Loading ...

Play interactive tourEdit tour

Analysis Report KOPEKER.exe

Overview

General Information

Sample Name:KOPEKER.exe
Analysis ID:392084
MD5:cd885321b35b73421cd63e3150d677f7
SHA1:2f09e0eb93927d82076f34549b0d4d3b7b393aab
SHA256:495edfb60c0a9af0c57251ce28ca0bcf4c911324f59074f99c2797e36c3f3ef4
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains an invalid checksum
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • KOPEKER.exe (PID: 5760 cmdline: 'C:\Users\user\Desktop\KOPEKER.exe' MD5: CD885321B35B73421CD63E3150D677F7)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=13mbmc5DER0_wKkBDGQL230MFPs1cTVbi", "Injection Process": ["RegAsm.exe", "RegSvcs.exe", "MSBuild.exe"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.985827741.0000000000620000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    Process Memory Space: KOPEKER.exe PID: 5760JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
      Process Memory Space: KOPEKER.exe PID: 5760JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

        Sigma Overview

        No Sigma rule has matched

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000000.00000002.985827741.0000000000620000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=13mbmc5DER0_wKkBDGQL230MFPs1cTVbi", "Injection Process": ["RegAsm.exe", "RegSvcs.exe", "MSBuild.exe"]}
        Multi AV Scanner detection for submitted fileShow sources
        Source: KOPEKER.exeVirustotal: Detection: 62%Perma Link
        Source: KOPEKER.exeMetadefender: Detection: 32%Perma Link
        Source: KOPEKER.exeReversingLabs: Detection: 82%
        Machine Learning detection for sampleShow sources
        Source: KOPEKER.exeJoe Sandbox ML: detected
        Source: KOPEKER.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=13mbmc5DER0_wKkBDGQL230MFPs1cTVbi
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess Stats: CPU usage > 98%
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_004096F2
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00409839
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_004098C2
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040A0E6
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040A09B
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040994E
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040A17E
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_004099E3
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00409A78
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040A29C
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00409B1B
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040A335
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040E33C
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040A3C6
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00409BAA
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040A45A
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00409C39
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040A4E5
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00409D71
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00409E98
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040A749
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00409F28
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_004097AA
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00409FB6
        Source: KOPEKER.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: KOPEKER.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: KOPEKER.exe, 00000000.00000002.986561193.0000000002200000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs KOPEKER.exe
        Source: KOPEKER.exe, 00000000.00000002.1003029734.00000000050D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameSHELL32.DLL.MUIj% vs KOPEKER.exe
        Source: KOPEKER.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/0
        Source: C:\Users\user\Desktop\KOPEKER.exeFile created: C:\Users\user\AppData\Local\Temp\~DF0ADD49C825BCA8F7.TMPJump to behavior
        Source: KOPEKER.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\KOPEKER.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
        Source: C:\Users\user\Desktop\KOPEKER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: KOPEKER.exeVirustotal: Detection: 62%
        Source: KOPEKER.exeMetadefender: Detection: 32%
        Source: KOPEKER.exeReversingLabs: Detection: 82%

        Data Obfuscation:

        barindex
        Yara detected GuLoaderShow sources
        Source: Yara matchFile source: 00000000.00000002.985827741.0000000000620000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: KOPEKER.exe PID: 5760, type: MEMORY
        Yara detected VB6 Downloader GenericShow sources
        Source: Yara matchFile source: Process Memory Space: KOPEKER.exe PID: 5760, type: MEMORY
        Source: KOPEKER.exeStatic PE information: real checksum: 0x27f9e should be: 0x1d52b
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00408053 push 8EA106DEh; ret
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00405019 push FFFFFFF4h; retf
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040C903 pushad ; ret
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040C24B push 7600FFCEh; iretd
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0040445A push 0D010762h; retf
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00402F28 push 713A1CACh; retf
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00403789 push BB150FDEh; retf

