Loading ...

Play interactive tourEdit tour

Analysis Report K8nV75e45o

Overview

General Information

Sample Name:K8nV75e45o (renamed file extension from none to exe)
Analysis ID:376941
MD5:b4bd8726c7a17ed5d3e99069a8e5872c
SHA1:5f69352894ed9a03ad1aac338605e823802545ee
SHA256:fdaba3f0e49475409607ec915599d216ef30351eb34e6c52716a74921285c994
Tags:uncategorized
Infos:

Most interesting Screenshot:

Detection

ZeusVM
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected ZeusVM e-Banking Trojan
Multi AV Scanner detection for submitted file
Contains VNC / remote desktop functionality (version string found)
Machine Learning detection for sample
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
May initialize a security null descriptor
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • K8nV75e45o.exe (PID: 3924 cmdline: 'C:\Users\user\Desktop\K8nV75e45o.exe' MD5: B4BD8726C7A17ED5D3E99069A8E5872C)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: K8nV75e45o.exeAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: K8nV75e45o.exeVirustotal: Detection: 90%Perma Link
Source: K8nV75e45o.exeMetadefender: Detection: 89%Perma Link
Source: K8nV75e45o.exeReversingLabs: Detection: 96%
Machine Learning detection for sampleShow sources
Source: K8nV75e45o.exeJoe Sandbox ML: detected
Source: 0.2.K8nV75e45o.exe.400000.0.unpackAvira: Label: TR/Kazy.MK
Source: 0.0.K8nV75e45o.exe.400000.0.unpackAvira: Label: TR/Kazy.MK
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00412C9A CryptUnprotectData,LocalFree,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_004176C6 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,
Source: K8nV75e45o.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040EECB GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0041BA9D FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0041BB58 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0041201E InternetReadFileExA,
Source: K8nV75e45o.exeString found in binary or memory: http://www.google.com/webhp
Source: K8nV75e45o.exeString found in binary or memory: http://www.google.com/webhpbc.exe-f
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_004098BE NtCreateUserProcess,NtCreateThread,LdrLoadDll,GetFileAttributesExW,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,OpenInputDesktop,SwitchDesktop,DefWindowProcW,DefWindowProcA,DefDlgProcW,DefDlgProcA,DefFrameProcW,DefFrameProcA,DefMDIChildProcW,DefMDIChildProcA,CallWindowProcW,CallWindowProcA,RegisterClassW,RegisterClassA,RegisterClassExW,RegisterClassExA,BeginPaint,EndPaint,GetDCEx,GetDC,GetWindowDC,ReleaseDC,GetUpdateRect,GetUpdateRgn,GetMessagePos,GetCursorPos,SetCursorPos,SetCapture,ReleaseCapture,GetCapture,GetMessageW,GetMessageA,PeekMessageW,PeekMessageA,TranslateMessage,GetClipboardData,PFXImportCertStore,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0041618F EnterCriticalSection,GetTickCount,LeaveCriticalSection,GetKeyboardState,ToUnicode,TranslateMessage,

E-Banking Fraud:

barindex
Detected ZeusVM e-Banking TrojanShow sources
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0041D159 lstrcmpiA,lstrcmpiA,lstrcmpiA,CloseHandle,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00405A43 OpenWindowStationW,CreateWindowStationW,GetProcessWindowStation,OpenDesktopW,CreateDesktopW,GetCurrentThreadId,GetThreadDesktop,SetThreadDesktop,CloseDesktop,CloseWindowStation,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_004098BE NtCreateUserProcess,NtCreateThread,LdrLoadDll,GetFileAttributesExW,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,OpenInputDesktop,SwitchDesktop,DefWindowProcW,DefWindowProcA,DefDlgProcW,DefDlgProcA,DefFrameProcW,DefFrameProcA,DefMDIChildProcW,DefMDIChildProcA,CallWindowProcW,CallWindowProcA,RegisterClassW,RegisterClassA,RegisterClassExW,RegisterClassExA,BeginPaint,EndPaint,GetDCEx,GetDC,GetWindowDC,ReleaseDC,GetUpdateRect,GetUpdateRgn,GetMessagePos,GetCursorPos,SetCursorPos,SetCapture,ReleaseCapture,GetCapture,GetMessageW,GetMessageA,PeekMessageW,PeekMessageA,TranslateMessage,GetClipboardData,PFXImportCertStore,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00412245 NtQueryInformationProcess,CloseHandle,NtCreateThread,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_004122FC NtCreateUserProcess,GetProcessId,GetThreadContext,SetThreadContext,VirtualFreeEx,CloseHandle,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00417D43 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040BA8F InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00406F85 CreateMutexW,GetLastError,CloseHandle,CloseHandle,ExitWindowsEx,OpenEventW,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,ReadProcessMemory,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00419174
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_004175D2
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_004021F3
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040AE91
Source: K8nV75e45o.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: classification engineClassification label: mal72.bank.troj.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040C0B2 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040C227 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00417AED GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00417A96 CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0041C8C2 CoCreateInstance,VariantInit,SysAllocString,VariantClear,
Source: K8nV75e45o.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\K8nV75e45o.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: K8nV75e45o.exeVirustotal: Detection: 90%
Source: K8nV75e45o.exeMetadefender: Detection: 89%
Source: K8nV75e45o.exeReversingLabs: Detection: 96%
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00418469 LoadLibraryA,GetProcAddress,FreeLibrary,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040247D push es; iretd
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00402B49 push cs; iretd
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00402B13 push cs; ret
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040F20F LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0041BA9D FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0041BB58 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00412425 LdrLoadDll,LdrGetDllHandle,LdrLoadDll,EnterCriticalSection,lstrcmpiW,LeaveCriticalSection,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00418469 LoadLibraryA,GetProcAddress,FreeLibrary,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00406015 mov edx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040635A GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,HeapCreate,GetProcessHeap,InitializeCriticalSection,WSAStartup,CreateEventW,GetLengthSid,GetCurrentProcessId,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00419A10 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,LocalFree,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040C0B2 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040C056 GetUserNameExW,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0041654B GetTimeZoneInformation,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_0040745C GetVersionExW,GetNativeSystemInfo,
Source: K8nV75e45o.exeBinary or memory string: S:(ML;;NRNWNX;;;LW)

Remote Access Functionality:

barindex
Contains VNC / remote desktop functionality (version string found)Show sources
Source: K8nV75e45o.exeString found in binary or memory: RFB 003.003
Source: K8nV75e45o.exeString found in binary or memory: RFB 003.003
Source: K8nV75e45o.exe, 00000000.00000000.202422865.0000000000401000.00000020.00020000.sdmpString found in binary or memory: $GetProcAddressLoadLibraryANtCreateThreadNtCreateUserProcessNtQueryInformationProcessRtlUserThreadStartLdrLoadDllLdrGetDllHandleSOFTWARE\Microsoft.dat0xB268B1AD#SysListView32MDIClientCiceroUIWndFrameConsoleWindowClass#32768SysShadowFIXME-vnspr4.dllPR_OpenTCPSocketPR_ClosePR_ReadPR_WriteRFB 003.003
Source: K8nV75e45o.exeString found in binary or memory: RFB 003.003
Source: K8nV75e45o.exeString found in binary or memory: $GetProcAddressLoadLibraryANtCreateThreadNtCreateUserProcessNtQueryInformationProcessRtlUserThreadStartLdrLoadDllLdrGetDllHandleSOFTWARE\Microsoft.dat0xB268B1AD#SysListView32MDIClientCiceroUIWndFrameConsoleWindowClass#32768SysShadowFIXME-vnspr4.dllPR_OpenTCPSocketPR_ClosePR_ReadPR_WriteRFB 003.003
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00419841 socket,bind,closesocket,
Source: C:\Users\user\Desktop\K8nV75e45o.exeCode function: 0_2_00419563 socket,bind,listen,closesocket,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1Native API1Create Account1Valid Accounts1Valid Accounts1Input Capture11Network Share Discovery1Remote Desktop Protocol1Input Capture11Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsScheduled Task/JobValid Accounts1Access Token Manipulation11Access Token Manipulation11LSASS MemorySystem Time Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Application Shimming1Application Shimming1Obfuscated Files or Information1Security Account ManagerSecurity Software Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Install Root Certificate1NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
K8nV75e45o.exe90%VirustotalBrowse
K8nV75e45o.exe92%MetadefenderBrowse
K8nV75e45o.exe97%ReversingLabsWin32.Trojan.Zeus
K8nV75e45o.exe100%AviraTR/Kazy.MK
K8nV75e45o.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.2.K8nV75e45o.exe.400000.0.unpack100%AviraTR/Kazy.MKDownload File
0.0.K8nV75e45o.exe.400000.0.unpack100%AviraTR/Kazy.MKDownload File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:376941
Start date:28.03.2021
Start time:03:46:20
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 21s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:K8nV75e45o (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal72.bank.troj.winEXE@1/0@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 99.6% (good quality ratio 91.6%)
  • Quality average: 82.5%
  • Quality standard deviation: 30.1%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Stop behavior analysis, all processes terminated

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:MS-DOS executable
Entropy (8bit):6.67054852527874
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.94%
  • DOS Executable Borland Pascal 7.0x (2037/25) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • VXD Driver (31/22) 0.00%
File name:K8nV75e45o.exe
File size:141824
MD5:b4bd8726c7a17ed5d3e99069a8e5872c
SHA1:5f69352894ed9a03ad1aac338605e823802545ee
SHA256:fdaba3f0e49475409607ec915599d216ef30351eb34e6c52716a74921285c994
SHA512:cf1ca96b4913b62af6169183904446cfe568e357003873d0a58cc9363a6bde2d2ea538a7aa56d30674b25531803bf77ff3944ebea4a0e129e5c15bf4216fcf52
SSDEEP:3072:nQuqviK2I7eGKyQCYxyoAIdA71BSFR5JD3AIP2+MDxIQeo:n9qKKFeG5oAPhBSFbJD3VPZQv
File Content Preview:MZ......................................................................................................................................................................................................................PE..L...u.KN.....................:.....

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x40728b
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
Time Stamp:0x4E4B9075 [Wed Aug 17 09:57:09 2011 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:28e141e08402af84d2753cccce4d826e

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
sub esp, 10h
push ebx
push 00000000h
xor bl, bl
call 00007F1014DEF594h
test al, al
je 00007F1014DF05AAh
push 00008007h
mov byte ptr [ebp-10h], bl
mov byte ptr [ebp-0Ch], 00000001h
mov byte ptr [ebp-01h], bl
call dword ptr [0040126Ch]
lea eax, dword ptr [ebp-08h]
push eax
call dword ptr [00401270h]
push eax
call dword ptr [004012C4h]
test eax, eax
je 00007F1014DF0557h
xor edx, edx
cmp dword ptr [ebp-08h], edx
jle 00007F1014DF0511h
mov ecx, dword ptr [eax+edx*4]
test ecx, ecx
je 00007F1014DF0504h
cmp word ptr [ecx], 002Dh
jne 00007F1014DF04FEh
movzx ecx, word ptr [ecx+02h]
cmp ecx, 66h
je 00007F1014DF04F1h
cmp ecx, 69h
je 00007F1014DF04E8h
cmp ecx, 6Eh
je 00007F1014DF04DDh
cmp ecx, 76h
jne 00007F1014DF04E6h
mov byte ptr [ebp-01h], 00000001h
jmp 00007F1014DF04E0h
mov byte ptr [ebp-0Ch], 00000000h
jmp 00007F1014DF04DAh
mov bl, 01h
jmp 00007F1014DF04D6h
mov byte ptr [ebp-10h], 00000001h
inc edx
cmp edx, dword ptr [ebp-08h]
jl 00007F1014DF0493h
push eax
call dword ptr [00401230h]
test bl, bl
je 00007F1014DF04D9h
call 00007F1014DEFF45h
jmp 00007F1014DF0506h
cmp byte ptr [ebp-01h], 00000000h
je 00007F1014DF04F5h
call 00007F1014DF1631h
call 00007F1014DF25F9h
test byte ptr [00422940h], 00000004h
mov bl, al
je 00007F1014DF04EDh
push 00000000h
mov eax, 00422E10h
call 00007F1014DF148Eh
jmp 00007F1014DF04DFh

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1f7840x118.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x250000x11ac.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x10000x5a0.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x206640x20800False0.641323617788data6.69796313177IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x220000x20540x400False0.208984375data1.60912793454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.reloc0x250000x166a0x1800False0.6220703125data5.63175186351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Imports

