VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: Ransomware, Trojan, Worm |
mdsqvy.exe
Windows Exe (x86-32)
Created at 2019-05-29T00:51:00
Remarks
(0x200001b): The maximum number of file reputation requests per analysis (20) was exceeded.
Master Boot Record Changes
»
Sector Number | Sector Size | Actions |
---|---|---|
2063 | 512 bytes |
...
|
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\mdsqvy.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-05-19 17:15 (UTC+2) |
Last Seen | 2019-05-28 20:56 (UTC+2) |
Names | Win32.Trojan.Uac |
Families | Uac |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x402d70 |
Size Of Code | 0x2c00 |
Size Of Initialized Data | 0x1e00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-05-17 14:59:33+00:00 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x2bc3 | 0x2c00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.31 |
.rdata | 0x404000 | 0x1b8e | 0x1c00 | 0x3000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.62 |
.data | 0x406000 | 0x28 | 0x0 | 0x0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
Imports (10)
»
MSVCRT.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
rand | 0x0 | 0x404134 | 0x54ec | 0x44ec | 0x2a6 |
memset | 0x0 | 0x404138 | 0x54f0 | 0x44f0 | 0x299 |
KERNEL32.dll (40)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
FindClose | 0x0 | 0x404078 | 0x5430 | 0x4430 | 0x175 |
CreateFileW | 0x0 | 0x40407c | 0x5434 | 0x4434 | 0xcb |
CreateThread | 0x0 | 0x404080 | 0x5438 | 0x4438 | 0xf3 |
SetFilePointerEx | 0x0 | 0x404084 | 0x543c | 0x443c | 0x523 |
ExitProcess | 0x0 | 0x404088 | 0x5440 | 0x4440 | 0x15e |
lstrcmpW | 0x0 | 0x40408c | 0x5444 | 0x4444 | 0x630 |
MoveFileW | 0x0 | 0x404090 | 0x5448 | 0x4448 | 0x3eb |
lstrcmpA | 0x0 | 0x404094 | 0x544c | 0x444c | 0x62f |
GlobalAlloc | 0x0 | 0x404098 | 0x5450 | 0x4450 | 0x32d |
WaitForMultipleObjects | 0x0 | 0x40409c | 0x5454 | 0x4454 | 0x5d5 |
GlobalLock | 0x0 | 0x4040a0 | 0x5458 | 0x4458 | 0x338 |
GlobalUnlock | 0x0 | 0x4040a4 | 0x545c | 0x445c | 0x33f |
GetVersionExW | 0x0 | 0x4040a8 | 0x5460 | 0x4460 | 0x31b |
ExitThread | 0x0 | 0x4040ac | 0x5464 | 0x4464 | 0x15f |
OpenProcess | 0x0 | 0x4040b0 | 0x5468 | 0x4468 | 0x40d |
LoadLibraryA | 0x0 | 0x4040b4 | 0x546c | 0x446c | 0x3c1 |
GetEnvironmentVariableW | 0x0 | 0x4040b8 | 0x5470 | 0x4470 | 0x239 |
lstrcatW | 0x0 | 0x4040bc | 0x5474 | 0x4474 | 0x62d |
GetUserDefaultLangID | 0x0 | 0x4040c0 | 0x5478 | 0x4478 | 0x313 |
WriteFile | 0x0 | 0x4040c4 | 0x547c | 0x447c | 0x612 |
CloseHandle | 0x0 | 0x4040c8 | 0x5480 | 0x4480 | 0x86 |
FindNextFileW | 0x0 | 0x4040cc | 0x5484 | 0x4484 | 0x18c |
FindFirstFileW | 0x0 | 0x4040d0 | 0x5488 | 0x4488 | 0x180 |
GetLogicalDrives | 0x0 | 0x4040d4 | 0x548c | 0x448c | 0x268 |
ReadFile | 0x0 | 0x4040d8 | 0x5490 | 0x4490 | 0x473 |
lstrlenA | 0x0 | 0x4040dc | 0x5494 | 0x4494 | 0x63b |
HeapFree | 0x0 | 0x4040e0 | 0x5498 | 0x4498 | 0x349 |
IsWow64Process | 0x0 | 0x4040e4 | 0x549c | 0x449c | 0x391 |
GetModuleFileNameW | 0x0 | 0x4040e8 | 0x54a0 | 0x44a0 | 0x274 |
GetCurrentProcess | 0x0 | 0x4040ec | 0x54a4 | 0x44a4 | 0x217 |
VerifyVersionInfoW | 0x0 | 0x4040f0 | 0x54a8 | 0x44a8 | 0x5c5 |
GetProcessHeap | 0x0 | 0x4040f4 | 0x54ac | 0x44ac | 0x2b4 |
GetCurrentProcessId | 0x0 | 0x4040f8 | 0x54b0 | 0x44b0 | 0x218 |
VerSetConditionMask | 0x0 | 0x4040fc | 0x54b4 | 0x44b4 | 0x5c1 |
GetProcAddress | 0x0 | 0x404100 | 0x54b8 | 0x44b8 | 0x2ae |
GetWindowsDirectoryW | 0x0 | 0x404104 | 0x54bc | 0x44bc | 0x326 |
