Malicious
Classifications
Downloader Injector
Threat Names
SmokeLoader Mal/Generic-S Mal/HTMLGen-A
Dynamic Analysis Report
Created on 2022-01-14T01:20:00
8362e0f91ae3379c73422bbca7bac493.virus.exe
Windows Exe (x86-32)
Remarks (2/2)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "58 minutes, 20 seconds" to "11 seconds" to reveal dormant functionality.
(0x0200003A): A task was rescheduled ahead of time to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\8362e0f91ae3379c73422bbca7bac493.virus.exe | Sample File | Binary |
malicious
|
...
|
»
File Reputation Information
»
Verdict |
malicious
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x403360 |
Size Of Code | 0x12000 |
Size Of Initialized Data | 0x3da00 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2021-05-18 18:47:08+00:00 |
Version Information (3)
»
InternationalName | bomgvioci.iwa |
Copyright | Copyrighz (C) 2021, fudkort |
ProjectVersion | 3.10.70.57 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0x11fc6 | 0x12000 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.7 |
.rdata | 0x413000 | 0x596e | 0x5a00 | 0x12400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.67 |
.data | 0x419000 | 0x28278 | 0x22200 | 0x17e00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.81 |
.rsrc | 0x442000 | 0xdc88 | 0xde00 | 0x3a000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.38 |
Imports (1)
»
KERNEL32.dll (98)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SetLocaleInfoA | - | 0x413000 | 0x180b0 | 0x174b0 | 0x3f0 |
GetConsoleAliasesLengthW | - | 0x413004 | 0x180b4 | 0x174b4 | 0x181 |
VirtualQuery | - | 0x413008 | 0x180b8 | 0x174b8 | 0x45c |
GetDefaultCommConfigW | - | 0x41300c | 0x180bc | 0x174bc | 0x1b2 |
OpenJobObjectA | - | 0x413010 | 0x180c0 | 0x174c0 | 0x32d |
ReadConsoleA | - | 0x413014 | 0x180c4 | 0x174c4 | 0x35c |
GetConsoleAliasA | - | 0x413018 | 0x180c8 | 0x174c8 | 0x179 |
InterlockedDecrement | - | 0x41301c | 0x180cc | 0x174cc | 0x2bc |
GetProfileSectionA | - | 0x413020 | 0x180d0 | 0x174d0 | 0x231 |
SetComputerNameW | - | 0x413024 | 0x180d4 | 0x174d4 | 0x3a4 |
GetTimeFormatA | - | 0x413028 | 0x180d8 | 0x174d8 | 0x268 |
GetConsoleAliasesA | - | 0x41302c | 0x180dc | 0x174dc | 0x17f |
GetConsoleTitleA | - | 0x413030 | 0x180e0 | 0x174e0 | 0x19e |
SetFileTime | - | 0x413034 | 0x180e4 | 0x174e4 | 0x3e3 |
FindResourceExA | - | 0x413038 | 0x180e8 | 0x174e8 | 0x137 |
Sleep | - | 0x41303c | 0x180ec | 0x174ec | 0x421 |
GetFileAttributesW | - | 0x413040 | 0x180f0 | 0x174f0 | 0x1ce |
SetComputerNameExW | - | 0x413044 | 0x180f4 | 0x174f4 | 0x3a3 |
RaiseException | - | 0x413048 | 0x180f8 | 0x174f8 | 0x35a |
GetLongPathNameW | - | 0x41304c | 0x180fc | 0x174fc | 0x1f2 |
GetProcAddress | - | 0x413050 | 0x18100 | 0x17500 | 0x220 |