DLLImport
KERNEL32.dllCreateThread, GetLastError, GetThreadContext, SetThreadContext, VirtualAlloc, GetProcessId, GlobalLock, GlobalUnlock, GetEnvironmentVariableW, FileTimeToDosDateTime, GetTempFileNameW, HeapReAlloc, FindFirstFileW, SetEndOfFile, CreateProcessW, HeapAlloc, SystemTimeToFileTime, SetFilePointerEx, HeapFree, GetProcessHeap, IsBadReadPtr, SetFileTime, VirtualQueryEx, OpenProcess, Thread32First, WideCharToMultiByte, ReadProcessMemory, CreateFileMappingW, HeapDestroy, Thread32Next, ReadFile, GetTimeZoneInformation, MultiByteToWideChar, GetTempPathW, GetFileSizeEx, OpenMutexW, VirtualProtectEx, VirtualAllocEx, FindClose, RemoveDirectoryW, FindNextFileW, VirtualProtect, CreateToolhelp32Snapshot, GetFileTime, FileTimeToLocalFileTime, GetVolumeNameForVolumeMountPointW, DeleteFileW, GetFileInformationByHandle, CreateRemoteThread, Process32FirstW, Process32NextW, SetThreadPriority, GetCurrentThread, GetLocalTime, LoadLibraryA, SetFileAttributesW, WTSGetActiveConsoleSessionId, lstrcmpiA, LoadLibraryW, CreateDirectoryW, FreeLibrary, EnterCriticalSection, UnmapViewOfFile, MapViewOfFile, GetPrivateProfileIntW, FlushFileBuffers, CreateFileW, LeaveCriticalSection, InitializeCriticalSection, WriteFile, GetPrivateProfileStringW, GetSystemTime, ExpandEnvironmentStringsW, ResetEvent, TerminateProcess, TlsSetValue, TlsGetValue, TlsFree, HeapCreate, TlsAlloc, CreateMutexW, ReleaseMutex, SetLastError, GetNativeSystemInfo, WriteProcessMemory, LocalFree, GetCurrentProcessId, CloseHandle, DuplicateHandle, OpenEventW, GetFileAttributesExW, WaitForMultipleObjects, CreateEventW, GetProcAddress, GetVersionExW, VirtualFreeEx, VirtualFree, GetModuleHandleW, SetEvent, GetComputerNameW, SetErrorMode, GetCommandLineW, ExitProcess, GetCurrentThreadId, GetUserDefaultUILanguage, lstrcmpiW, GetModuleFileNameW, GetFileAttributesW, Sleep, GetTickCount, WaitForSingleObject, MoveFileExW
USER32.dllGetMenu, RegisterClassExW, GetMenuItemRect, TrackPopupMenuEx, SystemParametersInfoW, GetClassNameW, ReleaseDC, GetMenuState, DefWindowProcA, DefMDIChildProcW, SwitchDesktop, GetMenuItemCount, DefDlgProcA, PostThreadMessageW, DefMDIChildProcA, HiliteMenuItem, RegisterClassW, GetDC, EndMenu, CallWindowProcW, DefWindowProcW, DefFrameProcW, RegisterClassA, GetShellWindow, GetMessageA, GetWindowDC, GetMessageW, SetCapture, PostMessageW, GetParent, GetWindowInfo, CharLowerBuffA, GetUpdateRgn, GetTopWindow, LoadImageW, MsgWaitForMultipleObjects, WindowFromPoint, CharLowerA, CharUpperW, SetWindowLongW, GetWindow, DispatchMessageW, GetKeyboardState, ToUnicode, MapVirtualKeyW, DrawIcon, GetIconInfo, CharToOemW, CharLowerW, GetSystemMetrics, TranslateMessage, GetClipboardData, FillRect, DrawEdge, OpenInputDesktop, BeginPaint, EndPaint, CallWindowProcA, GetUpdateRect, MenuItemFromPoint, GetDCEx, EqualRect, OpenWindowStationW, GetUserObjectInformationW, PrintWindow, RegisterClassExA, RegisterWindowMessageW, GetMenuItemID, GetClassLongW, GetCapture, SetCursorPos, GetWindowLongW, GetAncestor, PeekMessageW, PeekMessageA, SetWindowPos, GetCursorPos, SendMessageTimeoutW, IsWindow, ReleaseCapture, SendMessageW, MapWindowPoints, GetMessagePos, GetWindowThreadProcessId, IsRectEmpty, ExitWindowsEx, SetKeyboardState, GetSubMenu, DefDlgProcW, DefFrameProcA, GetWindowRect, SetThreadDesktop, CloseDesktop, OpenDesktopW, GetProcessWindowStation, CreateWindowStationW, CloseWindowStation, GetThreadDesktop, SetProcessWindowStation, CreateDesktopW, IntersectRect