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
        Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (71).png
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00621226
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00627309
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0062266B
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006226AB
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00622733
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006227EB
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006227BE
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00622787
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00626843
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0062282E
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00626806
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00626804
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006248E3
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006248C3
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006268CF
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006248A7
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006228B7
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0062488B
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00626892
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00626966
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00626907
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0062290E
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0062690E
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006249E7
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006249C7
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00624992
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_0062699F
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00624A2B
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00624A0B
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00621C82
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00625D75
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00625DAE
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00625D8B
        Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
        Source: C:\Users\user\Desktop\KOPEKER.exeRDTSC instruction interceptor: First address: 000000000062607D second address: 000000000062607D instructions:
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: KOPEKER.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Tries to detect virtualization through RDTSC time measurementsShow sources
        Source: C:\Users\user\Desktop\KOPEKER.exeRDTSC instruction interceptor: First address: 000000000040991D second address: 000000000040991D instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 00000085h 0x00000008 cmp ebx, 00000000h 0x0000000b cmp ebx, 0000009Ch 0x00000011 cmp eax, 10h 0x00000014 cmp ebx, 27h 0x00000017 cmp ebx, 24h 0x0000001a cmp ebx, 00000092h 0x00000020 fsubr st(5), st(0) 0x00000022 fldz 0x00000024 packuswb mm6, mm5 0x00000027 fldz 0x00000029 fxch st(0), st(1) 0x0000002b faddp st(1), st(0) 0x0000002d fpatan 0x0000002f jmp 00007F44BC95AAFEh 0x00000031 cmp ebx, 63h 0x00000034 cmp ebx, 000000C6h 0x0000003a cmp eax, 000000A7h 0x0000003f cmp edi, 02EAFF40h 0x00000045 movd mm1, ebx 0x00000048 movd mm1, ebx 0x0000004b movd mm1, ebx 0x0000004e movd mm1, ebx 0x00000051 fst st(4) 0x00000053 pslld mm5, 15h 0x00000057 fabs 0x00000059 psrlw mm4, A7h 0x0000005d fnclex 0x0000005f punpckhwd xmm4, xmm1 0x00000063 psubusb mm5, mm1 0x00000066 jmp 00007F44BC95AAF9h 0x00000068 jne 00007F44BC95A8F8h 0x0000006e inc edi 0x0000006f cmp ebx, 000000C2h 0x00000075 cmp eax, 00000099h 0x0000007a cmp ebx, 5Dh 0x0000007d cmp eax, 00000096h 0x00000082 cmp eax, 68h 0x00000085 cmp eax, 40h 0x00000088 psraw xmm7, xmm3 0x0000008c paddb xmm4, xmm5 0x00000090 ffree st(3) 0x00000092 psraw mm4, mm6 0x00000095 fninit 0x00000097 punpcklbw mm6, mm1 0x0000009a psubw xmm0, xmm1 0x0000009e jmp 00007F44BC95AAFDh 0x000000a0 rdtsc
        Source: C:\Users\user\Desktop\KOPEKER.exeRDTSC instruction interceptor: First address: 0000000000626071 second address: 000000000062607D instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b pushad 0x0000000c rdtsc
        Source: C:\Users\user\Desktop\KOPEKER.exeRDTSC instruction interceptor: First address: 000000000062607D second address: 000000000062607D instructions:
        Source: C:\Users\user\Desktop\KOPEKER.exeRDTSC instruction interceptor: First address: 00000000006258C4 second address: 00000000006259C6 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov eax, dword ptr [ebp+04h] 0x0000000e jmp 00007F44BC95CB9Ah 0x00000010 cmp cl, dl 0x00000012 add eax, ebx 0x00000014 mov ecx, dword ptr [eax+18h] 0x00000017 jmp 00007F44BC95CB9Ah 0x00000019 cmp eax, 92C74976h 0x0000001e mov dword ptr [ebp+08h], ecx 0x00000021 mov ecx, dword ptr [eax+1Ch] 0x00000024 jmp 00007F44BC95CB9Ah 0x00000026 pushad 0x00000027 mov di, 847Ch 0x0000002b cmp di, 847Ch 0x00000030 jne 00007F44BC95C80Ch 0x00000036 popad 0x00000037 mov dword ptr [ebp+14h], ecx 0x0000003a mov ecx, dword ptr [eax+24h] 0x0000003d mov dword ptr [ebp+10h], ecx 0x00000040 jmp 00007F44BC95CB9Ah 0x00000042 cmp ecx, ecx 0x00000044 mov esi, dword ptr [eax+20h] 0x00000047 jmp 00007F44BC95CB9Ah 0x00000049 cmp ah, ch 0x0000004b add esi, dword ptr [ebp+04h] 0x0000004e xor ecx, ecx 0x00000050 jmp 00007F44BC95CB9Ah 0x00000052 cmp eax, edx 0x00000054 jmp 00007F44BC95CB9Ah 0x00000056 pushad 0x00000057 lfence 0x0000005a rdtsc
        Source: C:\Users\user\Desktop\KOPEKER.exeRDTSC instruction interceptor: First address: 00000000006257CD second address: 00000000006258C4 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b call 00007F44BC95AB2Bh 0x00000010 jmp 00007F44BC95AABAh 0x00000012 cmp ah, ch 0x00000014 mov dword ptr [ebp+04h], eax 0x00000017 jmp 00007F44BC95AABAh 0x00000019 cmp eax, edx 0x0000001b mov ebx, dword ptr [eax+3Ch] 0x0000001e add eax, ebx 0x00000020 mov ebx, dword ptr [eax+78h] 0x00000023 jmp 00007F44BC95AABAh 0x00000025 pushad 0x00000026 lfence 0x00000029 rdtsc
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_004096F2 rdtsc
        Source: C:\Users\user\Desktop\KOPEKER.exeWindow / User API: threadDelayed 1256
        Source: C:\Users\user\Desktop\KOPEKER.exeWindow / User API: threadDelayed 8744
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: KOPEKER.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

