Edit tour

Windows Analysis Report
essai.exe

Overview

General Information

Sample Name:essai.exe
Analysis ID:560086
MD5:6f776e9782c231b5ff969a0f16c1821a
SHA1:1f6fe84939da4051ce47b81130823665298a2b60
SHA256:00165a5a0af9312110e3e579dc8e599f5da540a33f12f3e55b098653a8a4d043
Tags:exe
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Drops PE files to the startup folder
Drops PE files with a suspicious file extension
PE file has a writeable .text section
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses 32bit PE files
Drops files with a non-matching file extension (content does not match file extension)
Antivirus or Machine Learning detection for unpacked file
Drops PE files to the application program directory (C:\ProgramData)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Stores files to the Windows start menu directory
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • essai.exe (PID: 4628 cmdline: "C:\Users\user\Desktop\essai.exe" MD5: 6F776E9782C231B5FF969A0F16C1821A)
    • explorer.exe (PID: 4792 cmdline: C:\windows\explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\essai.exe, ProcessId: 4628, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pif

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: essai.exeAvira: detected
Source: essai.exeVirustotal: Detection: 92%Perma Link
Source: essai.exeMetadefender: Detection: 85%Perma Link
Source: essai.exeReversingLabs: Detection: 97%
Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifAvira: detection malicious, Label: TR/VB.Agent.IK
Source: C:\Windows\Dos.txtAvira: detection malicious, Label: TR/VB.Agent.IK
Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifVirustotal: Detection: 92%Perma Link
Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifMetadefender: Detection: 85%Perma Link
Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifReversingLabs: Detection: 97%
Source: C:\Windows\Dos.txtVirustotal: Detection: 92%Perma Link
Source: C:\Windows\Dos.txtMetadefender: Detection: 85%Perma Link
Source: C:\Windows\Dos.txtReversingLabs: Detection: 97%
Source: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifJoe Sandbox ML: detected
Source: C:\Windows\Dos.txtJoe Sandbox ML: detected
Source: essai.exeJoe Sandbox ML: detected
Source: 1.2.essai.exe.400000.0.unpackAvira: Label: TR/Crypt.CFI.Gen
Source: 1.0.essai.exe.400000.0.unpackAvira: Label: TR/Crypt.CFI.Gen
Source: essai.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

System Summary

barindex
Source: essai.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: Dos Accelerator.pif.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: Dos.txt.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: essai.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: essai.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: essai.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: essai.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Dos Accelerator.pif.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Dos Accelerator.pif.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Dos Accelerator.pif.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Dos.txt.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Dos.txt.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Dos.txt.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Windows\explorer.exeSection loaded: cscui.dll
Source: C:\Users\user\Desktop\essai.exeFile created: C:\windows\Dos.txtJump to behavior
Source: C:\Users\user\Desktop\essai.exeCode function: 1_2_004012B4
Source: Joe Sandbox ViewDropped File: C:\Windows\Dos.txt 00165A5A0AF9312110E3E579DC8E599F5DA540A33F12F3E55B098653A8A4D043
Source: essai.exeVirustotal: Detection: 92%
Source: essai.exeMetadefender: Detection: 85%
Source: essai.exeReversingLabs: Detection: 97%
Source: C:\Users\user\Desktop\essai.exeFile read: C:\Users\user\Desktop\essai.exeJump to behavior
Source: C:\Users\user\Desktop\essai.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\essai.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
Source: unknownProcess created: C:\Users\user\Desktop\essai.exe "C:\Users\user\Desktop\essai.exe"
Source: C:\Users\user\Desktop\essai.exeProcess created: C:\Windows\explorer.exe C:\windows\explorer.exe
Source: C:\Users\user\Desktop\essai.exeProcess created: C:\Windows\explorer.exe C:\windows\explorer.exe
Source: C:\Users\user\Desktop\essai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
Source: essai.exeBinary or memory string: @*\AD:\RAM\dos\Project1.vbp
Source: essai.exe, 00000001.00000002.349142579.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: {@*\AD:\RAM\dos\Project1.vbp
Source: essai.exe, Dos Accelerator.pif.1.dr, Dos.txt.1.drBinary or memory string: @*\AD:\RAM\dos\Project1.vbpdv@
Source: C:\Users\user\Desktop\essai.exeFile created: C:\Users\user\AppData\Local\Temp\~DFEBBAEFA04F15025D.TMPJump to behavior
Source: classification engineClassification label: mal92.adwa.winEXE@3/3@0/0
Source: C:\Users\user\Desktop\essai.exeProcess created: C:\Windows\explorer.exe
Source: C:\Users\user\Desktop\essai.exeProcess created: C:\Windows\explorer.exe
Source: C:\Users\user\Desktop\essai.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\essai.exeCode function: 1_2_00405C78 push ecx; retf 0000h
Source: C:\Users\user\Desktop\essai.exeCode function: 1_2_00402E94 push esp; ret
Source: C:\Users\user\Desktop\essai.exeCode function: 1_2_004047DE push esp; ret
Source: essai.exeStatic PE information: section name: kwvzuww
Source: essai.exeStatic PE information: section name: xnqjrdx
Source: Dos Accelerator.pif.1.drStatic PE information: section name: kwvzuww
Source: Dos Accelerator.pif.1.drStatic PE information: section name: xnqjrdx
Source: Dos.txt.1.drStatic PE information: section name: kwvzuww
Source: Dos.txt.1.drStatic PE information: section name: xnqjrdx

