PESCAN.IO - Analysis Report |
|||||||
| File Structure |
|
| Information |
| Size: 864,00 KB SHA-256 Hash: 87BDCEE9A09330B4C19E9E30EB77CB744C7AE325E1A7A61FAE424BA936FCD7B0 SHA-1 Hash: 19831266FBA876E197FDA3614DAA19A81EE80EC9 MD5 Hash: DB8CBECDCFC00E65D9CE129518D9CF3A Imphash: F34D5F2D4577ED6D9CEEC516C1F5A744 MajorOSVersion: 4 MinorOSVersion: 0 CheckSum: 00000000 EntryPoint (rva): D8E2E SizeOfHeaders: 200 SizeOfImage: DE000 ImageBase: 400000 Architecture: x86 ImportTable: D8DE0 IAT: 2000 Characteristics: 122 TimeDateStamp: B074C0CD Date: 24/10/2063 8:52:29 File Type: EXE Number Of Sections: 3 ASLR: Disabled Section Names: .text, .rsrc, .reloc Number Of Executable Sections: 1 Subsystem: Windows GUI UAC Execution Level Manifest: asInvoker |
| Sections Info |
| Section Name | Flags | ROffset | RSize | VOffset | VSize | Entropy | Chi2 |
|---|---|---|---|---|---|---|---|
| .text | 60000020 (Code, Executable, Readable) | 200 | D7000 | 2000 | D6E34 | 7,3566 | 3717891,74 |
| .rsrc | 40000040 (Initialized Data, Readable) | D7200 | C00 | DA000 | A48 | 4,5918 | 91680,50 |
| .reloc | 42000040 (Initialized Data, GP-Relative, Readable) | D7E00 | 200 | DC000 | C | 0,1019 | 128015,00 |
| Description |
| OriginalFilename: Client.exe FileVersion: 2.3.1 ProductVersion: 2.3.1 Language: Unknown (ID=0x0) CodePage: Unicode (UTF-16 LE) (0x4B0) |
| Entry Point |
| The section number (1) - (.text) have the Entry Point Information -> EntryPoint (calculated) - D702E Code -> FF25002040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 • JMP DWORD PTR [0X402000] • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL • ADD BYTE PTR [EAX], AL EP changed to another address -> (Address Of EntryPoint > Base Of Data) |
| Signatures |
| Certificate - Digital Signature Not Found: • The file is not signed |
| Packer/Compiler |
| Compiler: Microsoft Visual .NET - (You can use a decompiler for this...) • AnyCPU: True • Version: v4.0 Detect It Easy (die) • PE: library: .NET(v4.0.30319)[-] • PE: linker: Microsoft Linker(48.0)[-] • Entropy: 7.3475 |
| Suspicious Functions |
| Library | Function | Description |
|---|---|---|
| KERNEL32.DLL | LoadLibraryW | Possible Call API By Name | Loads the specified module into the address space of the calling process. |
| KERNEL32.DLL | IsDebuggerPresent | Possible Call API By Name | Determines if the calling process is being debugged by a user-mode debugger. |
| ADVAPI32.DLL | CryptDecrypt | Possible Call API By Name | Performs a cryptographic operation on data in a data block. |
| KERNEL32.DLL | CreateMutexA | Create a named or unnamed mutex object for controlling access to a shared resource. |
| KERNEL32.DLL | VirtualAlloc | Reserve, commit, or both, a region of memory within the virtual address space of a process. |
| KERNEL32.DLL | GetModuleHandleA | Retrieves a handle to the specified module. |
| KERNEL32.DLL | GetModuleHandle | Retrieves a handle to the specified module. |
| KERNEL32.DLL | CreateToolhelp32Snapshot | Creates a snapshot of the specified processes, heaps, threads, and modules. |
| KERNEL32.DLL | CreateRemoteThread | Creates a thread in the address space of another process. |