        Anti Debugging:

        barindex
        Found potential dummy code loops (likely to delay analysis)Show sources
        Source: C:\Users\user\Desktop\KOPEKER.exeProcess Stats: CPU usage > 90% for more than 60s
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_004096F2 rdtsc
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006231CC mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006222F6 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_006222C7 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00622286 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00622295 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00625480 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00626843 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00626806 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00626804 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00621C82 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\KOPEKER.exeCode function: 0_2_00625F2A mov eax, dword ptr fs:[00000030h]
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: KOPEKER.exe, 00000000.00000002.986154636.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: KOPEKER.exe, 00000000.00000002.986154636.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: KOPEKER.exe, 00000000.00000002.986154636.0000000000D70000.00000002.00000001.sdmpBinary or memory string: &Program Manager
        Source: KOPEKER.exe, 00000000.00000002.986154636.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Progmanlock

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery511Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion11LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery31SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

        Behavior Graph

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        KOPEKER.exe62%VirustotalBrowse
        KOPEKER.exe38%MetadefenderBrowse
        KOPEKER.exe83%ReversingLabsWin32.Trojan.VBObfuse
        KOPEKER.exe100%Joe Sandbox ML

        Dropped Files

        No Antivirus matches

        Unpacked PE Files

        No Antivirus matches

        Domains

        No Antivirus matches

        URLs

        No Antivirus matches

        Domains and IPs

        Contacted Domains

        No contacted domains info

        Contacted IPs

        No contacted IP infos

        General Information

        Joe Sandbox Version:31.0.0 Emerald
        Analysis ID:392084
        Start date:19.04.2021
        Start time:08:41:50
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 8m 40s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:KOPEKER.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:11
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@1/0@0/0
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 9.4% (good quality ratio 3.7%)
        • Quality average: 18.5%
        • Quality standard deviation: 24%
        HCA Information:Failed
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, MusNotifyIcon.exe, conhost.exe, svchost.exe

        Simulations

        Behavior and APIs

        No simulations

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        No context

        ASN

        No context

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        No created / dropped files found

        Static File Info

        General

        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):5.7626204591873975
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.15%
        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:KOPEKER.exe
        File size:118784
        MD5:cd885321b35b73421cd63e3150d677f7
        SHA1:2f09e0eb93927d82076f34549b0d4d3b7b393aab
        SHA256:495edfb60c0a9af0c57251ce28ca0bcf4c911324f59074f99c2797e36c3f3ef4
        SHA512:cf8124f2fb91027365cb2ed941b121698a40e5992935bc0b3b6bdd15ad92a417ad62bf247b643132d886145dfcc6c3a48b3ee52aaa6fd8577e4b37457cd83c81
        SSDEEP:1536:q28031a0rd/d7dGBWBWevDWoiLUaYuWMm2IPKtopQYXQHoH5encrFQLn9MamuSHi:qiFa0BGBWYeaoNHKtG+JMi
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......J.................p...`......h.............@................