VirtualAlloc | - | 0x413054 | 0x18104 | 0x17504 | 0x454 |
GetAtomNameA | - | 0x413058 | 0x18108 | 0x17508 | 0x155 |
LocalAlloc | - | 0x41305c | 0x1810c | 0x1750c | 0x2f9 |
DnsHostnameToComputerNameA | - | 0x413060 | 0x18110 | 0x17510 | 0xce |
GetFileType | - | 0x413064 | 0x18114 | 0x17514 | 0x1d7 |
GetModuleFileNameA | - | 0x413068 | 0x18118 | 0x17518 | 0x1f4 |
CreateIoCompletionPort | - | 0x41306c | 0x1811c | 0x1751c | 0x84 |
SetConsoleTitleW | - | 0x413070 | 0x18120 | 0x17520 | 0x3c2 |
GetModuleHandleA | - | 0x413074 | 0x18124 | 0x17524 | 0x1f6 |
GetStringTypeW | - | 0x413078 | 0x18128 | 0x17528 | 0x240 |
GetVersionExA | - | 0x41307c | 0x1812c | 0x1752c | 0x275 |
ReadConsoleInputW | - | 0x413080 | 0x18130 | 0x17530 | 0x360 |
EnumSystemLocalesW | - | 0x413084 | 0x18134 | 0x17534 | 0xfa |
CreateThread | - | 0x413088 | 0x18138 | 0x17538 | 0xa3 |
HeapAlloc | - | 0x41308c | 0x1813c | 0x1753c | 0x29d |
GetCommandLineA | - | 0x413090 | 0x18140 | 0x17540 | 0x16f |
GetStartupInfoA | - | 0x413094 | 0x18144 | 0x17544 | 0x239 |
RtlUnwind | - | 0x413098 | 0x18148 | 0x17548 | 0x392 |
TerminateProcess | - | 0x41309c | 0x1814c | 0x1754c | 0x42d |
GetCurrentProcess | - | 0x4130a0 | 0x18150 | 0x17550 | 0x1a9 |
UnhandledExceptionFilter | - | 0x4130a4 | 0x18154 | 0x17554 | 0x43e |
SetUnhandledExceptionFilter | - | 0x4130a8 | 0x18158 | 0x17558 | 0x415 |
IsDebuggerPresent | - | 0x4130ac | 0x1815c | 0x1755c | 0x2d1 |
GetLastError | - | 0x4130b0 | 0x18160 | 0x17560 | 0x1e6 |
HeapFree | - | 0x4130b4 | 0x18164 | 0x17564 | 0x2a1 |
DeleteCriticalSection | - | 0x4130b8 | 0x18168 | 0x17568 | 0xbe |
LeaveCriticalSection | - | 0x4130bc | 0x1816c | 0x1756c | 0x2ef |
EnterCriticalSection | - | 0x4130c0 | 0x18170 | 0x17570 | 0xd9 |
VirtualFree | - | 0x4130c4 | 0x18174 | 0x17574 | 0x457 |
HeapReAlloc | - | 0x4130c8 | 0x18178 | 0x17578 | 0x2a4 |
HeapCreate | - | 0x4130cc | 0x1817c | 0x1757c | 0x29f |
GetModuleHandleW | - | 0x4130d0 | 0x18180 | 0x17580 | 0x1f9 |
ExitProcess | - | 0x4130d4 | 0x18184 | 0x17584 | 0x104 |
WriteFile | - | 0x4130d8 | 0x18188 | 0x17588 | 0x48d |
GetStdHandle | - | 0x4130dc | 0x1818c | 0x1758c | 0x23b |
SetHandleCount | - | 0x4130e0 | 0x18190 | 0x17590 | 0x3e8 |
SetFilePointer | - | 0x4130e4 | 0x18194 | 0x17594 | 0x3df |
TlsGetValue | - | 0x4130e8 | 0x18198 | 0x17598 | 0x434 |
TlsAlloc | - | 0x4130ec | 0x1819c | 0x1759c | 0x432 |
TlsSetValue | - | 0x4130f0 | 0x181a0 | 0x175a0 | 0x435 |
TlsFree | - | 0x4130f4 | 0x181a4 | 0x175a4 | 0x433 |
InterlockedIncrement | - | 0x4130f8 | 0x181a8 | 0x175a8 | 0x2c0 |
SetLastError | - | 0x4130fc | 0x181ac | 0x175ac | 0x3ec |
GetCurrentThreadId | - | 0x413100 | 0x181b0 | 0x175b0 | 0x1ad |
CloseHandle | - | 0x413104 | 0x181b4 | 0x175b4 | 0x43 |
