File name: | Jemd.bin |
Full analysis: | https://app.any.run/tasks/259c135e-eff9-4560-9296-25a1fbd36e4a |
Verdict: | Malicious activity |
Analysis date: | September 30, 2020, 14:30:47 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 1F85AC92E6EA79A4D1CA7E20EF294D76 |
SHA1: | EE8184FFF2F833D1A1C6591796DE635D844652BD |
SHA256: | F33785B12A56A0EB70B8F4FAB1087777A58E75AF6B11AE62949BB568F3C8B323 |
SSDEEP: | 3072:N/Q/vb7I3YPmAg4+FXbwiuuLOzNOYP7uR8sl9:N/Q/3uYPxL1i8 |
.exe | | | Win32 Executable Borland Delphi 7 (69.3) |
---|---|---|
.exe | | | Win32 Executable Borland Delphi 6 (27.3) |
.exe | | | Win32 Executable Delphi generic (1.4) |
.dll | | | Win32 Dynamic Link Library (generic) (0.6) |
.exe | | | Win32 Executable (generic) (0.4) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 1992:06:20 00:22:17+02:00 |
PEType: | PE32 |
LinkerVersion: | 2.25 |
CodeSize: | 83456 |
InitializedDataSize: | 20480 |
UninitializedDataSize: | - |
EntryPoint: | 0x151dc |
OSVersion: | 4 |
ImageVersion: | - |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 19-Jun-1992 22:22:17 |
Detected languages: |
|
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0050 |
Pages in file: | 0x0002 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x000F |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x001A |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000100 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 8 |
Time date stamp: | 19-Jun-1992 22:22:17 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
CODE | 0x00001000 | 0x00014518 | 0x00014600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.46309 |
DATA | 0x00016000 | 0x00000DF4 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.41303 |
BSS | 0x00017000 | 0x000008FD | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.idata | 0x00018000 | 0x00000C0E | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.39212 |
.tls | 0x00019000 | 0x0000000C | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x0001A000 | 0x00000018 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 0.204488 |
.reloc | 0x0001B000 | 0x0000198C | 0x00001A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 6.62175 |
.rsrc | 0x0001D000 | 0x00001800 | 0x00001800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_SHARED | 3.69049 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 3.85232 | 744 | UNKNOWN | Russian - Russia | RT_ICON |
4090 | 2.96322 | 424 | UNKNOWN | UNKNOWN | RT_STRING |
4091 | 3.20818 | 520 | UNKNOWN | UNKNOWN | RT_STRING |
4092 | 3.02839 | 236 | UNKNOWN | UNKNOWN | RT_STRING |
4093 | 3.20724 | 408 | UNKNOWN | UNKNOWN | RT_STRING |
4094 | 3.20409 | 948 | UNKNOWN | UNKNOWN | RT_STRING |
4095 | 3.25436 | 892 | UNKNOWN | UNKNOWN | RT_STRING |
4096 | 3.18442 | 672 | UNKNOWN | UNKNOWN | RT_STRING |
DVCLAL | 4 | 16 | UNKNOWN | UNKNOWN | RT_RCDATA |
PACKAGEINFO | 5.10146 | 240 | UNKNOWN | UNKNOWN | RT_RCDATA |
advapi32.dll |
kernel32.dll |
oleaut32.dll |
shell32.dll |
user32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2092 | "C:\Users\admin\AppData\Local\Temp\Jemd.bin.exe" | C:\Users\admin\AppData\Local\Temp\Jemd.bin.exe | explorer.exe | |
User: admin Integrity Level: MEDIUM |
PID | Process | Filename | Type | |
---|---|---|---|---|
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cookie\436F6F6B6965732D6A6F75726E616C.CkAQH | — | |
MD5:— | SHA256:— | |||
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\CEF\User Data\Crashpad\6D65746164617461.CkAQH | — | |
MD5:— | SHA256:— | |||
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt | — | |
MD5:— | SHA256:— | |||
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\6D65746164617461.CkAQH | — | |
MD5:— | SHA256:— | |||
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\3030303030392E6C6F67.CkAQH | — | |
MD5:— | SHA256:— | |||
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\3030303030332E6C6F67.CkAQH | — | |
MD5:— | SHA256:— | |||
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\CURRENT | — | |
MD5:— | SHA256:— | |||
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\4C4F434B.CkAQH | — | |
MD5:— | SHA256:— | |||
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\3030303030332E6C6F67.CkAQH | — | |
MD5:— | SHA256:— | |||
2092 | Jemd.bin.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\CURRENT | — | |
MD5:— | SHA256:— |