HeapAlloc | 0x0 | 0x404108 | 0x54c0 | 0x44c0 | 0x345 |
LoadLibraryW | 0x0 | 0x40410c | 0x54c4 | 0x44c4 | 0x3c4 |
GetSystemInfo | 0x0 | 0x404110 | 0x54c8 | 0x44c8 | 0x2e3 |
GlobalFree | 0x0 | 0x404114 | 0x54cc | 0x44cc | 0x334 |
USER32.dll (6)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetWindowRect | 0x0 | 0x404158 | 0x5510 | 0x4510 | 0x1e6 |
GetKeyboardLayoutList | 0x0 | 0x40415c | 0x5514 | 0x4514 | 0x165 |
ReleaseDC | 0x0 | 0x404160 | 0x5518 | 0x4518 | 0x2fe |
SystemParametersInfoW | 0x0 | 0x404164 | 0x551c | 0x451c | 0x397 |
GetDesktopWindow | 0x0 | 0x404168 | 0x5520 | 0x4520 | 0x142 |
GetDC | 0x0 | 0x40416c | 0x5524 | 0x4524 | 0x13f |
GDI32.dll (21)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SaveDC | 0x0 | 0x404020 | 0x53d8 | 0x43d8 | 0x32a |
CreateFontA | 0x0 | 0x404024 | 0x53dc | 0x43dc | 0x3f |
SelectObject | 0x0 | 0x404028 | 0x53e0 | 0x43e0 | 0x35b |
CreateCompatibleDC | 0x0 | 0x40402c | 0x53e4 | 0x43e4 | 0x31 |
SetPixel | 0x0 | 0x404030 | 0x53e8 | 0x43e8 | 0x37f |
RealizePalette | 0x0 | 0x404034 | 0x53ec | 0x43ec | 0x316 |
CreateCompatibleBitmap | 0x0 | 0x404038 | 0x53f0 | 0x43f0 | 0x30 |
GetStockObject | 0x0 | 0x40403c | 0x53f4 | 0x43f4 | 0x2b8 |
GetDIBits | 0x0 | 0x404040 | 0x53f8 | 0x43f8 | 0x274 |
GetDeviceCaps | 0x0 | 0x404044 | 0x53fc | 0x43fc | 0x275 |
DeleteDC | 0x0 | 0x404048 | 0x5400 | 0x4400 | 0x17a |
SetTextColor | 0x0 | 0x40404c | 0x5404 | 0x4404 | 0x38a |
TextOutA | 0x0 | 0x404050 | 0x5408 | 0x4408 | 0x39c |
SelectPalette | 0x0 | 0x404054 | 0x540c | 0x440c | 0x35c |
GetObjectW | 0x0 | 0x404058 | 0x5410 | 0x4410 | 0x2a7 |
SetBkColor | 0x0 | 0x40405c | 0x5414 | 0x4414 | 0x362 |
RestoreDC | 0x0 | 0x404060 | 0x5418 | 0x4418 | 0x323 |
DeleteObject | 0x0 | 0x404064 | 0x541c | 0x441c | 0x17d |
BitBlt | 0x0 | 0x404068 | 0x5420 | 0x4420 | 0x13 |
CreateDCW | 0x0 | 0x40406c | 0x5424 | 0x4424 | 0x34 |
SetTextAlign | 0x0 | 0x404070 | 0x5428 | 0x4428 | 0x388 |
ADVAPI32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CryptDestroyKey | 0x0 | 0x404000 | 0x53b8 | 0x43b8 | 0xc8 |
CryptAcquireContextA | 0x0 | 0x404004 | 0x53bc | 0x43bc | 0xc1 |
CryptEncrypt | 0x0 | 0x404008 | 0x53c0 | 0x43c0 | 0xcb |
CryptImportKey | 0x0 | 0x40400c | 0x53c4 | 0x43c4 | 0xdb |
CryptReleaseContext | 0x0 | 0x404010 | 0x53c8 | 0x43c8 | 0xdc |
CryptAcquireContextW | 0x0 | 0x404014 | 0x53cc | 0x43cc | 0xc2 |
CryptGenRandom | 0x0 | 0x404018 | 0x53d0 | 0x43d0 | 0xd2 |
SHELL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShellExecuteExW | 0x0 | 0x404140 | 0x54f8 | 0x44f8 | 0x1b5 |
ole32.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoInitializeEx | 0x0 | 0x404180 | 0x5538 | 0x4538 | 0x5e |
CoGetObject | 0x0 | 0x404184 | 0x553c | 0x453c | 0x51 |
IIDFromString | 0x0 | 0x404188 | 0x5540 | 0x4540 | 0x102 |
SHLWAPI.dll (3)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
StrStrW | 0x0 | 0x404148 | 0x5500 | 0x4500 | 0x152 |
StrStrA | 0x0 | 0x40414c | 0x5504 | 0x4504 | 0x14d |
wnsprintfW | 0x0 | 0x404150 | 0x5508 | 0x4508 | 0x178 |
ntdll.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
RtlLeaveCriticalSection | 0x0 | 0x404174 | 0x552c | 0x452c | 0x4ad |
RtlEnterCriticalSection | 0x0 | 0x404178 | 0x5530 | 0x4530 | 0x397 |
MPR.dll (5)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
WNetAddConnection2W | 0x0 | 0x40411c | 0x54d4 | 0x44d4 | 0xd |
WNetOpenEnumW | 0x0 | 0x404120 | 0x54d8 | 0x44d8 | 0x44 |
WNetCancelConnection2W | 0x0 | 0x404124 | 0x54dc | 0x44dc | 0x13 |
