VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: Keylogger, Spyware, Backdoor, Trojan |
radiance.png.exe
Windows Exe (x86-32)
Created at 2019-05-16T17:08:00
Remarks (2/3)
(0x200000e): The overall sleep time of all monitored processes was truncated from "21 hours, 36 minutes, 10 seconds" to "1 minute, 34 seconds" to reveal dormant functionality.
(0x200003a): A task was rescheduled ahead of time to reveal dormant functionality.
Remarks
(0x200000c): The maximum memory dump size was exceeded. Some dumps may be missing in the report.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\2XC7u663GxWc\Desktop\radiance.png.exe | Sample File | Binary |
Malicious
|
...
|
»
File Reputation Information
»
Severity |
Blacklisted
|
First Seen | 2019-05-14 17:30 (UTC+2) |
Last Seen | 2019-05-16 10:07 (UTC+2) |
Names | Win32.Trojan.Trickbot |
Families | Trickbot |
Classification | Trojan |
PE Information
»
Image Base | 0x400000 |
Entry Point | 0x401000 |
Size Of Code | 0xd000 |
Size Of Initialized Data | 0x35000 |
File Type | FileType.executable |
Subsystem | Subsystem.windows_gui |
Machine Type | MachineType.i386 |
Compile Timestamp | 2019-05-14 12:17:04+00:00 |
Sections (8)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x401000 | 0xd000 | 0xc600 | 0x600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.51 |
.data | 0x40e000 | 0x35000 | 0x2fa00 | 0xcc00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.92 |
.tls | 0x443000 | 0x1000 | 0x200 | 0x3c600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0 |
.rdata | 0x444000 | 0x1000 | 0x200 | 0x3c800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 0.21 |
.idata | 0x445000 | 0x1000 | 0xa00 | 0x3ca00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.41 |
.edata | 0x446000 | 0x1000 | 0x200 | 0x3d400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.26 |
.rsrc | 0x447000 | 0x1000 | 0x200 | 0x3d600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 0.93 |
.reloc | 0x448000 | 0x1000 | 0x1000 | 0x3d800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ | 6.66 |
Imports (4)
»
KERNEL32.DLL (43)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CloseHandle | 0x0 | 0x445114 | 0x45064 | 0x3ca64 | 0x0 |
CreateFileA | 0x0 | 0x445118 | 0x45068 | 0x3ca68 | 0x0 |
ExitProcess | 0x0 | 0x44511c | 0x4506c | 0x3ca6c | 0x0 |
GetACP | 0x0 | 0x445120 | 0x45070 | 0x3ca70 | 0x0 |
GetCPInfo | 0x0 | 0x445124 | 0x45074 | 0x3ca74 | 0x0 |
GetCommandLineA | 0x0 | 0x445128 | 0x45078 | 0x3ca78 | 0x0 |
GetCurrentThreadId | 0x0 | 0x44512c | 0x4507c | 0x3ca7c | 0x0 |
GetEnvironmentStrings | 0x0 | 0x445130 | 0x45080 | 0x3ca80 | 0x0 |
GetFileType | 0x0 | 0x445134 | 0x45084 | 0x3ca84 | 0x0 |
GetLastError | 0x0 | 0x445138 | 0x45088 | 0x3ca88 | 0x0 |
GetLocalTime | 0x0 | 0x44513c | 0x4508c | 0x3ca8c | 0x0 |
GetModuleFileNameA | 0x0 | 0x445140 | 0x45090 | 0x3ca90 | 0x0 |
GetModuleHandleA | 0x0 | 0x445144 | 0x45094 | 0x3ca94 | 0x0 |
GetOEMCP | 0x0 | 0x445148 | 0x45098 | 0x3ca98 | 0x0 |
GetProcAddress | 0x0 | 0x44514c | 0x4509c | 0x3ca9c | 0x0 |
GetProcessHeap | 0x0 | 0x445150 | 0x450a0 | 0x3caa0 | 0x0 |
GetStartupInfoA | 0x0 | 0x445154 | 0x450a4 | 0x3caa4 | 0x0 |
GetStdHandle | 0x0 | 0x445158 | 0x450a8 | 0x3caa8 | 0x0 |
GetStringTypeW | 0x0 | 0x44515c | 0x450ac | 0x3caac | 0x0 |
GetTickCount | 0x0 | 0x445160 | 0x450b0 | 0x3cab0 | 0x0 |
GetVersion | 0x0 | 0x445164 | 0x450b4 | 0x3cab4 | 0x0 |
GetVersionExA | 0x0 | 0x445168 | 0x450b8 | 0x3cab8 | 0x0 |
GlobalMemoryStatus | 0x0 | 0x44516c | 0x450bc | 0x3cabc | 0x0 |
HeapAlloc | 0x0 | 0x445170 | 0x450c0 | 0x3cac0 | 0x0 |
HeapFree | 0x0 | 0x445174 | 0x450c4 | 0x3cac4 | 0x0 |
LoadLibraryA | 0x0 | 0x445178 | 0x450c8 | 0x3cac8 | 0x0 |
LoadLibraryW | 0x0 | 0x44517c | 0x450cc | 0x3cacc | 0x0 |
MultiByteToWideChar | 0x0 | 0x445180 | 0x450d0 | 0x3cad0 | 0x0 |
RaiseException | 0x0 | 0x445184 | 0x450d4 | 0x3cad4 | 0x0 |
RtlUnwind | 0x0 | 0x445188 | 0x450d8 | 0x3cad8 | 0x0 |
SetConsoleCtrlHandler | 0x0 | 0x44518c | 0x450dc | 0x3cadc | 0x0 |
SetFilePointer | 0x0 | 0x445190 | 0x450e0 | 0x3cae0 | 0x0 |
SetHandleCount | 0x0 | 0x445194 | 0x450e4 | 0x3cae4 | 0x0 |
Sleep | 0x0 | 0x445198 | 0x450e8 | 0x3cae8 | 0x0 |
TlsAlloc | 0x0 | 0x44519c | 0x450ec | 0x3caec | 0x0 |
TlsFree | 0x0 | 0x4451a0 | 0x450f0 | 0x3caf0 | 0x0 |
TlsGetValue | 0x0 | 0x4451a4 | 0x450f4 | 0x3caf4 | 0x0 |
TlsSetValue | 0x0 | 0x4451a8 | 0x450f8 | 0x3caf8 | 0x0 |
UnhandledExceptionFilter | 0x0 | 0x4451ac | 0x450fc | 0x3cafc | 0x0 |
VirtualAlloc | 0x0 | 0x4451b0 | 0x45100 | 0x3cb00 | 0x0 |
VirtualFree | 0x0 | 0x4451b4 | 0x45104 | 0x3cb04 | 0x0 |
WideCharToMultiByte | 0x0 | 0x4451b8 | 0x45108 | 0x3cb08 | 0x0 |
WriteFile | 0x0 | 0x4451bc | 0x4510c | 0x3cb0c | 0x0 |
GDI32.DLL (10)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
BitBlt | 0x0 | 0x4451f0 | 0x451c4 | 0x3cbc4 | 0x0 |
CreateCompatibleBitmap | 0x0 | 0x4451f4 | 0x451c8 | 0x3cbc8 | 0x0 |
CreateCompatibleDC | 0x0 | 0x4451f8 | 0x451cc | 0x3cbcc | 0x0 |
CreateFontA | 0x0 | 0x4451fc | 0x451d0 | 0x3cbd0 | 0x0 |
DeleteDC | 0x0 | 0x445200 | 0x451d4 | 0x3cbd4 | 0x0 |
DeleteObject | 0x0 | 0x445204 | 0x451d8 | 0x3cbd8 | 0x0 |
GetStockObject | 0x0 | 0x445208 | 0x451dc | 0x3cbdc | 0x0 |
