72cca77c...d17f | Files
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification:
Spyware
Threat Names:
FormBook
Trojan.GenericKDZ.70241
Gen:Variant.Babar.21405

Remarks (1/1)

(0x0200000E): The overall sleep time of all monitored processes was truncated from "41 seconds" to "10 seconds" to reveal dormant functionality.

Filters:
Filename Category Type Severity Actions
C:\Users\FD1HVy\Desktop\mFO4ED9hfrpsSO4O.exe Sample File Binary
Malicious
»
Mime Type application/vnd.microsoft.portable-executable
File Size 871.50 KB
MD5 51a292587a2d735306afb24d54002ba5 Copy to Clipboard
SHA1 c22a6a4cefcd2fe4c06a4244dce0c13bcf63d269 Copy to Clipboard
SHA256 72cca77c38132f30a09c57d24815d52ec3d5bb48c19415f52b7a38190b92d17f Copy to Clipboard
SSDeep 12288:Y2fVnLF0eRwlTaOcJFCS7TPIIDZZAzR//JIcJa7KoJ7/zDaLdkH66lmv5G/++r6h:t5iav+STPlrAzR//JIcJkfzHzwURrO Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
PE Information
»
Image Base 0x400000
Entry Point 0x4db37a
Size Of Code 0xd9400
Size Of Initialized Data 0x800
File Type FileType.executable
Subsystem Subsystem.windows_gui
Machine Type MachineType.i386
Compile Timestamp 2020-09-21 19:18:00+00:00
Version Information (11)
»
Assembly Version 2.1.1.9
Comments kamaz
CompanyName Kamaz Limited
FileDescription Mandora`
FileVersion 1.7.8.9
InternalName lIJ.exe
LegalCopyright STL international LTD
LegalTrademarks TT®
OriginalFilename lIJ.exe
ProductName chair
ProductVersion 1.7.8.9
Sections (3)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x402000 0xd9380 0xd9400 0x200 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 7.72
.reloc 0x4dc000 0xc 0x200 0xd9600 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 0.1
.rsrc 0x4de000 0x580 0x600 0xd9800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 4.51
Imports (1)
»
mscoree.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
_CorExeMain 0x0 0x402000 0xdb348 0xd9548 0x0
Memory Dumps (45)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point AV YARA Actions
mfo4ed9hfrpsso4o.exe 1 0x00EB0000 0x00F8FFFF Relevant Image True 32-bit - False False
buffer 1 0x05C70400 0x05CF4BFF Marked Executable False 32-bit - False False
buffer 1 0x05C70178 0x05C7017F Marked Executable False 32-bit - False False
buffer 1 0x05C701A0 0x05C701A7 Marked Executable False 32-bit - False False
buffer 1 0x05C701C8 0x05C701CF Marked Executable False 32-bit - False False
buffer 1 0x05C701F0 0x05C701F7 Marked Executable False 32-bit - False False
buffer 1 0x05C70218 0x05C7021F Marked Executable False 32-bit - False False
buffer 1 0x05CF54FE 0x05CF5508 Marked Executable False 32-bit - False False
buffer 1 0x05CF54F2 0x05CF54FC Marked Executable False 32-bit - False False
buffer 1 0x05CF4C00 0x05CF4C47 Marked Executable False 32-bit - False False
buffer 1 0x05CF550C 0x05CF550F Marked Executable False 32-bit - False False
buffer 1 0x05CF5530 0x05CF5537 Marked Executable False 32-bit - False False
buffer 1 0x05CF5538 0x05CF553B Marked Executable False 32-bit - False False
buffer 1 0x05CF553C 0x05CF5543 Marked Executable False 32-bit - False False
