Loading ...

Play interactive tourEdit tour

Analysis Report gedanken.exe

Overview

General Information

Sample Name:gedanken.exe
Analysis ID:384219
MD5:e2342da4c7a6ff102679cd487954dc5f
SHA1:a5aec8579ab17e7378c5cff51eb321d55f2e3532
SHA256:dc51b75c62afc72ad319d361366d01901a237343fe8dafc568fc0f38d9bc7f3a
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
PE file contains an invalid checksum
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • gedanken.exe (PID: 6880 cmdline: 'C:\Users\user\Desktop\gedanken.exe' MD5: E2342DA4C7A6FF102679CD487954DC5F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.1168805441.0000000000460000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    Process Memory Space: gedanken.exe PID: 6880JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
      Process Memory Space: gedanken.exe PID: 6880JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

        Sigma Overview

        No Sigma rule has matched

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for submitted fileShow sources
        Source: gedanken.exeVirustotal: Detection: 52%Perma Link
        Source: gedanken.exeReversingLabs: Detection: 50%
        Machine Learning detection for sampleShow sources
        Source: gedanken.exeJoe Sandbox ML: detected
        Source: gedanken.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: C:\Users\user\Desktop\gedanken.exeProcess Stats: CPU usage > 98%
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00465802
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00461A9C
        Source: gedanken.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: gedanken.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: gedanken.exe, 00000000.00000002.1169390599.0000000002260000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs gedanken.exe
        Source: gedanken.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: classification engineClassification label: mal80.troj.evad.winEXE@1/0@0/0
        Source: C:\Users\user\Desktop\gedanken.exeFile created: C:\Users\user\AppData\Local\Temp\~DFBBC711B87778BA89.TMPJump to behavior
        Source: gedanken.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\gedanken.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: C:\Users\user\Desktop\gedanken.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: gedanken.exeVirustotal: Detection: 52%
        Source: gedanken.exeReversingLabs: Detection: 50%

        Data Obfuscation:

        barindex
        Yara detected GuLoaderShow sources
        Source: Yara matchFile source: 00000000.00000002.1168805441.0000000000460000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gedanken.exe PID: 6880, type: MEMORY
        Yara detected VB6 Downloader GenericShow sources
        Source: Yara matchFile source: Process Memory Space: gedanken.exe PID: 6880, type: MEMORY
        Source: gedanken.exeStatic PE information: real checksum: 0x29cba should be: 0x275ed
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_0040BE5C push 7600FFCEh; iretd
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_004030E1 push ss; iretd
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_0040249C push edi; retf
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_0040314D push ss; iretd
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_0040475D push ss; retf
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_004047C8 push ss; retf
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00464CDA push ecx; retf
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462CA0 push ecx; retf
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00466554 pushfd ; iretd
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00466A14 push edi; ret
        Source: C:\Users\user\Desktop\gedanken.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462C4F
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_0046581C
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462CFC
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462CBE
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462D3F
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462DD6
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462D80
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462A65
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00461670
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462E13
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462ACB
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462B08
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462B88
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462BB6
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: gedanken.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Tries to detect virtualization through RDTSC time measurementsShow sources
        Source: C:\Users\user\Desktop\gedanken.exeRDTSC instruction interceptor: First address: 0000000000463681 second address: 0000000000463681 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FDEBC8E5224h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test bl, bl 0x0000001f cmp bl, al 0x00000021 pop ecx 0x00000022 cmp edx, ecx 0x00000024 test al, dl 0x00000026 add edi, edx 0x00000028 jmp 00007FDEBC8E521Ah 0x0000002a cmp al, B6h 0x0000002c dec ecx 0x0000002d cmp dx, 0C52h 0x00000032 cmp ecx, 00000000h 0x00000035 jne 00007FDEBC8E51CAh 0x00000037 push ecx 0x00000038 call 00007FDEBC8E525Eh 0x0000003d call 00007FDEBC8E5234h 0x00000042 lfence 0x00000045 mov edx, dword ptr [7FFE0014h] 0x0000004b lfence 0x0000004e ret 0x0000004f mov esi, edx 0x00000051 pushad 0x00000052 rdtsc
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_0040946F rdtsc
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: gedanken.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

        Anti Debugging:

        barindex
        Found potential dummy code loops (likely to delay analysis)Show sources
        Source: C:\Users\user\Desktop\gedanken.exeProcess Stats: CPU usage > 90% for more than 60s
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_0040946F rdtsc
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_004620C0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_004634DA mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_004620BE mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00465A03 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00461A8E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00466356 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_0046635B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462358 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_0046233D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_00462396 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_004623B7 mov eax, dword ptr fs:[00000030h]
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: gedanken.exe, 00000000.00000002.1169278487.0000000000DA0000.00000002.00000001.sdmpBinary or memory string: Program Manager
        Source: gedanken.exe, 00000000.00000002.1169278487.0000000000DA0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: gedanken.exe, 00000000.00000002.1169278487.0000000000DA0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: gedanken.exe, 00000000.00000002.1169278487.0000000000DA0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\gedanken.exeCode function: 0_2_004612AC cpuid

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery411Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery211Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        gedanken.exe53%VirustotalBrowse
        gedanken.exe50%ReversingLabsWin32.Trojan.GuLoader
        gedanken.exe100%Joe Sandbox ML