SelectObject | 0x0 | 0x44520c | 0x451e0 | 0x3cbe0 | 0x0 |
SetBkMode | 0x0 | 0x445210 | 0x451e4 | 0x3cbe4 | 0x0 |
SetTextColor | 0x0 | 0x445214 | 0x451e8 | 0x3cbe8 | 0x0 |
USER32.DLL (31)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
AdjustWindowRect | 0x0 | 0x44529c | 0x4521c | 0x3cc1c | 0x0 |
BeginPaint | 0x0 | 0x4452a0 | 0x45220 | 0x3cc20 | 0x0 |
CreateWindowExA | 0x0 | 0x4452a4 | 0x45224 | 0x3cc24 | 0x0 |
DefWindowProcA | 0x0 | 0x4452a8 | 0x45228 | 0x3cc28 | 0x0 |
DestroyWindow | 0x0 | 0x4452ac | 0x4522c | 0x3cc2c | 0x0 |
DialogBoxParamA | 0x0 | 0x4452b0 | 0x45230 | 0x3cc30 | 0x0 |
DispatchMessageA | 0x0 | 0x4452b4 | 0x45234 | 0x3cc34 | 0x0 |
DrawTextA | 0x0 | 0x4452b8 | 0x45238 | 0x3cc38 | 0x0 |
EndDialog | 0x0 | 0x4452bc | 0x4523c | 0x3cc3c | 0x0 |
EndPaint | 0x0 | 0x4452c0 | 0x45240 | 0x3cc40 | 0x0 |
EnumThreadWindows | 0x0 | 0x4452c4 | 0x45244 | 0x3cc44 | 0x0 |
FillRect | 0x0 | 0x4452c8 | 0x45248 | 0x3cc48 | 0x0 |
GetAsyncKeyState | 0x0 | 0x4452cc | 0x4524c | 0x3cc4c | 0x0 |
GetClientRect | 0x0 | 0x4452d0 | 0x45250 | 0x3cc50 | 0x0 |
GetDC | 0x0 | 0x4452d4 | 0x45254 | 0x3cc54 | 0x0 |
GetKeyState | 0x0 | 0x4452d8 | 0x45258 | 0x3cc58 | 0x0 |
GetMessageA | 0x0 | 0x4452dc | 0x4525c | 0x3cc5c | 0x0 |
InvalidateRect | 0x0 | 0x4452e0 | 0x45260 | 0x3cc60 | 0x0 |
KillTimer | 0x0 | 0x4452e4 | 0x45264 | 0x3cc64 | 0x0 |
LoadBitmapA | 0x0 | 0x4452e8 | 0x45268 | 0x3cc68 | 0x0 |
LoadCursorA | 0x0 | 0x4452ec | 0x4526c | 0x3cc6c | 0x0 |
LoadIconA | 0x0 | 0x4452f0 | 0x45270 | 0x3cc70 | 0x0 |
MessageBoxA | 0x0 | 0x4452f4 | 0x45274 | 0x3cc74 | 0x0 |
PostQuitMessage | 0x0 | 0x4452f8 | 0x45278 | 0x3cc78 | 0x0 |
RegisterClassA | 0x0 | 0x4452fc | 0x4527c | 0x3cc7c | 0x0 |
ReleaseDC | 0x0 | 0x445300 | 0x45280 | 0x3cc80 | 0x0 |
SetTimer | 0x0 | 0x445304 | 0x45284 | 0x3cc84 | 0x0 |
ShowWindow | 0x0 | 0x445308 | 0x45288 | 0x3cc88 | 0x0 |
TranslateMessage | 0x0 | 0x44530c | 0x4528c | 0x3cc8c | 0x0 |
UpdateWindow | 0x0 | 0x445310 | 0x45290 | 0x3cc90 | 0x0 |
wsprintfA | 0x0 | 0x445314 | 0x45294 | 0x3cc94 | 0x0 |
WINMM.DLL (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
timeGetTime | 0x0 | 0x445324 | 0x4531c | 0x3cd1c | 0x0 |
Exports (2)
»
Api name | EAT Address | Ordinal |
---|---|---|
__GetExceptDLLinfo | 0x1059 | 0x1 |
___CPPdebugHook | 0xe13c | 0x2 |
Memory Dumps (5)
»
Name | Process ID | Start VA | End VA | Dump Reason | PE Rebuilds | Bitness | Entry Points | AV | YARA | Actions |
---|---|---|---|---|---|---|---|---|---|---|
radiance.png.exe | 1 | 0x00400000 | 0x00448FFF | Relevant Image | - | 32-bit | - |
...