        File Icon

        Icon Hash:c0c6f2e0e4fefe3f

        Static PE Info

        General

        Entrypoint:0x401968
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        DLL Characteristics:
        Time Stamp:0x4A88EC80 [Mon Aug 17 05:37:04 2009 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:7677b40f5f8927412a58af017314f1ed

        Entrypoint Preview

        Instruction
        push 0040F4D8h
        call 00007F44BCECE623h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        xor byte ptr [eax], al
        add byte ptr [eax], al
        inc eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [ebx-604C4D3Dh], dl
        cmp eax, 0B8E48E7h
        imul edi, dword ptr [esi+3Dh], 00FB3ECEh
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [ecx], al
        add byte ptr [eax], al
        add byte ptr [ecx+00h], al
        push es
        push eax
        xchg eax, ebx
        add ah, byte ptr [ecx+edi*2+72h]
        imul esi, dword ptr [edx+65h], 64h
        jnc 00007F44BCECE697h
        outsb
        add byte ptr [edx], ch
        int1
        add al, byte ptr [eax]
        add byte ptr [eax], al
        add bh, bh
        int3
        xor dword ptr [eax], eax
        or al, 1Ah
        wait
        xor al, 5Ch
        push edi
        mov bp, seg?
        inc eax
        nop
        xchg byte ptr [ebp-3Dh], bl
        dec edi
        loope 00007F44BCECE5DFh
        jl 00007F44BCECE61Fh
        xchg eax, edx
        and eax, dword ptr [edx]
        xor esp, eax
        dec esi
        lodsd
        push edx
        and ebx, dword ptr [edx]

        Data Directories

        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x177640x28.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x3822.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
        IMAGE_DIRECTORY_ENTRY_IAT0x10000x1a8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

        Sections

        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x16d480x17000False0.439017917799data6.15247427314IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .data0x180000x12600x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .rsrc0x1a0000x38220x4000False0.4619140625data5.13551103483IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

        Resources

        NameRVASizeTypeLanguageCountry
        RT_ICON0x1cf7a0x8a8data
        RT_ICON0x1c8b20x6c8data
        RT_ICON0x1c34a0x568GLS_BINARY_LSB_FIRST
        RT_ICON0x1b2a20x10a8data
        RT_ICON0x1a91a0x988data
        RT_ICON0x1a4b20x468GLS_BINARY_LSB_FIRST
        RT_GROUP_ICON0x1a4580x5adata
        RT_VERSION0x1a1e00x278dataEnglishUnited States

        Imports

        DLLImport
        MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaLenBstr, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarAdd, __vbaStrToAnsi, __vbaVarDup, __vbaFpI4, __vbaLateMemCallLd, _CIatan, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, __vbaFPInt, _CIexp, __vbaFreeStr, __vbaFreeObj

        Version Infos

        DescriptionData
        Translation0x0409 0x04b0
        InternalNameKOPEKER
        FileVersion1.00
        CompanyNameCluster-C
        CommentsCluster-C
        ProductNameCluster-C
        ProductVersion1.00
        FileDescriptionCluster-C
        OriginalFilenameKOPEKER.exe

        Possible Origin

        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States

        Network Behavior

        No network behavior found

        Code Manipulations

        Statistics

        System Behavior

        General

        Start time:08:42:44
        Start date:19/04/2021
        Path:C:\Users\user\Desktop\KOPEKER.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\KOPEKER.exe'
        Imagebase:0x400000
        File size:118784 bytes
        MD5 hash:CD885321B35B73421CD63E3150D677F7
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Visual Basic
        Yara matches:
        • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000000.00000002.985827741.0000000000620000.00000040.00000001.sdmp, Author: Joe Security
        Reputation:low

        Disassembly

        Code Analysis

        Reset < >