Loading ...

Play interactive tourEdit tour

Analysis Report vovy0jYEM7

Overview

General Information

Sample Name:vovy0jYEM7 (renamed file extension from none to exe)
Analysis ID:376942
MD5:ac98d2d71f3a4998abe80dd6e0695fba
SHA1:76b5d3fd16c3e761022ebd7f3f5fc34f022fcc04
SHA256:98d33cf483b14fbdab3a470a9452bcea672da54da1131330babcbb40572719e8
Tags:uncategorized
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Contains functionality to detect sleep reduction / modifications
Machine Learning detection for sample
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
May check if the current machine is a sandbox (GetTickCount - Sleep)
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • vovy0jYEM7.exe (PID: 6588 cmdline: 'C:\Users\user\Desktop\vovy0jYEM7.exe' MD5: AC98D2D71F3A4998ABE80DD6E0695FBA)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: vovy0jYEM7.exeAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: vovy0jYEM7.exeVirustotal: Detection: 89%Perma Link
Source: vovy0jYEM7.exeReversingLabs: Detection: 96%
Machine Learning detection for sampleShow sources
Source: vovy0jYEM7.exeJoe Sandbox ML: detected
Source: 0.2.vovy0jYEM7.exe.400000.0.unpackAvira: Label: TR/Kazy.MK
Source: 0.0.vovy0jYEM7.exe.400000.0.unpackAvira: Label: TR/Kazy.MK
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040F4DA CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00418EF0 CryptUnprotectData,LocalFree,
Source: vovy0jYEM7.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041D2D2 GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00413951 FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00413A0C FindFirstFileW,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041676F ReadFile,CloseHandle,CloseHandle,PathIsDirectoryW,CreateFileW,FindFirstFileW,FindClose,SetFilePointerEx,GetFileTime,FileTimeToSystemTime,wsprintfW,CloseHandle,ShellExecuteW,GetLastError,MoveFileW,GetLastError,PathIsDirectoryW,CreateDirectoryW,GetLastError,FindFirstFileW,FileTimeToSystemTime,wsprintfW,FindNextFileW,FindClose,GetLogicalDriveStringsA,GetDriveTypeA,WriteFile,GetLastError,GetTempPathW,CreateFileW,SetFilePointerEx,GetLastError,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041BB83 PathCombineW,PathIsDirectoryW,FindFirstFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041676F ReadFile,CloseHandle,CloseHandle,PathIsDirectoryW,CreateFileW,FindFirstFileW,FindClose,SetFilePointerEx,GetFileTime,FileTimeToSystemTime,wsprintfW,CloseHandle,ShellExecuteW,GetLastError,MoveFileW,GetLastError,PathIsDirectoryW,CreateDirectoryW,GetLastError,FindFirstFileW,FileTimeToSystemTime,wsprintfW,FindNextFileW,FindClose,GetLogicalDriveStringsA,GetDriveTypeA,WriteFile,GetLastError,GetTempPathW,CreateFileW,SetFilePointerEx,GetLastError,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041596B getaddrinfo,freeaddrinfo,getsockname,getpeername,recv,recvfrom,getaddrinfo,freeaddrinfo,sendto,recvfrom,sendto,select,
Source: vovy0jYEM7.exeString found in binary or memory: http://adrotate.sytes.net/cfgg.bin
Source: vovy0jYEM7.exeString found in binary or memory: http://www.google.com/webhp
Source: vovy0jYEM7.exeString found in binary or memory: http://www.google.com/webhpbc
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040D447 NtCreateUserProcess,NtCreateThread,LdrLoadDll,GetFileAttributesExW,closesocket,send,WSASend,TranslateMessage,GetClipboardData,PFXImportCertStore,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041D7B7 EnterCriticalSection,GetTickCount,LeaveCriticalSection,GetKeyboardState,ToUnicode,TranslateMessage,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040D447 NtCreateUserProcess,NtCreateThread,LdrLoadDll,GetFileAttributesExW,closesocket,send,WSASend,TranslateMessage,GetClipboardData,PFXImportCertStore,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00415563 NtQueryInformationProcess,CloseHandle,NtCreateThread,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041561A NtCreateUserProcess,GetProcessId,GetThreadContext,SetThreadContext,VirtualFreeEx,CloseHandle,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040FBAD lstrcpyA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00405B5C CreateMutexW,GetLastError,CloseHandle,GetTickCount,GetTickCount,Sleep,GetTickCount,ExitWindowsEx,OpenEventW,SetEvent,CloseHandle,CloseHandle,OpenMutexW,GetFileAttributesExW,ReadProcessMemory,CloseHandle,GetFileAttributesExW,ReadProcessMemory,Sleep,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040DBFD InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_004110A3
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00409D36
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040C98B
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041676F
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040F3E6
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041CBF9
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040BFBE
Source: vovy0jYEM7.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: classification engineClassification label: mal64.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041C435 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041C5AA CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040F901 GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040F8AA CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041484B CoCreateInstance,VariantInit,SysAllocString,VariantClear,
Source: vovy0jYEM7.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\vovy0jYEM7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: vovy0jYEM7.exeVirustotal: Detection: 89%
Source: vovy0jYEM7.exeReversingLabs: Detection: 96%
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_004120AD LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,HeapCreate,FreeLibrary,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041D191 push 6B9D6F03h; retn 0008h
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00414C33 lstrcpyA,lstrcpyA,lstrcpyA,GetProcAddress,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,