WNetEnumResourceW | 0x0 | 0x404128 | 0x54e0 | 0x44e0 | 0x23 |
WNetCloseEnum | 0x0 | 0x40412c | 0x54e4 | 0x44e4 | 0x17 |
Memory Dumps (1)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuilds | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
mdsqvy.exe | 1 | 0x00400000 | 0x00406FFF | Relevant Image | - | 32-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Generic.Ransom.Outsider.BB2D3DDE |
Malicious
|
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Severity | Actions |
---|---|---|---|---|
OlympicDestroyer_Gen1 | Olympic Destroyer destructive malware | Worm |
Malicious
|
...
|
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfoPathMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\OneNoteMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-00B4-0409-1000-0000000FF1CE}-C\ProjectMUI.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\OfficeMUISet.xml | Modified File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordMUI.msi.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.cab.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.msi.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C\VisioMUI.xml.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\ShellUI.MST.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C\ProPlusrWW.xml.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C\Office32WW.xml.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\setup.exe.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\Setup.xml.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-0057-0000-1000-0000000FF1CE}-C\Office32WW.msi.NHCR | Dropped File | Stream |
Unknown
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\Proof.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-00B4-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C\GrooveMUI.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C\Setup.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\Microsoft.VC90.CRT.manifest | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\Access.en-us\AccessMUI.xml | Modified File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\AccessMUISet.xml | Modified File | Stream |
Not Queried
|
...
|
»
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming\encrypted_key.bin | Dropped File | Text |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.msi.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlkLR.cab.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.xml.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\Proof.cab.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\Proof.msi.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfLR.cab.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\msvcr90.dll.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\OfficeMUI.xml.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\Setup.xml.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C\ProPrWW2.cab.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C\Setup.xml.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-003B-0000-1000-0000000FF1CE}-C\PrjProrWW.xml.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\# DECRYPT MY FILES #.txt | Dropped File | Text |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-0057-0000-1000-0000000FF1CE}-C\OWOW32WW.cab.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»
\\?\C:\MSOCache\All Users\{91140000-0057-0000-1000-0000000FF1CE}-C\VisiorWW.cab.NHCR | Dropped File | Stream |
Not Queried
|
...
|
»