PESCAN.IO - Analysis Report

File Structure:
Analysis Image
Information:
Size: 411,00 KB
SHA-256 Hash: 025134D77DCD4AB189301ED58A5C6F5046AC71E2FC3C017FCE4122529FC0D7E8
SHA-1 Hash: 7F004012C05FCA17A746629179463F6274C48055
MD5 Hash: BE36675F14FB0099896527084200CC80
Imphash: 67900E6C89DA1700AD08C2A651600941
MajorOSVersion: 6
CheckSum: 00000000
EntryPoint (rva): 40770
SizeOfHeaders: 400
SizeOfImage: 6B000
ImageBase: 0000000140000000
Architecture: x64
ImportTable: 62B74
Characteristics: 22
TimeDateStamp: 6764EDBC
Date: 20/12/2024 4:08:28
File Type: EXE
Number Of Sections: 7
ASLR: Disabled
Section Names (Optional Header): .text, .rdata, .data, .pdata, .padding, .rsrc, .reloc
Number Of Executable Sections: 1
Subsystem: Windows GUI

Sections Info:
Section Name Flags ROffset RSize VOffset VSize
.text 60000020 (Executable) 400 46800 1000 46780
.rdata 40000040 46C00 1BC00 48000 1BBB2
.data C0000040 (Writeable) 62800 200 64000 AC0
.pdata 40000040 62A00 2C00 65000 2B74
.padding 40000040 65600 C00 68000 BBB
.rsrc 40000040 66200 200 69000 1F8
.reloc 42000040 66400 800 6A000 728
Description:
ProductName: data
FileVersion: 0.1.0

Entry Point:
The section number (1) have the Entry Point
Information -> EntryPoint (calculated) - 3FB70
Code -> 4883EC28E8E30200004883C428E972FEFFFFCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC66660F1F8400000000004883
SUB RSP, 0X28
CALL 0X12EC
ADD RSP, 0X28
JMP 0XE84
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
INT3
NOP WORD PTR [RAX + RAX]

Signatures:
Rich Signature Analyzer:
Code -> 19B3616A5DD20F395DD20F395DD20F3954AA9C3953D20F394C540C3854D20F394C540B3851D20F394C540A3875D20F399AA70E384DD20F395DD20E3997D20F395DD20F3965D20F39DC54F0395CD20F39DC540D385CD20F39526963685DD20F39
Footprint md5 Hash -> 66F5C73302E86FF78D94F21CCF20FB64
• The Rich header apparently has not been modified
Certificate - Digital Signature Not Found:
• The file is not signed

Packer/Compiler:
Compiler: Microsoft Visual Studio
Detect It Easy (die)
PE+(64): compiler: Microsoft Visual C/C++(-)[-]
PE+(64): compiler: Rust(x86_64-pc-windows-msvc)[-]
PE+(64): linker: Microsoft Linker(14.42**)[EXE64]
Entropy: 6.30918

Suspicious Functions:
Library Function Description
KERNEL32.DLL CreateMutexA Create a named or unnamed mutex object for controlling access to a shared resource.
KERNEL32.DLL GetModuleHandleA Retrieves a handle to the specified module.
KERNEL32.DLL WriteFile Writes data to a specified file or input/output (I/O) device.
KERNEL32.DLL LoadLibraryA Loads the specified module into the address space of the calling process.
KERNEL32.DLL GetProcAddress Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).
KERNEL32.DLL IsDebuggerPresent Determines if the calling process is being debugged by a user-mode debugger.
KERNEL32.DLL SleepEx Pauses the execution of the current thread, optionally allowing the thread to be awakened by a kernel object or upon expiration of a timeout.
File Access:
exe\\.\NUL\cmd.exe
.exe
?@\_cmd.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exevmwareuser.exevmacthlp.exevmware-vmx.exevmware-authd.exevboxservice.exevboxtray.exevboxcontrol.exevboxheadless.exeqemu-ga.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exevmwareuser.exevmacthlp.exevmware-vmx.exevmware-authd.exevboxservice.exevboxtray.exevboxcontrol.exevboxheadless.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exevmwareuser.exevmacthlp.exevmware-vmx.exevmware-authd.exevboxservice.exevboxtray.exevboxcontrol.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exevmwareuser.exevmacthlp.exevmware-vmx.exevmware-authd.exevboxservice.exevboxtray.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exevmwareuser.exevmacthlp.exevmware-vmx.exevmware-authd.exevboxservice.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exevmwareuser.exevmacthlp.exevmware-vmx.exevmware-authd.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exevmwareuser.exevmacthlp.exevmware-vmx.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exevmwareuser.exevmacthlp.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exevmwareuser.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exevmwaretray.exe
\windows\sysnative\drivers\xenvbd.sysvmtoolsd.exe
api-ms-win-crt-heap-l1-1-0.dll
api-ms-win-crt-locale-l1-1-0.dll
api-ms-win-crt-stdio-l1-1-0.dll
api-ms-win-crt-math-l1-1-0.dll
api-ms-win-crt-runtime-l1-1-0.dll
api-ms-win-crt-string-l1-1-0.dll
ntdll.dll
advapi32.dll
bcrypt.dll
kernel32.dll
bcryptprimitives.dll
api-ms-win-core-synch-l1-2-0.dll
dbghelp.dll
\windows\sysnative\vboxmrxnp.dll
\windows\sysnative\vboxhook.dll
\windows\sysnative\vboxdisp.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dllvmhgfs.dllvm3dgl.dllvmrig.dllvmusb.dllvboxhook.dllvboxdisp.dllvboxservice.dlldbghelp.dllapi_log.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dllvmhgfs.dllvm3dgl.dllvmrig.dllvmusb.dllvboxhook.dllvboxdisp.dllvboxservice.dlldbghelp.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dllvmhgfs.dllvm3dgl.dllvmrig.dllvmusb.dllvboxhook.dllvboxdisp.dllvboxservice.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dllvmhgfs.dllvm3dgl.dllvmrig.dllvmusb.dllvboxhook.dllvboxdisp.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dllvmhgfs.dllvm3dgl.dllvmrig.dllvmusb.dllvboxhook.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dllvmhgfs.dllvm3dgl.dllvmrig.dllvmusb.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dllvmhgfs.dllvm3dgl.dllvmrig.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dllvmhgfs.dllvm3dgl.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dllvmhgfs.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dllvmsrvc.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dllvboxmrxnp.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dllcyberghostvpn.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dllcmdvrt64.dll
sbiedll.dllsf2.dllsnxhk.dllcmdvrt32.dll
sbiedll.dllsf2.dllsnxhk.dll
sbiedll.dllsf2.dll
sbiedll.dll
\windows\sysnative\drivers\xenvbd.sys
\windows\sysnative\drivers\xensvc.sys
\windows\sysnative\drivers\xennet.sys
\windows\sysnative\drivers\prlvideo.sys
\windows\sysnative\drivers\prlmouse.sys
\windows\sysnative\drivers\prlfs.sys
\windows\sysnative\drivers\prleth.sys
\windows\sysnative\drivers\qemupciserial.sys
\windows\sysnative\drivers\qemufwcfg.sys
\windows\sysnative\drivers\qemu-ga.sys
\windows\sysnative\drivers\VBoxVideo.sys
\windows\sysnative\drivers\VBoxSF.sys
\windows\sysnative\drivers\VBoxGuest.sys
\windows\sysnative\drivers\VBoxMouse.sys
\windows\sysnative\drivers\vmnet.sys
\windows\sysnative\drivers\vmx86.sys
\windows\sysnative\drivers\vmmemctl.sys
\windows\sysnative\drivers\vmrawdsk.sys
\windows\sysnative\drivers\vmusbmouse.sys
\windows\sysnative\drivers\vmhgfs.sys
\windows\sysnative\drivers\vmmouse.sys
System information saved to system_info.txt
system_info.txt
Temp

Interest's Words:
Virus
exec
tasklist
attrib
start
wmic
systeminfo
expand
getmac
sc.exe

Anti-VM/Sandbox/Debug Tricks:
VMWare - vmmouse.sys
SandBoxie Library - SbieDll.dll
VirtualBox Service - VBoxService.exe
OllyDbg Libary - dbghelp.dll
OllyDbg EXE - ollydbg.exe
VirtualBox Library - vboxmrxnp.dll
LabTools - wireshark
LabTools - procexp
LabTools - procmon
LabTools - regmon
LabTools - petools

URLs:
https://docs.rs/getrandomnodejs-es-module-support

Payloads:
Unusual BP Cave > 15 Bytes - (0xCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC...)
Possible Metasploit Payload - MSFPayload Generate (Detection with heuristic methods)

AV Services:
Antivirus name extract - (SecurityCenter2)

Strings/Hex Code Found With The File Rules:
Rule Text (Ascii): WinAPI Sockets (connect)
Rule Text (Ascii): WinAPI Sockets (send)
Rule Text (Ascii): File (CreateFile)
Rule Text (Ascii): File (WriteFile)
Rule Text (Ascii): File (ReadFile)
Rule Text (Ascii): Anti-Analysis VM (IsDebuggerPresent)
Rule Text (Ascii): Execution (CreateProcessW)
Rule Text (Ascii): Antivirus Software (avast)
Rule Text (Ascii): Antivirus Software (panda)
Rule Text (Ascii): Antivirus Software (sophos)
Rule Text (Ascii): Antivirus Software (defender)
EP Rules: Microsoft Visual C++ 8.0 (DLL)
EP Rules: Microsoft Visual C++ 8.0
EP Rules: PE-Exe Executable Image

Intelligent String:
• sbiedll.dll
• sf2.dll
• snxhk.dll
• cmdvrt32.dll
• cmdvrt64.dll
• cyberghostvpn.dll
• vboxmrxnp.dll
• vmsrvc.dll
• vmhgfs.dll
• vm3dgl.dll
• vmrig.dll
• vmusb.dll
• vboxhook.dll
• vboxdisp.dll
• vboxservice.dll
• dbghelp.dll
• api_log.dll
• dir_watch.dll
• wpespy.dll
• cigdll.dll
• pstorec.dll
• vmcheck.dll
• allerror.dll
• sample.dll
• sandbox.dll
• agent.dll
• dbgcore.dll
• avghook.dll
• avghooka.dll
• log_api.dll
• api_hook.dll
• apimon.dll
• apispy.dll
• regmon.dll
• filemon.dll
• procmon.dll
• sysmon.dll
• syscall.dll
• hooks.dll
• monitor.dll
• defense.dll
• protect.dll
• analyzer.dll
• trace.dll
• qemu-ga.dll
• parallels.dll
• prl_tools.dll
• vpcmap.dll
• vmusbmouse.dll
• vmtray.dll
• wireshark.dll
• windbg.dll
• ollydbg.dll
• immunity.dll
• ghidra.dll
• ida.dll
• x64dbg.dll
• e:\\root\SecurityCenter2pathAntivirusProductdisplayName@
• -.log
• C:\Users\acana\.cargo\registry\src\index.crates.io-6f17d22bba15001f\chrono-0.4.39\src\format\formatting.rs
• C:\Users\acana\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rand-0.8.5\src\rngs\thread.rs
• C:\Users\acana\.cargo\registry\src\index.crates.io-6f17d22bba15001f\rand_chacha-0.3.1\src\guts.rs
• m: this target is not supportederrno: did not return a positive valueunexpected situationSecRandomCopyBytes: iOS Security framework failureRtlGenRandom: Windows system function failureRDRAND: failed multiple times: CPU issue likelyRDRAND: instruction not supportedWeb Crypto API is unavailableCalling Web API crypto.getRandomValues failedrandSecure: VxWorks RNG module is not initializedNode.js crypto CommonJS module is unavailableCalling Node.js API crypto.randomFillSync failedNode.js ES modules are not directly supported, see https://docs.rs/getrandomnodejs-es-module-support
• C:\Users\acana\.cargo\registry\src\index.crates.io-6f17d22bba15001f\chrono-0.4.39\src\offset\local\mod.rs
• C:\Users\acana\.cargo\registry\src\index.crates.io-6f17d22bba15001f\chrono-0.4.39\src/lib.rs
• NotFoundPermissionDeniedConnectionRefusedConnectionResetHostUnreachableNetworkUnreachableConnectionAbortedNotConnectedAddrInUseAddrNotAvailableNetworkDownBrokenPipeAlreadyExistsWouldBlockNotADirectoryIsADirectoryDirectoryNotEmptyReadOnlyFilesystemFilesystemLoopStaleNetworkFileHandleInvalidInputInvalidDataTimedOutWriteZeroStorageFullNotSeekableFilesystemQuotaExceededFileTooLargeResourceBusyExecutableFileBusyDeadlockCrossesDevicesTooManyLinksInvalidFilenameArgumentListTooLongInterruptedUnsupportedUnexpectedEofOutOfMemoryOtherUncategorizedlibrary\std\src\sys\pal\windows\args.rs$*+-./:?@\_cmd.exe /e:ON /v:OFF /d /c "batch file arguments are invalid
• NTDLL.DLL
• \\.\pipe\__rust_anonymous_pipe1__.
• data.pdb
• .tls
• .bss
• ProcessPrngapi-ms-win-core-synch-l1-2-0.dll
• bcryptprimitives.dll
• kernel32.dll
• bcrypt.dll
• advapi32.dll
• wcsncmpapi-ms-win-crt-string-l1-1-0.dll
• api-ms-win-crt-runtime-l1-1-0.dll
• api-ms-win-crt-math-l1-1-0.dll
• api-ms-win-crt-stdio-l1-1-0.dll
• api-ms-win-crt-locale-l1-1-0.dll
• api-ms-win-crt-heap-l1-1-0.dll

Extra 4n4lysis:
Metric Value Percentage
Ascii Code 239071 56,8048%
Null Byte Code 88094 20,9317%
© 2024 All rights reserved.