Analysis Report REQUEST FOR QUOTATION.exe

Overview

General Information

Sample Name: REQUEST FOR QUOTATION.exe
Analysis ID: 341412
MD5: 9c634109c87ad8b8d0b03b7283c44c6c
SHA1: fac666c82ee6ac4fa1cddc1e4be5faaa4f9965a8
SHA256: dc4b0fbae22a707e56c85725ac645ff7f7fe72164060da65070a38d1a5092012
Tags: exeGuLoader

Most interesting Screenshot:

Detection

GuLoader
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: REQUEST FOR QUOTATION.exe Virustotal: Detection: 33% Perma Link
Source: REQUEST FOR QUOTATION.exe ReversingLabs: Detection: 23%

Compliance:

barindex
Uses 32bit PE files
Source: REQUEST FOR QUOTATION.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

System Summary:

barindex
Initial sample is a PE file and has a suspicious name
Source: initial sample Static PE information: Filename: REQUEST FOR QUOTATION.exe
Abnormal high CPU Usage
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Process Stats: CPU usage > 98%
PE file contains strange resources
Source: REQUEST FOR QUOTATION.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Sample file is different than original file name gathered from version info
Source: REQUEST FOR QUOTATION.exe, 00000001.00000002.1316641910.00000000021F0000.00000002.00000001.sdmp Binary or memory string: OriginalFilenameuser32j% vs REQUEST FOR QUOTATION.exe
Source: REQUEST FOR QUOTATION.exe, 00000001.00000002.1318380230.0000000002B10000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameGangede7.exeFE2X vs REQUEST FOR QUOTATION.exe
Source: REQUEST FOR QUOTATION.exe, 00000001.00000000.236576334.0000000000418000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameGangede7.exe vs REQUEST FOR QUOTATION.exe
Source: REQUEST FOR QUOTATION.exe Binary or memory string: OriginalFilenameGangede7.exe vs REQUEST FOR QUOTATION.exe
Uses 32bit PE files
Source: REQUEST FOR QUOTATION.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engine Classification label: mal80.troj.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe File created: C:\Users\user\AppData\Local\Temp\~DF2354CAF8E7AD853F.TMP Jump to behavior
Source: REQUEST FOR QUOTATION.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: REQUEST FOR QUOTATION.exe Virustotal: Detection: 33%
Source: REQUEST FOR QUOTATION.exe ReversingLabs: Detection: 23%

Data Obfuscation:

barindex
Yara detected GuLoader
Source: Yara match File source: Process Memory Space: REQUEST FOR QUOTATION.exe PID: 5720, type: MEMORY
Yara detected VB6 Downloader Generic
Source: Yara match File source: Process Memory Space: REQUEST FOR QUOTATION.exe PID: 5720, type: MEMORY
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_004078FB push edx; iretd 1_2_004078FF
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_00402889 pushfd ; ret 1_2_00402895
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_02224EC3 1_2_02224EC3
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: REQUEST FOR QUOTATION.exe Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe RDTSC instruction interceptor: First address: 0000000002225AAA second address: 0000000002225AAA instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FFAE4A19648h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d add edi, edx 0x0000001f cmp cl, bl 0x00000021 dec dword ptr [ebp+000000F8h] 0x00000027 cmp esi, 355D7D1Fh 0x0000002d cmp dword ptr [ebp+000000F8h], 00000000h 0x00000034 jne 00007FFAE4A19622h 0x00000036 cmp edx, ecx 0x00000038 call 00007FFAE4A1969Ch 0x0000003d call 00007FFAE4A19658h 0x00000042 lfence 0x00000045 mov edx, dword ptr [7FFE0014h] 0x0000004b lfence 0x0000004e ret 0x0000004f mov esi, edx 0x00000051 pushad 0x00000052 rdtsc
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_02225628 rdtsc 1_2_02225628
Program does not show much activity (idle)
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: REQUEST FOR QUOTATION.exe Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

Anti Debugging:

barindex
Found potential dummy code loops (likely to delay analysis)
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Process Stats: CPU usage > 90% for more than 60s
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_02225628 rdtsc 1_2_02225628
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_02225246 mov eax, dword ptr fs:[00000030h] 1_2_02225246
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_02221AA5 mov eax, dword ptr fs:[00000030h] 1_2_02221AA5
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_022222B7 mov eax, dword ptr fs:[00000030h] 1_2_022222B7
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_02225F3F mov eax, dword ptr fs:[00000030h] 1_2_02225F3F
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_022257A1 mov eax, dword ptr fs:[00000030h] 1_2_022257A1
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_02223079 mov eax, dword ptr fs:[00000030h] 1_2_02223079
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_02226160 mov eax, dword ptr fs:[00000030h] 1_2_02226160
Source: C:\Users\user\Desktop\REQUEST FOR QUOTATION.exe Code function: 1_2_02226180 mov eax, dword ptr fs:[00000030h] 1_2_02226180
Program does not show much activity (idle)
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: REQUEST FOR QUOTATION.exe, 00000001.00000002.1316225426.0000000000D60000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: REQUEST FOR QUOTATION.exe, 00000001.00000002.1316225426.0000000000D60000.00000002.00000001.sdmp Binary or memory string: Progman
Source: REQUEST FOR QUOTATION.exe, 00000001.00000002.1316225426.0000000000D60000.00000002.00000001.sdmp Binary or memory string: SProgram Managerl
Source: REQUEST FOR QUOTATION.exe, 00000001.00000002.1316225426.0000000000D60000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd,
Source: REQUEST FOR QUOTATION.exe, 00000001.00000002.1316225426.0000000000D60000.00000002.00000001.sdmp Binary or memory string: Progmanlock
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 341412 Sample: REQUEST FOR QUOTATION.exe Startdate: 19/01/2021 Architecture: WINDOWS Score: 80 7 Multi AV Scanner detection for submitted file 2->7 9 Yara detected GuLoader 2->9 11 Initial sample is a PE file and has a suspicious name 2->11 13 5 other signatures 2->13 5 REQUEST FOR QUOTATION.exe 1 2->5         started        process3
No contacted IP infos