FreeEnvironmentStringsA | - | 0x413108 | 0x181b8 | 0x175b8 | 0x14a |
GetEnvironmentStrings | - | 0x41310c | 0x181bc | 0x175bc | 0x1bf |
FreeEnvironmentStringsW | - | 0x413110 | 0x181c0 | 0x175c0 | 0x14b |
WideCharToMultiByte | - | 0x413114 | 0x181c4 | 0x175c4 | 0x47a |
GetEnvironmentStringsW | - | 0x413118 | 0x181c8 | 0x175c8 | 0x1c1 |
QueryPerformanceCounter | - | 0x41311c | 0x181cc | 0x175cc | 0x354 |
GetTickCount | - | 0x413120 | 0x181d0 | 0x175d0 | 0x266 |
GetCurrentProcessId | - | 0x413124 | 0x181d4 | 0x175d4 | 0x1aa |
GetSystemTimeAsFileTime | - | 0x413128 | 0x181d8 | 0x175d8 | 0x24f |
InitializeCriticalSectionAndSpinCount | - | 0x41312c | 0x181dc | 0x175dc | 0x2b5 |
LoadLibraryA | - | 0x413130 | 0x181e0 | 0x175e0 | 0x2f1 |
GetCPInfo | - | 0x413134 | 0x181e4 | 0x175e4 | 0x15b |
GetACP | - | 0x413138 | 0x181e8 | 0x175e8 | 0x152 |
GetOEMCP | - | 0x41313c | 0x181ec | 0x175ec | 0x213 |
IsValidCodePage | - | 0x413140 | 0x181f0 | 0x175f0 | 0x2db |
CreateFileA | - | 0x413144 | 0x181f4 | 0x175f4 | 0x78 |
SetStdHandle | - | 0x413148 | 0x181f8 | 0x175f8 | 0x3fc |
GetConsoleCP | - | 0x41314c | 0x181fc | 0x175fc | 0x183 |
GetConsoleMode | - | 0x413150 | 0x18200 | 0x17600 | 0x195 |
FlushFileBuffers | - | 0x413154 | 0x18204 | 0x17604 | 0x141 |
HeapSize | - | 0x413158 | 0x18208 | 0x17608 | 0x2a6 |
GetLocaleInfoA | - | 0x41315c | 0x1820c | 0x1760c | 0x1e8 |
LCMapStringA | - | 0x413160 | 0x18210 | 0x17610 | 0x2e1 |
MultiByteToWideChar | - | 0x413164 | 0x18214 | 0x17614 | 0x31a |
LCMapStringW | - | 0x413168 | 0x18218 | 0x17618 | 0x2e3 |
GetStringTypeA | - | 0x41316c | 0x1821c | 0x1761c | 0x23d |
SetEndOfFile | - | 0x413170 | 0x18220 | 0x17620 | 0x3cd |
GetProcessHeap | - | 0x413174 | 0x18224 | 0x17624 | 0x223 |
ReadFile | - | 0x413178 | 0x18228 | 0x17628 | 0x368 |
WriteConsoleA | - | 0x41317c | 0x1822c | 0x1762c | 0x482 |
GetConsoleOutputCP | - | 0x413180 | 0x18230 | 0x17630 | 0x199 |
WriteConsoleW | - | 0x413184 | 0x18234 | 0x17634 | 0x48c |
Memory Dumps (8)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|
8362e0f91ae3379c73422bbca7bac493.virus.exe | 1 | 0x00400000 | 0x0044FFFF | Relevant Image | 32-bit | 0x00407F33 |
...
|
||
buffer | 1 | 0x00030000 | 0x00038FFF | First Execution | 32-bit | 0x00030000 |
...
|
||
buffer | 1 | 0x001C0000 | 0x001C8FFF | First Execution | 32-bit | 0x001C0000 |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | First Execution | 32-bit | 0x00402F47 |
...
|
||
8362e0f91ae3379c73422bbca7bac493.virus.exe | 1 | 0x00400000 | 0x0044FFFF | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | Content Changed | 32-bit | 0x0040283D |
...
|
||
buffer | 2 | 0x00400000 | 0x00408FFF | Process Termination | 32-bit | - |
...
|
||
buffer | 2 | 0x00430000 | 0x00435FFF | Process Termination | 32-bit | - |
...
|