| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2020-Nov-29 09:09:24 |
| Detected languages |
English - United States
|
| CompanyName | Endermanch |
| FileDescription | Windows Customization Tool |
| FileVersion | 6.6.6.6 |
| InternalName | WinCustomize.exe |
| LegalCopyright | Copyright (C) 2020 |
| OriginalFilename | WinCustomize.exe |
| ProductName | Customization Tool |
| ProductVersion | 6.6.6.6 |
| Suspicious | The PE is packed with mpress |
Unusual section name found: .MPRESS1
Section .MPRESS1 is both writable and executable. Unusual section name found: .MPRESS2 Section .MPRESS2 is both writable and executable. The PE's resources are bigger than it is. |
| Suspicious | The PE contains functions most legitimate programs don't use. |
Possibly launches other programs:
|
| Suspicious | The PE is possibly a dropper. |
Resource 102 is possibly compressed or encrypted.
Resource 103 is possibly compressed or encrypted. Resources amount for 150.166% of the executable. |
| Suspicious | The file contains overlay data. |
34975 bytes of data starting at offset 0x9e200.
The overlay data has an entropy of 7.99394 and is possibly compressed or encrypted. |
| Malicious | VirusTotal score: 56/68 (Scanned on 2021-08-29 13:35:14) |
Bkav:
W32.AIDetect.malware2
Lionic: Trojan.Win32.Gen.j!c Elastic: malicious (high confidence) DrWeb: Trojan.KillBoot.1513 CAT-QuickHeal: Trojanransom.Gen ALYac: Trojan.Ransom.ScreenLocker Malwarebytes: Ransom.FileCryptor Zillya: Trojan.Ransom.Win32.1954 Sangfor: Trojan.Win32.Save.a K7AntiVirus: Trojan ( 005764761 ) Alibaba: Ransom:Win32/Cryptor.bec0bebc K7GW: Trojan ( 005764761 ) CrowdStrike: win/malicious_confidence_100% (W) Cyren: W32/Ransom.GQCK-5858 Symantec: ML.Attribute.HighConfidence ESET-NOD32: Win32/Disabler.NDL APEX: Malicious Paloalto: generic.ml Cynet: Malicious (score: 100) Kaspersky: HEUR:Trojan-Ransom.Win32.Gen.gen BitDefender: Trojan.GenericKD.45703777 NANO-Antivirus: Trojan.Win32.KillBoot.iestim MicroWorld-eScan: Trojan.GenericKD.45703777 Avast: Win32:MalwareX-gen [Trj] Ad-Aware: Trojan.GenericKD.45703777 Sophos: Mal/Generic-S Comodo: Malware@#1sho60ur73gqq VIPRE: Trojan.Win32.Generic!BT TrendMicro: Ransom_Gen.R005C0DF421 McAfee-GW-Edition: BehavesLike.Win32.Dropper.jc FireEye: Generic.mg.989ae3d195203b32 Emsisoft: Trojan.GenericKD.45703777 (B) Ikarus: Trojan-Ransom.Agent GData: Trojan.GenericKD.45703777 Jiangmin: Trojan.Gen.bds Webroot: W32.Gen.BT Avira: TR/Ransom.Agent.ngrmb Antiy-AVL: Trojan/Generic.ASMalwS.330FC2B Kingsoft: Win32.Troj.Undef.(kcloud) Gridinsoft: Ransom.Win32.Ransom.sa Arcabit: Trojan.Generic.D2B96261 Microsoft: Trojan:MSIL/Cryptor AhnLab-V3: Malware/Win32.RL_Generic.R364340 McAfee: RDN/Ransom MAX: malware (ai score=99) VBA32: TrojanRansom.Gen Cylance: Unsafe TrendMicro-HouseCall: Ransom_Gen.R005C0DF421 Tencent: Malware.Win32.Gencirc.11baf11a Yandex: Trojan.Agent!yCnQtJZKjtk SentinelOne: Static AI - Suspicious PE eGambit: Unsafe.AI_Score_58% Fortinet: PossibleThreat.PALLAS.H AVG: Win32:MalwareX-gen [Trj] Panda: Trj/CI.A MaxSecure: Trojan.Malware.73859634.susgen |
| e_magic | MZ |
|---|---|
| e_cblp | 0x40 |
| e_cp | 0x1 |
| e_crlc | 0 |
| e_cparhdr | 0x2 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0xb400 |
| e_oeminfo | 0xcd09 |
| e_lfanew | 0x40 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 3 |
| TimeDateStamp | 2020-Nov-29 09:09:24 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x3c00 |
| SizeOfInitializedData | 0x1bf800 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x001C640E (Section: .MPRESS2) |
| BaseOfCode | 0x1000 |
| BaseOfData | 0x5000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x1cc000 |
| SizeOfHeaders | 0x200 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0xd000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.DLL |
GetModuleHandleA
GetProcAddress |
|---|---|
| NETAPI32.dll |
NetUserAdd
|
| ntdll.dll |
RtlGetVersion
|
| USER32.dll |
GetDC
|
| GDI32.dll |
BitBlt
|
| ADVAPI32.dll |
FreeSid
|
| SHELL32.dll |
ShellExecuteW
|
| ole32.dll |
CoTaskMemFree
|
| bcrypt.dll |
BCryptGenRandom
|
| VCRUNTIME140.dll |
wcsstr
|
| api-ms-win-crt-string-l1-1-0.dll |
wmemcpy_s
|
| api-ms-win-crt-runtime-l1-1-0.dll |
exit
|
| api-ms-win-crt-math-l1-1-0.dll |
__setusermatherr
|
| api-ms-win-crt-stdio-l1-1-0.dll |
_set_fmode
|
| api-ms-win-crt-locale-l1-1-0.dll |
_configthreadlocale
|
| api-ms-win-crt-heap-l1-1-0.dll |
_set_new_mode
|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 6.6.6.6 |
| ProductVersion | 6.6.6.6 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | English - United States |
| CompanyName | Endermanch |
| FileDescription | Windows Customization Tool |
| FileVersion (#2) | 6.6.6.6 |
| InternalName | WinCustomize.exe |
| LegalCopyright | Copyright (C) 2020 |
| OriginalFilename | WinCustomize.exe |
| ProductName | Customization Tool |
| ProductVersion (#2) | 6.6.6.6 |
| Resource LangID | English - United States |
|---|
No comments yet.