VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
|
Threat Names: |
Gen:Variant.Ulise.107709
|
Tr0MJ09gRmWhPOHs.exe
Windows Exe (x86-32)
Created at 2021-01-03T13:35:00
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\Tr0MJ09gRmWhPOHs.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x41d384 |
Size Of Code | 0x1bc00 |
Size Of Initialized Data | 0x19400 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_cui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2018-02-01 12:44:34+00:00 |
Sections (10)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x1b340 | 0x1b400 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.94 |
.itext | 0x41d000 | 0x708 | 0x800 | 0x1b800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.53 |
.data | 0x41e000 | 0x178c | 0x1800 | 0x1c000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.7 |
.bss | 0x420000 | 0x4fc8 | 0x0 | 0x1d800 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.idata | 0x425000 | 0xc3c | 0xe00 | 0x1d800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.51 |
.didata | 0x426000 | 0xc8 | 0x200 | 0x1e600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.45 |
.tls | 0x427000 | 0xc | 0x0 | 0x1e800 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x428000 | 0x18 | 0x200 | 0x1e800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.21 |
.reloc | 0x429000 | 0x2368 | 0x2400 | 0x1ea00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.46 |
.rsrc | 0x42c000 | 0x144b4 | 0x14600 | 0x20e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.74 |
Imports (7)
»
oleaut32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SysFreeString | 0x0 | 0x425278 | 0x250a0 | 0x1d8a0 | 0x0 |
SysReAllocStringLen | 0x0 | 0x42527c | 0x250a4 | 0x1d8a4 | 0x0 |
SysAllocStringLen | 0x0 | 0x425280 | 0x250a8 | 0x1d8a8 | 0x0 |
advapi32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RegQueryValueExW | 0x0 | 0x425288 | 0x250b0 | 0x1d8b0 | 0x0 |
RegOpenKeyExW | 0x0 | 0x42528c | 0x250b4 | 0x1d8b4 | 0x0 |
RegCloseKey | 0x0 | 0x425290 | 0x250b8 | 0x1d8b8 | 0x0 |
user32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
MessageBoxA | 0x0 | 0x425298 | 0x250c0 | 0x1d8c0 | 0x0 |
CharNextW | 0x0 | 0x42529c | 0x250c4 | 0x1d8c4 | 0x0 |
LoadStringW | 0x0 | 0x4252a0 | 0x250c8 | 0x1d8c8 | 0x0 |
kernel32.dll (50)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
Sleep | 0x0 | 0x4252a8 | 0x250d0 | 0x1d8d0 | 0x0 |
VirtualFree | 0x0 | 0x4252ac | 0x250d4 | 0x1d8d4 | 0x0 |
VirtualAlloc | 0x0 | 0x4252b0 | 0x250d8 | 0x1d8d8 | 0x0 |
lstrlenW | 0x0 | 0x4252b4 | 0x250dc | 0x1d8dc | 0x0 |
lstrcpynW | 0x0 | 0x4252b8 | 0x250e0 | 0x1d8e0 | 0x0 |
VirtualQuery | 0x0 | 0x4252bc | 0x250e4 | 0x1d8e4 | 0x0 |
QueryPerformanceCounter | 0x0 | 0x4252c0 | 0x250e8 | 0x1d8e8 | 0x0 |
GetTickCount | 0x0 | 0x4252c4 | 0x250ec | 0x1d8ec | 0x0 |
GetSystemInfo | 0x0 | 0x4252c8 | 0x250f0 | 0x1d8f0 | 0x0 |
GetVersion | 0x0 | 0x4252cc | 0x250f4 | 0x1d8f4 | 0x0 |
CompareStringW | 0x0 | 0x4252d0 | 0x250f8 | 0x1d8f8 | 0x0 |
IsDBCSLeadByteEx | 0x0 | 0x4252d4 | 0x250fc | 0x1d8fc | 0x0 |
IsValidLocale | 0x0 | 0x4252d8 | 0x25100 | 0x1d900 | 0x0 |
SetThreadLocale | 0x0 | 0x4252dc | 0x25104 | 0x1d904 | 0x0 |
GetSystemDefaultUILanguage | 0x0 | 0x4252e0 | 0x25108 | 0x1d908 | 0x0 |
GetUserDefaultUILanguage | 0x0 | 0x4252e4 | 0x2510c | 0x1d90c | 0x0 |
GetLocaleInfoW | 0x0 | 0x4252e8 | 0x25110 | 0x1d910 | 0x0 |