        Dropped Files

        No Antivirus matches

        Unpacked PE Files

        No Antivirus matches

        Domains

        No Antivirus matches

        URLs

        No Antivirus matches

        Domains and IPs

        Contacted Domains

        No contacted domains info

        Contacted IPs

        No contacted IP infos

        General Information

        Joe Sandbox Version:31.0.0 Emerald
        Analysis ID:384219
        Start date:08.04.2021
        Start time:18:50:52
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 45s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:gedanken.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:17
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal80.troj.evad.winEXE@1/0@0/0
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 32.8% (good quality ratio 16.5%)
        • Quality average: 24.8%
        • Quality standard deviation: 27.8%
        HCA Information:Failed
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe

        Simulations

        Behavior and APIs

        No simulations

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        No context

        ASN

        No context

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        No created / dropped files found

        Static File Info

        General

        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):5.658586008613306
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.15%
        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:gedanken.exe
        File size:110592
        MD5:e2342da4c7a6ff102679cd487954dc5f
        SHA1:a5aec8579ab17e7378c5cff51eb321d55f2e3532
        SHA256:dc51b75c62afc72ad319d361366d01901a237343fe8dafc568fc0f38d9bc7f3a
        SHA512:23cf2857f305792f8318760ff36f2f3dc940598850afa4410136c0c3abec58df2c7eaceb463ab64d45b101bc4f4c9c1aa8d737e46876e8120ef244621ec77803
        SSDEEP:1536:4yPqW0672Qw+Q7jlNmY/2vL2M/FPVm9v6hRK1ZPVm9vDd2Mf2v:Viw73Yfxv8Vm2A1FVmy
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...i.rY.................0...................@....@................

        File Icon

        Icon Hash:c0c6f2e0e4fefe3f

        Static PE Info

        General

        Entrypoint:0x4013e8
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        DLL Characteristics:
        Time Stamp:0x5972E969 [Sat Jul 22 05:58:01 2017 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:d1ed0dda3501483d16a7ad09b76f3b08

        Entrypoint Preview

        Instruction
        push 00411514h
        call 00007FDEBC9AD553h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        xor byte ptr [eax], al
        add byte ptr [eax], al
        inc eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [edx], al
        pushf
        sar dword ptr [esi+1Ah], cl
        aad 44h
        xchg byte ptr [eax-7Dh], cl
        dec cx
        dec esi
        outsd
        test byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [ecx], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], 00000000h
        add byte ptr [eax], al
        jne 00007FDEBC9AD5CEh
        popad
        insb
        jns 00007FDEBC9AD5D2h
        je 00007FDEBC9AD5D7h
        jnc 00007FDEBC9AD5D6h
        jc 00007FDEBC9AD5C7h
        jc 00007FDEBC9AD5D5h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add bh, bh
        int3
        xor dword ptr [eax], eax
        or edx, dword ptr [eax+61079236h]
        lea edi, dword ptr [esi-217365B3h]
        je 00007FDEBC9AD5E0h
        insd
        push ds
        in eax, 84h
        fisttp dword ptr [esi]
        sbb dword ptr [esi-01h], esp
        cli
        inc esp
        test al, 32h
        sti
        shl dword ptr [eax], cl
        out dx, eax
        push ebp
        imul edi, dword ptr [edx], 9933AD4Fh
        iretw
        adc dword ptr [edi+00AA000Ch], esi
        pushad
        rcl dword ptr [ebx+00000000h], cl
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al

        Data Directories

        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x139340x28.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x5c3a.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
        IMAGE_DIRECTORY_ENTRY_IAT0x10000x108.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

        Sections

        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x12ddc0x13000False0.42867238898data6.08030531578IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .data0x140000x117c0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .rsrc0x160000x5c3a0x6000False0.359700520833data5.27049873079IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

        Resources

        NameRVASizeTypeLanguageCountry
        RT_ICON0x1ad920xea8data
        RT_ICON0x1a4ea0x8a8data
        RT_ICON0x19f820x568GLS_BINARY_LSB_FIRST
        RT_ICON0x179da0x25a8dBase III DBT, version number 0, next free block index 40
        RT_ICON0x169320x10a8data
        RT_ICON0x164ca0x468GLS_BINARY_LSB_FIRST
        RT_GROUP_ICON0x164700x5adata
        RT_VERSION0x161e00x290MS Windows COFF PA-RISC object fileGuaraniParaguay

        Imports

        DLLImport
        MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaLineInputStr, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, _adj_fprem1, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaObjVar, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaFileOpen, __vbaNew2, __vbaR8Str, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, _adj_fdivr_m32, _adj_fdiv_r, __vbaLateMemCall, __vbaVarAdd, __vbaVarDup, __vbaFpI4, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

        Version Infos

        DescriptionData
        Translation0x0474 0x04b0
        InternalNamegedanken
        FileVersion1.00
        CompanyNamePana-sonic
        CommentsPana-sonic
        ProductNamePana-sonic
        ProductVersion1.00
        FileDescriptionPana-sonic
        OriginalFilenamegedanken.exe

        Possible Origin

        Language of compilation systemCountry where language is spokenMap
        GuaraniParaguay

        Network Behavior

        No network behavior found

        Code Manipulations

        Statistics

        System Behavior

        General

        Start time:18:51:37
        Start date:08/04/2021
        Path:C:\Users\user\Desktop\gedanken.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\gedanken.exe'
        Imagebase:0x400000
        File size:110592 bytes
        MD5 hash:E2342DA4C7A6FF102679CD487954DC5F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Visual Basic
        Yara matches:
        • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000000.00000002.1168805441.0000000000460000.00000040.00000001.sdmp, Author: Joe Security
        Reputation:low

        Disassembly

        Code Analysis

        Reset < >