Injector Downloader
SmokeLoader Mal/Generic-S Mal/HTMLGen-A
Created on 2022-01-09T18:09:00
08a6dfeb7adf5eb90703abfab6c1f24a9f93c79e6287213f695c44f0181644ec.exe
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "2 hours, 3 minutes, 43 seconds" to "27 seconds" to reveal dormant functionality.
(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.
Remarks
(0x0200004A): 7 dumps were skipped because they exceeded the maximum dump size of 7 MB. The largest one was 39 MB.
(0x0200005D): 456 additional dumps with the reason "Content Changed" and a total of 2251 MB were skipped because the respective maximum limit was reached.
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\08a6dfeb7adf5eb90703abfab6c1f24a9f93c79e6287213f695c44f0181644ec.exe | Sample File | Binary |
malicious
|
...
|
Verdict |
malicious
|
Names | Mal/Generic-S |
Image Base | 0x400000 |
Entry Point | 0x401eaf |
Size Of Code | 0x10a00 |
Size Of Initialized Data | 0x2774600 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2021-02-13 14:27:02+00:00 |
InternationalName | bomgvioci.iwa |
Copyright | Copyrighz (C) 2021, fudkort |
ProjectVersion | 3.14.70.27 |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x108f9 | 0x10a00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.7 |
.rdata | 0x412000 | 0x1fc78 | 0x1fe00 | 0x10e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.52 |
.data | 0x432000 | 0x273bbb8 | 0x8600 | 0x30c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.72 |
.rsrc | 0x2b6e000 | 0xfe00 | 0xfe00 | 0x39200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.5 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DosDateTimeToFileTime | - | 0x412000 | 0x31358 | 0x30158 | 0xd0 |
FindResourceExW | - | 0x412004 | 0x3135c | 0x3015c | 0x138 |
InterlockedIncrement | - | 0x412008 | 0x31360 | 0x30160 | 0x2c0 |
GetConsoleAliasA | - | 0x41200c | 0x31364 | 0x30164 | 0x179 |
GetCurrentActCtx | - | 0x412010 | 0x31368 | 0x30168 | 0x1a4 |
WriteConsoleInputA | - | 0x412014 | 0x3136c | 0x3016c | 0x483 |
GetConsoleAliasesLengthA | - | 0x412018 | 0x31370 | 0x30170 | 0x180 |
GetConsoleTitleA | - | 0x41201c | 0x31374 | 0x30174 | 0x19e |
ReadConsoleW | - | 0x412020 | 0x31378 | 0x30178 | 0x366 |
SetFileTime | - | 0x412024 | 0x3137c | 0x3017c | 0x3e3 |
InitializeCriticalSection | - | 0x412028 | 0x31380 | 0x30180 | 0x2b4 |
GlobalAlloc | - | 0x41202c | 0x31384 | 0x30184 | 0x285 |
TerminateThread | - | 0x412030 | 0x31388 | 0x30188 | 0x42e |
GetLocaleInfoW | - | 0x412034 | 0x3138c | 0x3018c | 0x1ea |
SwitchToFiber | - | 0x412038 | 0x31390 | 0x30190 | 0x428 |
ReadConsoleInputA | - | 0x41203c | 0x31394 | 0x30194 | 0x35d |
ReadFileScatter | - | 0x412040 | 0x31398 | 0x30198 | 0x36a |
DnsHostnameToComputerNameW | - | 0x412044 | 0x3139c | 0x3019c | 0xcf |
