Loading ...

Play interactive tourEdit tour

Windows Analysis Report June-July_Commission_List_Summary-2021.exe

Overview

General Information

Sample Name:June-July_Commission_List_Summary-2021.exe
Analysis ID:457757
MD5:bc6d6f6c55211e9ffc8972f330135da7
SHA1:07b6f45608594b9ee812a9a95f80e51d644424c9
SHA256:4326190ec077d66ad458337eed8a4f517cfd354247e921c4d01d9f50d9346e32
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Detected potential crypto function
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: June-July_Commission_List_Summary-2021.exeVirustotal: Detection: 29%Perma Link
Source: June-July_Commission_List_Summary-2021.exeReversingLabs: Detection: 17%
Machine Learning detection for sampleShow sources
Source: June-July_Commission_List_Summary-2021.exeJoe Sandbox ML: detected
Source: June-July_Commission_List_Summary-2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess Stats: CPU usage > 98%
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F7A3A
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F7A68
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F4F09
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F78FC
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F70E7
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F5521
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F5574
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F4DBE
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F59CC
Source: June-July_Commission_List_Summary-2021.exe, 00000000.00000002.755289932.0000000000473000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameWivrejaygeesca9.exe vs June-July_Commission_List_Summary-2021.exe
Source: June-July_Commission_List_Summary-2021.exeBinary or memory string: OriginalFilenameWivrejaygeesca9.exe vs June-July_Commission_List_Summary-2021.exe
Source: June-July_Commission_List_Summary-2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engineClassification label: mal68.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DF152992B35EEE298A.TMPJump to behavior
Source: June-July_Commission_List_Summary-2021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: June-July_Commission_List_Summary-2021.exeVirustotal: Detection: 29%
Source: June-July_Commission_List_Summary-2021.exeReversingLabs: Detection: 17%
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_00404923 push ds; ret
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_0040659A push esp; retf
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_0040569B push ebp; retf
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_00408B7B push ebx; iretd
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_00406F8F push ebp; retf
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F24F8 push es; iretd
Source: initial sampleStatic PE information: section name: .text entropy: 7.14012596914
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021FD52B
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F5521
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F5574
Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 00000000021FE4B4 second address: 00000000021FE4B4 instructions:
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 0000000002201AA0 second address: 0000000002201AA0 instructions:
Tries to detect virtualization through RDTSC time measurementsShow sources
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 00000000021FE4B4 second address: 00000000021FE4B4 instructions:
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 00000000021FDC02 second address: 00000000021FDDA2 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov esi, dword ptr [ebp+00000223h] 0x00000011 mov dword ptr [ebp+0000021Bh], eax 0x00000017 mov eax, esi 0x00000019 push eax 0x0000001a cmp dl, cl 0x0000001c mov eax, dword ptr [ebp+0000021Bh] 0x00000022 mov dword ptr [ebp+0000019Ch], ebx 0x00000028 test dx, F826h 0x0000002d mov ebx, edx 0x0000002f test bx, 655Ch 0x00000034 push ebx 0x00000035 mov ebx, dword ptr [ebp+0000019Ch] 0x0000003b call 00007F79C8CDA548h 0x00000040 test edx, ebx 0x00000042 mov esi, dword ptr [esp+04h] 0x00000046 mov eax, 020D0734h 0x0000004b xor eax, 97E8A2A4h 0x00000050 jmp 00007F79C8CDA5A9h 0x00000055 test dx, bx 0x00000058 xor eax, 66496E64h 0x0000005d sub eax, F3ACB6EFh 0x00000062 test ax, cx 0x00000065 test ax, ax 0x00000068 mov dword ptr [ebp+000001DCh], ebx 0x0000006e mov ebx, FD8668ABh 0x00000073 pushad 0x00000074 mov edx, 00000025h 0x00000079 rdtsc
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 00000000021FDDA2 second address: 00000000021FDDA2 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 add ebx, 2EB48951h 0x00000009 xor ebx, 4D05852Ah 0x0000000f test ah, ah 0x00000011 sub ebx, 613F7432h 0x00000017 cmp byte ptr [esi], bl 0x00000019 mov ebx, dword ptr [ebp+000001DCh] 0x0000001f jnc 00007F79C8CDA55Dh 0x00000021 mov ebx, eax 0x00000023 test dh, ch 0x00000025 shl eax, 05h 0x00000028 add eax, ebx 0x0000002a movzx ecx, byte ptr [esi] 0x0000002d test bh, dh 0x0000002f add eax, ecx 0x00000031 xor eax, 87814D76h 0x00000036 test dh, dh 0x00000038 inc esi 0x00000039 mov dword ptr [ebp+00000199h], ecx 0x0000003f mov ecx, 8083BC92h 0x00000044 cmp edx, E060B676h 0x0000004a test al, bl 0x0000004c xor ecx, 15B192FBh 0x00000052 xor ecx, 1B76C997h 0x00000058 test ecx, eax 0x0000005a xor ecx, 8E44E7FEh 0x00000060 cmp ebx, D7C88536h 0x00000066 cmp dh, FFFFFFD5h 0x00000069 cmp byte ptr [esi], cl 0x0000006b mov ecx, dword ptr [ebp+00000199h] 0x00000071 jne 00007F79C8CDA47Eh 0x00000077 mov dword ptr [ebp+000001DCh], ebx 0x0000007d mov ebx, FD8668ABh 0x00000082 pushad 0x00000083 mov edx, 00000025h 0x00000088 rdtsc
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 0000000002201903 second address: 0000000002201903 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 cmp dword ptr [ebp+000001DAh], ebx 0x00000009 jne 00007F79C8CDA4C6h 0x0000000b xor dword ptr [eax], edx 0x0000000d add eax, 04h 0x00000010 mov dword ptr [ebp+000001DAh], eax 0x00000016 pushad 0x00000017 mov eax, 000000FCh 0x0000001c rdtsc
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 0000000002201AA0 second address: 0000000002201AA0 instructions:
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 00000000021FF545 second address: 00000000021FDDA2 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b push ecx 0x0000000c mov ecx, dword ptr [ebp+000001B8h] 0x00000012 test bh, dh 0x00000014 mov dword ptr [ebp+0000020Fh], edx 0x0000001a mov edx, ecx 0x0000001c cmp ch, dh 0x0000001e push edx 0x0000001f cmp eax, D3D4D650h 0x00000024 mov edx, dword ptr [ebp+0000020Fh] 0x0000002a mov dword ptr [ebp+0000024Ah], ecx 0x00000030 mov ecx, esi 0x00000032 push ecx 0x00000033 mov ecx, dword ptr [ebp+0000024Ah] 0x00000039 test dl, cl 0x0000003b mov dword ptr [ebp+00000210h], eax 0x00000041 mov eax, esi 0x00000043 push eax 0x00000044 cmp ah, dh 0x00000046 mov eax, dword ptr [ebp+00000210h] 0x0000004c cmp cx, bx 0x0000004f add dword ptr [esp], ecx 0x00000052 call 00007F79C8CD8BEEh 0x00000057 test edx, ebx 0x00000059 mov esi, dword ptr [esp+04h] 0x0000005d mov eax, 020D0734h 0x00000062 xor eax, 97E8A2A4h 0x00000067 jmp 00007F79C8CDA5A9h 0x0000006c test dx, bx 0x0000006f xor eax, 66496E64h 0x00000074 sub eax, F3ACB6EFh 0x00000079 test ax, cx 0x0000007c test ax, ax 0x0000007f mov dword ptr [ebp+000001DCh], ebx 0x00000085 mov ebx, FD8668ABh 0x0000008a pushad 0x0000008b mov edx, 00000025h 0x00000090 rdtsc
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021FCE12 rdtsc
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Anti Debugging:

barindex
Found potential dummy code loops (likely to delay analysis)Show sources
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess Stats: CPU usage > 90% for more than 60s
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021FCE12 rdtsc
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021FE347 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 0_2_021F5521 mov eax, dword ptr fs:[00000030h]
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: June-July_Commission_List_Summary-2021.exe, 00000000.00000002.757153981.0000000000D60000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
Source: June-July_Commission_List_Summary-2021.exe, 00000000.00000002.757153981.0000000000D60000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: June-July_Commission_List_Summary-2021.exe, 00000000.00000002.757153981.0000000000D60000.00000002.00000001.sdmpBinary or memory string: Progman
Source: June-July_Commission_List_Summary-2021.exe, 00000000.00000002.757153981.0000000000D60000.00000002.00000001.sdmpBinary or memory string: Progmanlock

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery41Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsSoftware Packing1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSSystem Information Discovery31Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
June-July_Commission_List_Summary-2021.exe30%VirustotalBrowse
June-July_Commission_List_Summary-2021.exe17%ReversingLabsWin32.Trojan.Mucc
June-July_Commission_List_Summary-2021.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:457757
Start date:02.08.2021
Start time:09:23:32
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 41s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:June-July_Commission_List_Summary-2021.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:26
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal68.evad.winEXE@1/0@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 59.2% (good quality ratio 33.3%)
  • Quality average: 32.7%
  • Quality standard deviation: 34.4%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for sample files taking high CPU consumption
Warnings:
Show All
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Not all processes where analyzed, report is missing behavior information

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):4.8708154897145
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:June-July_Commission_List_Summary-2021.exe
File size:471040
MD5:bc6d6f6c55211e9ffc8972f330135da7
SHA1:07b6f45608594b9ee812a9a95f80e51d644424c9
SHA256:4326190ec077d66ad458337eed8a4f517cfd354247e921c4d01d9f50d9346e32
SHA512:a7947412f8c4d063d8fc4618f806d3900df4a47cc042da6ebbc893f7399eb2be20361ca92c324b31f37ffb896c2b827ca161cf7d24d17ceda0c9a2a8db85afec
SSDEEP:3072:W1bzponwO9HPBFRXBQnmCpy4eeF9d6tTbsYPYcF4v98C8OZW44PcpLg7SO32OGl0:W1bz+woHOmtmmTNYMSB
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......S.....................@....................@................

File Icon

Icon Hash:09090d0909040901

Static PE Info

General

Entrypoint:0x4015bc
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x5317A394 [Wed Mar 5 22:22:12 2014 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:6a2215b83e94f57aa594370ef2448759

Entrypoint Preview

Instruction
push 004027A4h
call 00007F79C8D91655h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
xor byte ptr [eax], al
add byte ptr [eax], al
inc eax
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [edi+6A214ED7h], al
shr dword ptr [ebp+48h], cl
mov dl, 49h
jo 00007F79C8D91684h
lds ebp, esi
lodsb
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add dword ptr [eax], eax
add byte ptr [eax], al
add byte ptr [eax], al
mov al, 8Fh
adc byte ptr [ebx], al
dec ebx
jne 00007F79C8D916CEh
insd
imul ebp, dword ptr [esi+65h], 666C6974h
add byte ptr [eax], ah
or byte ptr [ecx+00h], al
add byte ptr [eax], al
add byte ptr [eax], al
dec esp
xor dword ptr [eax], eax
or al, 41h
in al, dx
out 9Dh, eax
sahf
or al, byte ptr [edi-4Dh]
cmpsd
adc dword ptr [edx-2Eh], edi
inc esi
wait
jbe 00007F79C8D91634h
or byte ptr [ecx+44C5F4EFh], ch
mov cl, F3h
xchg eax, ebx
nop
cmp byte ptr [ebx+eax*8], cl
mov byte ptr [33AD4F3Ah], al
cdq
iretw
adc dword ptr [edi+00AA000Ch], esi
pushad
rcl dword ptr [ebx+00000000h], cl
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
push esp
adc byte ptr [eax], al
add byte ptr [ebp+0000000Eh], al
or al, byte ptr [eax]
push ebx
popad
outsb
outsb
arpl word ptr [edi+61h], bp
xor eax, 05010D00h
add byte ptr [ecx+4Eh], al
push ebx
dec ecx

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x2f9540x28.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x41ae4.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
IMAGE_DIRECTORY_ENTRY_IAT0x10000x16c.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x2ee9c0x2f000False0.605172664561data7.14012596914IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x300000x11e80x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x320000x41ae40x42000False0.052353367661data2.16158172255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0x320e80x417e8data
RT_GROUP_ICON0x738d00x14data
RT_VERSION0x738e40x200dataEnglishUnited States

Imports

DLLImport
MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaBoolStr, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, __vbaI2I4, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaErrorOverflow, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

Version Infos

DescriptionData
Translation0x0409 0x04b0
ProductVersion1.04
InternalNameWivrejaygeesca9
FileVersion1.04
OriginalFilenameWivrejaygeesca9.exe
ProductNameKulminetilf

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

General

Start time:09:24:23
Start date:02/08/2021
Path:C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exe'
Imagebase:0x400000
File size:471040 bytes
MD5 hash:BC6D6F6C55211E9FFC8972F330135DA7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Visual Basic
Reputation:low

Disassembly

Code Analysis

Reset < >