WideCharToMultiByte | 0x0 | 0x4252ec | 0x25114 | 0x1d914 | 0x0 |
MultiByteToWideChar | 0x0 | 0x4252f0 | 0x25118 | 0x1d918 | 0x0 |
GetConsoleOutputCP | 0x0 | 0x4252f4 | 0x2511c | 0x1d91c | 0x0 |
GetConsoleCP | 0x0 | 0x4252f8 | 0x25120 | 0x1d920 | 0x0 |
GetACP | 0x0 | 0x4252fc | 0x25124 | 0x1d924 | 0x0 |
LoadLibraryExW | 0x0 | 0x425300 | 0x25128 | 0x1d928 | 0x0 |
GetStartupInfoW | 0x0 | 0x425304 | 0x2512c | 0x1d92c | 0x0 |
GetProcAddress | 0x0 | 0x425308 | 0x25130 | 0x1d930 | 0x0 |
GetModuleHandleW | 0x0 | 0x42530c | 0x25134 | 0x1d934 | 0x0 |
GetModuleFileNameW | 0x0 | 0x425310 | 0x25138 | 0x1d938 | 0x0 |
GetCommandLineW | 0x0 | 0x425314 | 0x2513c | 0x1d93c | 0x0 |
FreeLibrary | 0x0 | 0x425318 | 0x25140 | 0x1d940 | 0x0 |
GetLastError | 0x0 | 0x42531c | 0x25144 | 0x1d944 | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x425320 | 0x25148 | 0x1d948 | 0x0 |
RtlUnwind | 0x0 | 0x425324 | 0x2514c | 0x1d94c | 0x0 |
RaiseException | 0x0 | 0x425328 | 0x25150 | 0x1d950 | 0x0 |
ExitProcess | 0x0 | 0x42532c | 0x25154 | 0x1d954 | 0x0 |
GetCurrentThreadId | 0x0 | 0x425330 | 0x25158 | 0x1d958 | 0x0 |
DeleteCriticalSection | 0x0 | 0x425334 | 0x2515c | 0x1d95c | 0x0 |
LeaveCriticalSection | 0x0 | 0x425338 | 0x25160 | 0x1d960 | 0x0 |
EnterCriticalSection | 0x0 | 0x42533c | 0x25164 | 0x1d964 | 0x0 |
InitializeCriticalSection | 0x0 | 0x425340 | 0x25168 | 0x1d968 | 0x0 |
FindFirstFileW | 0x0 | 0x425344 | 0x2516c | 0x1d96c | 0x0 |
FindClose | 0x0 | 0x425348 | 0x25170 | 0x1d970 | 0x0 |
WriteFile | 0x0 | 0x42534c | 0x25174 | 0x1d974 | 0x0 |
SetFilePointer | 0x0 | 0x425350 | 0x25178 | 0x1d978 | 0x0 |
SetEndOfFile | 0x0 | 0x425354 | 0x2517c | 0x1d97c | 0x0 |
ReadFile | 0x0 | 0x425358 | 0x25180 | 0x1d980 | 0x0 |
GetFileType | 0x0 | 0x42535c | 0x25184 | 0x1d984 | 0x0 |
GetFileSize | 0x0 | 0x425360 | 0x25188 | 0x1d988 | 0x0 |
CreateFileW | 0x0 | 0x425364 | 0x2518c | 0x1d98c | 0x0 |
GetStdHandle | 0x0 | 0x425368 | 0x25190 | 0x1d990 | 0x0 |
CloseHandle | 0x0 | 0x42536c | 0x25194 | 0x1d994 | 0x0 |
kernel32.dll (10)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetProcAddress | 0x0 | 0x425374 | 0x2519c | 0x1d99c | 0x0 |
RaiseException | 0x0 | 0x425378 | 0x251a0 | 0x1d9a0 | 0x0 |
LoadLibraryA | 0x0 | 0x42537c | 0x251a4 | 0x1d9a4 | 0x0 |
GetLastError | 0x0 | 0x425380 | 0x251a8 | 0x1d9a8 | 0x0 |
TlsSetValue | 0x0 | 0x425384 | 0x251ac | 0x1d9ac | 0x0 |
TlsGetValue | 0x0 | 0x425388 | 0x251b0 | 0x1d9b0 | 0x0 |
LocalFree | 0x0 | 0x42538c | 0x251b4 | 0x1d9b4 | 0x0 |
LocalAlloc | 0x0 | 0x425390 | 0x251b8 | 0x1d9b8 | 0x0 |
GetModuleHandleW | 0x0 | 0x425394 | 0x251bc | 0x1d9bc | 0x0 |
FreeLibrary | 0x0 | 0x425398 | 0x251c0 | 0x1d9c0 | 0x0 |
user32.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
MessageBoxW | 0x0 | 0x4253a0 | 0x251c8 | 0x1d9c8 | 0x0 |
LoadStringW | 0x0 | 0x4253a4 | 0x251cc | 0x1d9cc | 0x0 |
GetSystemMetrics | 0x0 | 0x4253a8 | 0x251d0 | 0x1d9d0 | 0x0 |
CharUpperW | 0x0 | 0x4253ac | 0x251d4 | 0x1d9d4 | 0x0 |
CharPrevW | 0x0 | 0x4253b0 | 0x251d8 | 0x1d9d8 | 0x0 |
kernel32.dll (37)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WriteFile | 0x0 | 0x4253b8 | 0x251e0 | 0x1d9e0 | 0x0 |
WideCharToMultiByte | 0x0 | 0x4253bc | 0x251e4 | 0x1d9e4 | 0x0 |
WaitForSingleObject | 0x0 | 0x4253c0 | 0x251e8 | 0x1d9e8 | 0x0 |
VirtualQuery | 0x0 | 0x4253c4 | 0x251ec | 0x1d9ec | 0x0 |
SizeofResource | 0x0 | 0x4253c8 | 0x251f0 | 0x1d9f0 | 0x0 |
