Loading ...

Play interactive tourEdit tour

Analysis Report GqSL8M2a72

Overview

General Information

Sample Name:GqSL8M2a72 (renamed file extension from none to exe)
Analysis ID:355735
MD5:4fc29198fcc9a9fe3b31f7549d54d8e9
SHA1:5b112c77ea208d570eedaad0d5880e6fc19cffbc
SHA256:98d8b13f297953a0b4f915e55cd527f0f1461d42b917b77aa99f05446f6fdd12
Tags:uncategorizedZeuS

Most interesting Screenshot:

Detection

ZeusVM
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected ZeusVM e-Banking Trojan
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Contains VNC / remote desktop functionality (version string found)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Antivirus or Machine Learning detection for unpacked file
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to enumerate network shares
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
May initialize a security null descriptor
Program does not show much activity (idle)
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • GqSL8M2a72.exe (PID: 1832 cmdline: 'C:\Users\user\Desktop\GqSL8M2a72.exe' MD5: 4FC29198FCC9A9FE3B31F7549D54D8E9)
    • GqSL8M2a72.exe (PID: 5864 cmdline: 'C:\Users\user\Desktop\GqSL8M2a72.exe' MD5: 4FC29198FCC9A9FE3B31F7549D54D8E9)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: GqSL8M2a72.exeAvira: detected
Multi AV Scanner detection for submitted fileShow sources
Source: GqSL8M2a72.exeVirustotal: Detection: 86%Perma Link
Source: GqSL8M2a72.exeMetadefender: Detection: 72%Perma Link
Source: GqSL8M2a72.exeReversingLabs: Detection: 88%
Machine Learning detection for sampleShow sources
Source: GqSL8M2a72.exeJoe Sandbox ML: detected
Source: 2.2.GqSL8M2a72.exe.400000.0.unpackAvira: Label: TR/Kazy.MK
Source: 1.2.GqSL8M2a72.exe.5e0000.1.unpackAvira: Label: TR/Kazy.MK
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 1_2_00401145 HeapAlloc,CryptStringToBinaryA,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0040A14E CryptUnprotectData,LocalFree,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0041764D CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,

Compliance:

barindex
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\Users\user\Desktop\GqSL8M2a72.exeUnpacked PE file: 2.2.GqSL8M2a72.exe.400000.0.unpack
Uses 32bit PE filesShow sources
Source: GqSL8M2a72.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0040969D GetFileAttributesExW,ReadProcessMemory,LoadLibraryW,GetProcAddress,SHGetFolderPathW,StrCmpNIW,FreeLibrary,NetUserEnum,NetUserGetInfo,NetApiBufferFree,NetApiBufferFree,SHGetFolderPathW,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0041BA18 PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0041BAD3 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00406095 getaddrinfo,freeaddrinfo,getsockname,getpeername,recv,recvfrom,getaddrinfo,freeaddrinfo,sendto,recvfrom,sendto,select,
Source: GqSL8M2a72.exeString found in binary or memory: http://www.google.com/webhp
Source: GqSL8M2a72.exe, 00000001.00000002.197226170.000000000265E000.00000004.00000040.sdmpString found in binary or memory: http://www.google.com/webhpLb
Source: GqSL8M2a72.exe, 00000002.00000002.197084539.0000000000401000.00000020.00000001.sdmpString found in binary or memory: http://www.google.com/webhpbc
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00405EC6 GetClipboardData,GlobalLock,EnterCriticalSection,LeaveCriticalSection,GlobalUnlock,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00405D60 EnterCriticalSection,GetTickCount,LeaveCriticalSection,GetKeyboardState,ToUnicode,TranslateMessage,
Source: GqSL8M2a72.exe, 00000001.00000002.197104411.000000000068A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

E-Banking Fraud:

