Analysis Report OFFER.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Startup |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
Nanocore_RAT_Gen_2 | Detetcs the Nanocore RAT | Florian Roth |
| |
JoeSecurity_Nanocore | Yara detected Nanocore RAT | Joe Security | ||
NanoCore | unknown | Kevin Breen <kevin@techanarchy.net> |
| |
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
Click to see the 1 entries |
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: NanoCore | Show sources |
Source: | Author: Joe Security: |
Sigma detected: Scheduled temp file as task from temp location | Show sources |
Source: | Author: Joe Security: |
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample | Show sources |
Source: | Avira: |
Antivirus detection for dropped file | Show sources |
Source: | Avira: |
Multi AV Scanner detection for dropped file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Yara detected Nanocore RAT | Show sources |
Source: | File source: |
Source: | Code function: |
Networking: |
---|
Uses dynamic DNS services | Show sources |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | DNS traffic detected: |
E-Banking Fraud: |
---|
Yara detected Nanocore RAT | Show sources |
Source: | File source: |
System Summary: |
---|
Malicious sample detected (through community Yara rule) | Show sources |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Code function: | ||
Source: | Code function: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | File read: | Jump to behavior |
Source: | Key opened: |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | File opened: |
Source: | Static PE information: |
Source: | File opened: |
Source: | Static PE information: |
Source: | Binary string: |
Data Obfuscation: |
---|
.NET source code contains potential unpacker | Show sources |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Boot Survival: |
---|
Uses schtasks.exe or at.exe to add and modify task schedules | Show sources |
Source: | Process created: |
Hooking and other Techniques for Hiding and Protection: |
---|
Hides that the sample has been downloaded from the Internet (zone.identifier) | Show sources |
Source: | File opened: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Malware Analysis System Evasion: |
---|
Yara detected AntiVM_3 | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) | Show sources |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | File opened / queried: |
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Window / User API: | ||
Source: | Window / User API: | ||
Source: | Window / User API: |
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: |
Source: | Process token adjusted: | ||
Source: | Process token adjusted: |
Source: | Memory allocated: |
HIPS / PFW / Operating System Protection Evasion: |
---|
Injects a PE file into a foreign processes | Show sources |
Source: | Memory written: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Code function: |
Source: | Key value queried: |
Stealing of Sensitive Information: |
---|
Yara detected Nanocore RAT | Show sources |
Source: | File source: |
Remote Access Functionality: |
---|
Yara detected Nanocore RAT | Show sources |
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scheduled Task/Job1 | Scheduled Task/Job1 | Access Token Manipulation1 | Masquerading1 | OS Credential Dumping | Security Software Discovery211 | Remote Services | Archive Collected Data11 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Process Injection111 | Virtualization/Sandbox Evasion3 | LSASS Memory | Virtualization/Sandbox Evasion3 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Non-Standard Port1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Scheduled Task/Job1 | Disable or Modify Tools1 | Security Account Manager | Process Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Non-Application Layer Protocol1 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Access Token Manipulation1 | NTDS | Application Window Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Application Layer Protocol11 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Process Injection111 | LSA Secrets | Account Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Deobfuscate/Decode Files or Information1 | Cached Domain Credentials | System Owner/User Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Hidden Files and Directories1 | DCSync | File and Directory Discovery1 | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact | |
Drive-by Compromise | Command and Scripting Interpreter | Scheduled Task/Job | Scheduled Task/Job | Obfuscated Files or Information3 | Proc Filesystem | System Information Discovery2 | Shared Webroot | Credential API Hooking | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol | Downgrade to Insecure Protocols | Generate Fraudulent Advertising Revenue | |
Exploit Public-Facing Application | PowerShell | At (Linux) | At (Linux) | Software Packing12 | /etc/passwd and /etc/shadow | System Network Connections Discovery | Software Deployment Tools | Data Staged | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | Web Protocols | Rogue Cellular Base Station | Data Destruction |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
57% | Virustotal | Browse | ||
41% | Metadefender | Browse | ||
69% | ReversingLabs | ByteCode-MSIL.Trojan.AgentTesla | ||
100% | Avira | TR/AD.Nanocore.gzsda |
Dropped Files |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/AD.Nanocore.gzsda | ||
57% | Virustotal | Browse | ||
41% | Metadefender | Browse | ||
69% | ReversingLabs | ByteCode-MSIL.Trojan.AgentTesla |
Unpacked PE Files |
---|
No Antivirus matches |
---|
Domains |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse |
URLs |
---|
No Antivirus matches |
---|
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
udochukwu.ddns.net | 37.18.96.19 | true | true |
| unknown |
Contacted IPs |
---|
General Information |
---|
Joe Sandbox Version: | 31.0.0 Red Diamond |
Analysis ID: | 322137 |
Start date: | 24.11.2020 |
Start time: | 15:27:11 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 24s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | OFFER.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 26 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@6/5@9/2 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
Time | Type | Description |
---|---|---|
15:27:58 | API Interceptor |
Joe Sandbox View / Context |
---|
IPs |
---|
No context |
---|
Domains |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
udochukwu.ddns.net | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
ASN |
---|
No context |
---|
JA3 Fingerprints |
---|
No context |
---|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
Process: | C:\Users\user\Desktop\OFFER.exe |
File Type: | |
Category: | modified |
Size (bytes): | 525 |
Entropy (8bit): | 5.2874233355119316 |
Encrypted: | false |
SSDEEP: | 12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T |
MD5: | 61CCF53571C9ABA6511D696CB0D32E45 |
SHA1: | A13A42A20EC14942F52DB20FB16A0A520F8183CE |
SHA-256: | 3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B |
SHA-512: | 90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Users\user\Desktop\OFFER.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1645 |
Entropy (8bit): | 5.191084760568334 |
Encrypted: | false |
SSDEEP: | 24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBPtn:cbh47TlNQ//rydbz9I3YODOLNdq3T |
MD5: | AB592D06D98D97E7246ACDE4BC6F877E |
SHA1: | 6F407D15DCD33272C9F36A3B60CE18EA287D943D |
SHA-256: | 5F401C9D62E49D3C79957EE747E11E54B09AE2577B37BF3FD8E0F59779E17764 |
SHA-512: | 323FEB7A1596BC5CCC43507EC2D975930D4A35E9D726592570FD27CA47874336CB1743BC9F2E4E0BF4A32FA9605280B27281E373F176AE3762E1F33B50EE5BCD |
Malicious: | true |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\OFFER.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8 |
Entropy (8bit): | 3.0 |
Encrypted: | false |
SSDEEP: | 3:fPn:fP |
MD5: | 94BA71EFD891C3DCB84D299A3569E0DA |
SHA1: | D1377C913F96023629C1A07DB3BF23E0BB5F9005 |
SHA-256: | 30F19B17612845ECB696342C4C9306B80FFCEC7BDC5ABA5DC83A9DA346270990 |
SHA-512: | E82A98D4BB3D4218A77A020B3DF08B6EBD14411C8345EDB9D152B31D3A85098764928DBFE1CA3831A8581FE1F32F15DB0341AD132CCB0AF58B3EDB234A7A5944 |
Malicious: | true |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\OFFER.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 610816 |
Entropy (8bit): | 7.683539798870558 |
Encrypted: | false |
SSDEEP: | 12288:5pV+lmcosZeY2eCbJtTx31jbzNDWMEDBOzuZ2znyo3almjbbLSz9CUo:9cGVF9d1DNDWMYAzuIbyoqlMbPSzbo |
MD5: | F0A3B70A92ECE3204289B3E1E25C9942 |
SHA1: | 5AF0534294C9F5FD1ADA722919EC8583F88F2AC9 |
SHA-256: | 0A09EC08C850081FFB281F5716859D62093A5F772266503CB67D5E49A4ECD4F4 |
SHA-512: | 35E3E2924E5B0CA26CD8D25DD0AF84ED89196EF6B4C7202BA2E18EC1741C030CC7D53C86EF0FCC9A876DC151A38A5AB3979D9B948ADB8C2E1560D3FDD35011E0 |
Malicious: | true |
Antivirus: | |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\OFFER.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.683539798870558 |
TrID: |
|
File name: | OFFER.exe |
File size: | 610816 |
MD5: | f0a3b70a92ece3204289b3e1e25c9942 |
