x0041B14C | 0x00021764 | 0x00020364 | 0x000003FC |
ole32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
OleInitialize | - | 0x0041B184 | 0x0002179C | 0x0002039C | 0x000000F4 |
OLEAUT32.dll (9)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VariantInit | 0x00000008 | 0x0041B154 | 0x0002176C | 0x0002036C | - |
SafeArrayCreate | 0x0000000F | 0x0041B158 | 0x00021770 | 0x00020370 | - |
SafeArrayAccessData | 0x00000017 | 0x0041B15C | 0x00021774 | 0x00020374 | - |
SafeArrayUnaccessData | 0x00000018 | 0x0041B160 | 0x00021778 | 0x00020378 | - |
SafeArrayDestroy | 0x00000010 | 0x0041B164 | 0x0002177C | 0x0002037C | - |
SafeArrayCreateVector | 0x0000019B | 0x0041B168 | 0x00021780 | 0x00020380 | - |
VariantClear | 0x00000009 | 0x0041B16C | 0x00021784 | 0x00020384 | - |
SysFreeString | 0x00000006 | 0x0041B170 | 0x00021788 | 0x00020388 | - |
SysAllocString | 0x00000002 | 0x0041B174 | 0x0002178C | 0x0002038C | - |
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CorBindToRuntimeEx | - | 0x0041B17C | 0x00021794 | 0x00020394 | 0x0000000E |
Memory Dumps (7)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
be88512c9250a558a3524e1c3bbd0299517cb0d6c3fb749c22df32033bf081e8.exe | 1 | 0x00400000 | 0x0043BFFF | Relevant Image |
![]() |
32-bit | 0x0041083E |
![]() |
...
|
buffer | 1 | 0x020B0000 | 0x020CFFFF | Reflectively Loaded .NET Assembly |
![]() |
32-bit | - |
![]() |
...
|
buffer | 1 | 0x04D60000 | 0x04D7EFFF | Reflectively Loaded .NET Assembly |
![]() |
32-bit | - |
![]() |
...
|
mscorjit.dll | 1 | 0x6DCF0000 | 0x6DD4AFFF | First Execution |
![]() |
32-bit | 0x6DD3800B |
![]() |
...
|
buffer | 1 | 0x04E00000 | 0x04E00FFF | First Execution |
![]() |
32-bit | 0x04E00000 |
![]() |
...
|
buffer | 1 | 0x01F84738 | 0x01FA4745 | Image In Buffer |
![]() |
32-bit | - |
![]() |
...
|
be88512c9250a558a3524e1c3bbd0299517cb0d6c3fb749c22df32033bf081e8.exe | 1 | 0x00400000 | 0x0043BFFF | Final Dump |
![]() |
32-bit | - |
![]() |
...
|
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
Packer_RedNet | Packer used to distribute malware | - |
5/5
|
...
|
File Reputation Information
»
Verdict |
Malicious
|
C:\Program Files\Common Files\n_NxG3 TG8VT.jpg[newpatek@cock.li].MARRA | Dropped File | Stream |
Clean
|
...
|
»
C:\$Recycle.Bin\MARRACRYPT_INFORMATION.HTML | Dropped File | HTML |
Clean
|
...
|
»
C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeUpdateSchedule.xml[newpatek@cock.li].MARRA | Dropped File | Stream |
Clean
|
...
|
»
C:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xml[newpatek@cock.li].MARRA | Dropped File | Stream |
Clean
|
...
|
»
C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml[newpatek@cock.li].MARRA | Dropped File | Stream |
Clean
|
...
|
»
C:\Users\Public\MARRACRYPT_ID_DO_NOT_TOUCH | Dropped File | Stream |
Clean
|
...
|
»
C:\Users\Public\MARRACRYPT_ID_DO_NOT_TOUCH | Dropped File | Stream |
Clean
|
...
|
»
C:\ProgramData\newpatek\onmywrist.bat | Dropped File | Text |
Clean
|
...
|
»
C:\Users\Public\PUBLIC_KEY_DO_NOT_TOUCH | Dropped File | Stream |
Clean
|
...
|
»
C:\Program Files\Common Files\System\msadc\MARRACRYPT_INFORMATION.HTML | Dropped File | Empty |
Clean
|
...
|
»
C:\Program Files\Windows Media Player\en-US\MARRACRYPT_INFORMATION.HTML | Dropped File | Empty |
Clean
|
...
|
»