Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RcvMst.exe

Overview

General Information

Sample name:RcvMst.exe
Analysis ID:1447778
MD5:6866479d039860a7f28eb5f11768e2e0
SHA1:58f70fd73d8582a11db032322aac6081850359ac
SHA256:9ff834bf3231a1e257b6d19770bcd670b8ff00227334f7f967cba9fd5a5a6a85

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Uses Windows timers to delay execution
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • RcvMst.exe (PID: 6612 cmdline: "C:\Users\user\Desktop\RcvMst.exe" MD5: 6866479D039860A7F28EB5F11768E2E0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RcvMst.exeVirustotal: Detection: 14%Perma Link
Source: RcvMst.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: RcvMst.exeString found in binary or memory: http://www.indyproject.org/
Source: RcvMst.exe, 00000000.00000003.1677314919.00000000089F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: RcvMst.exeStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79
Source: RcvMst.exeStatic PE information: Number of sections : 11 > 10
Source: RcvMst.exe, 00000000.00000003.1675874771.0000000000D59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10War vs RcvMst.exe
Source: RcvMst.exe, 00000000.00000003.1675874771.0000000000D50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dllj% vs RcvMst.exe
Source: RcvMst.exe, 00000000.00000003.1670904466.0000000000D52000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dllj% vs RcvMst.exe
Source: RcvMst.exe, 00000000.00000003.1676332459.0000000000D54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dllj% vs RcvMst.exe
Source: RcvMst.exe, 00000000.00000003.1671310554.0000000000D53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dllj% vs RcvMst.exe
Source: RcvMst.exe, 00000000.00000003.1676738087.0000000000D53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dllj% vs RcvMst.exe
Source: RcvMst.exe, 00000000.00000003.1676569336.0000000000D54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dllj% vs RcvMst.exe
Source: RcvMst.exe, 00000000.00000003.1676738087.0000000000D59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10War vs RcvMst.exe
Source: RcvMst.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: mal52.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\RcvMst.exeFile created: C:\Users\user\Desktop\RcvMst.exe.close.stopJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: RcvMst.exeVirustotal: Detection: 14%
Source: RcvMst.exeString found in binary or memory: NATS-SEFI-ADD
Source: RcvMst.exeString found in binary or memory: NATS-DANO-ADD
Source: RcvMst.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: RcvMst.exeString found in binary or memory: jp-ocr-b-add
Source: RcvMst.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: RcvMst.exeString found in binary or memory: jp-ocr-hand-add
Source: RcvMst.exeString found in binary or memory: ISO_6937-2-add
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: security.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: d3d10_1.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: d3d10_1core.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: d3d10_1.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: d3d10_1core.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: msdart.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: idndl.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
Source: RcvMst.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: RcvMst.exeStatic file information: File size 8620032 > 1048576
Source: RcvMst.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x64c400
Source: RcvMst.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x125600
Source: RcvMst.exeStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\RcvMst.exeUser Timer Set: Timeout: 250msJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeUser Timer Set: Timeout: 10msJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeUser Timer Set: Timeout: 10msJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeUser Timer Set: Timeout: 10msJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: RcvMst.exe, 00000000.00000003.1675874771.0000000000D64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll8
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\RcvMst.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\RcvMst.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RcvMst.exe15%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.indyproject.org/0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.sandoll.co.krRcvMst.exe, 00000000.00000003.1677314919.00000000089F2000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.indyproject.org/RcvMst.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447778
Start date and time:2024-05-27 02:33:42 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 2s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:RcvMst.exe
Detection:MAL
Classification:mal52.evad.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.666838353480752
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.53%
  • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:RcvMst.exe
File size:8'620'032 bytes
MD5:6866479d039860a7f28eb5f11768e2e0
SHA1:58f70fd73d8582a11db032322aac6081850359ac
SHA256:9ff834bf3231a1e257b6d19770bcd670b8ff00227334f7f967cba9fd5a5a6a85
SHA512:230546308f0fd7b6f31d9bfe0f696d6c06c8619a2a7a1989f4d5d1d90a78fb5134cdb5388c4665477b2359f9f62437749f3c30a1f82682ae6e189331b7932504
SSDEEP:98304:uYiJ1MVTPBlcZvtBumKt62YfpG2XROyQlA3aLk2w+7+rO7j3+myvAUNA6dw3:ukxJiY02YBGEOzlOrO7jO6
TLSH:59967C27AA465539C47B093B5837B714AC3F76B43956EC1BABF80C4C4E719806A3A70F
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
Icon Hash:2b4d968a88f93b17
Entrypoint:0xa51520
Entrypoint Section:.itext
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
DLL Characteristics:
Time Stamp:0x5BE0E20D [Tue Nov 6 00:36:29 2018 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:fc37d1dd2185e1224c6d6badcfe3a402
Instruction
push ebp
mov ebp, esp
add esp, FFFFFFF0h
mov eax, 00A3FC58h
call 00007F86D4E835C9h
mov eax, dword ptr [00A6E1B0h]
mov eax, dword ptr [eax]
call 00007F86D53347C5h
mov ecx, dword ptr [00A6E5D0h]
mov eax, dword ptr [00A6E1B0h]
mov eax, dword ptr [eax]
mov edx, dword ptr [00A37D14h]
call 00007F86D533159Dh
mov eax, dword ptr [00A6E1B0h]
mov eax, dword ptr [eax]
call 00007F86D5334605h
call 00007F86D4E7D86Ch
lea eax, dword ptr [eax+00h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x6930000x98.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0x6890000x2dc8.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x7340000x125600.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6960000x9d59c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x6950000x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x6898fc0x71c.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x68c0000x636a.didata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x64c3700x64c4004841ac4cefc34b09d2909fbe1f0873c4unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.itext0x64e0000x35680x3600db7879e1463384e791db1fb2119c19b6False0.5489728009259259data6.391915620686699IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x6520000x1c7e80x1c800df314b762de4b3b48a69f35b15a84b3fFalse0.23532586348684212data5.328806783949352IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0x66f0000x19f480x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x6890000x2dc80x2e00fa03e3dde763c8577b656159789b96bfFalse0.33126698369565216data5.153963991622925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.didata0x68c0000x636a0x6400d571e8121cfb1b34b89674a1eac3a5e1False0.2267578125data5.032166947505453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0x6930000x980x20088479539dd60a20990109ed500413047False0.25390625data1.8839782081778167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x6940000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x6950000x5d0x200ba9292a4332c64f6c93eb5fe1a97ae4bFalse0.1875data1.382174483578759IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6960000x9d59c0x9d6001a5a0d0108e0a980080cdcfb9018a22aFalse0.5074867206115965data6.672371684082929IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.rsrc0x7340000x1256000x1256001fdc582e927f6dbcc55f24f38753b984False0.2952713903387303data6.286082043906723IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_CURSOR0x734ea40x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
RT_CURSOR0x734fd80x134dataEnglishUnited States0.4642857142857143
RT_CURSOR0x73510c0x134dataEnglishUnited States0.4805194805194805
RT_CURSOR0x7352400x134dataEnglishUnited States0.4090909090909091
RT_CURSOR0x7353740x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
RT_ICON0x7354a80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2834 x 2834 px/mEnglishUnited States0.3930557198627706
RT_ICON0x745cd00xaf42PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0003789060758703
RT_STRING0x750c140xd4data0.5660377358490566
RT_STRING0x750ce80x898data0.3109090909090909
RT_STRING0x7515800x106cdata0.21741198858230257
RT_STRING0x7525ec0x9f8data0.32053291536050155
RT_STRING0x752fe40x894data0.3087431693989071
RT_STRING0x7538780x87cdata0.27532228360957645
RT_STRING0x7540f40x400data0.392578125
RT_STRING0x7544f40x2a8data0.43676470588235294
RT_STRING0x75479c0x60cdata0.3578811369509044
RT_STRING0x754da80x3fcdata0.41274509803921566
RT_STRING0x7551a40x454data0.38267148014440433
RT_STRING0x7555f80x430data0.4123134328358209
RT_STRING0x755a280x34cdata0.4253554502369668
RT_STRING0x755d740x4a0data0.3876689189189189
RT_STRING0x7562140x370data0.42159090909090907
RT_STRING0x7565840x390data0.3607456140350877
RT_STRING0x7569140x27cdata0.4591194968553459
RT_STRING0x756b900x388data0.41150442477876104
RT_STRING0x756f180x580data0.41051136363636365
RT_STRING0x7574980x41cdata0.35551330798479086
RT_STRING0x7578b40x4c8data0.2965686274509804
RT_STRING0x757d7c0x4fcdata0.3377742946708464
RT_STRING0x7582780x680data0.34915865384615385
RT_STRING0x7588f80x448data0.38321167883211676
RT_STRING0x758d400x52cdata0.28700906344410876
RT_STRING0x75926c0x350data0.41391509433962265
RT_STRING0x7595bc0x268data0.4448051948051948
RT_STRING0x7598240x114data0.6086956521739131
RT_STRING0x7599380x440data0.39981617647058826
RT_STRING0x759d780x510data0.3472222222222222
RT_STRING0x75a2880x598data0.36941340782122906
RT_STRING0x75a8200x420data0.3693181818181818
RT_STRING0x75ac400x3b8data0.28361344537815125
RT_STRING0x75aff80x3f4data0.424901185770751
RT_STRING0x75b3ec0x6b4data0.31934731934731936
RT_STRING0x75baa00x4dcdata0.3392282958199357
RT_STRING0x75bf7c0x330data0.3909313725490196
RT_STRING0x75c2ac0x35cdata0.3755813953488372
RT_STRING0x75c6080x3c4data0.36721991701244816
RT_STRING0x75c9cc0x3fcdata0.3764705882352941
RT_STRING0x75cdc80xf4data0.5491803278688525
RT_STRING0x75cebc0xc4data0.6275510204081632
RT_STRING0x75cf800x268data0.48863636363636365
RT_STRING0x75d1e80x434data0.3308550185873606
RT_STRING0x75d61c0x360data0.38425925925925924
RT_STRING0x75d97c0x2ecdata0.37566844919786097
RT_STRING0x75dc680x31cdata0.34296482412060303
RT_RCDATA0x75df840x627eJPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=6, datetime=2010:05:11 20:59:59], baseline, precision 8, 256x256, components 3EnglishUnited States0.9922265408106608
RT_RCDATA0x7642040x10data1.5
RT_RCDATA0x7642140x1690data0.45896814404432135
RT_RCDATA0x7658a40x2dataEnglishUnited States5.0
RT_RCDATA0x7658a80x1407Delphi compiled form 'TForm1'0.33664911254144725
RT_RCDATA0x766cb00x53fc6dataEnglishUnited States0.26979180595687285
RT_RCDATA0x7bac780x4a976dataEnglishUnited States0.1747249006631187
RT_RCDATA0x8055f00x538f4dataEnglishUnited States0.2701192076199381
RT_GROUP_CURSOR0x858ee40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x858ef80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x858f0c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x858f200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x858f340x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_ICON0x858f480x22dataEnglishUnited States0.9705882352941176
RT_VERSION0x858f6c0x140MIPSEB-LE MIPS-III ECOFF executable not stripped - version 0.79EnglishUnited States0.55
RT_MANIFEST0x8590ac0x3afXML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States0.47613997879109227
DLLImport
oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
user32.dllCharNextW, LoadStringW
kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsDBCSLeadByteEx, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetConsoleOutputCP, GetConsoleCP, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FindResourceW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, SetFilePointer, SetEndOfFile, ReadFile, GetFileType, GetFileSize, CreateFileW, GetStdHandle, CloseHandle
kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
user32.dllWINNLSEnableIME, SetWindowLongW, GetWindowLongW, CreateWindowExW, WaitMessage, UpdateLayeredWindow, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TrackMouseEvent, SystemParametersInfoW, ShowWindow, ShowScrollBar, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetFocus, SetCursor, SetClipboardData, SetCapture, SetActiveWindow, SendMessageTimeoutW, SendMessageW, ScreenToClient, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageW, OpenClipboard, MsgWaitForMultipleObjects, MessageBoxIndirectW, MessageBoxW, MapVirtualKeyW, LoadStringW, LoadIconW, LoadCursorW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsMenu, IsIconic, IsClipboardFormatAvailable, InvalidateRect, GetWindowTextLengthW, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetUpdateRgn, GetUpdateRect, GetSystemMetrics, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollInfo, GetPropW, GetParent, GetMenuItemInfoW, GetMenuItemCount, GetMenu, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetFocus, GetDesktopWindow, GetDC, GetCursorPos, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoW, GetCapture, GetAsyncKeyState, GetActiveWindow, FindWindowW, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EmptyClipboard, DrawTextW, DrawIconEx, DispatchMessageW, DestroyWindow, DestroyMenu, DefWindowProcW, CreateMenu, CloseClipboard, ClientToScreen, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, AppendMenuW, ActivateKeyboardLayout
gdi32.dllTextOutW, StartPage, StartDocW, SetWindowOrgEx, SetTextColor, SetTextAlign, SetMapMode, SetBkColor, SetAbortProc, SelectObject, GetWindowOrgEx, GetTextMetricsW, GetTextExtentPoint32W, GetStockObject, GetRegionData, GetPath, GetObjectA, GetDeviceCaps, GetCharABCWidthsFloatW, ExtCreateRegion, EnumFontsW, EndPath, EndPage, EndDoc, DeleteObject, DeleteDC, CreateRectRgn, CreateICW, CreateFontIndirectW, CreateFontW, CreateDIBSection, CreateDCW, CreateCompatibleDC, CombineRgn, BitBlt, BeginPath, AbortDoc
version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
kernel32.dlllstrlenW, WritePrivateProfileStringW, WriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, TryEnterCriticalSection, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryW, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, IsDebuggerPresent, OutputDebugStringW, MulDiv, LockResource, LocalFree, LoadResource, LoadLibraryW, LeaveCriticalSection, LCMapStringW, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalAlloc, GlobalAddAtomW, GetVersionExW, GetUserDefaultLCID, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetTempPathW, GetSystemDirectoryW, GetStdHandle, GetLongPathNameW, GetProcAddress, GetPrivateProfileStringW, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeThread, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetComputerNameW, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, FindNextFileW, FindFirstFileW, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExpandEnvironmentStringsW, EnumSystemLocalesW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CopyFileW, CompareStringW, CloseHandle
advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
SHFolder.dllSHGetFolderPathW
kernel32.dllSleep
netapi32.dllNetWkstaGetInfo
oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayRedim, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
oleaut32.dllGetErrorInfo, SysStringLen, SysFreeString
ole32.dllCreateStreamOnHGlobal, OleRegEnumFormatEtc, ReleaseStgMedium, OleDraw, DoDragDrop, RevokeDragDrop, RegisterDragDrop, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID, CoCreateInstance, CoGetClassObject, CoGetMalloc, CoUninitialize, CoInitialize, IsEqualGUID
msvcrt.dllisxdigit, isupper, isspace, ispunct, isprint, islower, isgraph, isdigit, iscntrl, isalpha, isalnum, toupper, tolower, strchr, strlen, strncmp, memset, memcpy, memcmp
shell32.dllShellExecuteW, DragQueryFileW
comdlg32.dllPageSetupDlgW, PrintDlgW, GetSaveFileNameW, GetOpenFileNameW
winmm.dlltimeGetTime
user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromWindow
winspool.drvSetPrinterW, OpenPrinterW, GetPrinterW, GetDefaultPrinterW, EnumPrintersW, DocumentPropertiesW, DeviceCapabilitiesW, ClosePrinter
d3d9.dllDirect3DCreate9
NameOrdinalAddress
TMethodImplementationIntercept30x46bb7c
__dbk_fcall_wrapper20x4105c8
dbkFCallWrapperAddr10xa71c5c
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:20:34:33
Start date:26/05/2024
Path:C:\Users\user\Desktop\RcvMst.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\RcvMst.exe"
Imagebase:0x400000
File size:8'620'032 bytes
MD5 hash:6866479D039860A7F28EB5F11768E2E0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:true

No disassembly