SHA1: | 5af0534294c9f5fd1ada722919ec8583f88f2ac9 |
SHA256: | 0a09ec08c850081ffb281f5716859d62093a5f772266503cb67d5e49a4ecd4f4 |
SHA512: | 35e3e2924e5b0ca26cd8d25dd0af84ed89196ef6b4c7202ba2e18ec1741c030cc7d53c86ef0fcc9a876dc151a38a5ab3979d9b948adb8c2e1560d3fdd35011e0 |
SSDEEP: | 12288:5pV+lmcosZeY2eCbJtTx31jbzNDWMEDBOzuZ2znyo3almjbbLSz9CUo:9cGVF9d1DNDWMYAzuIbyoqlMbPSzbo |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P......D......>+... ...@....@.. ....................................@................................ |
File Icon |
---|
Icon Hash: | 480f0f49194d4520 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x492b3e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE |
DLL Characteristics: | NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x5F990EE4 [Wed Oct 28 06:25:40 2020 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | v2.0.50727 |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Entrypoint Preview |
---|
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x92aec | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x94000 | 0x4178 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x9a000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x90b44 | 0x90c00 | False | 0.811946783247 | data | 7.70065403732 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rsrc | 0x94000 | 0x4178 | 0x4200 | False | 0.340968276515 | data | 4.65497389104 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x9a000 | 0xc | 0x200 | False | 0.044921875 | data | 0.101910425663 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
RT_ICON | 0x94190 | 0x468 | GLS_BINARY_LSB_FIRST | ||
RT_ICON | 0x945f8 | 0x10a8 | dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294967295, next used block 4294967295 | ||
RT_ICON | 0x956a0 | 0x25a8 | dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4294967295, next used block 4294967295 | ||
RT_GROUP_ICON | 0x97c48 | 0x30 | data | ||
RT_VERSION | 0x97c78 | 0x314 | data | ||
RT_MANIFEST | 0x97f8c | 0x1ea | XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators |
Imports |
---|
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Version Infos |
---|
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
LegalCopyright | Copyright 2016 |
Assembly Version | 1.0.0.0 |
InternalName | mQWh.exe |
FileVersion | 1.0.0.0 |
CompanyName | |
LegalTrademarks | |
Comments | |
ProductName | Controlador |
ProductVersion | 1.0.0.0 |
FileDescription | Controlador |
OriginalFilename | mQWh.exe |
Network Behavior |
---|
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2020 15:28:03.778383017 CET | 49711 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:28:06.779992104 CET | 49711 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:28:12.780513048 CET | 49711 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:28:22.446753979 CET | 49717 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:28:25.453433037 CET | 49717 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:28:31.469504118 CET | 49717 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:28:41.136913061 CET | 49729 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:28:44.142489910 CET | 49729 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:28:50.158615112 CET | 49729 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:28:57.892918110 CET | 49734 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:00.893838882 CET | 49734 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:06.910063028 CET | 49734 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:15.128210068 CET | 49739 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:18.129841089 CET | 49739 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:24.146588087 CET | 49739 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:31.857831001 CET | 49742 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:34.865459919 CET | 49742 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:40.881633997 CET | 49742 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:49.063406944 CET | 49743 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:52.069961071 CET | 49743 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:29:58.086153984 CET | 49743 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:30:08.977169037 CET | 49744 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:30:12.102895021 CET | 49744 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:30:18.103403091 CET | 49744 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:30:25.596973896 CET | 49745 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:30:28.604291916 CET | 49745 | 2323 | 192.168.2.3 | 37.18.96.19 |