| KERNEL32.DLL | WriteProcessMemory | Writes data to an area of memory in a specified process. |
| KERNEL32.DLL | ReadProcessMemory | Reads data from an area of memory in a specified process. |
| KERNEL32.DLL | GetProcAddress | Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL). |
| KERNEL32.DLL | IsDebuggerPresent | Determines if the calling process is being debugged by a user-mode debugger. |
| ADVAPI32.DLL | CryptEncrypt | Performs a cryptographic operation on data in a data block. |
| ADVAPI32.DLL | CryptDecrypt | Performs a cryptographic operation on data in a data block. |
| NtosKrnl.exe | ZwUnmapViewOfSection | Unmaps a mapped view of a section from a process's address space. |
| Windows REG (UNICODE) |
| Software\Microsoft\Windows\CurrentVersion\Run Software\Opera GX Stable Software\Brave-Browser\Application\brave.exe SOFTWARE\Clients\StartMenuInternet SOFTWARE\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Software\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice SOFTWARE\Microsoft\RecoveryEnvironment" /v TargetOS') DO SET TARGETOS=%%Cfor /F "tokens=1 delims=\" %%A in ('Echo %TARGETOS%') DO SET TARGETOSDRIVE=%%Areg load HKLM\ Software\Classes SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Software\Microsoft\Windows\CurrentVersion\Policies\System Software\Brave-Browser\User Data Software\Brave-Browser\Application Software\Opera GX Stable\ Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced SOFTWARE\VMware, Inc.\VMware Tools SOFTWARE\Oracle\VirtualBox Guest Additions SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management System\BIOS Rebuilt string - SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System - DisableTaskMgr Rebuilt string - SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Rebuilt string - SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| File Access |
| Client.exe mscoree.dll win32u.dll bcrypt.dll rstrtmgr.dll DbgHelp.dll ntdll.dll psapi.dll iphlpapi.dll ucrtbase.dll kernelbase.dll user32.dll kernel32.dll advapi32.dll gdi32.dll costura.system.memory.dll costura.system.numerics.vectors.dll costura.system.buffers.dll costura.messagepack.annotations.dll costura.pulsar.common.dll costura.messagepack.dll costura.system.collections.immutable.dll null|Pulsar.Common.dll cc7b13ffcd2ddd51|System.Threading.Tasks.Extensions.dll b03f5f7f11d50a3a|System.Runtime.CompilerServices.Unsafe.dll b03f5f7f11d50a3a|System.Numerics.Vectors.dll cc7b13ffcd2ddd51|System.Memory.dll b03f5f7f11d50a3a|System.Collections.Immutable.dll cc7b13ffcd2ddd51|System.Buffers.dll b4a0369545f0a1be|MessagePack.Annotations.dll b4a0369545f0a1be|MessagePack.dll Pulsar.Common.Messages.Administration.Sys Gma.Sys costura.sys Temp RootDir AppData |
| File Access (UNICODE) |
