PESCAN.IO - Analysis Report Valid Code

File Structure:
Analysis Image
Information:
Size: 135,98 KB
SHA-256 Hash: 3036746D9E62F29EC5A6CE8B44BB6BAC183ED8126FDAE3B64C01D86D2A27D428
SHA-1 Hash: C64242F9CC1EA7AD03DA46B9F7E70437D8D5CBBB
MD5 Hash: AC433C7A0FEAFBF08AFEE01CF212EEA5
Imphash: 4B776BD26F313F172A18C5EB16A5CD4D
MajorOSVersion: 4
CheckSum: 000229EA
EntryPoint (rva): 13E0
SizeOfHeaders: 600
SizeOfImage: 26000
ImageBase: 0000000140000000
Architecture: x64
ImportTable: 8000
Characteristics: 26
TimeDateStamp: 67D067A3
Date: 11/03/2025 16:41:07
File Type: DLL
Number Of Sections: 20
ASLR: Disabled
Section Names (Optional Header): .text, .data, .rdata, .pdata, .xdata, .bss, .idata, .CRT, .tls, .rsrc, .reloc, /4, /19, /31, /45, /57, /70, /81, /97, /113
Number Of Executable Sections: 1
Subsystem: Windows Console
UAC Execution Level Manifest: asInvoker

Sections Info:
Section Name Flags ROffset RSize VOffset VSize
.text 60000060 (Executable) 600 1C00 1000 1BA8
.data C0000040 (Writeable) 2200 200 3000 A0
.rdata 40000040 2400 C00 4000 B90
.pdata 40000040 3000 400 5000 234
.xdata 40000040 3400 200 6000 1B8
.bss C0000080 (Writeable) 0 0 7000 180
.idata C0000040 (Writeable) 3600 C00 8000 A08
.CRT C0000040 (Writeable) 4200 200 9000 60
.tls C0000040 (Writeable) 4400 200 A000 10
.rsrc 40000040 4600 600 B000 4E8
.reloc 42000040 4C00 200 C000 78
/4 42000040 4E00 600 D000 490
/19 42000040 5400 B400 E000 B224
/31 42000040 10800 2200 1A000 2106
/45 42000040 12A00 1E00 1D000 1DF3
/57 42000040 14800 A00 1F000 8F8
/70 42000040 15200 400 20000 2D2
/81 42000040 15600 1A00 21000 1815
/97 42000040 17000 1400 23000 12F1
/113 42000040 18400 200 25000 16E
Entry Point:
The section number (1) have the Entry Point
Information -> EntryPoint (calculated) - 9E0
Code -> 4883EC28488B05C5300000C70000000000E88AFDFFFF90904883C428C30F1F00E92B1600009090909090909090909090488D
SUB RSP, 0X28
MOV RAX, QWORD PTR [RIP + 0X30C5]
MOV DWORD PTR [RAX], 0
CALL 0XDA0
NOP
NOP
ADD RSP, 0X28
RET
NOP DWORD PTR [RAX]
JMP 0X2650
NOP
NOP
NOP
NOP
NOP
NOP
NOP
NOP
NOP
NOP
NOP

Signatures:
Certificate - Digital Signature Not Found:
• The file is not signed

Packer/Compiler:
Detect It Easy (die)
Entropy: 5.32056

Suspicious Functions:
Library Function Description
KERNEL32.DLL WriteFile Writes data to a specified file or input/output (I/O) device.
KERNEL32.DLL CreateFileA Creates or opens a file or I/O device.
SHELL32.DLL ShellExecuteA Performs a run operation on a specific file.
Windows REG:
Rebuilt string - SOFTWARE\Policies\Microsoft\Windows\System

File Access:
\Windows\System32\cmd.exe
cmd.exe
/c start Proxima.exe
WININET.dll
SHELL32.dll
api-ms-win-crt-string-l1-1-0.dll
api-ms-win-crt-stdio-l1-1-0.dll
api-ms-win-crt-runtime-l1-1-0.dll
api-ms-win-crt-private-l1-1-0.dll
api-ms-win-crt-math-l1-1-0.dll
api-ms-win-crt-heap-l1-1-0.dll
api-ms-win-crt-filesystem-l1-1-0.dll
api-ms-win-crt-environment-l1-1-0.dll
KERNEL32.dll
\$S1llyOwO\calc.bat

Interest's Words:
BotNet
exec
attrib
start
expand

URLs:
https://anonymfile.com/f/d1fa9be9-2399-4594-ba6e-44efd3609476

Strings/Hex Code Found With The File Rules:
Rule Text (Ascii): File (CreateFile)
Rule Text (Ascii): File (WriteFile)
Rule Text (Ascii): File (ReadFile)
Rule Text (Ascii): Stealth (VirtualProtect)
Rule Text (Ascii): Execution (CreateProcessA)
Rule Text (Ascii): Execution (ShellExecute)
Rule Text (Ascii): Malicious code executed after exploiting a vulnerability (Payload)
Rule Text (Ascii): Network of compromised computers controlled by an attacker (Botnet)
EP Rules: Microsoft Visual C++ 8.0 (DLL)

Resources:
Path DataRVA Size FileOffset CodeText
\24\1\0 B058 48F 4658 3C3F786D6C2076657273696F6E3D22312E302220656E636F64696E673D225554462D3822207374616E64616C6F6E653D2279<?xml version="1.0" encoding="UTF-8" standalone="y
Intelligent String:
• .bss
• .tls
• @.bss
• .CRT
• https://anonymfile.com/f/d1fa9be9-2399-4594-ba6e-44efd3609476C:\$S1llyOwO\calc.bat/c start Proxima.execmd.exerunasC:\$S1llyOwO/c "C:\$S1llyOwO\calc.bat"C:\Windows\System32\cmd.exe
• KERNEL32.dll
• api-ms-win-crt-environment-l1-1-0.dll
• api-ms-win-crt-filesystem-l1-1-0.dll
• api-ms-win-crt-heap-l1-1-0.dll
• api-ms-win-crt-math-l1-1-0.dll
• api-ms-win-crt-private-l1-1-0.dll
• api-ms-win-crt-runtime-l1-1-0.dll
• api-ms-win-crt-string-l1-1-0.dll
• WININET.dll

Extra 4n4lysis:
Metric Value Percentage
Ascii Code 70912 50,9272%
Null Byte Code 48200 34,616%
NOP Cave Found 0x9090909090 Block Count: 30 | Total: 0,0539%
© 2025 All rights reserved.