Nov 24, 2020 15:30:34.620423079 CET | 49745 | 2323 | 192.168.2.3 | 37.18.96.19 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 24, 2020 15:27:53.506155968 CET | 55984 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:27:53.533616066 CET | 53 | 55984 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:27:54.659101963 CET | 64185 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:27:54.686460018 CET | 53 | 64185 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:27:56.442240953 CET | 65110 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:27:56.478300095 CET | 53 | 65110 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:27:57.345671892 CET | 58361 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:27:57.372770071 CET | 53 | 58361 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:27:58.937705994 CET | 63492 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:27:58.964807034 CET | 53 | 63492 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:27:59.964009047 CET | 60831 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:27:59.991353035 CET | 53 | 60831 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:03.718260050 CET | 60100 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:03.764199018 CET | 53 | 60100 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:15.093889952 CET | 53195 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:15.129780054 CET | 53 | 53195 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:16.826072931 CET | 50141 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:16.853127956 CET | 53 | 50141 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:21.401735067 CET | 53023 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:21.429003000 CET | 53 | 53023 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:22.360163927 CET | 49563 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:22.387494087 CET | 53 | 49563 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:22.404793978 CET | 51352 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:22.445501089 CET | 53 | 51352 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:23.165205956 CET | 59349 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:23.200990915 CET | 53 | 59349 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:24.037941933 CET | 57084 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:24.073755980 CET | 53 | 57084 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:25.199189901 CET | 58823 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:25.226290941 CET | 53 | 58823 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:27.783973932 CET | 57568 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:27.821347952 CET | 53 | 57568 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:34.769733906 CET | 50540 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:34.796920061 CET | 53 | 50540 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:35.618417978 CET | 54366 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:35.645675898 CET | 53 | 54366 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:38.654897928 CET | 53034 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:38.681972980 CET | 53 | 53034 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:39.306180000 CET | 57762 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:39.356237888 CET | 53 | 57762 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:39.559573889 CET | 55435 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:39.586956024 CET | 53 | 55435 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:41.097023964 CET | 50713 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:41.134298086 CET | 53 | 50713 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:44.236629963 CET | 56132 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:44.263674021 CET | 53 | 56132 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:55.406728029 CET | 58987 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:55.434057951 CET | 53 | 58987 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:57.856010914 CET | 56579 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:57.891792059 CET | 53 | 56579 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:28:57.897439957 CET | 60633 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:28:57.934497118 CET | 53 | 60633 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:29:15.099493980 CET | 61292 