Malicious
Classifications
Wiper Ransomware
Threat Names
-
Dynamic Analysis Report
Created on 2021-06-17T20:42:00
Windows Session Manager.exe
Windows Exe (x86-32)
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "4 minutes" to "40 seconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\kEecfMwgj\Desktop\Windows Session Manager.exe | Sample File | Binary |
malicious
|
...
|
»
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x44e00a |
Size Of Code | 0xa600 |
Size Of Initialized Data | 0x3ae00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2060-05-27 03:32:56+00:00 |
Version Information (11)
»
Comments | - |
CompanyName | - |
FileDescription | Windows Session Manager |
FileVersion | 1.0.0.0 |
InternalName | Windows Session Manager.exe |
LegalCopyright | Copyright © 2021 |
LegalTrademarks | - |
OriginalFilename | Windows Session Manager.exe |
ProductName | Windows Session Manager |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
UA?IyCw| | 0x402000 | 0x3a304 | 0x3a400 | 0x400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 8.0 |
.text | 0x43e000 | 0xa3e8 | 0xa400 | 0x3a800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.22 |
.rsrc | 0x44a000 | 0x618 | 0x800 | 0x44c00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.45 |
.reloc | 0x44c000 | 0xc | 0x200 | 0x45400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 0.1 |
- | 0x44e000 | 0x10 | 0x200 | 0x45600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 0.14 |
Imports (1)
»
mscoree.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | - | 0x44e000 | 0x3f970 | 0x3c170 | 0x0 |
Memory Dumps (17)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
windows session manager.exe | 1 | 0x010C0000 | 0x0110FFFF | Relevant Image | 32-bit | - |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | First Execution | 32-bit | 0x004C0040 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004C1000 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004C2000 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004C5850 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004C6708 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004C72A8 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004C8013 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004C9000 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004CA308 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004CB000 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004C4000 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004CC000 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004CD053 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004CE000 |
...
|
|||
buffer | 1 | 0x004A0000 | 0x004E5FFF | Content Changed | 32-bit | 0x004CF000 |
...
|
|||
windows session manager.exe | 1 | 0x010C0000 | 0x0110FFFF | Final Dump | 32-bit | - |
...
|
YARA Matches (7)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
MultipleNetObfuscatorAttributes | .NET file contains multiple obfuscator attributes | - |
2/5
|
...
|
BabelObfuscatorAttributes | Babel Obfuscator Attributes | - |
1/5
|
...
|
DNGuardObfuscatorAttributes | DNGuard HVM Attributes | - |
1/5
|
...
|
MaxtoCodeObfuscatorAttributes | MaxtoCode Obfuscator Attributes | - |
1/5
|
...
|
NETReactorObfuscatorAttributes | .NET Reactor Obfuscator Attributes | - |
1/5
|
...
|
RyanBorlandProtectorAttributes | Ryan Borland Protector Attributes | - |
1/5
|
...
|
YanoObfuscatorAttributes | Yano Obfuscator Attributes | - |
1/5
|
...
|
C:\Users\kEecfMwgj\Videos\NxzOBAzgvcNeV3cE gd-\b5GepjBp9EYKzeV\-1DVuhiu_x6Y\LvrtiqeAx zdKEixkd\MP8Ghk7Dv AjRZ\readme.txt.Poteston | Modified File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\-S33.bmp.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\9a-Wiva\DJIlxXh.pptx.Poteston | Dropped File | Compressed |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\9a-Wiva\epH-_N hU0l.jpg.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\9a-Wiva\nGUytBPJlqP.rtf.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\9a-Wiva\SPnXfcP7CFdFT0XeBuv6.ots.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\9a-Wiva\UapJbgd7.flv.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\9a-Wiva\vc-4n.png.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\7du2.gif.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\UkCm4Dq_\2W4Hx.m4a.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\UkCm4Dq_\EoS9VOqOPP_4IHn.mp4.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\UkCm4Dq_\G ZkrQjDnE0.odt.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\UkCm4Dq_\noCEUmxfykebkeyH9.flv.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\UkCm4Dq_\TbVG3PC0bCG2.png.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\UkCm4Dq_\XbvlKnZREA1k.mp3.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\UkCm4Dq_\XtD X6g3ZZH.m4a.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\ixaXT-WqX0.swf.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\UkCm4Dq_\readme.txt.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\TETQ.m4a.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\z71-eOvw.m4a.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\677aEP3NVPVTqr.jpg.Poteston | Dropped File | Stream |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\9a-Wiva\readme.txt | Dropped File | Text |
clean
|
...
|
»
C:\Users\kEecfMwgj\Desktop\LyNdnxnx\UkCm4Dq_\readme.txt.Poteston | Dropped File | Stream |
clean
|
...
|
»