buffer 1 0x05CF5544 0x05CF5547 Marked Executable False 32-bit - False False
buffer 1 0x05CF5548 0x05CF554B Marked Executable False 32-bit - False False
buffer 1 0x05CF554C 0x05CF554F Marked Executable False 32-bit - False False
buffer 1 0x05CF5550 0x05CF5557 Marked Executable False 32-bit - False False
buffer 1 0x05CF5558 0x05CF555B Marked Executable False 32-bit - False False
buffer 1 0x05CF555C 0x05CF5563 Marked Executable False 32-bit - False False
buffer 1 0x05CF5564 0x05CF5567 Marked Executable False 32-bit - False False
buffer 1 0x05CF5568 0x05CF556B Marked Executable False 32-bit - False False
buffer 1 0x05CF556C 0x05CF5573 Marked Executable False 32-bit - False False
buffer 1 0x05CF5574 0x05CF5577 Marked Executable False 32-bit - False False
buffer 1 0x05CF5578 0x05CF557B Marked Executable False 32-bit - False False
buffer 1 0x05CF557C 0x05CF5583 Marked Executable False 32-bit - False False
buffer 1 0x05CF5584 0x05CF5587 Marked Executable False 32-bit - False False
buffer 1 0x05CF5588 0x05CF558B Marked Executable False 32-bit - False False
buffer 1 0x05CF558C 0x05CF5593 Marked Executable False 32-bit - False False
buffer 1 0x05CF5594 0x05CF5597 Marked Executable False 32-bit - False False
buffer 1 0x05CF5598 0x05CF559B Marked Executable False 32-bit - False False
buffer 1 0x05CF559C 0x05CF559F Marked Executable False 32-bit - False False
buffer 1 0x05CF55A0 0x05CF55A7 Marked Executable False 32-bit - False False
buffer 1 0x05CF55A8 0x05CF55AB Marked Executable False 32-bit - False False
buffer 1 0x05CF55AC 0x05CF55AF Marked Executable False 32-bit - False False
buffer 1 0x05CF55B0 0x05CF55B7 Marked Executable False 32-bit - False False
buffer 1 0x05CF55B8 0x05CF55BB Marked Executable False 32-bit - False False
buffer 1 0x05CF55BC 0x05CF55BF Marked Executable False 32-bit - False False
buffer 6 0x00400000 0x0042DFFF First Execution True 32-bit 0x0041ED10 True False
mfo4ed9hfrpsso4o.exe 6 0x007D0000 0x008AFFFF Relevant Image True 32-bit - False False
buffer 6 0x00E00000 0x00E13FFF First Execution False 32-bit 0x00E00000 False False
buffer 6 0x01660000 0x01763FFF Marked Executable False 32-bit - False False
buffer 7 0x06120000 0x06223FFF Content Changed False 64-bit 0x061810E2 False False
buffer 6 0x00E40000 0x00E5DFFF Image In Buffer True 32-bit - False False
buffer 8 0x00A40000 0x00A5DFFF First Execution True 32-bit 0x00A49870 False False
Local AV Matches (1)
»
Threat Name Severity
Trojan.GenericKDZ.70241
Malicious
C:\Users\FD1HVy\AppData\Local\Temp\DB1 Dropped File Sqlite
Whitelisted
»
Also Known As C:\Users\FD1HVy\AppData\Local\Google\Chrome\User Data\Default\Login Data (Dropped File)
Mime Type application/x-sqlite3
File Size 18.00 KB
MD5 5c2161fc7b16d12b45b3e53d56fad16a Copy to Clipboard
SHA1 06a317f3d6519cf226db3ab029a212293d318a1b Copy to Clipboard
SHA256 cdad85eefaeee766286a12d8c4039c819a3515170da3070967a7f5198119b35a Copy to Clipboard
SSDeep 24:LLUH0KL7G0TMJHUyyJtmCm0XKY6lOKQAE9V8MffD4fOzeCmly6Uwc6FZW:Uz+JH3yJUheCVE9V8MX0PFlNU12ZW Copy to Clipboard
ImpHash -
File Reputation Information