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:29:15.126679897 CET | 53 | 61292 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:29:30.311285019 CET | 63619 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:29:30.338418961 CET | 53 | 63619 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:29:31.783803940 CET | 64938 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:29:31.815838099 CET | 61946 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:29:31.819479942 CET | 53 | 64938 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:29:31.851372004 CET | 53 | 61946 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:29:49.024101973 CET | 64910 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:29:49.059978962 CET | 53 | 64910 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:30:07.586671114 CET | 52123 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:30:07.624885082 CET | 53 | 52123 | 8.8.8.8 | 192.168.2.3 |
Nov 24, 2020 15:30:25.558933020 CET | 56130 | 53 | 192.168.2.3 | 8.8.8.8 |
Nov 24, 2020 15:30:25.596074104 CET | 53 | 56130 | 8.8.8.8 | 192.168.2.3 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Nov 24, 2020 15:28:03.718260050 CET | 192.168.2.3 | 8.8.8.8 | 0x330b | Standard query (0) | A (IP address) | IN (0x0001) | |
Nov 24, 2020 15:28:22.404793978 CET | 192.168.2.3 | 8.8.8.8 | 0x731b | Standard query (0) | A (IP address) | IN (0x0001) | |
Nov 24, 2020 15:28:41.097023964 CET | 192.168.2.3 | 8.8.8.8 | 0xdf3e | Standard query (0) | A (IP address) | IN (0x0001) | |
Nov 24, 2020 15:28:57.856010914 CET | 192.168.2.3 | 8.8.8.8 | 0x7759 | Standard query (0) | A (IP address) | IN (0x0001) | |
Nov 24, 2020 15:29:15.099493980 CET | 192.168.2.3 | 8.8.8.8 | 0xdf0b | Standard query (0) | A (IP address) | IN (0x0001) | |
Nov 24, 2020 15:29:31.815838099 CET | 192.168.2.3 | 8.8.8.8 | 0xe3da | Standard query (0) | A (IP address) | IN (0x0001) | |
Nov 24, 2020 15:29:49.024101973 CET | 192.168.2.3 | 8.8.8.8 | 0x8150 | Standard query (0) | A (IP address) | IN (0x0001) | |
Nov 24, 2020 15:30:07.586671114 CET | 192.168.2.3 | 8.8.8.8 | 0x371e | Standard query (0) | A (IP address) | IN (0x0001) | |
Nov 24, 2020 15:30:25.558933020 CET | 192.168.2.3 | 8.8.8.8 | 0x748e | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Nov 24, 2020 15:28:03.764199018 CET | 8.8.8.8 | 192.168.2.3 | 0x330b | No error (0) | 37.18.96.19 | A (IP address) | IN (0x0001) | ||
Nov 24, 2020 15:28:22.445501089 CET | 8.8.8.8 | 192.168.2.3 | 0x731b | No error (0) | 37.18.96.19 | A (IP address) | IN (0x0001) | ||
Nov 24, 2020 15:28:41.134298086 CET | 8.8.8.8 | 192.168.2.3 | 0xdf3e | No error (0) | 37.18.96.19 | A (IP address) | IN (0x0001) | ||
Nov 24, 2020 15:28:57.891792059 CET | 8.8.8.8 | 192.168.2.3 | 0x7759 | No error (0) | 37.18.96.19 | A (IP address) | IN (0x0001) | ||
Nov 24, 2020 15:29:15.126679897 CET | 8.8.8.8 | 192.168.2.3 | 0xdf0b | No error (0) | 37.18.96.19 | A (IP address) | IN (0x0001) | ||
Nov 24, 2020 15:29:31.851372004 CET | 8.8.8.8 | 192.168.2.3 | 0xe3da | No error (0) | 37.18.96.19 | A (IP address) | IN (0x0001) | ||
Nov 24, 2020 15:29:49.059978962 CET | 8.8.8.8 | 192.168.2.3 | 0x8150 | No error (0) | 37.18.96.19 | A (IP address) | IN (0x0001) | ||
Nov 24, 2020 15:30:07.624885082 CET | 8.8.8.8 | 192.168.2.3 | 0x371e | No error (0) | 37.18.96.19 | A (IP address) | IN (0x0001) | ||
Nov 24, 2020 15:30:25.596074104 CET | 8.8.8.8 | 192.168.2.3 | 0x748e | No error (0) | 37.18.96.19 | A (IP address) | IN (0x0001) |
Code Manipulations |
---|
Statistics |
---|
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 15:27:58 |
Start date: | 24/11/2020 |
Path: | C:\Users\user\Desktop\OFFER.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x720000 |
File size: | 610816 bytes |
MD5 hash: | F0A3B70A92ECE3204289B3E1E25C9942 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Yara matches: |
|
Reputation: | low |
General |
---|
Start time: | 15:28:00 |
Start date: | 24/11/2020 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1390000 |
File size: | 185856 bytes |
MD5 hash: | 15FF7D8324231381BAD48A052F85DF04 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 15:28:00 |
Start date: | 24/11/2020 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6b2800000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 15:28:01 |
Start date: | 24/11/2020 |
Path: | C:\Users\user\Desktop\OFFER.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf90000 |
File size: | 610816 bytes |
MD5 hash: | F0A3B70A92ECE3204289B3E1E25C9942 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Disassembly |
---|
Code Analysis |
---|