Downloader
Mal/Generic-S C2/Generic-A Emotet Mal/HTMLGen-A
Created on 2023-04-21T13:16:39+00:00
{3656F910-4433-438C-BE65-BC03A0BBE048}.wsf
Remarks (2/2)
(0x02000050): This analysis has been updated with the latest reputation and static analysis results from the original analysis with the ID #13672024.
(0x0200000E): The overall sleep time of all monitored processes was truncated from "1 minute" to "10 seconds" to reveal dormant functionality.
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\KEECFM~1\Desktop\{3656F910-4433-438C-BE65-BC03A0BBE048}.wsf | Sample File | Text |
Malicious
|
...
|
Verdict |
Malicious
|
C:\Users\KEECFM~1\Desktop\radF4DF4.tmp.dll | Dropped File | Binary |
Malicious
|
...
|
Verdict |
Malicious
|
Names | Mal/Generic-S |
Image Base | 0x180000000 |
Entry Point | 0x18000179C |
Size Of Code | 0x00014600 |
Size Of Initialized Data | 0x0003A000 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_AMD64 |
Compile Timestamp | 2023-03-10 13:52 (UTC) |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x180001000 | 0x00014415 | 0x00014600 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.39 |
.rdata | 0x180016000 | 0x0000A4B4 | 0x0000A600 | 0x00014A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.75 |
.data | 0x180021000 | 0x00001EA4 | 0x00000C00 | 0x0001F000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.1 |
.pdata | 0x180023000 | 0x000011A0 | 0x00001200 | 0x0001FC00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.89 |
_RDATA | 0x180025000 | 0x0000015C | 0x00000200 | 0x00020E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.8 |
.rsrc | 0x180026000 | 0x0002BD28 | 0x0002BE00 | 0x00021000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x180052000 | 0x00000684 | 0x00000800 | 0x0004CE00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.92 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SetFilePointerEx | - | 0x180016038 | 0x0001FA00 | 0x0001E400 | 0x00000555 |
GetConsoleMode | - | 0x180016040 | 0x0001FA08 | 0x0001E408 | 0x00000216 |
GetConsoleOutputCP | - | 0x180016048 | 0x0001FA10 | 0x0001E410 | 0x0000021A |
WriteFile | - | 0x180016050 | 0x0001FA18 | 0x0001E418 | 0x0000064B |
FlushFileBuffers | - | 0x180016058 | 0x0001FA20 | 0x0001E420 | 0x000001B9 |
SetStdHandle | - | 0x180016060 | 0x0001FA28 | 0x0001E428 | 0x0000057F |
HeapSize | - | 0x180016068 | 0x0001FA30 | 0x0001E430 | 0x00000375 |
GetStringTypeW | - | 0x180016070 | 0x0001FA38 | 0x0001E438 | 0x000002F8 |
GetFileType | - | 0x180016078 | 0x0001FA40 | 0x0001E440 | 0x0000026A |
GetStdHandle | - | 0x180016080 | 0x0001FA48 | 0x0001E448 | 0x000002F3 |
GetProcessHeap | - | 0x180016088 | 0x0001FA50 | 0x0001E450 | 0x000002D4 |
CreateFileW | - | 0x180016090 | 0x0001FA58 | 0x0001E458 | 0x000000DA |
CloseHandle | - | 0x180016098 | 0x0001FA60 | 0x0001E460 | 0x00000094 |
WriteConsoleW | - | 0x1800160A0 | 0x0001FA68 | 0x0001E468 | 0x0000064A |
ExitProcess | - | 0x1800160A8 | 0x0001FA70 | 0x0001E470 | 0x00000178 |
HeapReAlloc | - | 0x1800160B0 | 0x0001FA78 | 0x0001E478 | 0x00000373 |
GetLastError | - | 0x1800160B8 | 0x0001FA80 | 0x0001E480 | 0x0000027D |
LCMapStringW | - | 0x1800160C0 | 0x0001FA88 | 0x0001E488 | 0x000003D4 |
FlsFree | - | 0x1800160C8 | 0x0001FA90 | 0x0001E490 | 0x000001B5 |
FlsSetValue | - | 0x1800160D0 | 0x0001FA98 | 0x0001E498 | 0x000001B7 |
