PESCAN.IO - Analysis Report

File Structure:
Analysis Image
Information:
Size: 179,06 KB
SHA-256 Hash: 2FFDEF61AD6F6E925599D889B0FBD1C949D9412719E818867052ABF57E67963A
SHA-1 Hash: 9673B99609492C01A8C64C9A33620EFB3DF338D0
MD5 Hash: 867EED5C96E4E5EEB28884F8D02A0914
Imphash: D41D8CD98F00B204E9800998ECF8427E
MajorOSVersion: 6
CheckSum: 00000000
EntryPoint (rva): 79B4
SizeOfHeaders: 400
SizeOfImage: 31000
ImageBase: 0000000140000000
Architecture: x64
ImportTable: 275B0
Characteristics: 22
TimeDateStamp: 674FCB26
Date: 04/12/2024 3:23:18
File Type: EXE
Number Of Sections: 6
ASLR: Disabled
Section Names (Optional Header): .text, .rdata, .data, .pdata, .rsrc, .reloc
Number Of Executable Sections: 1
Subsystem: Windows GUI
UAC Execution Level Manifest: asInvoker

Sections Info:
Section Name Flags ROffset RSize VOffset VSize
.text 60000020 (Executable) 400 1BC00 1000 1BBFC
.rdata 40000040 1C000 BC00 1D000 BA2C
.data C0000040 (Writeable) 27C00 1A00 29000 32CC
.pdata 40000040 29600 1600 2D000 15A8
.rsrc 40000040 2AC00 200 2F000 1E0
.reloc 42000040 2AE00 800 30000 6EC
Entry Point:
The section number (1) have the Entry Point
Information -> EntryPoint (calculated) - 6DB4
Code -> 008BC8E89F870000E8E607000084C07405E8817F0000E844060000E83706000085C075064883C4205BC3B907000000E89F04
ADD BYTE PTR [RBX - 0X78601738], CL
ADD BYTE PTR [RAX], AL
CALL 0X17F3
TEST AL, AL
JE 0X1016
CALL 0X8F97
CALL 0X165F
CALL 0X1657
TEST EAX, EAX
JNE 0X102A
ADD RSP, 0X20
POP RBX
RET
MOV ECX, 7

Signatures:
Certificate - Digital Signature Not Found:
• The file is not signed

Packer/Compiler:
Detect It Easy (die)
PE+(64): linker: Microsoft Linker(14.40)[EXE64]
Entropy: 6.17463

Suspicious Functions:
Library Function Description
KERNEL32.DLL WriteFile Writes data to a specified file or input/output (I/O) device.
KERNEL32.DLL CreateToolhelp32Snapshot Creates a snapshot of the specified processes, heaps, threads, and modules.
KERNEL32.DLL GetProcAddress Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).
KERNEL32.DLL IsDebuggerPresent Determines if the calling process is being debugged by a user-mode debugger.
SHELL32.DLL ShellExecuteExW Performs a run operation on a specific file.
Windows REG (UNICODE):
Software\Friends
Software\Softina
SOFTWARE\Microsoft\Cryptography

File Access:
WINHTTP.dll
WS2_32.dll
gdiplus.dll
SHLWAPI.dll
ole32.dll
SHELL32.dll
ADVAPI32.dll
GDI32.dll
USER32.dll
KERNEL32.dll

File Access (UNICODE):
mscoree.dll
%ProgramFiles%\Mozilla Firefox\firefox.exe
chrome.exe
msedge.exe
firefox.exe
coreServiceShell.exe
PSANHost.exe
mc-fw-host.exe
cmdagent.exe
fcmcomm.exe
McsAgent.exe
x64.exe
SecurityService.exe
Service.exe
MBAMService.exe
avp.exe
guardxservice_x64.exe
fshoster64.exe
ekrn.exe
a2service.exe
dwengine.exe
bdagent.exe
AVGSvc.exe
AvastSvc.exe
QHActiveDefense.exe
CredentialUIBroker.exe
%LOCALAPPDATA%\Mozilla Firefox\firefox.exe
%WINDIR%\System32\wscript.exe
%WINDIR%\System32\rundll32.exe
0\powershell.exe
%WINDIR%\System32\cmd.exe
%TEMP%\kaka.txt
Exec - powershell.exe
Temp
WinDir
ProgramFiles
AppData

Interest's Words:
exec
start
expand

Interest's Words (UNICODE):
wscript
powershell
comspec
rundll32
rundll

Payloads:
Unusual BP Cave > 15 Bytes - (0xCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC...)

AV Services (UNICODE):
ekrn.exe - (ESET NOD32)

IP Addresses:
111.90.147.138

Strings/Hex Code Found With The File Rules:
Rule Text (Ascii): Registry (RegCreateKeyEx)
Rule Text (Ascii): Registry (RegOpenKeyEx)
Rule Text (Ascii): Registry (RegSetValueEx)
Rule Text (Ascii): Registry (RegGetValue)
Rule Text (Ascii): File (CreateFile)
Rule Text (Ascii): File (WriteFile)
Rule Text (Ascii): File (ReadFile)
Rule Text (Ascii): Anti-Analysis VM (IsDebuggerPresent)
Rule Text (Ascii): Anti-Analysis VM (CreateToolhelp32Snapshot)
Rule Text (Ascii): Execution (CreateProcessW)
Rule Text (Ascii): Execution (ShellExecute)
Rule Text (Unicode): Information used to authenticate a users identity (Credential)
Rule Text (Unicode): Information used for user authentication (Credential)
EP Rules: Microsoft Visual C++ 8.0 (DLL)

Intelligent String:
• firefox.exe
• msedge.exe
• chrome.exe
• mscoree.dll
• WS2_32.dll
• COMSPEC
• %WINDIR%\System32\cmd.exe
• %WINDIR%\System32\WindowsPowerShell\v1.0\powershell.exe
• %WINDIR%\System32\rundll32.exe
• %WINDIR%\System32\wscript.exe
• %ws /c "%ws"
• www.ip-api.com
• 111.90.147.138
• %ProgramFiles%\Mozilla Firefox\firefox.exe
• %LOCALAPPDATA%\Mozilla Firefox\firefox.exe
• %ProgramFiles%\Google\Chrome\Application\chrome.exe
• %LOCALAPPDATA%\Google\Chrome\Application\chrome.exe
• %ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe
• %LOCALAPPDATA%\Microsoft\Edge\Application\msedge.exe
• CredentialUIBroker.exe
• %TEMP%\kaka.txt
• QHActiveDefense.exe
• AvastSvc.exe
• AVGSvc.exe
• bdagent.exe
• dwengine.exe
• a2service.exe
• ekrn.exe
• fshoster64.exe
• guardxservice_x64.exe
• avp.exe
• MBAMService.exe
• Avira.Spotlight.Service.exe
• SecurityService.exe
• WRCoreService.x64.exe
• McsAgent.exe
• fcmcomm.exe
• cmdagent.exe
• mc-fw-host.exe
• PSANHost.exe
• coreServiceShell.exe

Extra 4n4lysis:
Metric Value Percentage
Ascii Code 102967 56,1563%
Null Byte Code 43187 23,5534%
© 2024 All rights reserved.