VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Worm
|
Threat Names: |
Olympic Destroyer
Generic.Ransom.Small.773EC97D
|
QoAY92J30os7vCHc.exe
Windows Exe (x86-32)
Created at 2020-03-22T09:43:00
Master Boot Record Changes
»
Sector Number | Sector Size | Actions |
---|---|---|
2063 | 512 Bytes |
...
|
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\QoAY92J30os7vCHc.exe | Sample File | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x405c1a |
Size Of Code | 0x3e00 |
Size Of Initialized Data | 0x800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2020-03-20 22:35:10+00:00 |
Version Information (11)
»
Assembly Version | 1.0.0.0 |
Comments | - |
CompanyName | Microsoft |
FileDescription | SSvchost |
FileVersion | 1.0.0.0 |
InternalName | ssvchost.exe |
LegalCopyright | Copyright © Microsoft 2018 |
LegalTrademarks | - |
OriginalFilename | ssvchost.exe |
ProductName | SSvchost |
ProductVersion | 1.0.0.0 |
Sections (3)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x3c20 | 0x3e00 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.24 |
.rsrc | 0x406000 | 0x5d0 | 0x600 | 0x4000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.12 |
.reloc | 0x408000 | 0xc | 0x200 | 0x4600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.08 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x5bf0 | 0x3df0 | 0x0 |
Memory Dumps (27)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
qoay92j30os7vchc.exe | 1 | 0x013C0000 | 0x013C9FFF | Relevant Image |
![]() |
64-bit | - |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410E000 | 0x7FE9410EFFF | First Execution |
![]() |
64-bit | 0x7FE9410E000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9411E000 | 0x7FE9411EFFF | First Execution |
![]() |
64-bit | 0x7FE9411E040 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9412B000 | 0x7FE9412BFFF | First Execution |
![]() |
64-bit | 0x7FE9412B020 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94221000 | 0x7FE94221FFF | First Execution |
![]() |
64-bit | 0x7FE94221030 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94271000 | 0x7FE94271FFF | First Execution |
![]() |
64-bit | 0x7FE94271040 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94272000 | 0x7FE94272FFF | First Execution |
![]() |
64-bit | 0x7FE94272000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94221000 | 0x7FE94221FFF | Content Changed |
![]() |
64-bit | 0x7FE94221333 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94222000 | 0x7FE94223FFF | First Execution |
![]() |
64-bit | 0x7FE94222000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9412B000 | 0x7FE9412BFFF | Content Changed |
![]() |
64-bit | 0x7FE9412B100 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410E000 | 0x7FE9410EFFF | Content Changed |
![]() |
64-bit | 0x7FE9410E6E0 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94222000 | 0x7FE94223FFF | Content Changed |
![]() |
64-bit | 0x7FE94223020 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410E000 | 0x7FE9410EFFF | Content Changed |
![]() |
64-bit | 0x7FE9410E760 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94222000 | 0x7FE94223FFF | Content Changed |
![]() |
64-bit | 0x7FE94223164 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410E000 | 0x7FE9410EFFF | Content Changed |
![]() |
64-bit | 0x7FE9410EA00 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410E000 | 0x7FE9410EFFF | Content Changed |
![]() |
64-bit | 0x7FE9410EAE0 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410E000 | 0x7FE9410EFFF | Content Changed |
![]() |
64-bit | 0x7FE9410E6E0 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94221000 | 0x7FE94221FFF | Content Changed |
![]() |
64-bit | 0x7FE942218D7 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94222000 | 0x7FE94223FFF | Content Changed |
![]() |
64-bit | 0x7FE94223450 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410E000 | 0x7FE9410EFFF | Content Changed |
![]() |
64-bit | 0x7FE9410ECA0 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410E000 | 0x7FE9410EFFF | Content Changed |
![]() |
64-bit | 0x7FE9410EFD0 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94272000 | 0x7FE94272FFF | Content Changed |
![]() |
64-bit | 0x7FE942722A0 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410F000 | 0x7FE9410FFFF | First Execution |
![]() |
64-bit | 0x7FE9410F000 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94271000 | 0x7FE94271FFF | Content Changed |
![]() |
64-bit | 0x7FE94271040 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE9410E000 | 0x7FE9410EFFF | Content Changed |
![]() |
64-bit | 0x7FE9410EA00 |
![]() |
![]() |
...
|
buffer | 1 | 0x7FE94272000 | 0x7FE94272FFF | Content Changed |
![]() |
64-bit | 0x7FE942722A0 |
![]() |
![]() |
...
|
qoay92j30os7vchc.exe | 1 | 0x013C0000 | 0x013C9FFF | Final Dump |
![]() |
64-bit | - |
![]() |
![]() |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Generic.Ransom.Small.773EC97D |
Malicious
|
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
OlympicDestroyer_Gen1 | Olympic Destroyer destructive malware | Worm |
5/5
|
...
|
c:\users\5p5nrgjn0js halpmcxz\appdata\local\gdipfontcachev1.dat | Modified File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\CGMIMP32.CFG.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.EPS.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.JPG.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\MS.PNG.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\Smart Tag\METCONV.TXT.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Decrypt Instructions.txt | Dropped File | Text |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\Stationery\HandPrints.jpg.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\Stationery\Blue_Gradient.jpg.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg.enc | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg.enc | Dropped File | Unknown |
Not Queried
|
...
|
»