Architecture |
IMAGE_FILE_MACHINE_AMD64
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
Compilation Date | 2020-Apr-21 06:30:08 |
Detected languages |
English - United States
|
Info | Libraries used to perform cryptographic operations: | Microsoft's Cryptography API |
Suspicious | This PE is packed with VMProtect |
Unusual section name found: .vmp0
Unusual section name found: .vmp1 |
Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
Suspicious | The file contains overlay data. | 83 bytes of data starting at offset 0x6e9800. |
Malicious | VirusTotal score: 16/73 (Scanned on 2020-05-14 20:56:37) |
FireEye:
Generic.mg.da365c7716c8d8e0
CAT-QuickHeal: Trojan.Wacatac Invincea: heuristic APEX: Malicious Avast: Win64:Malware-gen Endgame: malicious (high confidence) F-Secure: Heuristic.HEUR/AGEN.1110460 McAfee-GW-Edition: BehavesLike.Win64.Generic.vc Trapmine: malicious.moderate.ml.score Avira: HEUR/AGEN.1110460 Webroot: W32.Adware.Gen Microsoft: Trojan:Win32/Wacatac.D!ml Ikarus: Trojan.Win64.Vmprotect MaxSecure: Trojan.Malware.300983.susgen AVG: Win64:Malware-gen CrowdStrike: win/malicious_confidence_70% (D) |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x80 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_AMD64
|
NumberofSections | 8 |
TimeDateStamp | 2020-Apr-21 06:30:08 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xf0 |
Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
Magic | PE32+ |
---|---|
LinkerVersion | 14.0 |
SizeOfCode | 0x8e200 |
SizeOfInitializedData | 0x9ba00 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00000000005EAF31 (Section: .vmp1) |
BaseOfCode | 0x1000 |
ImageBase | 0x140000000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 6.0 |
ImageVersion | 0.0 |
SubsystemVersion | 6.0 |
Win32VersionValue | 0 |
SizeOfImage | 0xcb7000 |
SizeOfHeaders | 0x400 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
WS2_32.dll |
#9
|
---|---|
WLDAP32.dll |
#211
|
CRYPT32.dll |
CertFreeCertificateContext
|
IMM32.dll |
ImmSetCompositionWindow
|
d3d9.dll |
Direct3DCreate9
|
KERNEL32.dll |
IsProcessorFeaturePresent
|
USER32.dll |
GetSystemMenu
|
GDI32.dll |
SelectObject
|
ADVAPI32.dll |
CryptDestroyKey
|
MSVCP140.dll |
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
|
XINPUT1_4.dll |
#2
|
VCRUNTIME140_1.dll |
__CxxFrameHandler4
|
VCRUNTIME140.dll |
strstr
|
api-ms-win-crt-runtime-l1-1-0.dll |
_register_thread_local_exe_atexit_callback
|
api-ms-win-crt-stdio-l1-1-0.dll |
__acrt_iob_func
|
api-ms-win-crt-math-l1-1-0.dll |
pow
|
api-ms-win-crt-time-l1-1-0.dll |
_time64
|
api-ms-win-crt-heap-l1-1-0.dll |
realloc
|
api-ms-win-crt-string-l1-1-0.dll |
strncmp
|
api-ms-win-crt-utility-l1-1-0.dll |
srand
|
api-ms-win-crt-convert-l1-1-0.dll |
strtol
|
api-ms-win-crt-filesystem-l1-1-0.dll |
_unlock_file
|
api-ms-win-crt-environment-l1-1-0.dll |
getenv
|
api-ms-win-crt-multibyte-l1-1-0.dll |
_mbsnbcpy
|
api-ms-win-crt-locale-l1-1-0.dll |
_configthreadlocale
|
WTSAPI32.dll |
WTSSendMessageW
|
KERNEL32.dll (#2) |
IsProcessorFeaturePresent
|
USER32.dll (#2) |
GetSystemMenu
|
KERNEL32.dll (#3) |
IsProcessorFeaturePresent
|
USER32.dll (#3) |
GetSystemMenu
|
Size | 0x108 |
---|---|
TimeDateStamp | 1970-Jan-01 00:00:00 |
Version | 0.0 |
GlobalFlagsClear | (EMPTY) |
GlobalFlagsSet | (EMPTY) |
CriticalSectionDefaultTimeout | 0 |
DeCommitFreeBlockThreshold | 0 |
DeCommitTotalFreeThreshold | 0 |
LockPrefixTable | 0 |
MaximumAllocationSize | 0 |
VirtualMemoryThreshold | 0 |
ProcessAffinityMask | 0 |
ProcessHeapFlags | (EMPTY) |
CSDVersion | 0 |
Reserved1 | 0 |
EditList | 0 |
SecurityCookie | 0x1400ee0e8 |