Analysis Report Proforma Invoice.exe

Overview

General Information

Sample Name: Proforma Invoice.exe
Analysis ID: 343196
MD5: 6479f35608769db340640d6a8f84a38d
SHA1: 1ffc79fde43e746e826f32a018e02a65fc51602e
SHA256: e97a63a8f54270ace4969870597c7642bbdb31fc6d5d1972d412edaf4fccd80e
Tags: GuLoader

Most interesting Screenshot:

Detection

GuLoader
Score: 84
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Executable has a suspicious name (potential lure to open the executable)
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
PE file contains strange resources
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: Proforma Invoice.exe Virustotal: Detection: 33% Perma Link
Source: Proforma Invoice.exe ReversingLabs: Detection: 19%

Compliance:

barindex
Uses 32bit PE files
Source: Proforma Invoice.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

System Summary:

barindex
Executable has a suspicious name (potential lure to open the executable)
Source: Proforma Invoice.exe Static file information: Suspicious name
Initial sample is a PE file and has a suspicious name
Source: initial sample Static PE information: Filename: Proforma Invoice.exe
Abnormal high CPU Usage
Source: C:\Users\user\Desktop\Proforma Invoice.exe Process Stats: CPU usage > 98%
Contains functionality to call native functions
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F76CF NtProtectVirtualMemory, 0_2_021F76CF
Detected potential crypto function
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_0040326F 0_2_0040326F
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_00403424 0_2_00403424
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_004033DF 0_2_004033DF
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_00403383 0_2_00403383
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_004033AF 0_2_004033AF
PE file contains strange resources
Source: Proforma Invoice.exe Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Sample file is different than original file name gathered from version info
Source: Proforma Invoice.exe, 00000000.00000000.226901777.0000000000411000.00000002.00020000.sdmp Binary or memory string: OriginalFilenameABJOINT.exe vs Proforma Invoice.exe
Source: Proforma Invoice.exe, 00000000.00000002.1387605484.0000000002110000.00000002.00000001.sdmp Binary or memory string: OriginalFilenameuser32j% vs Proforma Invoice.exe
Source: Proforma Invoice.exe Binary or memory string: OriginalFilenameABJOINT.exe vs Proforma Invoice.exe
Uses 32bit PE files
Source: Proforma Invoice.exe Static PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
Source: classification engine Classification label: mal84.troj.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\Proforma Invoice.exe File created: C:\Users\user\AppData\Local\Temp\~DF97811D99A2EC711B.TMP Jump to behavior
Source: Proforma Invoice.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Proforma Invoice.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: C:\Users\user\Desktop\Proforma Invoice.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Proforma Invoice.exe Virustotal: Detection: 33%
Source: Proforma Invoice.exe ReversingLabs: Detection: 19%

Data Obfuscation:

barindex
Yara detected GuLoader
Source: Yara match File source: Process Memory Space: Proforma Invoice.exe PID: 2952, type: MEMORY
Yara detected VB6 Downloader Generic
Source: Yara match File source: Process Memory Space: Proforma Invoice.exe PID: 2952, type: MEMORY
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_00407A10 pushfd ; retf 0_2_00407A12
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_00404292 push cs; iretd 0_2_00404294
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_004072AB push ecx; iretd 0_2_00407361
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F6EF1 push eax; ret 0_2_021F6EF2
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F4AE6 push ss; iretd 0_2_021F4AE7
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F576C push FFFFFFB9h; retf 0_2_021F576E
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F0F86 push edi; retf 0_2_021F0F9F
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F0FA0 push edi; retf 0_2_021F0F9F
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F0FA0 push edi; retf 0_2_021F0FC4
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F49C2 push edi; iretd 0_2_021F49C8
Source: C:\Users\user\Desktop\Proforma Invoice.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F1850 0_2_021F1850
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Source: C:\Users\user\Desktop\Proforma Invoice.exe RDTSC instruction interceptor: First address: 00000000021F0249 second address: 00000000021F0249 instructions:
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: Proforma Invoice.exe Binary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\user\Desktop\Proforma Invoice.exe RDTSC instruction interceptor: First address: 00000000021F0249 second address: 00000000021F0249 instructions:
Source: C:\Users\user\Desktop\Proforma Invoice.exe RDTSC instruction interceptor: First address: 00000000021F6485 second address: 00000000021F6485 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FD330E19525h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test edx, CAC49675h 0x00000023 cmp edx, edx 0x00000025 cmp eax, ecx 0x00000027 add edi, edx 0x00000029 dec dword ptr [ebp+000000F8h] 0x0000002f jmp 00007FD330E1951Ah 0x00000031 test di, 395Ch 0x00000036 cmp dword ptr [ebp+000000F8h], 00000000h 0x0000003d jne 00007FD330E19460h 0x0000003f cmp bx, ax 0x00000042 call 00007FD330E19559h 0x00000047 call 00007FD330E19535h 0x0000004c lfence 0x0000004f mov edx, dword ptr [7FFE0014h] 0x00000055 lfence 0x00000058 ret 0x00000059 mov esi, edx 0x0000005b pushad 0x0000005c rdtsc
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F1A1F rdtsc 0_2_021F1A1F
Source: Proforma Invoice.exe Binary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

Anti Debugging:

barindex
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F1A1F rdtsc 0_2_021F1A1F
Contains functionality to read the PEB
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F6006 mov eax, dword ptr fs:[00000030h] 0_2_021F6006
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F5A78 mov eax, dword ptr fs:[00000030h] 0_2_021F5A78
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F34AA mov eax, dword ptr fs:[00000030h] 0_2_021F34AA
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F34A8 mov eax, dword ptr fs:[00000030h] 0_2_021F34A8
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F2519 mov eax, dword ptr fs:[00000030h] 0_2_021F2519
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F2571 mov eax, dword ptr fs:[00000030h] 0_2_021F2571
Source: Proforma Invoice.exe, 00000000.00000002.1387502839.0000000000C40000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: Proforma Invoice.exe, 00000000.00000002.1387502839.0000000000C40000.00000002.00000001.sdmp Binary or memory string: Progman
Source: Proforma Invoice.exe, 00000000.00000002.1387502839.0000000000C40000.00000002.00000001.sdmp Binary or memory string: SProgram Managerl
Source: Proforma Invoice.exe, 00000000.00000002.1387502839.0000000000C40000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd,
Source: Proforma Invoice.exe, 00000000.00000002.1387502839.0000000000C40000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Contains functionality to query CPU information (cpuid)
Source: C:\Users\user\Desktop\Proforma Invoice.exe Code function: 0_2_021F2BD8 cpuid 0_2_021F2BD8
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 343196 Sample: Proforma Invoice.exe Startdate: 22/01/2021 Architecture: WINDOWS Score: 84 7 Multi AV Scanner detection for submitted file 2->7 9 Yara detected GuLoader 2->9 11 Executable has a suspicious name (potential lure to open the executable) 2->11 13 6 other signatures 2->13 5 Proforma Invoice.exe 1 2->5         started        process3
No contacted IP infos