SetEvent | 0x0 | 0x4253cc | 0x251f4 | 0x1d9f4 | 0x0 |
SetEnvironmentVariableW | 0x0 | 0x4253d0 | 0x251f8 | 0x1d9f8 | 0x0 |
ResetEvent | 0x0 | 0x4253d4 | 0x251fc | 0x1d9fc | 0x0 |
LockResource | 0x0 | 0x4253d8 | 0x25200 | 0x1da00 | 0x0 |
LoadResource | 0x0 | 0x4253dc | 0x25204 | 0x1da04 | 0x0 |
IsValidLocale | 0x0 | 0x4253e0 | 0x25208 | 0x1da08 | 0x0 |
GetWindowsDirectoryW | 0x0 | 0x4253e4 | 0x2520c | 0x1da0c | 0x0 |
GetVersionExW | 0x0 | 0x4253e8 | 0x25210 | 0x1da10 | 0x0 |
GetThreadLocale | 0x0 | 0x4253ec | 0x25214 | 0x1da14 | 0x0 |
GetStdHandle | 0x0 | 0x4253f0 | 0x25218 | 0x1da18 | 0x0 |
GetProcAddress | 0x0 | 0x4253f4 | 0x2521c | 0x1da1c | 0x0 |
GetModuleHandleW | 0x0 | 0x4253f8 | 0x25220 | 0x1da20 | 0x0 |
GetModuleFileNameW | 0x0 | 0x4253fc | 0x25224 | 0x1da24 | 0x0 |
GetLocaleInfoW | 0x0 | 0x425400 | 0x25228 | 0x1da28 | 0x0 |
GetFullPathNameW | 0x0 | 0x425404 | 0x2522c | 0x1da2c | 0x0 |
GetFileAttributesW | 0x0 | 0x425408 | 0x25230 | 0x1da30 | 0x0 |
GetExitCodeProcess | 0x0 | 0x42540c | 0x25234 | 0x1da34 | 0x0 |
GetEnvironmentVariableW | 0x0 | 0x425410 | 0x25238 | 0x1da38 | 0x0 |
GetDiskFreeSpaceW | 0x0 | 0x425414 | 0x2523c | 0x1da3c | 0x0 |
GetCurrentProcessId | 0x0 | 0x425418 | 0x25240 | 0x1da40 | 0x0 |
GetCommandLineW | 0x0 | 0x42541c | 0x25244 | 0x1da44 | 0x0 |
GetCPInfo | 0x0 | 0x425420 | 0x25248 | 0x1da48 | 0x0 |
FreeResource | 0x0 | 0x425424 | 0x2524c | 0x1da4c | 0x0 |
FreeLibrary | 0x0 | 0x425428 | 0x25250 | 0x1da50 | 0x0 |
FindResourceW | 0x0 | 0x42542c | 0x25254 | 0x1da54 | 0x0 |
EnumSystemLocalesW | 0x0 | 0x425430 | 0x25258 | 0x1da58 | 0x0 |
EnumCalendarInfoW | 0x0 | 0x425434 | 0x2525c | 0x1da5c | 0x0 |
DeleteFileW | 0x0 | 0x425438 | 0x25260 | 0x1da60 | 0x0 |
CreateProcessW | 0x0 | 0x42543c | 0x25264 | 0x1da64 | 0x0 |
CreateFileW | 0x0 | 0x425440 | 0x25268 | 0x1da68 | 0x0 |
CreateEventW | 0x0 | 0x425444 | 0x2526c | 0x1da6c | 0x0 |
CloseHandle | 0x0 | 0x425448 | 0x25270 | 0x1da70 | 0x0 |
Memory Dumps (1)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
tr0mj09grmwhpohs.exe | 1 | 0x00400000 | 0x00440FFF | Relevant Image |
![]() |
32-bit | 0x004059D8 |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Ulise.107709 |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\29302.XL | Dropped File |
Suspicious
|
...
|
»
YARA Matches (2)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
PDF_Missing_startxref | Malformed PDF without startxref; possible obfuscation | - |
3/5
|
...
|
PDF_Missing_EOF | Malformed PDF without EOF marker; possible obfuscation | - |
3/5
|
...
|
C:\Users\5P5NRG~1\AppData\Local\Temp\CAS5AY8X.bat | Dropped File | Batch |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\13768.XL | Dropped File | Video |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\20835.XL | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2894.XL | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\16132.XL | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\10354.XL | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\9130.XL | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\31726.XL | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\1037.XL | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\11484.XL | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\21278.XL | Dropped File | Image |
Unknown
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\4542.XL | Dropped File | Image |
Unknown
|
...
|
»