ADVAPI32.dllIsWellKnownSid, GetLengthSid, ConvertSidToStringSidW, InitiateSystemShutdownExW, EqualSid, RegOpenKeyExW, RegEnumKeyExW, RegCloseKey, CryptGetHashParam, OpenProcessToken, GetSidSubAuthority, CryptAcquireContextW, OpenThreadToken, GetSidSubAuthorityCount, GetTokenInformation, RegCreateKeyExW, CryptReleaseContext, RegQueryValueExW, CreateProcessAsUserW, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, SetNamedSecurityInfoW, LookupPrivilegeValueW, CryptCreateHash, ConvertStringSecurityDescriptorToSecurityDescriptorW, GetSecurityDescriptorSacl, SetSecurityDescriptorSacl, CryptDestroyHash, AdjustTokenPrivileges, RegSetValueExW, CryptHashData
SHLWAPI.dllPathIsURLW, PathRenameExtensionW, wvnsprintfA, StrCmpNIA, PathMatchSpecW, PathUnquoteSpacesW, PathAddExtensionW, PathCombineW, SHDeleteKeyW, PathSkipRootW, SHDeleteValueW, PathAddBackslashW, PathFindFileNameW, PathIsDirectoryW, wvnsprintfW, UrlUnescapeA, PathQuoteSpacesW, StrStrIW, StrStrIA, StrCmpNIW, PathRemoveBackslashW, PathRemoveFileSpecW
SHELL32.dllCommandLineToArgvW, SHGetFolderPathW, ShellExecuteW
Secur32.dllGetUserNameExW
ole32.dllStringFromGUID2, CLSIDFromString, CoUninitialize, CoCreateInstance, CoInitializeEx
GDI32.dllSetViewportOrgEx, GdiFlush, CreateDIBSection, SetRectRgn, SaveDC, RestoreDC, DeleteDC, GetDeviceCaps, DeleteObject, SelectObject, GetDIBits, CreateCompatibleBitmap, CreateCompatibleDC
WS2_32.dllrecv, sendto, getsockname, select, getaddrinfo, recvfrom, getpeername, accept, WSAEventSelect, WSAIoctl, connect, WSAAddressToStringW, WSAStartup, shutdown, setsockopt, bind, socket, WSASetLastError, listen, freeaddrinfo, WSAGetLastError, WSASend, closesocket, send
CRYPT32.dllPFXExportCertStoreEx, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertCloseStore, CertOpenSystemStoreW, CertDeleteCertificateFromStore, PFXImportCertStore, CryptUnprotectData
WININET.dllInternetQueryOptionA, InternetSetOptionA, InternetQueryOptionW, HttpAddRequestHeadersW, InternetSetStatusCallbackW, GetUrlCacheEntryInfoW, InternetOpenA, HttpAddRequestHeadersA, HttpOpenRequestA, InternetCrackUrlA, InternetConnectA, HttpSendRequestA, HttpSendRequestW, InternetReadFile, InternetReadFileExA, InternetQueryDataAvailable, HttpSendRequestExW, HttpQueryInfoA, HttpSendRequestExA, InternetCloseHandle
OLEAUT32.dllVariantInit, SysAllocString, VariantClear, SysFreeString
NETAPI32.dllNetApiBufferFree, NetUserEnum, NetUserGetInfo

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

General

Start time:03:47:07
Start date:28/03/2021
Path:C:\Users\user\Desktop\K8nV75e45o.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\K8nV75e45o.exe'
Imagebase:0x400000
File size:141824 bytes
MD5 hash:B4BD8726C7A17ED5D3E99069A8E5872C
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >