b42cbcfae52aecb822ce44587d3eb9ca

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2022-Jul-24 16:32:23
Detected languages English - United States

Plugin Output

Info Matching compiler(s): MASM/TASM - sig1(h)
Suspicious Strings found in the binary may indicate undesirable behavior: Contains a XORed PE executable:
  • 98 a4 a5 bf ec bc be a3 ab be ad a1 ec af ad a2 a2 a3 b8 ec ...
Contains another PE executable:
  • This program cannot be run in DOS mode.
Miscellaneous malware strings:
  • cmd.exe
Info The PE contains common functions which appear in legitimate applications. Possibly launches other programs:
  • system
Malicious The PE is possibly a dropper. Resource 101 detected as a PE Executable.
Resources amount for 77.0764% of the executable.
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 b42cbcfae52aecb822ce44587d3eb9ca
SHA1 7c3e1e5bc38b64275803b7aa1b32d33877a3483a
SHA256 5c53ad79022bff1876376e71d73d400ebe10d3ee349f32bc7c1baf71cd1b8db8
SHA3 746cc3ab4ce2fbb0e4f01d7e7727890caf0467db9d99a43f1d171d5d079e7863
SSDeep 768:lZuv1EY37/mJh3bdhA1Y3Hv3zmDNwhqLG4:lZuv78h3pvMy4
Imports Hash e216ee55c1285280b5fd1210d8edd140

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 5
TimeDateStamp 2022-Jul-24 16:32:23
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 14.0
SizeOfCode 0x1000
SizeOfInitializedData 0x9600
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000013F7 (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x2000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xe000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 312646a6977dc30f39ef2de933a4938a
SHA1 c6370bf8d26977b9f926d3bb80335b7dd96c2c7d
SHA256 765647185cb779828a69f35884fe8f585b710e9bcd0aca3f172c308eb0811944
SHA3 ceba6c38b654f3b0a1afa674f845fb504008eb7cafbf93d904a580275c416522
VirtualSize 0xe34
VirtualAddress 0x1000
SizeOfRawData 0x1000
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.80079

.rdata

MD5 082d11d890e4f600a7beb37ba842d7e5
SHA1 ce1bc6d9da669b221868194967db90cf5f005cf8
SHA256 4f79e971c3065def64f202c3a3d833d1cbe6c15a5f8e6101d210d8e940ac6971
SHA3 afa9e525004fefdeaaf3d632e070755e6b0683d3f52db38721c41a426ad7ef3c
VirtualSize 0xbb0
VirtualAddress 0x2000
SizeOfRawData 0xc00
PointerToRawData 0x1400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.62975

.data

MD5 550b6d19eefd3a6f89a89a9be78fdbaf
SHA1 8ecc1f32ace62555c4813cde841b42d4d2b96f5a
SHA256 001cc148d185d7d29246eff5375f33b25cb070b959413a1f8dcf1ec3a4475bbd
SHA3 cf54e2e6646dab051d22e2fb2f63c5526b6cd7107b05660aa03783d21ec08748
VirtualSize 0x384
VirtualAddress 0x3000
SizeOfRawData 0x200
PointerToRawData 0x2000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.280401

.rsrc

MD5 b81ae9a9cd19f133061191c289e1086f
SHA1 e288b2040424d35db49a8dd0e387adb50dabdc1b
SHA256 43964f75e310d9da7fbe714905a681636958d5827c0e7ae6f57269136fe065c7
SHA3 641ea59c39149538ed780764d58ac576cce9ceeae74eb177872d789ff2a45801
VirtualSize 0x8220
VirtualAddress 0x4000
SizeOfRawData 0x8400
PointerToRawData 0x2200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.75525

.reloc

MD5 27223eaf8dac6b87c0aa59e79258588f
SHA1 3a7eaccdeabfa43025886af1a4c129ae9ef17576
SHA256 b45c8a7a1e67ec1ee02e0f94b1a372fa9d5e9dac59875483e3e178bd35848ba3
SHA3 77a14a4aa62f41f84d8ac5c05ea8e9f780ec7480398a903df254b4f1045e11e6
VirtualSize 0x178
VirtualAddress 0xd000
SizeOfRawData 0x200
PointerToRawData 0xa600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.16186

Imports

KERNEL32.dll SizeofResource
FindResourceA
GetModuleHandleA
GetTempPathA
LockResource
LoadResource
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetModuleHandleW
VCRUNTIME140.dll memset
__current_exception_context
__current_exception
_except_handler4_common
api-ms-win-crt-stdio-l1-1-0.dll _set_fmode
fclose
fopen
__p__commode
fwrite
api-ms-win-crt-runtime-l1-1-0.dll _seh_filter_exe
_register_thread_local_exe_atexit_callback
__p___argv
__p___argc
_initterm
_initterm_e
_register_onexit_function
_crt_atexit
_controlfp_s
terminate
_get_initial_narrow_environment
_initialize_narrow_environment
_configure_narrow_argv
_cexit
_exit
_initialize_onexit_table
exit
_set_app_type
system
_c_exit
api-ms-win-crt-string-l1-1-0.dll strcat_s
api-ms-win-crt-math-l1-1-0.dll __setusermatherr
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll _set_new_mode

Delayed Imports

101

Type RT_RCDATA
Language English - United States
Codepage UNKNOWN
Size 0x8000
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.79371
Detected Filetype PE Executable
MD5 f99346cd02060b5c713271c593a016e1
SHA1 ab1da4e1c0141c91db323a5b724159f1e661444c
SHA256 b51e22f97241d0709c7bba3a35490e17285e4b3479ddd918d960903777d0c32d
SHA3 167175f2673e2ed1e9286985022aa27b6ffd80e2094ffb505ccf180150ead8e2

1

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x17d
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.91161
MD5 1e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA1 4260284ce14278c397aaf6f389c1609b0ab0ce51
SHA256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA3 4bb9e8b5a714cae82782f3831cc2d45f4bf4a50a755fe584d2d1893129d68353

Version Info

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2022-Jul-24 16:32:23
Version 0.0
SizeofData 620
AddressOfRawData 0x22a0
PointerToRawData 0x16a0

IMAGE_DEBUG_TYPE_ILTCG

Characteristics 0
TimeDateStamp 2022-Jul-24 16:32:23
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

Load Configuration

Size 0xc0
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x403004
SEHandlerTable 0x402240
SEHandlerCount 1

RICH Header

XOR Key 0xefd2e29d
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 12
Imports (VS2022 Update 2 (17.2.0-1) compiler 31328) 2
C++ objects (VS2022 Update 2 (17.2.0-1) compiler 31328) 19
C objects (VS2022 Update 2 (17.2.0-1) compiler 31328) 12
ASM objects (VS2022 Update 2 (17.2.0-1) compiler 31328) 1
Imports (27412) 3
Total imports 56
C++ objects (LTCG) (VS2022 Update 2 (17.2.5) compiler 31332) 1
Resource objects (VS2022 Update 2 (17.2.5) compiler 31332) 1
151 1
Linker (VS2022 Update 2 (17.2.5) compiler 31332) 1

Errors

<-- -->