GetWriteWatch | - | 0x412048 | 0x313a0 | 0x301a0 | 0x282 |
GetFileAttributesW | - | 0x41204c | 0x313a4 | 0x301a4 | 0x1ce |
WriteConsoleW | - | 0x412050 | 0x313a8 | 0x301a8 | 0x48c |
SetComputerNameExW | - | 0x412054 | 0x313ac | 0x301ac | 0x3a3 |
CreateActCtxA | - | 0x412058 | 0x313b0 | 0x301b0 | 0x67 |
GetLongPathNameW | - | 0x41205c | 0x313b4 | 0x301b4 | 0x1f2 |
SetLastError | - | 0x412060 | 0x313b8 | 0x301b8 | 0x3ec |
GetProcAddress | - | 0x412064 | 0x313bc | 0x301bc | 0x220 |
VirtualAlloc | - | 0x412068 | 0x313c0 | 0x301c0 | 0x454 |
GetAtomNameA | - | 0x41206c | 0x313c4 | 0x301c4 | 0x155 |
HeapLock | - | 0x412070 | 0x313c8 | 0x301c8 | 0x2a2 |
OpenJobObjectW | - | 0x412074 | 0x313cc | 0x301cc | 0x32e |
GetModuleFileNameA | - | 0x412078 | 0x313d0 | 0x301d0 | 0x1f4 |
SetConsoleTitleW | - | 0x41207c | 0x313d4 | 0x301d4 | 0x3c2 |
GetModuleHandleA | - | 0x412080 | 0x313d8 | 0x301d8 | 0x1f6 |
GetStringTypeW | - | 0x412084 | 0x313dc | 0x301dc | 0x240 |
ReleaseMutex | - | 0x412088 | 0x313e0 | 0x301e0 | 0x377 |
GetVersionExA | - | 0x41208c | 0x313e4 | 0x301e4 | 0x275 |
EnumCalendarInfoExA | - | 0x412090 | 0x313e8 | 0x301e8 | 0xdb |
SwitchToThread | - | 0x412094 | 0x313ec | 0x301ec | 0x429 |
HeapAlloc | - | 0x412098 | 0x313f0 | 0x301f0 | 0x29d |
GetStartupInfoW | - | 0x41209c | 0x313f4 | 0x301f4 | 0x23a |
TerminateProcess | - | 0x4120a0 | 0x313f8 | 0x301f8 | 0x42d |
GetCurrentProcess | - | 0x4120a4 | 0x313fc | 0x301fc | 0x1a9 |
UnhandledExceptionFilter | - | 0x4120a8 | 0x31400 | 0x30200 | 0x43e |
SetUnhandledExceptionFilter | - | 0x4120ac | 0x31404 | 0x30204 | 0x415 |
IsDebuggerPresent | - | 0x4120b0 | 0x31408 | 0x30208 | 0x2d1 |
DeleteCriticalSection | - | 0x4120b4 | 0x3140c | 0x3020c | 0xbe |
LeaveCriticalSection | - | 0x4120b8 | 0x31410 | 0x30210 | 0x2ef |
EnterCriticalSection | - | 0x4120bc | 0x31414 | 0x30214 | 0xd9 |
HeapFree | - | 0x4120c0 | 0x31418 | 0x30218 | 0x2a1 |
VirtualFree | - | 0x4120c4 | 0x3141c | 0x3021c | 0x457 |
HeapReAlloc | - | 0x4120c8 | 0x31420 | 0x30220 | 0x2a4 |
HeapCreate | - | 0x4120cc | 0x31424 | 0x30224 | 0x29f |
GetModuleHandleW | - | 0x4120d0 | 0x31428 | 0x30228 | 0x1f9 |
Sleep | - | 0x4120d4 | 0x3142c | 0x3022c | 0x421 |
ExitProcess | - | 0x4120d8 | 0x31430 | 0x30230 | 0x104 |
WriteFile | - | 0x4120dc | 0x31434 | 0x30234 | 0x48d |
GetStdHandle | - | 0x4120e0 | 0x31438 | 0x30238 | 0x23b |
RtlUnwind | - | 0x4120e4 | 0x3143c | 0x3023c | 0x392 |
GetLastError | - | 0x4120e8 | 0x31440 | 0x30240 | 0x1e6 |
TlsGetValue | - | 0x4120ec | 0x31444 | 0x30244 | 0x434 |
TlsAlloc | - | 0x4120f0 | 0x31448 | 0x30248 | 0x432 |
TlsSetValue | - | 0x4120f4 | 0x3144c | 0x3024c | 0x435 |
TlsFree | - | 0x4120f8 | 0x31450 | 0x30250 | 0x433 |
GetCurrentThreadId | - | 0x4120fc | 0x31454 | 0x30254 | 0x1ad |
InterlockedDecrement | - | 0x412100 | 0x31458 | 0x30258 | 0x2bc |