| *.dll mozglue.dll nss3.dll chrome.dll msedge.dll user32.dll kernel32.dll KFailed to get handle for kernel32.dll SbieDll.dll cmdvrt32.dll cmdvrt64.dll SxIn.dll cuckoomon.dll clr.dll coreclr.dll ntdll.dll annotations.dll messagepack.dll common.dll buffers.dll immutable.dll memory.dll vectors.dll unsafe.dll extensions.dll Client.exe 3\explorer.exe --processStart Discord.exe exe /c taskkill /IM discord.exe \Discord\Update.exe exe /c taskkill /IM chrome.exe exe /c taskkill /IM msedge.exe 9\Programs\Opera GX\opera.exe exe /c taskkill /IM operagx.exe QConhost --headless cmd.exe 3\Programs\Opera\opera.exe exe /c taskkill /IM opera.exe exe /c taskkill /IM brave.exe oConhost --headless cmd.exe exe /c taskkill /IM firefox.exe -conhost powershell.exe conhost cmd.exe )computerdefaults.exe ]cmd.exe MSBuild.exe RegSvcs.exe RegAsm.exe +deviceinstaller64.exe |\S+\.exe ]+\.exe WConhost --headless cmd.exe 9\Mozilla Firefox\firefox.exe \Opera GX\opera.exe !\Opera\opera.exe M\Microsoft\Edge\Application\msedge.exe K\Google\Chrome\Application\chrome.exe qcostura.sys {costura.sys ]costura.sys Icostura.sys gcostura.sys Kcostura.sys vmmouse.sys VBoxVideo.sys VBoxSF.sys VBoxGuest.sys VBoxMouse.sys vioser.sys viofs.sys netkvm.sys balloon.sys /Gma.Sys desktop.ini Exec - cmd.exe /c taskkill /IM Exec - cmd.exe /c start %TARGETOSDRIVE%\Recovery\OEM\ Exec - cmd.exe /c taskkill /IM firefox.exe /F Exec - cmd.exe /c start firefox --profile=" Exec - cmd.exe /c taskkill /IM brave.exe /F Exec - cmd.exe /c taskkill /IM opera.exe /F Exec - cmd.exe /c start "" " Exec - cmd.exe /c taskkill /IM operagx.exe /F Exec - cmd.exe /c taskkill /IM msedge.exe /F Exec - cmd.exe /c taskkill /IM chrome.exe /F Exec - cmd.exe /c taskkill /IM discord.exe /F Exec - powershell.exe conhost Temp ProgramFiles AppData |
| SQL Queries |
| SELECT * FROM Win32_BIOS SELECT * FROM Win32_BaseBoard SELECT * FROM Win32_Processor Select * From Win32_ComputerSystem SELECT * FROM Win32_VideoController SELECT * FROM Win32_OperatingSystem WHERE Primary='true' SELECT * FROM AntivirusProduct SELECT * FROM FirewallProduct Select * from Win32_ComputerSystem SELECT * FROM Win32_DiskDrive SELECT * FROM Win32_PortConnector |
| Interest's Words |
| lockbit Encrypt Decrypt KeyLogger Encryption RunPE PassWord <form cscript exec attrib start cipher hostname shutdown systeminfo ping dism replace |
| Interest's Words (UNICODE) |
| Virus BitCoin taskkill Encrypt Decrypt Encryption PassWord <html <head <body <script cscript wscript mshta exec powershell schtasks netsh taskkill start hostname shutdown schtask ping |
| Anti-VM/Sandbox/Debug Tricks |
| OllyDbg Libary - dbghelp.dll |
| Anti-VM/Sandbox/Debug Tricks (UNICODE) |
| LabTools - taskmgr VMWare - vmmouse.sys SandBoxie Library - SbieDll.dll |
| URLs |
| http://schemas.microsoft.com/SMI/2005/WindowsSettings http://schemas.microsoft.com/SMI/2016/WindowsSettings |
| URLs (UNICODE) |
| https://www.amyuni.com/downloads/usbmmidd_v2.zip https://ipwho.is/ https://api.ipify.org/ |
| AV Services (UNICODE) |
| Antivirus name extract - (SecurityCenter2) |
| IP Addresses |
| 15.0.0.0 15.8.0.0 |
| Strings/Hex Code Found With The File Rules |
| Rule Type | Encoding | Matched (Word) |
|---|---|---|
| Text | Ascii | WinAPI Sockets (connect) |
| Text | Unicode | WinAPI Sockets (connect) |
| Text | Ascii | WinAPI Sockets (send) |
| Text | Unicode | WinAPI Sockets (send) |
| Text | Ascii | File (GetTempPath) |
| Text | Ascii | File (CreateFile) |
| Text | Ascii | File (ReadFile) |
| Text | Ascii | Encryption (FromBase64String) |
| Text | Ascii | Encryption API (CryptDecrypt) |
| Text | Unicode | Encryption API (CryptDecrypt) |
