Windows
Analysis Report
SelfService.exe
Overview
General Information
Detection
Score: | 36 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 60% |
Signatures
Classification
Analysis Advice
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--") |
Sample crashes during execution, try analyze it on another analysis machine |
- System is w10x64
SelfService.exe (PID: 4416 cmdline:
C:\Users\u ser\Deskto p\SelfServ ice.exe MD5: 9F68B5C096445EBC64ECA54843415A77) WerFault.exe (PID: 2316 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 416 -s 816 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security |
Click to jump to signature section
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Process created: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Queries volume information: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 2 Command and Scripting Interpreter | Path Interception | 1 Process Injection | 1 Virtualization/Sandbox Evasion | OS Credential Dumping | 21 Security Software Discovery | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 11 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Data Encrypted for Impact | DNS Server | Email Addresses |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1347492 |
Start date and time: | 2023-11-24 16:24:46 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 6s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | SelfService.exe |
Detection: | SUS |
Classification: | sus36.troj.evad.winEXE@2/5@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): dllhost.exe, We rFault.exe, WMIADAP.exe, SIHCl ient.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 20.42.65.92 - Excluded domains from analysis
(whitelisted): onedsblobprdeu s17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live .com, slscr.update.microsoft.c om, blobcollector.events.data. trafficmanager.net, ctldl.wind owsupdate.com, umwatson.events .data.microsoft.com, fe3cr.del ivery.mp.microsoft.com - Report size getting too big, t
oo many NtSetInformationFile c alls found.
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8562300225687745 |
Encrypted: | false |
SSDEEP: | 96:znFrEJoSECosMjzzxTMbTdQXIDcQvc6QcEVcw3cE/n+BHUHZopAnQHdE7HeS9+P2:rbUobT0BU/KaKDzuiFWZ24IO8Uv |
MD5: | 5A24B37A04A96E218CEACF95A86C6D47 |
SHA1: | E5BC84CE3BB485C8074B73F7E314017339241E40 |
SHA-256: | 6956E73EC38C0A9EA94A2F13A3F98C6476D45A92318AE08495EA132623DBAC8D |
SHA-512: | 114817DB2114A3CC6FAE6E431FEC969BC3EC73DAE531FB5214EBAB897C6F9C177326CCB1C5D4A65A94CA6D10EA43D34E06BF2C0DE438F1C76BB6DAD1B1F2E78D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 147423 |
Entropy (8bit): | 3.3387120899044427 |
Encrypted: | false |
SSDEEP: | 768:YGWTx4u2SBpNNFWt0zE2vrvC6hhiHLTggjA4D4vJcIfDICgLPHcQ3w7+LH1nnwRr:PulpN4uE2aOhuLTgADyzgrHcfCDWVE |
MD5: | B24B7DD22DD3EB83CC1846518C7013FE |
SHA1: | 2E5DBAAB9DA23594B9F72ECA9DAA13844E46BE3F |
SHA-256: | 1E0FD3DCA1157D0435D0362646DDA760F2EF6AB830F4D9761EF372CE891AE779 |
SHA-512: | 5E4CE58BDC5D8F6089C8E6AD9C9B8DF275663B37AEB8BCF288352D7022A672A8D182FB42FC3EAAB8373457880BC5EE436EBC7CD917A74CB49ACC0C850C85AA5F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8340 |
Entropy (8bit): | 3.699426773722131 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJvo6bT6YEIwSU9QOYgmfKK405prr89b+8sf6qm:R6lXJw6/6YE/SU9vYgmfx40o+PfO |
MD5: | CCF0FA147CE3964ADDB2439F76B57E88 |
SHA1: | 33958F972E6DCEE185A625F586AFA08B8638DD6C |
SHA-256: | F4829563836A8F37E69001A54CEBAB0A2BCBED48E2F37EF1BD840A3946F9D1E8 |
SHA-512: | 0B76FFC76B0DE877695F16C92F0F955855662BB6D291330FD78CD62B06245C0D8A98BEFC684172DB52AE44997BB1489892E209F0923D0BB8D21B825477DBF800 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4680 |
Entropy (8bit): | 4.488697032001025 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsaJg77aI9t/2WpW8VYzYm8M4JijFW+q85SaUEElDfd:uIjfoI7TX7VzJbdFJlDfd |
MD5: | 23278C4DDAE3A2EDE6C2197E5E2382E5 |
SHA1: | 1290BBF94DF45AB33D54E2E14F7D239D8DE723BA |
SHA-256: | 08BE3E307E10F1307F2707D80B4DE5FCB752EA13943A8DD85DDF1FEA68F14367 |
SHA-512: | BE3F73BB75C4E1DDF911EDD196494D904219684371B79E3FD52801E6680DC4DDBF5D5D917E2618D550080059E4455B69150B94BAED518D365A231AB71A321393 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.422004506521449 |
Encrypted: | false |
SSDEEP: | 6144:1Svfpi6ceLP/9skLmb0OTIWSPHaJG8nAgeMZMMhA2fX4WABlEnNt0uhiTwi:8vloTIW+EZMM6DFy303wi |
MD5: | 4A1A71C0DAF6F422BB6F01650C059DDE |
SHA1: | 9711F9AC75CCEDD4697DA708DFA8137A6D7F65FE |
SHA-256: | 80ACAB6A35E4EA5286949EDDB87DD21DC3764A21A2A576A4F6ACAB6A2B5BF5A1 |
SHA-512: | A78E7B6660D61E1E5DD2C26D4E0E30DE32463E0482D0578D92D897F32AE485515DDD2819B440B0629836CAA2ED34058B0CB907BBF830BD2B9B2BF06B06EF0E48 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.927824079777427 |
TrID: |
|
File name: | SelfService.exe |
File size: | 5'268'576 bytes |
MD5: | 9f68b5c096445ebc64eca54843415a77 |
SHA1: | 35fe3260d7e7d762d5114de157e338d966576d60 |
SHA256: | 9cbfaff0aa427e248a325bb430f3e0a7ec420d7ecf03efdab9d29eaddac44f01 |
SHA512: | 425e2b7e46e28d4e3fe01ffd628a1f479cb47041b6cb79c0b3fa3a0022d5a2c5dd99c37e9056ea2fc7bf73aa31cbcd65e79781427601e3d0082e03d068954dbe |
SSDEEP: | 98304:Thj0OcytalUPvzEmgmyM3tO+xcQjEHstOb8:Thj0OcykyXzEY53Tx3jEM4g |
TLSH: | 5F36BE1036B49409E4BBCA7C54A946400F397C829DADDA4D3D6E7C8E1F73B428E15FAB |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............0..@L.........2^L.. ...`L...@.. ........................P.......P...`................................ |
Icon Hash: | 1b3d5a8eaa56690f |
Entrypoint: | 0x8c5e32 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6082991B [Fri Apr 23 09:53:31 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | true |
Signature Issuer: | CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 175095A8F0748B275DBC0C10EBBB533A |
Thumbprint SHA-1: | EBAF02C39126534EE4196667B92283860CEED095 |
Thumbprint SHA-256: | A88C7898F592CAD490236D05D9E04965B69B33214227A47D424CDDA9DBE6DEF6 |
Serial: | 09C3B1EA2097AED1E243D9024C13C15A |
Instruction |
---|
jmp dword ptr [00402000h] |
jl 00007F41C061BCB2h |
and byte ptr [eax], al |
sub al, 00h |
cmp eax, dword ptr [eax] |
and byte ptr [eax], al |
sub al, 00h |
add byte ptr [ebx], bh |
add byte ptr [21005F00h], ch |
add byte ptr [eax], ch |
add byte ptr [ecx], ch |
add byte ptr [ebx+00h], bl |
pop ebp |
add byte ptr [ebx+00h], bh |
jnl 00007F41C061BCB2h |
pop esp |
add byte ptr [edi], ch |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x4c5de0 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4c6000 | 0x3e854 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x502e00 | 0x3660 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x506000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x4c5ca8 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x4c3e60 | 0x4c4000 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x4c6000 | 0x3e854 | 0x3ea00 | False | 0.21703468063872255 | data | 4.192502909219041 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x506000 | 0xc | 0x200 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x4c6280 | 0x148 | Device independent bitmap graphic, 8 x 16 x 32, image size 0 | 0.6585365853658537 | ||
RT_ICON | 0x4c63d8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | 0.5549645390070922 | ||
RT_ICON | 0x4c6850 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 0 | 0.4558139534883721 | ||
RT_ICON | 0x4c6f18 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | 0.4155737704918033 | ||
RT_ICON | 0x4c78b0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | 0.37171669793621015 | ||
RT_ICON | 0x4c8968 | 0x1a68 | Device independent bitmap graphic, 40 x 80 x 32, image size 0 | 0.2834319526627219 | ||
RT_ICON | 0x4ca3e0 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | 0.24730290456431536 | ||
RT_ICON | 0x4cc998 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 0 | 0.18463627775153518 | ||
RT_ICON | 0x4d0bd0 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 0 | 0.16478743068391866 | ||
RT_ICON | 0x4d6068 | 0xe8a8 | Device independent bitmap graphic, 120 x 240 x 32, image size 0 | 0.08138012088650101 | ||
RT_ICON | 0x4e4920 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 0 | 0.1339604792936725 | ||
RT_ICON | 0x4eddd8 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 0 | 0.11492961078906896 | ||
RT_ICON | 0x4fe610 | 0x5766 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 1.0003128631447216 | ||
RT_GROUP_ICON | 0x503d88 | 0xbc | data | 0.6914893617021277 | ||
RT_VERSION | 0x503e54 | 0x3ea | data | 0.41317365269461076 | ||
RT_MANIFEST | 0x504250 | 0x600 | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.3717447916666667 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 16:25:30 |
Start date: | 24/11/2023 |
Path: | C:\Users\user\Desktop\SelfService.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7d0000 |
File size: | 5'268'576 bytes |
MD5 hash: | 9F68B5C096445EBC64ECA54843415A77 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 16:25:31 |
Start date: | 24/11/2023 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x110000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Reputation: | high |
Has exited: | true |