Malware Analysis System Evasion:

barindex
Contains functionality to detect sleep reduction / modificationsShow sources
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00416504
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00405B5C
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00405B5C
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00413951 FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00413A0C FindFirstFileW,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041676F ReadFile,CloseHandle,CloseHandle,PathIsDirectoryW,CreateFileW,FindFirstFileW,FindClose,SetFilePointerEx,GetFileTime,FileTimeToSystemTime,wsprintfW,CloseHandle,ShellExecuteW,GetLastError,MoveFileW,GetLastError,PathIsDirectoryW,CreateDirectoryW,GetLastError,FindFirstFileW,FileTimeToSystemTime,wsprintfW,FindNextFileW,FindClose,GetLogicalDriveStringsA,GetDriveTypeA,WriteFile,GetLastError,GetTempPathW,CreateFileW,SetFilePointerEx,GetLastError,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041BB83 PathCombineW,PathIsDirectoryW,FindFirstFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041676F ReadFile,CloseHandle,CloseHandle,PathIsDirectoryW,CreateFileW,FindFirstFileW,FindClose,SetFilePointerEx,GetFileTime,FileTimeToSystemTime,wsprintfW,CloseHandle,ShellExecuteW,GetLastError,MoveFileW,GetLastError,PathIsDirectoryW,CreateDirectoryW,GetLastError,FindFirstFileW,FileTimeToSystemTime,wsprintfW,FindNextFileW,FindClose,GetLogicalDriveStringsA,GetDriveTypeA,WriteFile,GetLastError,GetTempPathW,CreateFileW,SetFilePointerEx,GetLastError,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040D447 NtCreateUserProcess,NtCreateThread,LdrLoadDll,GetFileAttributesExW,closesocket,send,WSASend,TranslateMessage,GetClipboardData,PFXImportCertStore,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_004120AD LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,HeapCreate,FreeLibrary,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00404E5C GetModuleHandleW,GetModuleHandleW,lstrcpyA,lstrcpyA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrcpyA,GetProcAddress,lstrcpyA,GetProcAddress,HeapCreate,GetProcessHeap,InitializeCriticalSection,WSAStartup,CreateEventW,GetLengthSid,GetCurrentProcessId,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_004118F9 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,lstrcpyW,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,LocalFree,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041C435 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041DB15 GetTickCount,GetUserDefaultUILanguage,GetModuleFileNameW,GetUserNameExW,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0040E35F GetTimeZoneInformation,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_004054A1 GetComputerNameW,GetVersionExW,RegOpenKeyExW,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_00411481 socket,bind,listen,closesocket,
Source: C:\Users\user\Desktop\vovy0jYEM7.exeCode function: 0_2_0041172A socket,bind,closesocket,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1Native API1Valid Accounts1Valid Accounts1Valid Accounts1Input Capture11Network Share Discovery1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsScheduled Task/JobApplication Shimming1Access Token Manipulation11Access Token Manipulation11LSASS MemorySystem Time Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Application Shimming1Obfuscated Files or Information1Security Account ManagerSecurity Software Discovery12SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Install Root Certificate1NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
vovy0jYEM7.exe89%VirustotalBrowse
vovy0jYEM7.exe96%ReversingLabsWin32.Trojan.Zeus
vovy0jYEM7.exe100%AviraTR/Kazy.MK
vovy0jYEM7.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
0.2.vovy0jYEM7.exe.400000.0.unpack100%AviraTR/Kazy.MKDownload File
0.0.vovy0jYEM7.exe.400000.0.unpack100%AviraTR/Kazy.MKDownload File