barindex
Detected ZeusVM e-Banking TrojanShow sources
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0040DB94 lstrcmpiA,lstrcmpiA,lstrcmpiA,CloseHandle,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00404C67 OpenWindowStationW,CreateWindowStationW,GetProcessWindowStation,OpenDesktopW,CreateDesktopW,GetCurrentThreadId,GetThreadDesktop,SetThreadDesktop,CloseDesktop,CloseWindowStation,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 1_2_00401326 NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 1_2_0042656B NtAllocateVirtualMemory,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 1_2_0042694B CreateProcessW,NtGetContextThread,NtUnmapViewOfSection,SetUnhandledExceptionFilter,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,ExitProcess,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 1_2_0042658E NtSetContextThread,NtResumeProcess,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00415C2E NtQueryInformationProcess,CloseHandle,NtCreateThread,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00415CE5 NtCreateUserProcess,GetProcessId,GetThreadContext,SetThreadContext,VirtualFreeEx,CloseHandle,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00415781 NtCreateUserProcess,NtCreateThread,LdrLoadDll,GetFileAttributesExW,HttpSendRequestW,HttpSendRequestA,HttpSendRequestExW,HttpSendRequestExA,InternetCloseHandle,InternetReadFile,InternetReadFileExA,InternetQueryDataAvailable,HttpQueryInfoA,closesocket,send,WSASend,OpenInputDesktop,SwitchDesktop,DefWindowProcW,DefWindowProcA,DefDlgProcW,DefDlgProcA,DefFrameProcW,DefFrameProcA,DefMDIChildProcW,DefMDIChildProcA,CallWindowProcW,CallWindowProcA,RegisterClassW,RegisterClassA,RegisterClassExW,RegisterClassExA,BeginPaint,EndPaint,GetDCEx,GetDC,GetWindowDC,ReleaseDC,GetUpdateRect,GetUpdateRgn,GetMessagePos,GetCursorPos,SetCursorPos,SetCapture,ReleaseCapture,GetCapture,GetMessageW,GetMessageA,PeekMessageW,PeekMessageA,TranslateMessage,GetClipboardData,PFXImportCertStore,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00417CCA LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_004120CF InitiateSystemShutdownExW,ExitWindowsEx,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0040F5BB CreateMutexW,GetLastError,CloseHandle,CloseHandle,ExitWindowsEx,OpenEventW,SetEvent,CloseHandle,CloseHandle,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,ReadProcessMemory,Sleep,IsWellKnownSid,GetFileAttributesExW,ReadProcessMemory,GetFileAttributesExW,VirtualFree,CreateEventW,WaitForSingleObject,WaitForMultipleObjects,CloseHandle,CloseHandle,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_004190FB
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00417559
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00401A63
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00410F8B
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: String function: 0040101D appears 51 times
Source: C:\Users\user\Desktop\GqSL8M2a72.exeSection loaded: skembuptpwnoq.dll
Source: GqSL8M2a72.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
Source: GqSL8M2a72.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal92.bank.troj.evad.winEXE@3/0@0/0
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0041D5F1 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertEnumCertificatesInStore,PFXExportCertStoreEx,PFXExportCertStoreEx,PFXExportCertStoreEx,CharLowerW,GetSystemTime,CertCloseStore,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0041D766 CertOpenSystemStoreW,CertEnumCertificatesInStore,CertDuplicateCertificateContext,CertDeleteCertificateFromStore,CertEnumCertificatesInStore,CertCloseStore,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00417A74 GetCurrentThread,OpenThreadToken,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00417A1D CreateToolhelp32Snapshot,Thread32First,Thread32Next,CloseHandle,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0040A86D CoCreateInstance,
Source: GqSL8M2a72.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\GqSL8M2a72.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: GqSL8M2a72.exeVirustotal: Detection: 86%
Source: GqSL8M2a72.exeMetadefender: Detection: 72%
Source: GqSL8M2a72.exeReversingLabs: Detection: 88%
Source: unknownProcess created: C:\Users\user\Desktop\GqSL8M2a72.exe 'C:\Users\user\Desktop\GqSL8M2a72.exe'
Source: unknownProcess created: C:\Users\user\Desktop\GqSL8M2a72.exe 'C:\Users\user\Desktop\GqSL8M2a72.exe'
Source: C:\Users\user\Desktop\GqSL8M2a72.exeProcess created: C:\Users\user\Desktop\GqSL8M2a72.exe 'C:\Users\user\Desktop\GqSL8M2a72.exe'

