Loading ...

Play interactive tourEdit tour

Windows Analysis Report sVNHE4jjOw.exe

Overview

General Information

Sample Name:sVNHE4jjOw.exe
Analysis ID:449805
MD5:72fe87cb4fd41cf172a9caecbdc6887f
SHA1:2c8c745378f4a80e96dbabf574d1ac2d6408df69
SHA256:6d26df7a7163053aa756f62ee4504af93020696cee98a1fc891c600ac76acc1c
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
PE / OLE file has an invalid certificate
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • sVNHE4jjOw.exe (PID: 4072 cmdline: 'C:\Users\user\Desktop\sVNHE4jjOw.exe' MD5: 72FE87CB4FD41CF172A9CAECBDC6887F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: sVNHE4jjOw.exeVirustotal: Detection: 34%Perma Link
Source: sVNHE4jjOw.exeReversingLabs: Detection: 23%
Source: sVNHE4jjOw.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\Dragt1.pdb source: sVNHE4jjOw.exe
Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\Dragt1.pdb@ source: sVNHE4jjOw.exe
Source: sVNHE4jjOw.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: sVNHE4jjOw.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: sVNHE4jjOw.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: sVNHE4jjOw.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: sVNHE4jjOw.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: sVNHE4jjOw.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: sVNHE4jjOw.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: sVNHE4jjOw.exeString found in binary or memory: http://ocsp.digicert.com0O
Source: sVNHE4jjOw.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: sVNHE4jjOw.exeString found in binary or memory: https://www.digicert.com/CPS0
Source: sVNHE4jjOw.exe, 00000000.00000002.748037096.000000000081A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeProcess Stats: CPU usage > 98%
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_0080561F NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00805608 NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00805761 NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00401470
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_0080561F
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_008080B4
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00805985
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_008022A2
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00805AB8
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00805AE6
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00805A62
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00805608
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00808F74
Source: sVNHE4jjOw.exeStatic PE information: invalid certificate
Source: sVNHE4jjOw.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: sVNHE4jjOw.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: sVNHE4jjOw.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: sVNHE4jjOw.exe, 00000000.00000002.747307091.0000000000438000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameDragt1.exe vs sVNHE4jjOw.exe
Source: sVNHE4jjOw.exeBinary or memory string: OriginalFilenameDragt1.exe vs sVNHE4jjOw.exe
Source: sVNHE4jjOw.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal64.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeFile created: C:\Users\user\AppData\Local\Temp\~DFB3D8909A7274E24A.TMPJump to behavior
Source: sVNHE4jjOw.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: sVNHE4jjOw.exeVirustotal: Detection: 34%
Source: sVNHE4jjOw.exeReversingLabs: Detection: 23%
Source: sVNHE4jjOw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\Dragt1.pdb source: sVNHE4jjOw.exe
Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\Dragt1.pdb@ source: sVNHE4jjOw.exe
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00404960 push es; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00611774 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00613063 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00611863 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00614863 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00616065 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00610068 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00616875 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00612074 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00613874 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00615074 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00610878 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00610843 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00612043 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00613843 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00615043 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00616844 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00611054 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00612854 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00614054 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00615854 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00617054 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00611023 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00612823 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00614023 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00615825 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00617024 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00614833 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00613033 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00611833 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00616034 push edx; ret
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_008080B4
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00805A62
Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeRDTSC instruction interceptor: First address: 0000000000807129 second address: 0000000000807129 instructions:
Tries to detect virtualization through RDTSC time measurementsShow sources
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeRDTSC instruction interceptor: First address: 0000000000807129 second address: 0000000000807129 instructions:
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeRDTSC instruction interceptor: First address: 00000000008092E8 second address: 00000000008092E8 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b cmp edx, dword ptr [ebp+44h] 0x0000000e jne 00007F282C8B58F9h 0x00000010 sub edx, 04h 0x00000013 xor dword ptr [edx], ecx 0x00000015 pushad 0x00000016 lfence 0x00000019 rdtsc
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_008080B4 rdtsc
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Anti Debugging:

barindex
Found potential dummy code loops (likely to delay analysis)Show sources
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeProcess Stats: CPU usage > 90% for more than 60s
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_008080B4 rdtsc
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_008080B4 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_0080527E mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_008074A3 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\sVNHE4jjOw.exeCode function: 0_2_00806F30 mov eax, dword ptr fs:[00000030h]
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: sVNHE4jjOw.exe, 00000000.00000002.748249870.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: sVNHE4jjOw.exe, 00000000.00000002.748249870.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: Progman
Source: sVNHE4jjOw.exe, 00000000.00000002.748249870.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
Source: sVNHE4jjOw.exe, 00000000.00000002.748249870.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
Source: sVNHE4jjOw.exe, 00000000.00000002.748249870.0000000000EA0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11Input Capture1Security Software Discovery41Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery31Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
sVNHE4jjOw.exe35%VirustotalBrowse
sVNHE4jjOw.exe24%ReversingLabsWin32.Trojan.AgentTesla

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:449805
Start date:16.07.2021
Start time:11:40:22
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 28s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:sVNHE4jjOw.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:30
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.evad.winEXE@1/0@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 53%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for sample files taking high CPU consumption
Warnings:
Show All
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Not all processes where analyzed, report is missing behavior information

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):4.800085383449222
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.15%
  • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:sVNHE4jjOw.exe
File size:267408
MD5:72fe87cb4fd41cf172a9caecbdc6887f
SHA1:2c8c745378f4a80e96dbabf574d1ac2d6408df69
SHA256:6d26df7a7163053aa756f62ee4504af93020696cee98a1fc891c600ac76acc1c
SHA512:6fa975b8ba69692b6eb278f4145d13fea8d3c64c33d7f9267172f1718f4a4a1f0852cc65f4b16691d152afe9035f038c4c203deecf85e56ecf451448f8a6f60a
SSDEEP:1536:35/ikBkzm219ZmFtg5sfrWrNjosvNmmCUibm84t3TxY/n:35/pkdPAw0iNVvNnbVZxY/
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........y.....................................Rich............PE..L..... L.................`..........p........p....@................

File Icon

Icon Hash:e8ccce8e8ececce8

Static PE Info

General

Entrypoint:0x401470
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x4C20BCC1 [Tue Jun 22 13:38:09 2010 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:a6a8fddf213e725d12277ffa52409c50

Authenticode Signature

Signature Valid:false
Signature Issuer:E=Unstaunch1@Strygeork.GUN, CN=ryper, OU=Nonpropa4, O=Twisti8, L=Efterspil4, S=FORDUMM, C=AD
Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
Error Number:-2146762487
Not Before, Not After
  • 7/15/2021 2:48:16 PM 7/15/2022 2:48:16 PM
Subject Chain
  • E=Unstaunch1@Strygeork.GUN, CN=ryper, OU=Nonpropa4, O=Twisti8, L=Efterspil4, S=FORDUMM, C=AD
Version:3
Thumbprint MD5:74A7224C73056759B33CA9EB4F1649A0
Thumbprint SHA-1:C9DACC639E15797636E4B8185A4E5522E877B0B9
Thumbprint SHA-256:CEEC9E9D00E6C96EE6ECF708C8F2812C2BC31DADAF84E625E66CEA556F34ABA7
Serial:00

Entrypoint Preview

Instruction
push 0043195Ch
call 00007F282D1051A3h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
xor byte ptr [eax], al
add byte ptr [eax], al
cmp byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
pop es
pop ds
mov dword ptr [ecx+4B63D25Ch], edx
lodsb
mov dx, fs
dec ebx
push FFFFFFDBh
call far 0000h : 000000B2h
add byte ptr [ecx], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [ecx+6Eh], cl
add byte ptr fs:[eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
dec esp
xor dword ptr [eax], eax
adc bh, byte ptr [edx-74h]
sbb al, 48h
dec ebp
into
dec esp
dec edi
mov cl, BEh
stc
and byte ptr [ebx-53h], bh
add dword ptr [edi-08h], 08h
lodsd
push ebx
sbb esp, edx
dec ebx
test esp, esi
xchg eax, edi
fmul st(0), st(1)
and eax, 4F3ADC4Eh
lodsd
xor ebx, dword ptr [ecx-48EE309Ah]
or al, 00h
stosb
add byte ptr [eax-2Dh], ah
xchg eax, ebx
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add eax, dword ptr [ebx]
add eax, dword ptr [eax]
xor esi, dword ptr [ebp+00h]
add byte ptr [eax], al
push es
add byte ptr [edi+ebp*2+6Ch], al
imul esp, dword ptr [ebx+37h], 06010D00h
add byte ptr [ebx+74h], dh
jne 00007F282D105216h
imul esp, dword ptr [ebp+00h], 42000119h
add byte ptr [edx], ah
add byte ptr [ebx], ah
out dx, al

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x366840x28.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x380000x7a8a.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x400500x1440
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x11200x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
IMAGE_DIRECTORY_ENTRY_IAT0x10000x118.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x35bb00x36000False0.257260923032data4.74248188384IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x370000xbd40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x380000x7a8a0x8000False0.294769287109data4.40772584771IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x3f4220x668data
RT_ICON0x3f13a0x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 998965248, next used block 48059
RT_ICON0x3ef520x1e8data
RT_ICON0x3ee2a0x128GLS_BINARY_LSB_FIRST
RT_ICON0x3df820xea8data
RT_ICON0x3d6da0x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0
RT_ICON0x3d0120x6c8data
RT_ICON0x3caaa0x568GLS_BINARY_LSB_FIRST
RT_ICON0x3a5020x25a8data
RT_ICON0x3945a0x10a8data
RT_ICON0x38ad20x988data
RT_ICON0x3866a0x468GLS_BINARY_LSB_FIRST
RT_GROUP_ICON0x385bc0xaedata
RT_VERSION0x383000x2bcdataSwahiliKenya
RT_VERSION0x383000x2bcdataSwahiliMozambiq

Imports

DLLImport
MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFPFix, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaFileOpen, __vbaNew2, __vbaInStr, __vbaR8Str, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaLateMemCall, __vbaStrToAnsi, __vbaVarDup, __vbaFpI4, _CIatan, __vbaStrMove, __vbaAryCopy, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

Version Infos

DescriptionData
Translation0x0441 0x04b0
LegalCopyrightON24
InternalNameDragt1
FileVersion7.00
CompanyNameON24
LegalTrademarksON24
CommentsON24
ProductNameON24
ProductVersion7.00
FileDescriptionON24
OriginalFilenameDragt1.exe

Possible Origin

Language of compilation systemCountry where language is spokenMap
SwahiliKenya
SwahiliMozambiq

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

General

Start time:11:41:12
Start date:16/07/2021
Path:C:\Users\user\Desktop\sVNHE4jjOw.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\sVNHE4jjOw.exe'
Imagebase:0x400000
File size:267408 bytes
MD5 hash:72FE87CB4FD41CF172A9CAECBDC6887F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Visual Basic
Reputation:low

Disassembly

Code Analysis

Reset < >