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://adrotate.sytes.net/cfgg.bin3%VirustotalBrowse
http://adrotate.sytes.net/cfgg.bin0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://adrotate.sytes.net/cfgg.binvovy0jYEM7.exefalse
  • 3%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:376942
Start date:28.03.2021
Start time:03:46:23
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 14s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:vovy0jYEM7 (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.evad.winEXE@1/0@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 99.6% (good quality ratio 92.1%)
  • Quality average: 82.2%
  • Quality standard deviation: 29.9%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Stop behavior analysis, all processes terminated

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:MS-DOS executable
Entropy (8bit):6.666462810016037
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.94%
  • DOS Executable Borland Pascal 7.0x (2037/25) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • VXD Driver (31/22) 0.00%
File name:vovy0jYEM7.exe
File size:143360
MD5:ac98d2d71f3a4998abe80dd6e0695fba
SHA1:76b5d3fd16c3e761022ebd7f3f5fc34f022fcc04
SHA256:98d33cf483b14fbdab3a470a9452bcea672da54da1131330babcbb40572719e8
SHA512:190893c1511573db160bcfae275ac4b7ac43b6a1cb67f348e1043a98698241c96b44bfd65ebef1a18b80e8955118ae71e4384bf061781984427cee6251bafff7
SSDEEP:3072:BpJJwr9xIGE2q/DB9WMnuwutBE+XjlE2fX7kiknViBXMlaT0S:BpkYGOBRjutBE+XvjkiGV6HTh
File Content Preview:MZ......................................................................................................................................................................................................................PE..L..."..O.....................6.....

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x405f45
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
Time Stamp:0x4F8CFD22 [Tue Apr 17 05:18:26 2012 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:5aa18671f1cb1cc96a51c8f1958d6f84

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
push ecx
push ebx
push 00000000h
xor bl, bl
call 00007FA290D7332Eh
test al, al
je 00007FA290D744C6h
push 00008007h
add bl, 00000002h
call dword ptr [00401240h]
lea eax, dword ptr [ebp-04h]
push eax
call dword ptr [00401244h]
push eax
call dword ptr [00401284h]
test eax, eax
je 00007FA290D74463h
xor edx, edx
cmp dword ptr [ebp-04h], edx
jle 00007FA290D74455h
mov ecx, dword ptr [eax+edx*4]
test ecx, ecx
je 00007FA290D74448h
cmp word ptr [ecx], 002Dh
jne 00007FA290D74442h
movzx ecx, word ptr [ecx+02h]
cmp ecx, 66h
je 00007FA290D74436h
cmp ecx, 69h
je 00007FA290D7442Ch
cmp ecx, 6Eh
jne 00007FA290D7442Fh
and bl, FFFFFFFDh
jmp 00007FA290D7442Ah
or bl, 00000008h
jmp 00007FA290D74425h
or bl, 00000001h
inc edx
cmp edx, dword ptr [ebp-04h]
jl 00007FA290D743EFh
push eax
call dword ptr [00423808h]
test bl, 00000008h
je 00007FA290D74429h
call 00007FA290D73DCAh
jmp 00007FA290D74438h
mov al, bl
shr al, 1
and al, 01h
movzx eax, al
push eax
and bl, 00000001h
movzx eax, bl
push eax
call 00007FA290D73FA0h
mov bl, al
test bl, bl
je 00007FA290D74436h
test byte ptr [004222A8h], 00000002h
je 00007FA290D7442Dh
push FFFFFFFFh
call dword ptr [00423818h]
pop ebx
leave
ret
xor eax, eax
test bl, bl
sete al
push eax
call dword ptr [00401248h]
int3
test esi, esi

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x20b040xf0.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x10.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x250000x10c4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x10000x394.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x20ec60x21000False0.63339695786data6.68700480051IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x220000x1d4c0x200False0.20703125data1.30631439164IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x240000x100x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x250000x14c20x1800False0.689127604167data6.04503144547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Imports