FlsGetValue | - | 0x1800160D8 | 0x0001FAA0 | 0x0001E4A0 | 0x000001B6 |
FlsAlloc | - | 0x1800160E0 | 0x0001FAA8 | 0x0001E4A8 | 0x000001B4 |
UnhandledExceptionFilter | - | 0x1800160E8 | 0x0001FAB0 | 0x0001E4B0 | 0x000005E6 |
SetUnhandledExceptionFilter | - | 0x1800160F0 | 0x0001FAB8 | 0x0001E4B8 | 0x000005A4 |
GetCurrentProcess | - | 0x1800160F8 | 0x0001FAC0 | 0x0001E4C0 | 0x00000232 |
TerminateProcess | - | 0x180016100 | 0x0001FAC8 | 0x0001E4C8 | 0x000005C4 |
IsProcessorFeaturePresent | - | 0x180016108 | 0x0001FAD0 | 0x0001E4D0 | 0x000003A8 |
IsDebuggerPresent | - | 0x180016110 | 0x0001FAD8 | 0x0001E4D8 | 0x000003A0 |
GetStartupInfoW | - | 0x180016118 | 0x0001FAE0 | 0x0001E4E0 | 0x000002F1 |
GetModuleHandleW | - | 0x180016120 | 0x0001FAE8 | 0x0001E4E8 | 0x00000295 |
QueryPerformanceCounter | - | 0x180016128 | 0x0001FAF0 | 0x0001E4F0 | 0x00000470 |
GetCurrentProcessId | - | 0x180016130 | 0x0001FAF8 | 0x0001E4F8 | 0x00000233 |
GetCurrentThreadId | - | 0x180016138 | 0x0001FB00 | 0x0001E500 | 0x00000237 |
GetSystemTimeAsFileTime | - | 0x180016140 | 0x0001FB08 | 0x0001E508 | 0x0000030A |
InitializeSListHead | - | 0x180016148 | 0x0001FB10 | 0x0001E510 | 0x0000038A |
RtlUnwindEx | - | 0x180016150 | 0x0001FB18 | 0x0001E518 | 0x00000503 |
InterlockedFlushSList | - | 0x180016158 | 0x0001FB20 | 0x0001E520 | 0x0000038E |
SetLastError | - | 0x180016160 | 0x0001FB28 | 0x0001E528 | 0x00000564 |
EncodePointer | - | 0x180016168 | 0x0001FB30 | 0x0001E530 | 0x00000145 |
RaiseException | - | 0x180016170 | 0x0001FB38 | 0x0001E538 | 0x00000487 |
EnterCriticalSection | - | 0x180016178 | 0x0001FB40 | 0x0001E540 | 0x00000149 |
LeaveCriticalSection | - | 0x180016180 | 0x0001FB48 | 0x0001E548 | 0x000003E0 |
DeleteCriticalSection | - | 0x180016188 | 0x0001FB50 | 0x0001E550 | 0x00000123 |
InitializeCriticalSectionAndSpinCount | - | 0x180016190 | 0x0001FB58 | 0x0001E558 | 0x00000386 |
TlsAlloc | - | 0x180016198 | 0x0001FB60 | 0x0001E560 | 0x000005D6 |
TlsGetValue | - | 0x1800161A0 | 0x0001FB68 | 0x0001E568 | 0x000005D8 |
TlsSetValue | - | 0x1800161A8 | 0x0001FB70 | 0x0001E570 | 0x000005D9 |
TlsFree | - | 0x1800161B0 | 0x0001FB78 | 0x0001E578 | 0x000005D7 |
FreeLibrary | - | 0x1800161B8 | 0x0001FB80 | 0x0001E580 | 0x000001C5 |
GetProcAddress | - | 0x1800161C0 | 0x0001FB88 | 0x0001E588 | 0x000002CD |
LoadLibraryExW | - | 0x1800161C8 | 0x0001FB90 | 0x0001E590 | 0x000003E6 |
RtlPcToFileHeader | - | 0x1800161D0 | 0x0001FB98 | 0x0001E598 | 0x000004FF |
GetModuleHandleExW | - | 0x1800161D8 | 0x0001FBA0 | 0x0001E5A0 | 0x00000294 |
GetModuleFileNameW | - | 0x1800161E0 | 0x0001FBA8 | 0x0001E5A8 | 0x00000291 |
HeapAlloc | - | 0x1800161E8 | 0x0001FBB0 | 0x0001E5B0 | 0x0000036C |
HeapFree | - | 0x1800161F0 | 0x0001FBB8 | 0x0001E5B8 | 0x00000370 |
FindClose | - | 0x1800161F8 | 0x0001FBC0 | 0x0001E5C0 | 0x0000018F |
FindFirstFileExW | - | 0x180016200 | 0x0001FBC8 | 0x0001E5C8 | 0x00000195 |
FindNextFileW | - | 0x180016208 | 0x0001FBD0 | 0x0001E5D0 | 0x000001A6 |
IsValidCodePage | - | 0x180016210 | 0x0001FBD8 | 0x0001E5D8 | 0x000003AE |
GetACP | - | 0x180016218 | 0x0001FBE0 | 0x0001E5E0 | 0x000001CC |
GetOEMCP | - | 0x180016220 | 0x0001FBE8 | 0x0001E5E8 | 0x000002B6 |
GetCPInfo | - | 0x180016228 | 0x0001FBF0 | 0x0001E5F0 | 0x000001DB |
GetCommandLineA | - | 0x180016230 | 0x0001FBF8 | 0x0001E5F8 | 0x000001F0 |