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)Show sources
Source: C:\Users\user\Desktop\GqSL8M2a72.exeUnpacked PE file: 2.2.GqSL8M2a72.exe.400000.0.unpack .text:ER;.rdata:R;.data:W; vs .text:ER;.data:W;.reloc:R;
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\Users\user\Desktop\GqSL8M2a72.exeUnpacked PE file: 2.2.GqSL8M2a72.exe.400000.0.unpack
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00417CCA LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00401807 push FFFFFFF1h; ret
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00401CED push es; iretd
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_004093F2 push esi; iretd
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00402383 push cs; ret
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_004023B9 push cs; iretd
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00411779 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadImageW,GetIconInfo,GetCursorPos,DrawIcon,lstrcmpiW,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0041BA18 PathRemoveFileSpecW,FindFirstFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0041BAD3 FindFirstFileW,Sleep,WaitForSingleObject,PathMatchSpecW,Sleep,Sleep,FindNextFileW,FindClose,
Source: GqSL8M2a72.exeBinary or memory string: O1nvu1ctKOpA7eriBCpw6n8KOmhqynhk5NpS7zt6aKXNOvppepIl6mWFlZ9VmzJrWm5qYtXp1dqSKkm6aK8Vmzcrbmpqbx9S1WWbMGprLmpp1VqSKCp6a+LduuWdG68K5Zs26muC/jZp2OZdOqpqsapqtPoqemuWDjXafAn/umGqki16empi2m46ov4wYt43qmjeNyL9MCL+OmFi3jRo3jfmGq4x4mqCa5EivjOqb2WZNCjuSmL4b7Di/7CiaQt+ampi
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00415E14 LdrLoadDll,LdrGetDllHandle,LdrLoadDll,EnterCriticalSection,lstrcmpiW,LeaveCriticalSection,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00417CCA LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessAsUserW,CloseHandle,CloseHandle,CloseHandle,FreeLibrary,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0040E636 mov edx, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 1_2_004015DA HeapCreate,GetProcessHeap,
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 1_2_0042694B CreateProcessW,NtGetContextThread,NtUnmapViewOfSection,SetUnhandledExceptionFilter,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,ExitProcess,

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\Desktop\GqSL8M2a72.exeMemory written: C:\Users\user\Desktop\GqSL8M2a72.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\GqSL8M2a72.exeProcess created: C:\Users\user\Desktop\GqSL8M2a72.exe 'C:\Users\user\Desktop\GqSL8M2a72.exe'
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_00419997 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,LocalFree,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_004164AA GetSystemTime,SystemTimeToFileTime,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0041D595 GetUserNameExW,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_004164D2 GetTimeZoneInformation,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_0040E447 GetVersionExW,GetNativeSystemInfo,
Source: GqSL8M2a72.exeBinary or memory string: S:(ML;;NRNWNX;;;LW)

Remote Access Functionality:

barindex
Contains VNC / remote desktop functionality (version string found)Show sources
Source: GqSL8M2a72.exeString found in binary or memory: RFB 003.003
Source: GqSL8M2a72.exeString found in binary or memory: RFB 003.003
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_004194EA socket,bind,listen,closesocket,
Source: C:\Users\user\Desktop\GqSL8M2a72.exeCode function: 2_2_004197C8 socket,bind,closesocket,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1Native API1DLL Side-Loading1DLL Side-Loading1Deobfuscate/Decode Files or Information1Input Capture21System Time Discovery2Remote Desktop Protocol1Archive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsScheduled Task/JobApplication Shimming1Application Shimming1Obfuscated Files or Information2LSASS MemoryAccount Discovery1Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Create Account1Valid Accounts1Install Root Certificate1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Valid Accounts1Access Token Manipulation11Software Packing22NTDSSystem Information Discovery3Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptProcess Injection111DLL Side-Loading1LSA SecretsNetwork Share Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonValid Accounts1Cached Domain CredentialsSecurity Software Discovery11VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsAccess Token Manipulation11DCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection111Proc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
GqSL8M2a72.exe86%VirustotalBrowse
GqSL8M2a72.exe78%MetadefenderBrowse
GqSL8M2a72.exe88%ReversingLabsWin32.Trojan.Zeus
GqSL8M2a72.exe100%AviraHEUR/AGEN.1108096
GqSL8M2a72.exe100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
2.2.GqSL8M2a72.exe.400000.0.unpack100%AviraTR/Kazy.MKDownload File
2.0.GqSL8M2a72.exe.400000.0.unpack100%AviraHEUR/AGEN.1108090Download File
1.0.GqSL8M2a72.exe.400000.0.unpack100%AviraHEUR/AGEN.1108090Download File
1.2.GqSL8M2a72.exe.5e0000.1.unpack100%AviraTR/Kazy.MKDownload File
1.2.GqSL8M2a72.exe.400000.0.unpack100%AviraHEUR/AGEN.1108090Download File

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:355735
Start date:21.02.2021
Start time:15:03:09
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 34s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:GqSL8M2a72 (renamed file extension from none to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal92.bank.troj.evad.winEXE@3/0@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 100% (good quality ratio 92.4%)
  • Quality average: 82.2%
  • Quality standard deviation: 29.9%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Stop behavior analysis, all processes terminated
Warnings:
Show All
  • Exclude process from analysis (whitelisted): svchost.exe

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.080431308237134
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:GqSL8M2a72.exe
File size:161962
MD5:4fc29198fcc9a9fe3b31f7549d54d8e9
SHA1:5b112c77ea208d570eedaad0d5880e6fc19cffbc
SHA256:98d8b13f297953a0b4f915e55cd527f0f1461d42b917b77aa99f05446f6fdd12
SHA512:a023c11edff4e1059bb3e22edb53d9774c66b44379c3121b761e9fa276eae42aca7b15b82b45aef4fc829095c2c264728147bb840f36650e4566136a79f6fead
SSDEEP:3072:sK9smc3K+aCj93AnXGaNkdrgm9nl0JdqFJG2GztR07IVgfXs7ZsFz6x:JfcVho2eaJnl0JoLGtzz074IsYOx
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%...a...a...a.......c.......`.......c...h...|...a...1.....).`.......`...Richa...................PE..L......<.................^.

