PESCAN.IO - Analysis Report Valid Code

File Structure:
Analysis Image
Information:
Size: 52,50 KB
SHA-256 Hash: D93EE2700767B89273521287AB9E0AFB05C03E5E6D78D52A5254A84B0F2BA7F4
SHA-1 Hash: 1BDBCF0277F40DE13FCA29621FA2113347A4E703
MD5 Hash: C02A45C075CB87557F1F114B0D19B2C9
Imphash: F34D5F2D4577ED6D9CEEC516C1F5A744
MajorOSVersion: 4
CheckSum: 00000000
EntryPoint (rva): E516
SizeOfHeaders: 200
SizeOfImage: 14000
ImageBase: 400000
Architecture: x86
ImportTable: E4C4
Characteristics: 102
TimeDateStamp: 67AAE013
Date: 11/02/2025 5:28:51
File Type: EXE
Number Of Sections: 3
ASLR: Disabled
Section Names: .text, .rsrc, .reloc
Number Of Executable Sections: 1
Subsystem: Windows GUI
UAC Execution Level Manifest: asInvoker
[Incomplete Binary or Compressor Packer - 27,50 KB Missing]

Sections Info:
Section Name Flags ROffset RSize VOffset VSize
.text 60000020 (Executable) 200 C600 2000 C530
.rsrc 40000040 C800 800 10000 61C
.reloc 42000040 D000 200 12000 C
Description:
InternalName: SystemHelper.exe
OriginalFilename: SystemHelper.exe
CompanyName: Oracle
LegalCopyright: Copyright Oracle 2024
LegalTrademarks: Copyright Oracle 2024
ProductName: Oracle
FileVersion: 1.0.0.8

Entry Point:
The section number (1) - (.text) have the Entry Point
Information -> EntryPoint (calculated) - C716
Code -> FF250020400000000000000009000A000D000B00C200A0000000000000000000000000000000000000000000000000000000
JMP DWORD PTR [0X402000]
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
OR DWORD PTR [EAX], EAX
OR AL, BYTE PTR [EAX]
OR EAX, 0XC2000B00
ADD BYTE PTR [EAX], AH
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL
ADD BYTE PTR [EAX], AL

Signatures:
Certificate - Digital Signature Not Found:
• The file is not signed

Packer/Compiler:
Compiler: Microsoft Visual .NET - (You can use a decompiler for this...)
AnyCPU: False
Version: v4.0
Compiler: Microsoft Visual Studio
Detect It Easy (die)
PE: library: .NET(v4.0.30319)[-]
PE: linker: Microsoft Linker(48.0)[EXE32]
Entropy: 5.09523

Suspicious Functions:
Library Function Description
KERNEL32.DLL VirtualAlloc Reserve, commit, or both, a region of memory within the virtual address space of a process.
Windows REG (UNICODE):
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\RunOnce
Rebuilt string - SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Rebuilt string - SOFTWARE\Microsoft\Windows\CurrentVersion\Run

File Access:
SystemHelper.exe
mscoree.dll
kernel32.dll
RootDir

File Access (UNICODE):
SystemHelper.exe
*.exe
wscript.exe
cmd.exe
powershell.exe
autorun.vbs

SQL Queries:
Select * FROM AntivirusProductdisplayNameQError retrieving antivirus information: G
Select * FROM Win32_VideoControllerEError retrieving GPU information: ;
Select * FROM Win32_Processor9{0} - {1} Cores, {2} ThreadsNumberOfCores3NumberOfLogicalProcessorsEError retrieving CPU information: S

Interest's Words:
Virus
Encrypt
Decrypt
<script
<main
exec
powershell
attrib
start
cipher
wmic
systeminfo
replace

Interest's Words (UNICODE):
Virus
Encrypt
Decrypt
Encryption
wscript
exec
createobject
powershell
ping

URLs (UNICODE):
http://41.216.188.198/Panel/page.php

AV Services (UNICODE):
Antivirus name extract - (SecurityCenter2)

IP Addresses:
41.216.188.198

Known IP/Domains (UNICODE):
Cloudflare DNS - 1.1.1.1

Strings/Hex Code Found With The File Rules:
Rule Text (Ascii): Encryption (CipherMode)
Rule Text (Ascii): Encryption (CreateDecryptor)
Rule Text (Ascii): Encryption (CryptoStream)
Rule Text (Ascii): Encryption (CryptoStreamMode)
Rule Text (Ascii): Encryption (FromBase64String)
Rule Text (Ascii): Encryption (ICryptoTransform)
Rule Text (Ascii): Encryption (RNGCryptoServiceProvider)
Rule Text (Ascii): Encryption (Rijndael)
Rule Text (Ascii): Encryption (RijndaelManaged)
Rule Text (Ascii): Encryption (ToBase64String)
Rule Text (Ascii): Stealth (VirtualAlloc)
Rule Text (Ascii): Execution (ShellExecute)
Rule Text (Ascii): Malicious rerouting of traffic to an attacker-controlled site (Redirect)
Rule Text (Unicode): Technique used to circumvent security measures (Bypass)
EP Rules: Lotus Graphics format
EP Rules: Microsoft Visual C++ 8
EP Rules: Microsoft Visual C++ 8.0

Resources:
Path DataRVA Size FileOffset CodeText
\VERSION\1\0 10090 38C C890 8C0334000000560053005F00560045005200530049004F004E005F0049004E0046004F0000000000BD04EFFE000001000000..4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...............
\24\1\0 1042C 1EA CC2C EFBBBF3C3F786D6C2076657273696F6E3D22312E302220656E636F64696E673D225554462D3822207374616E64616C6F6E65...<?xml version="1.0" encoding="UTF-8" standalone
Intelligent String:
• 1.0.0.8
• SystemHelper.exe
• powershell.exe
• .zip
• .exe
• .bat
• .cmd
• .ps1
• .vbs
• .pdf
• cmd.exe
• wscript.exe
• U/C ping 1.1.1.1 -n 1 -w 4000 > Nul & Del "
• http://41.216.188.198/Panel/page.php
• autorun.vbs
• *.exe
• C:\Users\Badus\OneDrive\Desktop\Bot1.0.8\Bot\LiteHTTP\obj\x86\Debug\SystemHelper.pdb
• _CorExeMainmscoree.dll

Extra 4n4lysis:
Metric Value Percentage
Ascii Code 29400 54,6875%
Null Byte Code 20058 37,3103%
© 2025 All rights reserved.