GetCommandLineW | - | 0x180016238 | 0x0001FC00 | 0x0001E600 | 0x000001F1 |
MultiByteToWideChar | - | 0x180016240 | 0x0001FC08 | 0x0001E608 | 0x00000412 |
WideCharToMultiByte | - | 0x180016248 | 0x0001FC10 | 0x0001E610 | 0x00000637 |
GetEnvironmentStringsW | - | 0x180016250 | 0x0001FC18 | 0x0001E618 | 0x00000253 |
FreeEnvironmentStringsW | - | 0x180016258 | 0x0001FC20 | 0x0001E620 | 0x000001C4 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetGestureInfo | - | 0x180016268 | 0x0001FC30 | 0x0001E630 | 0x0000015E |
InvalidateRect | - | 0x180016270 | 0x0001FC38 | 0x0001E638 | 0x00000224 |
ScreenToClient | - | 0x180016278 | 0x0001FC40 | 0x0001E640 | 0x0000030C |
CloseGestureInfoHandle | - | 0x180016280 | 0x0001FC48 | 0x0001E648 | 0x00000051 |
EndPaint | - | 0x180016288 | 0x0001FC50 | 0x0001E650 | 0x000000F4 |
BeginPaint | - | 0x180016290 | 0x0001FC58 | 0x0001E658 | 0x00000011 |
UpdateWindow | - | 0x180016298 | 0x0001FC60 | 0x0001E660 | 0x000003D0 |
PostQuitMessage | - | 0x1800162A0 | 0x0001FC68 | 0x0001E668 | 0x000002AF |
LoadCursorW | - | 0x1800162A8 | 0x0001FC70 | 0x0001E670 | 0x00000259 |
GetMessageW | - | 0x1800162B0 | 0x0001FC78 | 0x0001E678 | 0x0000018B |
DefWindowProcW | - | 0x1800162B8 | 0x0001FC80 | 0x0001E680 | 0x000000A7 |
DestroyWindow | - | 0x1800162C0 | 0x0001FC88 | 0x0001E688 | 0x000000B5 |
CreateWindowExW | - | 0x1800162C8 | 0x0001FC90 | 0x0001E690 | 0x00000076 |
RegisterClassExW | - | 0x1800162D0 | 0x0001FC98 | 0x0001E698 | 0x000002DF |
LoadStringW | - | 0x1800162D8 | 0x0001FCA0 | 0x0001E6A0 | 0x00000268 |
ShowWindow | - | 0x1800162E0 | 0x0001FCA8 | 0x0001E6A8 | 0x00000396 |
DispatchMessageW | - | 0x1800162E8 | 0x0001FCB0 | 0x0001E6B0 | 0x000000BD |
SetGestureConfig | - | 0x1800162F0 | 0x0001FCB8 | 0x0001E6B8 | 0x0000033F |
TranslateAcceleratorW | - | 0x1800162F8 | 0x0001FCC0 | 0x0001E6C0 | 0x000003B4 |
TranslateMessage | - | 0x180016300 | 0x0001FCC8 | 0x0001E6C8 | 0x000003B6 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
Polyline | - | 0x180016000 | 0x0001F9C8 | 0x0001E3C8 | 0x0000032A |
LineTo | - | 0x180016008 | 0x0001F9D0 | 0x0001E3D0 | 0x000002F9 |
CreatePen | - | 0x180016010 | 0x0001F9D8 | 0x0001E3D8 | 0x0000004F |
MoveToEx | - | 0x180016018 | 0x0001F9E0 | 0x0001E3E0 | 0x0000030D |
DeleteObject | - | 0x180016020 | 0x0001F9E8 | 0x0001E3E8 | 0x0000018F |
SelectObject | - | 0x180016028 | 0x0001F9F0 | 0x0001E3F0 | 0x00000374 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
NtQueueApcThread | - | 0x180016310 | 0x0001FCD8 | 0x0001E6D8 | 0x0000020F |
ZwOpenSymbolicLinkObject | - | 0x180016318 | 0x0001FCE0 | 0x0001E6E0 | 0x00000812 |
LdrFindResource_U | - | 0x180016320 | 0x0001FCE8 | 0x0001E6E8 | 0x00000074 |
NtAllocateVirtualMemory | - | 0x180016328 | 0x0001FCF0 | 0x0001E6F0 | 0x000000D9 |
NtTestAlert | - | 0x180016330 | 0x0001FCF8 | 0x0001E6F8 | 0x00000286 |
LdrAccessResource | - | 0x180016338 | 0x0001FD00 | 0x0001E700 | 0x00000064 |
RtlCaptureContext | - | 0x180016340 | 0x0001FD08 | 0x0001E708 | 0x00000305 |
RtlLookupFunctionEntry | - | 0x180016348 | 0x0001FD10 | 0x0001E710 | 0x00000509 |
RtlVirtualUnwind | - | 0x180016350 | 0x0001FD18 | 0x0001E718 | 0x0000064E |
API Name | EAT Address | Ordinal |
---|---|---|
DllRegisterServer | 0x00010A70 | 0x00000001 |
C:\Users\KEECFM~1\Desktop\rad5FFE2.tmp.dll | Downloaded File | HTML |
Clean
|
...
|