SetHandleCount | - | 0x412104 | 0x3145c | 0x3025c | 0x3e8 |
GetFileType | - | 0x412108 | 0x31460 | 0x30260 | 0x1d7 |
GetStartupInfoA | - | 0x41210c | 0x31464 | 0x30264 | 0x239 |
GetModuleFileNameW | - | 0x412110 | 0x31468 | 0x30268 | 0x1f5 |
FreeEnvironmentStringsW | - | 0x412114 | 0x3146c | 0x3026c | 0x14b |
GetEnvironmentStringsW | - | 0x412118 | 0x31470 | 0x30270 | 0x1c1 |
GetCommandLineW | - | 0x41211c | 0x31474 | 0x30274 | 0x170 |
QueryPerformanceCounter | - | 0x412120 | 0x31478 | 0x30278 | 0x354 |
GetTickCount | - | 0x412124 | 0x3147c | 0x3027c | 0x266 |
GetCurrentProcessId | - | 0x412128 | 0x31480 | 0x30280 | 0x1aa |
GetSystemTimeAsFileTime | - | 0x41212c | 0x31484 | 0x30284 | 0x24f |
SetFilePointer | - | 0x412130 | 0x31488 | 0x30288 | 0x3df |
WideCharToMultiByte | - | 0x412134 | 0x3148c | 0x3028c | 0x47a |
GetConsoleCP | - | 0x412138 | 0x31490 | 0x30290 | 0x183 |
GetConsoleMode | - | 0x41213c | 0x31494 | 0x30294 | 0x195 |
GetCPInfo | - | 0x412140 | 0x31498 | 0x30298 | 0x15b |
GetACP | - | 0x412144 | 0x3149c | 0x3029c | 0x152 |
GetOEMCP | - | 0x412148 | 0x314a0 | 0x302a0 | 0x213 |
IsValidCodePage | - | 0x41214c | 0x314a4 | 0x302a4 | 0x2db |
InitializeCriticalSectionAndSpinCount | - | 0x412150 | 0x314a8 | 0x302a8 | 0x2b5 |
LoadLibraryA | - | 0x412154 | 0x314ac | 0x302ac | 0x2f1 |
CloseHandle | - | 0x412158 | 0x314b0 | 0x302b0 | 0x43 |
CreateFileA | - | 0x41215c | 0x314b4 | 0x302b4 | 0x78 |
RaiseException | - | 0x412160 | 0x314b8 | 0x302b8 | 0x35a |
SetStdHandle | - | 0x412164 | 0x314bc | 0x302bc | 0x3fc |
WriteConsoleA | - | 0x412168 | 0x314c0 | 0x302c0 | 0x482 |
GetConsoleOutputCP | - | 0x41216c | 0x314c4 | 0x302c4 | 0x199 |
MultiByteToWideChar | - | 0x412170 | 0x314c8 | 0x302c8 | 0x31a |
LCMapStringA | - | 0x412174 | 0x314cc | 0x302cc | 0x2e1 |
LCMapStringW | - | 0x412178 | 0x314d0 | 0x302d0 | 0x2e3 |
GetStringTypeA | - | 0x41217c | 0x314d4 | 0x302d4 | 0x23d |
GetLocaleInfoA | - | 0x412180 | 0x314d8 | 0x302d8 | 0x1e8 |
HeapSize | - | 0x412184 | 0x314dc | 0x302dc | 0x2a6 |
FlushFileBuffers | - | 0x412188 | 0x314e0 | 0x302e0 | 0x141 |
SetEndOfFile | - | 0x41218c | 0x314e4 | 0x302e4 | 0x3cd |
GetProcessHeap | - | 0x412190 | 0x314e8 | 0x302e8 | 0x223 |
ReadFile | - | 0x412194 | 0x314ec | 0x302ec | 0x368 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
ShowCaret | - | 0x41219c | 0x314f4 | 0x302f4 | 0x2b2 |
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
buffer | 1 | 0x02C50000 | 0x02C58FFF | First Execution | 32-bit | 0x02C50000 |
...
|
||
buffer | 1 | 0x02C60000 | 0x02C68FFF | First Execution | 32-bit | 0x02C60000 |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | First Execution | 32-bit | 0x00402F47 |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | Content Changed | 32-bit | 0x0040283D |
...