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\essai.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifJump to dropped file
Source: C:\Users\user\Desktop\essai.exeFile created: C:\Windows\Dos.txtJump to dropped file
Source: C:\Users\user\Desktop\essai.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifJump to dropped file
Source: C:\Users\user\Desktop\essai.exeFile created: C:\Windows\Dos.txtJump to dropped file
Source: C:\Users\user\Desktop\essai.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifJump to dropped file
Source: C:\Users\user\Desktop\essai.exeFile created: C:\Windows\Dos.txtJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\essai.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifJump to dropped file
Source: C:\Users\user\Desktop\essai.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifJump to behavior
Source: C:\Users\user\Desktop\essai.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pifJump to behavior
Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\essai.exeProcess information set: NOOPENFILEERRORBOX
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
13
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/Job12
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Software Packing
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)12
Registry Run Keys / Startup Folder
1
Process Injection
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
DLL Side-Loading
NTDS1
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 560086 Sample: essai.exe Startdate: 26/01/2022 Architecture: WINDOWS Score: 92 16 Antivirus detection for dropped file 2->16 18 Antivirus / Scanner detection for submitted sample 2->18 20 Multi AV Scanner detection for dropped file 2->20 22 4 other signatures 2->22 6 essai.exe 4 2->6         started        process3 file4 12 C:\Windows\Dos.txt, PE32 6->12 dropped 14 C:\ProgramData\...\Dos Accelerator.pif, PE32 6->14 dropped 24 Drops PE files with a suspicious file extension 6->24 26 Drops PE files to the startup folder 6->26 10 explorer.exe 5 4 6->10         started        signatures5 process6

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
essai.exe93%VirustotalBrowse
essai.exe86%MetadefenderBrowse
essai.exe98%ReversingLabsWin32.Worm.Mofksys
essai.exe100%AviraTR/VB.Agent.IK
essai.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pif100%AviraTR/VB.Agent.IK
C:\Windows\Dos.txt100%AviraTR/VB.Agent.IK
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pif100%Joe Sandbox ML
C:\Windows\Dos.txt100%Joe Sandbox ML
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pif93%VirustotalBrowse
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pif86%MetadefenderBrowse
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\Dos Accelerator.pif98%ReversingLabsWin32.Worm.Mofksys
C:\Windows\Dos.txt93%VirustotalBrowse
C:\Windows\Dos.txt86%MetadefenderBrowse
C:\Windows\Dos.txt98%ReversingLabsWin32.Worm.Mofksys
SourceDetectionScannerLabelLinkDownload
1.2.essai.exe.400000.0.unpack100%AviraTR/Crypt.CFI.GenDownload File
1.0.essai.exe.400000.0.unpack100%AviraTR/Crypt.CFI.GenDownload File
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:560086
Start date:26.01.2022
Start time:06:11:57
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 23s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:essai.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal92.adwa.winEXE@3/3@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 3.5% (good quality ratio 0%)
  • Quality average: 0%
  • Quality standard deviation: 0%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): svchost.exe
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\essai.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):376832
Entropy (8bit):2.6161997591789414
Encrypted:false
SSDEEP:3072:VMs3fGBjN1Jrpi0kOBzleK6VU6SaQFQMg6W:Vn3MN1JlveK6VUsQOj
MD5:6F776E9782C231B5FF969A0F16C1821A
SHA1:1F6FE84939DA4051CE47B81130823665298A2B60
SHA-256:00165A5A0AF9312110E3E579DC8E599F5DA540A33F12F3E55B098653A8A4D043
SHA-512:2B37FB088FC294B030D23B1CD45E13D513B389237EC966E93309DD66A830A6C1D38960F642CF33847D2AEE57EE669D783DA52B31CDC97ED90EBA03950D1F59E7
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: Virustotal, Detection: 93%, Browse
  • Antivirus: Metadefender, Detection: 86%, Browse
  • Antivirus: ReversingLabs, Detection: 98%
Reputation:low
Preview:MZ......................@.............$.....................h...........!..L.!This program cannot be runPE..L......F..........................................@.............................................................................(........ ..................................................................(... ....................................text............................... ....data...............................@....rsrc.... ....... ..................`...kwvzuww............................. ...xnqjrdx....................................A............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\essai.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):26750
Entropy (8bit):4.312743780697173
Encrypted:false
SSDEEP:192:SaAl+No9UH86KlVsV9P6AO1miRx8VYr4eZJgnda4/cUe3uS:Sbgl86+yyA2UVYrpZAB/5e3uS
MD5:D1BE5FAEBD2D0EDA16E0BC3CED28BC4D
SHA1:C0D48C5121FB07D8EBEECA7488B1965FB8E59AFE
SHA-256:9A9641164188E3C6E379AC46389174E07FCF6D4E125B501F9D5A63189F907992
SHA-512:BB7A895265A9DE1D3E5FAEEBE84CE2C8544B4ABF25FEECC3085F49FFF4596470D51AB989B410A2113CE3C7DBB60BE946DC23663DE027A0BC726BA7E2998DA3CF
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\essai.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):376832
Entropy (8bit):2.6161997591789414
Encrypted:false
SSDEEP:3072:VMs3fGBjN1Jrpi0kOBzleK6VU6SaQFQMg6W:Vn3MN1JlveK6VUsQOj
MD5:6F776E9782C231B5FF969A0F16C1821A
SHA1:1F6FE84939DA4051CE47B81130823665298A2B60
SHA-256:00165A5A0AF9312110E3E579DC8E599F5DA540A33F12F3E55B098653A8A4D043
SHA-512:2B37FB088FC294B030D23B1CD45E13D513B389237EC966E93309DD66A830A6C1D38960F642CF33847D2AEE57EE669D783DA52B31CDC97ED90EBA03950D1F59E7
Malicious:true
Antivirus:
  • Antivirus: Avira, Detection: 100%
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: Virustotal, Detection: 93%, Browse
  • Antivirus: Metadefender, Detection: 86%, Browse
  • Antivirus: ReversingLabs, Detection: 98%
Reputation:low
Preview:MZ......................@.............$.....................h...........!..L.!This program cannot be runPE..L......F..........................................@.............................................................................(........ ..................................................................(... ....................................text............................... ....data...............................@....rsrc.... ....... ..................`...kwvzuww............................. ...xnqjrdx....................................A............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):2.6161997591789414
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:essai.exe
File size:376832
MD5:6f776e9782c231b5ff969a0f16c1821a
SHA1:1f6fe84939da4051ce47b81130823665298a2b60
SHA256:00165a5a0af9312110e3e579dc8e599f5da540a33f12f3e55b098653a8a4d043
SHA512:2b37fb088fc294b030d23b1cd45e13d513b389237ec966e93309dd66a830a6c1d38960f642cf33847d2aee57ee669d783da52b31cdc97ed90eba03950d1f59e7
SSDEEP:3072:VMs3fGBjN1Jrpi0kOBzleK6VU6SaQFQMg6W:Vn3MN1JlveK6VUsQOj
File Content Preview:MZ......................@.............$.....................h...........!..L.!This program cannot be runPE..L......F..........................................@.............................................................................(........ .........
Icon Hash:44e6fad2e07e9e60
Entrypoint:0x4012b4
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x46A4AA95 [Mon Jul 23 13:18:13 2007 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:30e5df4fdb501cc0bf738d65c89185b6
Instruction
push 004076BCh
call 00007FD080B10165h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
xor byte ptr [eax], al
add byte ptr [eax], al
cmp byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
push ds
and byte ptr [edx+5Fh], bh
pop ebx
add al, B6h
inc edx
mov edx, 2541FDB4h
add dword ptr [eax+60h], 00000000h
add byte ptr [eax], al
add dword ptr [eax], eax
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
js 00007FD080B101D5h
jbe 00007FD080B10172h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
dec esp
xor dword ptr [eax], eax
add ch, byte ptr [edx]
push 7B5A9218h
mov bl, 49h
mov ah, 12h
pop ss
pop ebp
inc ecx
loope 00007FD080B101BBh
aaa
mov al, bh
dec esp
ficomp word ptr [ecx]
xor eax, dword ptr [eax-50h]
xchg eax, ecx
xchg eax, esp
scasd
test al, 85h
dec esp
cmp cl, byte ptr [edi-53h]
xor ebx, dword ptr [ecx-48EE309Ah]
or al, 00h
stosb
add byte ptr [eax-2Dh], ah
xchg eax, ebx
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
push cs
arpl word ptr [eax], ax
add dl, cl
bound eax, dword ptr [eax]
add byte ptr [eax], al
add eax, 726F4600h
insd
xor dword ptr [eax], eax
or eax, 46000501h
outsd
jc 00007FD080B101DFh
xor dword ptr [eax], eax
sbb dword ptr [ecx], eax
add byte ptr [edx+00h], al
and al, byte ptr [eax]
and eax, dword ptr [esi+00000062h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x95f40x28.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0xb0000x42000.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
IMAGE_DIRECTORY_ENTRY_IAT0x10000xfc.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x90000x9000False0.310574001736data4.84291359329IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0xa0000x9f00x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0xb0000x420000x42000False0.130311908144data1.78643267268IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
kwvzuww0x4d0000xf0000xf000False0.437613932292data4.43065012785IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
xnqjrdx0x5c0000x10000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_ICON0x110a40x668data
RT_ICON0x10dbc0x2e8data
RT_ICON0x10c940x128GLS_BINARY_LSB_FIRST
RT_ICON0xe6ec0x25a8dBase III DBT, version number 0, next free block index 40
RT_ICON0xd8440xea8data
RT_ICON0xc79c0x10a8dBase III DBT, version number 0, next free block index 40
RT_ICON0xbef40x8a8data
RT_ICON0xba8c0x468GLS_BINARY_LSB_FIRST
RT_ICON0xb5240x568GLS_BINARY_LSB_FIRST
RT_GROUP_ICON0xb4a00x84data
RT_VERSION0xb2700x230dataEnglishUnited States
DLLImport
MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaEnd, __vbaFreeVarList, _adj_fdiv_m64, __vbaNextEachVar, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaExitProc, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaVarTstEq, __vbaObjVar, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaVarCat, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarSetVar, __vbaI4Var, __vbaLateMemCall, __vbaVarAdd, __vbaVarLateMemCallLd, _CIatan, __vbaStrMove, __vbaForEachVar, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeObj, __vbaFreeStr
DescriptionData
Translation0x0409 0x04b0
InternalNameessai
FileVersion15.05.0088
ProductNamexcv
ProductVersion15.05.0088
FileDescriptionDossier de fichiers
OriginalFilenameessai.exe
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found
Target ID:1
Start time:06:12:54
Start date:26/01/2022
Path:C:\Users\user\Desktop\essai.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\essai.exe"
Imagebase:0x400000
File size:376832 bytes
MD5 hash:6F776E9782C231B5FF969A0F16C1821A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Visual Basic
Reputation:low

Target ID:2
Start time:06:12:56
Start date:26/01/2022
Path:C:\Windows\explorer.exe
Wow64 process (32bit):false
Commandline:C:\windows\explorer.exe
Imagebase:0x7ff6f22f0000
File size:3933184 bytes
MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

No disassembly