»
Severity
Whitelisted
c:\users\fd1hvy\appdata\local\microsoft\windows\inetcache\counters2.dat Modified File Stream
Unknown
»
Mime Type application/octet-stream
File Size 128 Bytes
MD5 f3344e084c76cf0e0a3ad5bacde88678 Copy to Clipboard
SHA1 7609c6b4fe4da79d21ddea0cbc56b9e0ce5822a7 Copy to Clipboard
SHA256 67a2c36c1223e17b98b6114a85c345a63696aabb2d8225e7c3423762f7109ed7 Copy to Clipboard
SSDeep 3:iu/B:i Copy to Clipboard
ImpHash -
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogrc.ini Dropped File Stream
Unknown
»
Mime Type application/octet-stream
File Size 1.66 KB
MD5 be12879796aff1cdda6c81e4013f3768 Copy to Clipboard
SHA1 69f16df774765738c69a0127834c8cc82c3e1464 Copy to Clipboard
SHA256 8a773e5070f3f095a2d99fdfb805bb8da74bae4aa652b7af57d64d0eecd719bf Copy to Clipboard
SSDeep 24:YUd8ap1okH+gUca7b50WJ8axhiyUV0xyUR0oRBrHwWSSwxBlgHvgXP7b5RCd8a2B:bdiy3hW7AaxJrQWh2qdYUL9hw Copy to Clipboard
ImpHash -
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogri.ini Dropped File Stream
Unknown
»
Mime Type application/octet-stream
File Size 40 Bytes
MD5 d63a82e5d81e02e399090af26db0b9cb Copy to Clipboard
SHA1 91d0014c8f54743bba141fd60c9d963f869d76c9 Copy to Clipboard
SHA256 eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae Copy to Clipboard
SSDeep 3:+slXllAGQJhIl:dlIGQPY Copy to Clipboard
ImpHash -
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogrg.ini Dropped File Stream
Unknown
»
Mime Type application/octet-stream
File Size 38 Bytes
MD5 4aadf49fed30e4c9b3fe4a3dd6445ebe Copy to Clipboard
SHA1 1e332822167c6f351b99615eada2c30a538ff037 Copy to Clipboard
SHA256 75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56 Copy to Clipboard
SSDeep 3:rFGQJhIl:RGQPY Copy to Clipboard
ImpHash -
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogrv.ini Dropped File Stream
Unknown
»
Mime Type application/octet-stream
File Size 210 Bytes
MD5 0a12b29ad7ad6dfae3cc5e256dda51b8 Copy to Clipboard
SHA1 46afbbd21834a3afacf0eea2bca6569112512c6f Copy to Clipboard
SHA256 e9e3cf2606ead8943af1c5862b729085cfca4ebb064abc6781db64a602534927 Copy to Clipboard
SSDeep 6:tGQPYlIaExGNlGcQga3Of9y96GO4+egyaOBEoY:MlIaExGNYvOI6x49aWY Copy to Clipboard
ImpHash -
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlogim.jpeg Dropped File Image
Unknown
»
Mime Type image/jpeg
File Size 98.06 KB
MD5 ebe71a8c92833628b67f81ef121ba453 Copy to Clipboard
SHA1 16347cb0f78ec35616abe6d9172a50b222e53d80 Copy to Clipboard
SHA256 e1b8602c0b7a1b2c6df21219bf1c10023080098e100e7c3c84c13f62bca9fe67 Copy to Clipboard
SSDeep 1536:bqE0Xzdz4PtxhLkg7L6dFAXWZYlrWt8c+DHQ5s4UYmLFki1zgNKXXxKgEkwYq3Nw:GFzqbjL64Se68/Q5ULFrFHXG5OJuML Copy to Clipboard
ImpHash -
c:\users\fd1hvy\appdata\roaming\-6nbp70t\-6nlog.ini Dropped File Unknown
Not Queried
»
Mime Type -
File Size 0 Bytes
MD5 d41d8cd98f00b204e9800998ecf8427e Copy to Clipboard
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Copy to Clipboard
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 Copy to Clipboard
SSDeep 3:: Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image