|
||
buffer | 2 | 0x01E40000 | 0x01E55FFF | Marked Executable | 32-bit | - |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x004F0000 | 0x004F5FFF | Process Termination | 32-bit | - |
...
|
C:\Users\RDHJ0C~1\AppData\Local\Temp\6951.exe | Downloaded File | Binary |
malicious
|
...
|
Verdict |
malicious
|
Names | Mal/Generic-S |
Image Base | 0x400000 |
Entry Point | 0x4f6c8e |
Size Of Code | 0xf4e00 |
Size Of Initialized Data | 0x800 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2059-05-22 02:30:43+00:00 |
Comments | cxUMnUv |
CompanyName | RgnVeIfBj |
FileDescription | cxUMnUv |
FileVersion | 2.13.72.61 |
InternalName | ycvlCbh.exe |
LegalCopyright | Copyright © 2021 RgnVeIfBj |
LegalTrademarks | - |
OriginalFilename | ycvlCbh.exe |
ProductName | cxUMnUv |
ProductVersion | 2.13.72.61 |
Assembly Version | 2.13.72.61 |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0xf4c94 | 0xf4e00 | 0x200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.92 |
.rsrc | 0x4f8000 | 0x5de | 0x600 | 0xf5000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.28 |
.reloc | 0x4fa000 | 0xc | 0x200 | 0xf5600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x402000 | 0xf6c64 | 0xf4e64 | 0x0 |
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
6951.exe | 7 | 0x00400000 | 0x004FBFFF | Relevant Image | 32-bit | - |
...
|
C:\Users\RDHJ0C~1\AppData\Local\Temp\6951.tmp | Dropped File | Unknown |
clean
|
...
|
C:\Users\RDHJ0C~1\AppData\Local\Temp\AA17.exe | Downloaded File | Binary |
clean
|
...
|
Image Base | 0x400000 |
Entry Point | 0x8fe9a0 |
Size Of Code | 0x1c2000 |
Size Of Initialized Data | 0x1000 |
Size Of Uninitialized Data | 0x33c000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.amd64 |
Compile Timestamp | 1970-01-01 00:00:00+00:00 |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UPX0 | 0x401000 | 0x33c000 | 0x0 | 0x200 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
UPX1 | 0x73d000 | 0x1c2000 | 0x1c1c00 | 0x200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.87 |
UPX2 | 0x8ff000 | 0x1000 | 0x200 | 0x1c1e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.37 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
LoadLibraryA | - | 0x8ff028 | 0x4ff028 | 0x1c1e28 | 0x0 |
ExitProcess | - | 0x8ff030 | 0x4ff030 | 0x1c1e30 | 0x0 |
GetProcAddress | - | 0x8ff038 | 0x4ff038 | 0x1c1e38 | 0x0 |
VirtualProtect | - | 0x8ff040 | 0x4ff040 | 0x1c1e40 | 0x0 |
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | First Execution | 64-bit | 0x008FE9A0 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00440D60 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00447DC0 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00403E70 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00445830 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00444F10 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00451CB0 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00428A30 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x0040D1C0 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00408710 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x004360D0 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x004166B0 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00420F60 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x0045FA10 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00427EE0 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x00421090 |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Content Changed | 64-bit | 0x0045A6D3 |
...
|
||
buffer | 6 | 0x00160000 | 0x0019FFFF | Final Dump | 64-bit | - |
...
|
||
buffer | 6 | 0x001A0000 | 0x001C1FFF | Final Dump | 64-bit | - |
...
|
||
buffer | 6 | 0x001D0000 | 0x001DFFFF | Final Dump | 64-bit | - |
...
|
||
buffer | 6 | 0x001E0000 | 0x001EFFFF | Final Dump | 64-bit | - |
...
|
||
buffer | 6 | 0x00B00000 | 0x00B3FFFF | Final Dump | 64-bit | - |
...
|
||
buffer | 6 | 0x039D0000 | 0x03A0FFFF | Final Dump | 64-bit | - |
...
|
||
buffer | 6 | 0xC000000000 | 0xC0003FFFFF | Final Dump | 64-bit | - |
...
|
||
aa17.exe | 6 | 0x00400000 | 0x008FFFFF | Final Dump | 64-bit | - |
...
|