VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Ransomware
|
Threat Names: |
Trojan.GenericKDZ.67331
Mal/Generic-S
|
2020-05-22_17-36-19.exe
Windows Exe (x86-32)
Created at 2020-05-23T03:30:00
Remarks
(0x0200001E): The maximum size of extracted files was exceeded. Some files may be missing in the report.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\2020-05-22_17-36-19.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
Names | Mal/Generic-S |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x4062e1 |
Size Of Code | 0xea00 |
Size Of Initialized Data | 0x284e400 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-02-27 06:09:00+00:00 |
Sections (4)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0xe9aa | 0xea00 | 0x400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.66 |
.rdata | 0x410000 | 0x3367 | 0x3400 | 0xee00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.95 |
.data | 0x414000 | 0x2825550 | 0x3f200 | 0x12200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.68 |
.rsrc | 0x2c3a000 | 0x1eb70 | 0x1ec00 | 0x51400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.84 |
Imports (3)
»
KERNEL32.dll (86)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
UnmapViewOfFile | 0x0 | 0x410000 | 0x12ad4 | 0x118d4 | 0x4d6 |
GetMailslotInfo | 0x0 | 0x410004 | 0x12ad8 | 0x118d8 | 0x210 |
GetNumaHighestNodeNumber | 0x0 | 0x410008 | 0x12adc | 0x118dc | 0x229 |
GetNumaNodeProcessorMask | 0x0 | 0x41000c | 0x12ae0 | 0x118e0 | 0x22b |
GetNumaAvailableMemoryNode | 0x0 | 0x410010 | 0x12ae4 | 0x118e4 | 0x227 |
ConnectNamedPipe | 0x0 | 0x410014 | 0x12ae8 | 0x118e8 | 0x65 |
SetProcessAffinityMask | 0x0 | 0x410018 | 0x12aec | 0x118ec | 0x47e |
RtlCaptureStackBackTrace | 0x0 | 0x41001c | 0x12af0 | 0x118f0 | 0x415 |
SetVolumeMountPointA | 0x0 | 0x410020 | 0x12af4 | 0x118f4 | 0x4aa |
DeleteVolumeMountPointW | 0x0 | 0x410024 | 0x12af8 | 0x118f8 | 0xdc |
GetVolumeNameForVolumeMountPointW | 0x0 | 0x410028 | 0x12afc | 0x118fc | 0x2a9 |
FindFirstFileExA | 0x0 | 0x41002c | 0x12b00 | 0x11900 | 0x133 |
IsDBCSLeadByte | 0x0 | 0x410030 | 0x12b04 | 0x11904 | 0x2fe |
LoadResource | 0x0 | 0x410034 | 0x12b08 | 0x11908 | 0x341 |
LocalAlloc | 0x0 | 0x410038 | 0x12b0c | 0x1190c | 0x344 |
GetProcAddress | 0x0 | 0x41003c | 0x12b10 | 0x11910 | 0x245 |
ProcessIdToSessionId | 0x0 | 0x410040 | 0x12b14 | 0x11914 | 0x399 |
GetModuleHandleW | 0x0 | 0x410044 | 0x12b18 | 0x11918 | 0x218 |
IsWow64Process | 0x0 | 0x410048 | 0x12b1c | 0x1191c | 0x30e |
SetEnvironmentVariableW | 0x0 | 0x41004c | 0x12b20 | 0x11920 | 0x457 |
ScrollConsoleScreenBufferA | 0x0 | 0x410050 | 0x12b24 | 0x11924 | 0x41a |
WriteConsoleW | 0x0 | 0x410054 | 0x12b28 | 0x11928 | 0x524 |
RaiseException | 0x0 | 0x410058 | 0x12b2c | 0x1192c | 0x3b1 |
RtlUnwind | 0x0 | 0x41005c | 0x12b30 | 0x11930 | 0x418 |
GetCommandLineW | 0x0 | 0x410060 | 0x12b34 | 0x11934 | 0x187 |
HeapSetInformation | 0x0 | 0x410064 | 0x12b38 | 0x11938 | 0x2d3 |
GetStartupInfoW | 0x0 | 0x410068 | 0x12b3c | 0x1193c | 0x263 |
HeapAlloc | 0x0 | 0x41006c | 0x12b40 | 0x11940 | 0x2cb |
GetLastError | 0x0 | 0x410070 | 0x12b44 | 0x11944 | 0x202 |
HeapFree | 0x0 | 0x410074 | 0x12b48 | 0x11948 | 0x2cf |
IsProcessorFeaturePresent | 0x0 | 0x410078 | 0x12b4c | 0x1194c | 0x304 |
EncodePointer | 0x0 | 0x41007c | 0x12b50 | 0x11950 | 0xea |
DecodePointer | 0x0 | 0x410080 | 0x12b54 | 0x11954 | 0xca |
TlsAlloc | 0x0 | 0x410084 | 0x12b58 | 0x11958 | 0x4c5 |
TlsGetValue | 0x0 | 0x410088 | 0x12b5c | 0x1195c | 0x4c7 |
TlsSetValue | 0x0 | 0x41008c | 0x12b60 | 0x11960 | 0x4c8 |
TlsFree | 0x0 | 0x410090 | 0x12b64 | 0x11964 | 0x4c6 |
InterlockedIncrement | 0x0 | 0x410094 | 0x12b68 | 0x11968 | 0x2ef |
SetLastError | 0x0 | 0x410098 | 0x12b6c | 0x1196c | 0x473 |
GetCurrentThreadId | 0x0 | 0x41009c | 0x12b70 | 0x11970 | 0x1c5 |
InterlockedDecrement | 0x0 | 0x4100a0 | 0x12b74 | 0x11974 | 0x2eb |
TerminateProcess | 0x0 | 0x4100a4 | 0x12b78 | 0x11978 | 0x4c0 |
GetCurrentProcess | 0x0 | 0x4100a8 | 0x12b7c | 0x1197c | 0x1c0 |
UnhandledExceptionFilter | 0x0 | 0x4100ac | 0x12b80 | 0x11980 | 0x4d3 |
SetUnhandledExceptionFilter | 0x0 | 0x4100b0 | 0x12b84 | 0x11984 | 0x4a5 |
IsDebuggerPresent | 0x0 | 0x4100b4 | 0x12b88 | 0x11988 | 0x300 |
EnterCriticalSection | 0x0 | 0x4100b8 | 0x12b8c | 0x1198c | 0xee |
LeaveCriticalSection | 0x0 | 0x4100bc | 0x12b90 | 0x11990 | 0x339 |
InitializeCriticalSectionAndSpinCount | 0x0 | 0x4100c0 | 0x12b94 | 0x11994 | 0x2e3 |
ExitProcess | 0x0 | 0x4100c4 | 0x12b98 | 0x11998 | 0x119 |
WriteFile | 0x0 | 0x4100c8 | 0x12b9c | 0x1199c | 0x525 |
GetStdHandle | 0x0 | 0x4100cc | 0x12ba0 | 0x119a0 | 0x264 |
GetModuleFileNameW | 0x0 | 0x4100d0 | 0x12ba4 | 0x119a4 | 0x214 |
FreeEnvironmentStringsW | 0x0 | 0x4100d4 | 0x12ba8 | 0x119a8 | 0x161 |
GetEnvironmentStringsW | 0x0 | 0x4100d8 | 0x12bac | 0x119ac | 0x1da |
SetHandleCount | 0x0 | 0x4100dc | 0x12bb0 | 0x119b0 | 0x46f |
GetFileType | 0x0 | 0x4100e0 | 0x12bb4 | 0x119b4 | 0x1f3 |
DeleteCriticalSection | 0x0 | 0x4100e4 | 0x12bb8 | 0x119b8 | 0xd1 |
HeapCreate | 0x0 | 0x4100e8 | 0x12bbc | 0x119bc | 0x2cd |
QueryPerformanceCounter | 0x0 | 0x4100ec | 0x12bc0 | 0x119c0 | 0x3a7 |
GetTickCount | 0x0 | 0x4100f0 | 0x12bc4 | 0x119c4 | 0x293 |
GetCurrentProcessId | 0x0 | 0x4100f4 | 0x12bc8 | 0x119c8 | 0x1c1 |
GetSystemTimeAsFileTime | 0x0 | 0x4100f8 | 0x12bcc | 0x119cc | 0x279 |
Sleep | 0x0 | 0x4100fc | 0x12bd0 | 0x119d0 | 0x4b2 |
HeapSize | 0x0 | 0x410100 | 0x12bd4 | 0x119d4 | 0x2d4 |
GetCPInfo | 0x0 | 0x410104 | 0x12bd8 | 0x119d8 | 0x172 |
GetACP | 0x0 | 0x410108 | 0x12bdc | 0x119dc | 0x168 |
GetOEMCP | 0x0 | 0x41010c | 0x12be0 | 0x119e0 | 0x237 |
IsValidCodePage | 0x0 | 0x410110 | 0x12be4 | 0x119e4 | 0x30a |
CloseHandle | 0x0 | 0x410114 | 0x12be8 | 0x119e8 | 0x52 |
CreateFileA | 0x0 | 0x410118 | 0x12bec | 0x119ec | 0x88 |
MultiByteToWideChar | 0x0 | 0x41011c | 0x12bf0 | 0x119f0 | 0x367 |
LoadLibraryW | 0x0 | 0x410120 | 0x12bf4 | 0x119f4 | 0x33f |
HeapReAlloc | 0x0 | 0x410124 | 0x12bf8 | 0x119f8 | 0x2d2 |
WideCharToMultiByte | 0x0 | 0x410128 | 0x12bfc | 0x119fc | 0x511 |
LCMapStringW | 0x0 | 0x41012c | 0x12c00 | 0x11a00 | 0x32d |
GetStringTypeW | 0x0 | 0x410130 | 0x12c04 | 0x11a04 | 0x269 |
GetConsoleCP | 0x0 | 0x410134 | 0x12c08 | 0x11a08 | 0x19a |
GetConsoleMode | 0x0 | 0x410138 | 0x12c0c | 0x11a0c | 0x1ac |
FlushFileBuffers | 0x0 | 0x41013c | 0x12c10 | 0x11a10 | 0x157 |
SetStdHandle | 0x0 | 0x410140 | 0x12c14 | 0x11a14 | 0x487 |
SetFilePointer | 0x0 | 0x410144 | 0x12c18 | 0x11a18 | 0x466 |
SetEndOfFile | 0x0 | 0x410148 | 0x12c1c | 0x11a1c | 0x453 |
GetProcessHeap | 0x0 | 0x41014c | 0x12c20 | 0x11a20 | 0x24a |
ReadFile | 0x0 | 0x410150 | 0x12c24 | 0x11a24 | 0x3c0 |
CreateFileW | 0x0 | 0x410154 | 0x12c28 | 0x11a28 | 0x8f |
USER32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetCursorInfo | 0x0 | 0x410164 | 0x12c38 | 0x11a38 | 0x11f |
GetCursor | 0x0 | 0x410168 | 0x12c3c | 0x11a3c | 0x11d |
MSIMG32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
TransparentBlt | 0x0 | 0x41015c | 0x12c30 | 0x11a30 | 0x3 |
Exports (1)
»
Api name | EAT Address | Ordinal |
---|---|---|
@shutting@0 | 0x1040 | 0x1 |
Memory Dumps (2)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuild | Bitness | Entry Point | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
buffer | 1 | 0x02D122F0 | 0x02D4B337 | First Execution | 32-bit | 0x02D122F0 |
...
|
|||
buffer | 1 | 0x002C0000 | 0x002FAFFF | First Execution | 32-bit | 0x002C0000 |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.GenericKDZ.67331 |
Malicious
|
C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Roaming//KEY.FILE | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\cs-CZ\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\de-DE\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\da-DK\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\el-GR\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\en-US\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\en-US\memtest.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\fi-FI\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\es-ES\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\fr-FR\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\Fonts\chs_boot.ttf.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\hu-HU\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\it-IT\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\Fonts\cht_boot.ttf.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\ja-JP\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\Fonts\jpn_boot.ttf.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\ko-KR\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\Fonts\kor_boot.ttf.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\Fonts\wgl4_boot.ttf.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\nl-NL\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\nb-NO\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\pl-PL\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\pt-BR\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\pt-PT\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\ru-RU\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\sv-SE\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\tr-TR\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\zh-CN\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\zh-HK\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Boot\zh-TW\bootmgr.exe.mui.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files (x86)\Mozilla Firefox\precomplete.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Program Files (x86)\Mozilla Firefox\removed-files.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Recovery\e9e23962-4a25-11e7-88e8-91fb2ec43f0b\boot.sdi.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\Default\NTUSER.DAT.LOG.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\Default\NTUSER.DAT.LOG1.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\Default\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TM.blf.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\Default\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000001.regtrans-ms.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\Default\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000002.regtrans-ms.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Windows\Panther\setupinfo.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.msi.corona-lock | Dropped File | Binary |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PublisherMUI.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.msi.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PowerPointMUI.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlkLR.cab.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\PubLR.cab.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelLR.cab.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.msi.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\OutlookMUI.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\Setup.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\Setup.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\Setup.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.msi.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proofing.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Setup.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.msi.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Office32MUI.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.msi.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\ExcelMUI.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\Setup.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\OWOW32LR.cab.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\Setup.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfLR.cab.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\WordLR.cab.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\PptLR.cab.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfoPathMUI.msi.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\InfoPathMUI.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\Setup.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\Setup.xml.corona-lock | Dropped File | Stream |
Unknown
|
...
|
»
C:\Recovery\e9e23962-4a25-11e7-88e8-91fb2ec43f0b\Winre.wim.corona-lock | Dropped File | Compressed |
Unknown
|
...
|
»