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x40156c
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
DLL Characteristics:TERMINAL_SERVER_AWARE, NO_ISOLATION
Time Stamp:0x3CAFB40C [Sun Apr 7 02:50:52 2002 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:3d72c2249f14f4cc74dd098fd236f98a

Entrypoint Preview

Instruction
push ebp
mov ebp, esp
sub esp, 1Ch
push 0042713Ch
call dword ptr [00427024h]
test eax, eax
jne 00007F7554D791E7h
call 00007F7554D79239h
push edi
xor edi, edi
cmp dword ptr [004294ECh], edi
je 00007F7554D79221h
call 00007F7554D78FACh
test eax, eax
je 00007F7554D79218h
push esi
push 004270C4h
call 00007F7554D78C5Dh
mov esi, dword ptr [00427080h]
pop ecx
jmp 00007F7554D791F6h
lea eax, dword ptr [ebp-1Ch]
push eax
call dword ptr [00427088h]
lea eax, dword ptr [ebp-1Ch]
push eax
call dword ptr [00427060h]
push edi
push edi
push edi
lea eax, dword ptr [ebp-1Ch]
push eax
call esi
test eax, eax
jne 00007F7554D791C1h
pop esi
mov eax, dword ptr [00428278h]
pop edi
leave
retn 000Ch
push 004270C4h
call 00007F7554D78C1Eh
pop ecx
push 00000000h
push 0016FCD8h
push 00000000h
call dword ptr [0042702Ch]
mov dword ptr [0042A4F4h], eax
test eax, eax
jne 00007F7554D791F1h
call dword ptr [00427030h]
mov dword ptr [0042A4F4h], eax
test eax, eax
je 00007F7554D791FDh
call 00007F7554D78BEAh
mov eax, dword ptr [eax+30h]
mov dword ptr [004294ECh], eax
test eax, eax
je 00007F7554D791ECh
mov eax, dword ptr [00428278h]
jmp 00007F7554D791E6h
ret
mov eax, dword ptr [004294ECh]
mov eax, dword ptr [eax+10h]
mov ecx, dword ptr [eax+44h]

Rich Headers

Programming Language:
  • [LNK] VS2010 build 30319
  • [IMP] VS2008 SP1 build 30729

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x271e00xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x270000xac.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x25dc60x25e00False0.732924659653data5.98756571788IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x270000x6320x800False0.43115234375zlib compressed data4.18800845972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x280000x25380x400False0.626953125data4.83990809034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

Imports

DLLImport
KERNEL32.dllLocalAlloc, GetModuleHandleA, OutputDebugStringA, lstrcpyA, LoadLibraryA, GetProcAddress, HeapCreate, GetProcessHeap, ExitProcess, SetUnhandledExceptionFilter, HeapAlloc, lstrlenA
USER32.dllGetActiveWindow, DispatchMessageW, UpdateWindow, SetWindowPos, CreateWindowExA, MessageBoxA, ShowWindow, FindWindowA, MessageBoxW, GetMessageW, SetFocus, TranslateMessage, DefWindowProcW
POWRPROF.dllGetPwrCapabilities, IsPwrShutdownAllowed, IsPwrHibernateAllowed, GetActivePwrScheme
WINTRUST.dllWintrustGetRegPolicyFlags
CRYPT32.dllCryptStringToBinaryA, CertCreateCertificateChainEngine
imagehlp.dllImageEnumerateCertificates
WINMM.dllmciSendStringW
CLUSAPI.dllClusterEnum

Network Behavior

No network behavior found

Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:15:03:53
Start date:21/02/2021
Path:C:\Users\user\Desktop\GqSL8M2a72.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\GqSL8M2a72.exe'
Imagebase:0x400000
File size:161962 bytes
MD5 hash:4FC29198FCC9A9FE3B31F7549D54D8E9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:15:03:54
Start date:21/02/2021
Path:C:\Users\user\Desktop\GqSL8M2a72.exe
Wow64 process (32bit):true
Commandline:'C:\Users\user\Desktop\GqSL8M2a72.exe'
Imagebase:0x400000
File size:161962 bytes
MD5 hash:4FC29198FCC9A9FE3B31F7549D54D8E9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >