Analysis Report PO1001910 Sample Arrive Tracking No_SINI0068206497.exe

Overview

General Information

Sample Name: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe
Analysis ID: 342204
MD5: 7d9a5b92d4e287b92d7f4c46f40c3155
SHA1: 01b5226ea9a4bc9ee01edbf73b0ddb6463b29a25
SHA256: 43af4469aaafbb8d24b8d0da831e494952db00c649d1888458594a6b8ef1284b
Tags: exeGuLoader

Most interesting Screenshot:

Detection

GuLoader
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Detected potential crypto function
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Virustotal: Detection: 23% Perma Link
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe ReversingLabs: Detection: 24%

Compliance:

barindex
Uses 32bit PE files
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

System Summary:

barindex
Abnormal high CPU Usage
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Process Stats: CPU usage > 98%
Detected potential crypto function
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_00404BEE 0_2_00404BEE
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_00404C48 0_2_00404C48
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_00404C21 0_2_00404C21
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_00404C80 0_2_00404C80
PE file contains strange resources
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Sample file is different than original file name gathered from version info
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000000.331338295.0000000000416000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamelseferier.exe vs PO1001910 Sample Arrive Tracking No_SINI0068206497.exe
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367508550.00000000021D0000.00000002.00000001.sdmp Binary or memory string: OriginalFilenameuser32j% vs PO1001910 Sample Arrive Tracking No_SINI0068206497.exe
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Binary or memory string: OriginalFilenamelseferier.exe vs PO1001910 Sample Arrive Tracking No_SINI0068206497.exe
Uses 32bit PE files
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engine Classification label: mal80.troj.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe File created: C:\Users\user\AppData\Local\Temp\~DF496457654F946C01.TMP Jump to behavior
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Virustotal: Detection: 23%
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe ReversingLabs: Detection: 24%

Data Obfuscation:

barindex
Yara detected GuLoader
Source: Yara match File source: Process Memory Space: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe PID: 7100, type: MEMORY
Yara detected VB6 Downloader Generic
Source: Yara match File source: Process Memory Space: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe PID: 7100, type: MEMORY
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_00404592 push ebp; iretd 0_2_0040459B
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02212459 0_2_02212459
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02216EA1 0_2_02216EA1
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_022124A7 0_2_022124A7
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_022168E1 0_2_022168E1
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02216AF5 0_2_02216AF5
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_022168D4 0_2_022168D4
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02211D88 0_2_02211D88
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 000000000221713A second address: 000000000221713A instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 000000000221651C second address: 0000000002216527 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pushad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 0000000002216527 second address: 0000000002216527 instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022165EC second address: 0000000002216603 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp esi, 0000F000h 0x00000010 je 00007F1D7CF4B320h 0x00000016 pushad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 0000000002216603 second address: 0000000002216603 instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022166BF second address: 00000000022166D0 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp dword ptr [edi+14h], 40h 0x0000000e je 00007F1D7CF4B002h 0x00000010 pushad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022166D0 second address: 00000000022166D0 instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022167BD second address: 00000000022167CA instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor eax, eax 0x0000000c pushad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022167CA second address: 00000000022167CA instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 000000000221064F second address: 00000000022162B1 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a test ax, 0000701Dh 0x0000000e call 00007F1D7CF509D9h 0x00000013 cmp ebx, ebx 0x00000015 cmp ecx, ecx 0x00000017 call 00007F1D7CF4B190h 0x0000001c test dh, bh 0x0000001e cmp ax, bx 0x00000021 xor edi, edi 0x00000023 test esi, 5B8401F4h 0x00000029 mov dword ptr [ebp+000000F8h], 00A95F60h 0x00000033 test al, 09h 0x00000035 test ah, 00000068h 0x00000038 cmp dh, ah 0x0000003a test ch, 0000007Bh 0x0000003d call 00007F1D7CF4B05Eh 0x00000042 call 00007F1D7CF4AFF8h 0x00000047 lfence 0x0000004a mov edx, dword ptr [7FFE0014h] 0x00000050 lfence 0x00000053 ret 0x00000054 mov esi, edx 0x00000056 pushad 0x00000057 rdtsc
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 000000000221713A second address: 000000000221713A instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 000000000221651C second address: 0000000002216527 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pushad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 0000000002216527 second address: 0000000002216527 instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022165EC second address: 0000000002216603 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp esi, 0000F000h 0x00000010 je 00007F1D7CF4B320h 0x00000016 pushad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 0000000002216603 second address: 0000000002216603 instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022166BF second address: 00000000022166D0 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a cmp dword ptr [edi+14h], 40h 0x0000000e je 00007F1D7CF4B002h 0x00000010 pushad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022166D0 second address: 00000000022166D0 instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022167BD second address: 00000000022167CA instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor eax, eax 0x0000000c pushad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022167CA second address: 00000000022167CA instructions:
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 000000000221064F second address: 00000000022162B1 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a test ax, 0000701Dh 0x0000000e call 00007F1D7CF509D9h 0x00000013 cmp ebx, ebx 0x00000015 cmp ecx, ecx 0x00000017 call 00007F1D7CF4B190h 0x0000001c test dh, bh 0x0000001e cmp ax, bx 0x00000021 xor edi, edi 0x00000023 test esi, 5B8401F4h 0x00000029 mov dword ptr [ebp+000000F8h], 00A95F60h 0x00000033 test al, 09h 0x00000035 test ah, 00000068h 0x00000038 cmp dh, ah 0x0000003a test ch, 0000007Bh 0x0000003d call 00007F1D7CF4B05Eh 0x00000042 call 00007F1D7CF4AFF8h 0x00000047 lfence 0x0000004a mov edx, dword ptr [7FFE0014h] 0x00000050 lfence 0x00000053 ret 0x00000054 mov esi, edx 0x00000056 pushad 0x00000057 rdtsc
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe RDTSC instruction interceptor: First address: 00000000022162B1 second address: 00000000022162B1 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F1D7C8FA428h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test dh, bh 0x0000001f add edi, edx 0x00000021 cmp ax, bx 0x00000024 dec dword ptr [ebp+000000F8h] 0x0000002a cmp dword ptr [ebp+000000F8h], 00000000h 0x00000031 jne 00007F1D7C8FA402h 0x00000033 cmp dh, ah 0x00000035 test ch, 0000007Bh 0x00000038 call 00007F1D7C8FA49Eh 0x0000003d call 00007F1D7C8FA438h 0x00000042 lfence 0x00000045 mov edx, dword ptr [7FFE0014h] 0x0000004b lfence 0x0000004e ret 0x0000004f mov esi, edx 0x00000051 pushad 0x00000052 rdtsc
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02216056 rdtsc 0_2_02216056
Program does not show much activity (idle)
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

Anti Debugging:

barindex
Found potential dummy code loops (likely to delay analysis)
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Process Stats: CPU usage > 90% for more than 60s
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02216056 rdtsc 0_2_02216056
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_022126B7 mov eax, dword ptr fs:[00000030h] 0_2_022126B7
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02216AE8 mov eax, dword ptr fs:[00000030h] 0_2_02216AE8
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02216AF5 mov eax, dword ptr fs:[00000030h] 0_2_02216AF5
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02216B35 mov eax, dword ptr fs:[00000030h] 0_2_02216B35
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02215F3E mov eax, dword ptr fs:[00000030h] 0_2_02215F3E
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02213567 mov eax, dword ptr fs:[00000030h] 0_2_02213567
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_02211D88 mov eax, dword ptr fs:[00000030h] 0_2_02211D88
Source: C:\Users\user\Desktop\PO1001910 Sample Arrive Tracking No_SINI0068206497.exe Code function: 0_2_022159EE mov eax, dword ptr fs:[00000030h] 0_2_022159EE
Program does not show much activity (idle)
Source: all processes Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367435282.0000000000DB0000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367435282.0000000000DB0000.00000002.00000001.sdmp Binary or memory string: Progman
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367435282.0000000000DB0000.00000002.00000001.sdmp Binary or memory string: &Program Manager
Source: PO1001910 Sample Arrive Tracking No_SINI0068206497.exe, 00000000.00000002.1367435282.0000000000DB0000.00000002.00000001.sdmp Binary or memory string: Progmanlock
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 342204 Sample: PO1001910 Sample Arrive  Tr... Startdate: 20/01/2021 Architecture: WINDOWS Score: 80 7 Multi AV Scanner detection for submitted file 2->7 9 Yara detected GuLoader 2->9 11 Contains functionality to detect hardware virtualization (CPUID execution measurement) 2->11 13 5 other signatures 2->13 5 PO1001910 Sample Arrive  Tracking No_SINI0068206497.exe 1 2->5         started        process3
No contacted IP infos