| Text | Ascii | Anti-Analysis VM (IsDebuggerPresent) |
| Text | Unicode | Anti-Analysis VM (IsDebuggerPresent) |
| Text | Ascii | Anti-Analysis VM (GetSystemInfo) |
| Text | Ascii | Anti-Analysis VM (CreateToolhelp32Snapshot) |
| Text | Ascii | Stealth (VirtualAlloc) |
| Text | Ascii | Stealth (VirtualProtect) |
| Text | Ascii | Stealth (ReadProcessMemory) |
| Text | Ascii | Stealth (CreateRemoteThread) |
| Text | Ascii | Execution (CreateProcessA) |
| Text | Ascii | Execution (ShellExecute) |
| Text | Ascii | Execution (ResumeThread) |
| Text | Unicode | Privileges (SeDebugPrivilege) |
| Text | Unicode | Keyboard Key ([Enter]) |
| Text | Unicode | Keyboard Key ([Esc]) |
| Text | Unicode | Keyboard Key ([Esc]) |
| Text | Ascii | Malicious code executed after exploiting a vulnerability (Payload) |
| Text | Ascii | Ability of malware to remain on a system after a reboot (Persistence) |
| Text | Unicode | Ability of malware to remain on a system after a reboot (Persistence) |
| Text | Ascii | Process of gathering information about network resources (Enumeration) |
| Text | Unicode | Technique to insert malicious code into a vulnerable application (Injection) |
| Text | Ascii | Stealer malware focused on obtaining CVV codes to conduct unauthorized transactions (CVV) |
| Text | Ascii | Software that records keystrokes to steal credentials (Keylogger) |
| Text | Ascii | Software that records user activity (Logger) |
| Text | Ascii | Unauthorized movement of funds or data (Transfer) |
| Text | Unicode | Technique used to insert malicious code into legitimate processes (Inject) |
| Text | Ascii | Malicious rerouting of traffic to an attacker-controlled site (Redirect) |
| Text | Ascii | Technique used to circumvent security measures (Bypass) |
| Text | Unicode | Technique used to circumvent security measures (Bypass) |
| Entry Point | Hex Pattern | Microsoft Visual C / Basic .NET |
| Entry Point | Hex Pattern | Microsoft Visual C++ 8 |
| Entry Point | Hex Pattern | Microsoft Visual C++ 8.0 |
| Entry Point | Hex Pattern | Microsoft Visual C v7.0 / Basic .NET |
| Entry Point | Hex Pattern | Microsoft Visual Studio .NET |
| Entry Point | Hex Pattern | .NET executable |
| Resources |
| Path | DataRVA | Size | FileOffset | Code | Text |
|---|---|---|---|---|---|
| \VERSION\1\0 | DA090 | 2CC | D7290 | CC0234000000560053005F00560045005200530049004F004E005F0049004E0046004F0000000000BD04EFFE000001000300 | ..4...V.S._.V.E.R.S.I.O.N._.I.N.F.O............... |
| \24\1\0 | DA36C | 6D7 | D756C | EFBBBF3C3F786D6C2076657273696F6E3D22312E302220656E636F64696E673D227574662D38223F3E0A3C617373656D626C | ...<?xml version="1.0" encoding="utf-8"?>.<assembl |
| Intelligent String |
| • Client.exe • *.dll • .dll • !" /rl HIGHEST /f • Login Data • logins.json • logins • CCan not find chromium logins file • mozglue.dll • nss3.dll • moz_logins • runas • .jpg • .png • .bmp • .gif • .img • K\Google\Chrome\Application\chrome.exe • M\Microsoft\Edge\Application\msedge.exe • e\BraveSoftware\Brave-Browser\Application\brave.exe • !\Opera\opera.exe • '\Opera GX\opera.exe • 9\Mozilla Firefox\firefox.exe • WConhost --headless cmd.exe /c taskkill /IM • .exe /F • https://www.amyuni.com/downloads/usbmmidd_v2.zip • usbmmidd_v2.zip • +deviceinstaller64.exe • usbmmIdd.inf • .ps1 • .bat • .vbs • .hta • <html><head><hta:application windowstate='minimize'></hta:application></head><body><script> • .url • desktop.ini • .exe • Microsoft.NET • RegAsm.exe • RegSvcs.exe • MSBuild.exe • for /F "tokens=1,2,3 delims= " %%A in ('reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RecoveryEnvironment" /v TargetOS') DO SET TARGETOS=%%C • for /F "tokens=1 delims=\" %%A in ('Echo %TARGETOS%') DO SET TARGETOSDRIVE=%%A • ResetConfig.xml • )computerdefaults.exe • conhost cmd.exe • -conhost powershell.exe • sConhost --headless cmd.exe /c taskkill /IM firefox.exe /F • oConhost --headless cmd.exe /c start firefox --profile=" • oConhost --headless cmd.exe /c taskkill /IM brave.exe /F • chrome.dll • oConhost --headless cmd.exe /c taskkill /IM opera.exe /F • 3\Programs\Opera\opera.exe • QConhost --headless cmd.exe /c start "" " • sConhost --headless cmd.exe /c taskkill /IM operagx.exe /F • 9\Programs\Opera GX\opera.exe • qConhost --headless cmd.exe /c taskkill /IM msedge.exe /F • msedge.dll • qConhost --headless cmd.exe /c taskkill /IM chrome.exe /F • '\Discord\Update.exe • sConhost --headless cmd.exe /c taskkill /IM discord.exe /F • 9" --processStart Discord.exe • 3\explorer.exe /NoUACCheck • user32.dll • kernel32.dll • SbieDll.dll • cmdvrt32.dll • cmdvrt64.dll • SxIn.dll • cuckoomon.dll • balloon.sys • netkvm.sys • viofs.sys • vioser.sys • VBoxMouse.sys • VBoxGuest.sys • VBoxSF.sys • VBoxVideo.sys • vmmouse.sys • C:\Program Files\VMware • C:\Program Files\Oracle\VirtualBox Guest Additions • \\.\pipe\cuckoo • +\\.\pipe\VBoxMiniRdDN • )\\.\pipe\VBoxTrayIPC • clr.dll • coreclr.dll • ntdll.dll • _CorExeMainmscoree.dll • 2.3.1.0 • <dpiAware xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true/pm</dpiAware> • <dpiAwareness xmlns="http://schemas.microsoft.com/SMI/2016/WindowsSettings">PerMonitorV2, PerMonitor</dpiAwareness> • <longPathAware xmlns="http://schemas.microsoft.com/SMI/2016/WindowsSettings">true</longPathAware> |
| Flow Anomalies |
| Offset | RVA | Section | Description |
|---|---|---|---|
| 21F6C | 747E2506 | .text | CALL [static] | Indirect call to absolute memory address |
| 21FF3 | 747E2506 | .text | CALL [static] | Indirect call to absolute memory address |
| 358CC | 747E2506 | .text | CALL [static] | Indirect call to absolute memory address |
| 3706E | 42D4D7BA | .text | JMP [static] | Indirect jump to absolute memory address |
| 3AAE7 | 42D4D7BA | .text | CALL [static] | Indirect call to absolute memory address |
| 406E6 | 5C248251 | .text | CALL [static] | Indirect call to absolute memory address |
| 54CA6 | 5C248251 | .text | CALL [static] | Indirect call to absolute memory address |
| 77573 | 7A232EC2 | .text | CALL [static] | Indirect call to absolute memory address |
| 8782E | 12905592 | .text | JMP [static] | Indirect jump to absolute memory address |
| D702E | 402000 | .text | JMP [static] | Indirect jump to absolute memory address |
| Extra Analysis |
| Metric | Value | Percentage |
|---|---|---|
| Ascii Code | 564901 | 63,8497% |
| Null Byte Code | 114057 | 12,8916% |
© 2025 All rights reserved.