|
||
buffer | 1 | 0x00150000 | 0x00151FFF | First Execution | - | 32-bit | 0x00151140, 0x001512D0, ... |
...
|
||
buffer | 1 | 0x003C0000 | 0x003C0FFF | First Execution | - | 32-bit | 0x003C0000 |
...
|
||
buffer | 1 | 0x00450000 | 0x00450FFF | First Execution | - | 32-bit | 0x00450000 |
...
|
||
buffer | 1 | 0x01A60000 | 0x01A8AFFF | First Execution | - | 32-bit | 0x01A77D1F, 0x01A78A78, ... |
...
|
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Trojan.GenericKD.41286982 |
Malicious
|
C:\Users\2XC7u663GxWc\AppData\Local\Google\Chrome\User Data\Default\Login Data.bak | Dropped File | Sqlite |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2017-07-29 17:52 (UTC+2) |
Last Seen | 2018-11-23 06:54 (UTC+1) |
C:\Users\2XC7u663GxWc\AppData\Local\Google\Chrome\User Data\Default\Web Data.bak | Dropped File | Sqlite |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2017-07-29 17:52 (UTC+2) |
Last Seen | 2019-04-05 00:58 (UTC+2) |
c:\users\2xc7u663gxwc\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3727408139-63090477-3136880571-1000\a7ad97fe866c7f48db63edede97b2b9b_3912d7c0-2df4-4798-9de9-c60c58f001d5 | Modified File | Stream |
Unknown
|
...
|
»
c:\users\2xc7u663gxwc\appdata\roaming\microsoft\crypto\rsa\s-1-5-21-3727408139-63090477-3136880571-1000\a7ad97fe866c7f48db63edede97b2b9b_3912d7c0-2df4-4798-9de9-c60c58f001d5 | Modified File | Stream |
Unknown
|
...
|
»
c:\programdata\microsoft\crypto\rsa\s-1-5-18\6d14e4b1d8ca773bab785d1be032546e_3912d7c0-2df4-4798-9de9-c60c58f001d5 | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\2XC7u663GxWc\AppData\Roaming\chromedata\Data\systeminfo32 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\2XC7u663GxWc\AppData\Roaming\chromedata\Data\injectDll32 | Dropped File | Stream |
Unknown
|
...
|
»
c:\programdata\microsoft\crypto\rsa\machinekeys\d71375b114e472f50fdecc6000e0f0a4_3912d7c0-2df4-4798-9de9-c60c58f001d5 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\2XC7u663GxWc\AppData\Roaming\chromedata\Data\pwgrab32 | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\2XC7u663GxWc\AppData\Roaming\chromedata\Data\injectDll32_configs\dpost | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\2XC7u663GxWc\AppData\Roaming\chromedata\Data\injectDll32_configs\dinj | Dropped File | Stream |
Unknown
|
...
|
»
C:\Users\2XC7u663GxWc\AppData\Roaming\chromedata\Data\injectDll32_configs\sinj | Dropped File | Stream |
Unknown
|
...
|
»