DLLImport
KERNEL32.dlllstrcpynW, FileTimeToSystemTime, ReadFile, lstrcatA, lstrcmpW, lstrlenW, GetFileInformationByHandle, lstrcpyW, ExpandEnvironmentStringsW, GetEnvironmentVariableW, FileTimeToDosDateTime, HeapReAlloc, CreateMutexW, FindFirstFileW, SetEndOfFile, CreateProcessW, HeapAlloc, SetFilePointerEx, HeapFree, CreateDirectoryW, GetProcessHeap, IsBadReadPtr, SetFileTime, VirtualQueryEx, OpenProcess, Thread32First, LoadLibraryW, ReadProcessMemory, HeapDestroy, HeapCreate, Thread32Next, GetTimeZoneInformation, CreateThread, MultiByteToWideChar, WideCharToMultiByte, OpenMutexW, GetLastError, SetLastError, VirtualProtectEx, VirtualAllocEx, FindClose, RemoveDirectoryW, FindNextFileW, VirtualProtect, CreateToolhelp32Snapshot, GetFileTime, ReleaseMutex, FileTimeToLocalFileTime, DeleteFileW, SetFileAttributesW, GetThreadContext, SetThreadContext, GetProcessId, GetDriveTypeA, Sleep, GetLogicalDriveStringsA, MoveFileW, ResetEvent, GetNativeSystemInfo, WTSGetActiveConsoleSessionId, GlobalLock, GlobalUnlock, MoveFileExW, GetUserDefaultUILanguage, CreateRemoteThread, Process32FirstW, Process32NextW, GetSystemTime, GetLocalTime, SystemTimeToFileTime, UnmapViewOfFile, lstrlenA, SetFilePointer, GetFileSize, FreeLibrary, lstrcmpiA, GetPrivateProfileIntW, InitializeCriticalSection, FlushFileBuffers, SetThreadPriority, GetTempPathW, GetCurrentThread, CreateFileW, GetFileAttributesW, WriteFile, GetPrivateProfileStringW, lstrcpyA, WriteProcessMemory, GetCurrentProcessId, CloseHandle, DuplicateHandle, OpenEventW, GetFileAttributesExW, lstrcmpiW, WaitForMultipleObjects, CreateEventW, GetProcAddress, GetModuleFileNameW, GetVersionExW, VirtualFreeEx, VirtualFree, GetTickCount, GetModuleHandleW, SetEvent, GetComputerNameW, SetErrorMode, GetCommandLineW, ExitProcess, EnterCriticalSection, LeaveCriticalSection
USER32.dllCharToOemW, wsprintfA, ExitWindowsEx, CharLowerBuffA, MsgWaitForMultipleObjects, LoadImageW, CharLowerA, PeekMessageW, CharUpperW, wsprintfW, CharLowerW, ToUnicode, GetKeyboardState, GetCursorPos, GetIconInfo, DrawIcon, GetClipboardData, TranslateMessage, DispatchMessageW
ADVAPI32.dllLookupPrivilegeValueW, SetNamedSecurityInfoW, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, CreateProcessAsUserW, RegQueryValueExW, CryptReleaseContext, RegCreateKeyExW, GetTokenInformation, GetSidSubAuthorityCount, OpenThreadToken, CryptAcquireContextW, GetSidSubAuthority, CryptGetHashParam, InitiateSystemShutdownExW, GetLengthSid, IsWellKnownSid, CryptCreateHash, ConvertStringSecurityDescriptorToSecurityDescriptorW, RegOpenKeyExW, GetSecurityDescriptorSacl, CryptDestroyHash, AdjustTokenPrivileges, RegCloseKey, RegSetValueExW, CryptHashData, RegEnumKeyExW, ConvertSidToStringSidW, EqualSid
SHLWAPI.dllPathIsDirectoryW, UrlUnescapeA, PathRemoveFileSpecW, SHDeleteValueW, PathSkipRootW, SHDeleteKeyW, PathCombineW, PathAddExtensionW, PathUnquoteSpacesW, StrCmpNIA, wvnsprintfA, StrStrIA, StrStrIW, StrCmpNIW, PathIsURLW, PathQuoteSpacesW, PathRemoveBackslashW, PathRenameExtensionW
SHELL32.dllSHFileOperationW, ShellExecuteW, CommandLineToArgvW, SHGetFolderPathW
Secur32.dllGetUserNameExW
ole32.dllStringFromGUID2, CoUninitialize, CoCreateInstance, CoInitializeEx
WS2_32.dllconnect, WSAIoctl, sendto, WSAEventSelect, WSAAddressToStringW, WSAStartup, getaddrinfo, select, WSAGetLastError, getsockname, setsockopt, bind, socket, freeaddrinfo, listen, WSASend, closesocket, send
CRYPT32.dllCertOpenSystemStoreW, PFXExportCertStoreEx, PFXImportCertStore, CryptUnprotectData, CertDeleteCertificateFromStore, CertCloseStore, CertEnumCertificatesInStore, CertDuplicateCertificateContext
OLEAUT32.dllVariantInit, SysAllocString, VariantClear, SysFreeString
NETAPI32.dllNetApiBufferFree, NetUserEnum, NetUserGetInfo

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

General

Start time:03:47:07
Start date:28/03/2021
Path:C:\Users\user\Desktop\vovy0jYEM7.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\vovy0jYEM7.exe'
Imagebase:0x400000
File size:143360 bytes
MD5 hash:AC98D2D71F3A4998ABE80DD6E0695FBA
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >