Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2020-Aug-08 12:30:37 |
Info | Matching compiler(s): | Microsoft Visual C++ 6.0 - 8.0 |
Info | Interesting strings found in the binary: |
Contains domain names:
|
Info | Cryptographic algorithms detected in the binary: | Uses constants related to CRC32 |
Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
Suspicious | The file contains overlay data. |
8991771 bytes of data starting at offset 0x7ca00.
The overlay data has an entropy of 7.99946 and is possibly compressed or encrypted. Overlay data amounts for 94.628% of the executable. |
Malicious | VirusTotal score: 9/70 (Scanned on 2020-10-16 18:11:38) |
Elastic:
malicious (high confidence)
APEX: Malicious Avast: Win32:Trojan-gen Zillya: Trojan.Badur.Win32.33894 McAfee-GW-Edition: BehavesLike.Win32.Trojan.tc Jiangmin: TrojanSpy.Python.g Antiy-AVL: Trojan[PSW]/Python.Agent Microsoft: Trojan:Win32/Wacatac.C!ml AVG: Win32:Trojan-gen |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x108 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 6 |
TimeDateStamp | 2020-Aug-08 12:30:37 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
Magic | PE32 |
---|---|
LinkerVersion | 14.0 |
SizeOfCode | 0x1ec00 |
SizeOfInitializedData | 0x5da00 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00007913 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x20000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 5.1 |
ImageVersion | 0.0 |
SubsystemVersion | 5.1 |
Win32VersionValue | 0 |
SizeOfImage | 0x8b000 |
SizeOfHeaders | 0x400 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
USER32.dll |
MessageBoxW
MessageBoxA |
---|---|
KERNEL32.dll |
GetLastError
SetDllDirectoryW GetModuleFileNameW GetProcAddress GetCommandLineW GetEnvironmentVariableW SetEnvironmentVariableW ExpandEnvironmentStringsW GetTempPathW DecodePointer Sleep GetExitCodeProcess CreateProcessW GetStartupInfoW LoadLibraryExW CreateDirectoryW FormatMessageW LoadLibraryA MultiByteToWideChar WideCharToMultiByte WaitForSingleObject CloseHandle SetEndOfFile HeapReAlloc UnhandledExceptionFilter SetUnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent QueryPerformanceCounter GetCurrentProcessId GetCurrentThreadId GetSystemTimeAsFileTime InitializeSListHead IsDebuggerPresent GetModuleHandleW RtlUnwind SetLastError EnterCriticalSection LeaveCriticalSection DeleteCriticalSection InitializeCriticalSectionAndSpinCount TlsAlloc TlsGetValue TlsSetValue TlsFree FreeLibrary GetCommandLineA ReadFile CreateFileW GetDriveTypeW GetFileType RaiseException PeekNamedPipe SystemTimeToTzSpecificLocalTime FileTimeToSystemTime GetFullPathNameW GetFullPathNameA RemoveDirectoryW FindClose FindFirstFileExW FindNextFileW SetStdHandle SetConsoleCtrlHandler DeleteFileW GetStdHandle WriteFile ExitProcess GetModuleHandleExW GetACP HeapFree HeapAlloc GetConsoleMode ReadConsoleW SetFilePointerEx GetConsoleCP CompareStringW LCMapStringW GetCurrentDirectoryW FlushFileBuffers SetEnvironmentVariableA GetFileAttributesExW IsValidCodePage GetOEMCP GetCPInfo GetEnvironmentStringsW FreeEnvironmentStringsW GetStringTypeW GetProcessHeap WriteConsoleW GetTimeZoneInformation HeapSize |
ADVAPI32.dll |
ConvertStringSecurityDescriptorToSecurityDescriptorW
|
WS2_32.dll |
#14
|
Characteristics |
0
|
---|---|
TimeDateStamp | 2020-Aug-08 12:30:37 |
Version | 0.0 |
SizeofData | 696 |
AddressOfRawData | 0x29fec |
PointerToRawData | 0x28fec |
Size | 0x5c |
---|---|
TimeDateStamp | 1970-Jan-01 00:00:00 |
Version | 0.0 |
GlobalFlagsClear | (EMPTY) |
GlobalFlagsSet | (EMPTY) |
CriticalSectionDefaultTimeout | 0 |
DeCommitFreeBlockThreshold | 0 |
DeCommitTotalFreeThreshold | 0 |
LockPrefixTable | 0 |
MaximumAllocationSize | 0 |
VirtualMemoryThreshold | 0 |
ProcessAffinityMask | 0 |
ProcessHeapFlags | (EMPTY) |
CSDVersion | 0 |
Reserved1 | 0 |
EditList | 0 |
SecurityCookie | 0x42c008 |
SEHandlerTable | 0x429fe0 |
SEHandlerCount | 3 |
XOR Key | 0x3f8ef00d |
---|---|
Unmarked objects | 0 |
241 (40116) | 12 |
243 (40116) | 171 |
242 (40116) | 24 |
ASM objects (VS2015 UPD3 build 24123) | 18 |
C++ objects (VS2015 UPD3 build 24123) | 29 |
C objects (VS2015 UPD3 build 24123) | 18 |
Imports (65501) | 9 |
Total imports | 115 |
C objects (VS2015 UPD3 build 24210) | 16 |
Resource objects (VS2015 UPD3 build 24210) | 1 |
Linker (VS2015 UPD3 build 24210) | 1 |