Threat Database Trojans Trojan.Downloader.Gen.KF

Trojan.Downloader.Gen.KF

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Downloader.Gen.KF
Signature status: Hash Mismatch

Known Samples

MD5: 53f0238355e1dcefc1eefb462c5c9199
SHA1: 28692b1a9f63373803908a3ec3cc8108c949b286
SHA256: ED5D6906DA49AF208667D2E6076E1FD7D6BBF4B74C89B73E7E244EC7D51565CB
File Size: 1.27 MB, 1270184 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name Microsoft Corporation
File Description Microsoft Instrumentation Engine
File Version 15.1.0.2022032203
Internal Name MicrosoftInstrumentationEngine_x86
Legal Copyright © Microsoft Corporation. All rights reserved.
Legal Trademarks Microsoft® is a registered trademark of Microsoft Corporation.
Original Filename MicrosoftInstrumentationEngine_x86.dll
Product Name Microsoft® Visual Studio®
Product Version 15.1.0.2022032203

Digital Signatures

Signer Root Status
Microsoft Corporation Microsoft Code Signing PCA 2011 Hash Mismatch

File Traits

  • dll
  • x86

Block Information

Total Blocks: 3,034
Potentially Malicious Blocks: 1,125
Whitelisted Blocks: 1,895
Unknown Blocks: 14

Visual Map

x x 0 0 0 x x x x 0 x x x x 0 0 x 0 x 0 x x 0 0 0 x 0 0 0 0 0 x 0 x 0 0 0 0 x 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 0 0 0 x x 0 0 x x x x x 0 x x x x x x x 0 x x 0 0 x x 0 x x x 0 0 0 0 x x 0 0 0 0 0 0 0 x 0 0 x 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x 0 x x x x x x x x x x x x x x 0 0 x x x 0 0 0 x 0 0 x x x 0 0 0 0 0 0 0 0 x x x 0 x 0 0 0 0 x x x x x 0 x x x x x 0 0 x x x x x x x x 0 0 0 0 x 0 x x 0 0 0 x 0 0 0 x x 0 0 0 x 0 0 0 x 0 0 0 x 0 0 0 0 x 0 0 0 x 0 0 0 x x x 0 0 0 x 0 0 0 x x x x x x x x x 0 x 0 0 x 0 x 0 0 x 0 x 0 0 x x x x 0 x x 0 x x x 0 x x 0 x x x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x 0 0 x x x 0 x x 0 0 0 0 0 0 0 x x 0 x x x x 0 0 0 x x 0 0 0 x x x x 0 x x x 0 x 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x x x x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x x x x x x x x x x x x x 0 x x x x x x x x x 0 0 x x 0 x ? ? 0 x 0 ? 0 0 0 0 x ? ? ? ? ? ? ? ? ? ? x x x x x x x x 0 x x 0 x x 0 x x 0 x x 0 x x 0 0 x x x x x x 0 x 0 0 x x x x x x x x x 0 x x 0 x x 0 x x x x x x x x x 0 x x 0 x 0 0 x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x x x x x x x x x x 0 0 x 0 x 0 x x 0 x 0 x x 0 x 0 x x x x x x x x x x 0 x x x x 0 x x x x x x x 0 0 x 0 x x 0 x 0 x x x 0 x x x x x 0 x 0 0 x x x 0 x x x 0 x x x x 0 x x x x 0 x 0 0 0 0 x x x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x x x x x x x x x x x x x x x x x x 0 x x x x x x x 0 x x 0 x x x x 0 x 0 x x x x x x x x x x x x 0 x x 0 0 0 x x 0 0 0 x x 0 0 x x x x 0 0 0 0 0 0 x 0 x x 0 0 0 x x 0 x x 0 x 0 0 x x x x x 0 x 0 0 x x x x 0 x x 0 x x 0 0 x x x 0 0 x x x x x 0 x 0 x x 0 x x 0 x x x 0 x x x x x 0 x x 0 x 0 0 x 0 x x x 0 0 x 0 0 x x x x x x x x x x x x x x x x x 0 x 0 0 0 x x 0 x 0 x x x 0 x 0 x x x 0 x x x x x x x 0 x x x x x x x x 0 x x 0 x x x 0 0 0 0 x x 0 0 0 0 0 0 x x x x x 0 x x x 0 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x x x x x 0 x x x x x x 0 0 0 x x 0 x x x 0 0 0 0 0 x x x x 0 0 x x x x x x x 0 x 0 x x 0 x x 0 0 x x 0 x x 0 0 0 0 0 0 x x x x 0 0 x 0 x x x 0 x 0 0 0 0 x 0 0 x x x x x 0 x 0 x x x x x 0 x x x x 0 0 x x x x 0 0 x x x x x x 0 x x x x x x x 0 0 x 0 0 x x x 0 x x x x x x x 0 x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x 0 x 0 x x x x x x x x x 0 0 x x x x 0 0 0 x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 x x x x 0 x x x x 0 x x x x x x 0 x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x 0 x x x x 0 x x x x x 0 x x x x x x x x x x x x x x x x 0 0 0 0 x 0 x x 0 x 0 0 0 x 0 0 x x x x 0 0 x x 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x x 0 x x 0 0 0 0 0 0 0 x 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x 0 0 x 0 x 0 x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 x x x x x 0 0 x x 0 x 0 x x 0 0 0 0 x x x 0 x 0 0 x 0 0 x 0 x 0 0 0 0 x 0 0 x 0 0 x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 x x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x x x x x x x x 0 x 0 x x 0 0 x 0 x x 0 x x 0 0 x x 0 x x x x 0 0 x x x 0 x 0 x x x x x x x 0 x x x x x x x x 0 x 0 0 x 0 x 0 0 0 x x x x x x x x 0 x x x x 0 x x x x 0 x x 0 x 0 0 0 x x 0 0 0 0 0 x 0 0 x x x x x x x x x 0 x x x x x x 0 0 x x x x x x 0 0 x 0 0 x 0 x 0 x x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x x 0 x 0 x 0 0 x x x x x x x 0 0 x 0 0 0 0 0 0 0 0 x x x 0 0 0 0 0 x 0 0 0 0 x x x x x x x x x x x x x x x x 0 x x 0 x x 0 x x 0 x x x x x x x x x 0 0 0 0 0 x 0 0 0 0 0 0 x x x x x x 0 x 0 0 x x x x x 0 0 x 0 0 x 0 x 0 0 x x x 0 0 x 0 0 x x x x 0 x 0 x 0 0 x x x 0 x x x x x x x 0 0 0 0 x x x x x x x x x x 0 x 0 0 x 0 0 x x x x 0 0 0 0 0 x x x x 0 0 x x x 0 0 0 0 0 0 0 0 x x 0 x x x 0 x 0 x x 0 0 x 0 x x x 0 0 0 x x x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\28692b1a9f63373803908a3ec3cc8108c949b286_0001270184.,LiQMAxHB

Trending

Most Viewed

Loading...