VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: Spyware, Ransomware, Trojan |
sam.exe
Windows Exe (x86-32)
Created at 2019-10-02T16:30:00
Remarks
(0x200001e): The maximum size of extracted files was exceeded. Some files may be missing in the report.
(0x200001d): The maximum number of extracted files was exceeded. Some files may be missing in the report.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\sam.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-09-06 10:15 (UTC+2) |
Last Seen | 2019-09-20 04:26 (UTC+2) |
Names | Win32.Trojan.Delshad |
Families | Delshad |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x67ac60 |
Size Of Code | 0xff000 |
Size Of Initialized Data | 0x1000 |
Size Of Uninitialized Data | 0x17b000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_cui |
Machine Type | MachineType.i386 |
Compile Timestamp | 1970-01-01 00:00:00+00:00 |
Packer | UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0x17b000 | 0x0 | 0x200 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x57c000 | 0xff000 | 0xff000 | 0x200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.91 |
UPX2 | 0x67b000 | 0x1000 | 0x200 | 0xff200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.38 |
Imports (1)
»
KERNEL32.DLL (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | 0x0 | 0x67b028 | 0x27b028 | 0xff228 | 0x0 |
ExitProcess | 0x0 | 0x67b02c | 0x27b02c | 0xff22c | 0x0 |
GetProcAddress | 0x0 | 0x67b030 | 0x27b030 | 0xff230 | 0x0 |
VirtualProtect | 0x0 | 0x67b034 | 0x27b034 | 0xff234 | 0x0 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
sam.exe | 1 | 0x00400000 | 0x0067BFFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
sam.exe | 1 | 0x00400000 | 0x0067BFFF | Final Dump | - | 32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Generic.Ransom.Estemani.A095E571 |
Malicious
|
C:/MSOCache/All Users/{90140000-0016-0409-1000-0000000FF1CE}-C/ExcelLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-0018-0409-1000-0000000FF1CE}-C/PptLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-0019-0409-1000-0000000FF1CE}-C/PubLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-001A-0409-1000-0000000FF1CE}-C/OutlkLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-001B-0409-1000-0000000FF1CE}-C/WordLR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-002C-0409-1000-0000000FF1CE}-C/Proof.en/Proof.cab | Modified File | Stream |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-002C-0409-1000-0000000FF1CE}-C/Proof.es/Proof.cab | Modified File | Binary |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-002C-0409-1000-0000000FF1CE}-C/Proof.fr/Proof.cab | Modified File | Stream |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-0043-0409-1000-0000000FF1CE}-C/OWOW32LR.cab | Modified File | Stream |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-0044-0409-1000-0000000FF1CE}-C/InfLR.cab | Modified File | Binary |
Unknown
|
...
|
»
C:/MSOCache/All Users/{90140000-0019-0409-1000-0000000FF1CE}-C\@_READ_TO_RECOVER_FILES_@.txt | Dropped File | Text |
Unknown
|
...
|
»