Loading ...

Play interactive tourEdit tour

Analysis Report cotizacion.exe

Overview

General Information

Sample Name:cotizacion.exe
Analysis ID:395265
MD5:35f5d83dbc44b907d379c5ab35f725f8
SHA1:745ba0ab77e726e01d3f2fca4506383948906e24
SHA256:daf8d6de50e27c49b372d6cb0a7c6b7cd7a0946f959d13d3d3eb8d5d892c9eb7
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Machine Learning detection for sample
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains an invalid checksum
PE file contains strange resources
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • cotizacion.exe (PID: 1976 cmdline: 'C:\Users\user\Desktop\cotizacion.exe' MD5: 35F5D83DBC44B907D379C5AB35F725F8)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
cotizacion.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000002.493125170.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
      00000000.00000000.229099820.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.0.cotizacion.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
          0.2.cotizacion.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: cotizacion.exeVirustotal: Detection: 62%Perma Link
            Source: cotizacion.exeMetadefender: Detection: 32%Perma Link
            Source: cotizacion.exeReversingLabs: Detection: 70%
            Machine Learning detection for sampleShow sources
            Source: cotizacion.exeJoe Sandbox ML: detected
            Source: cotizacion.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: cotizacion.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: cotizacion.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: cotizacion.exe, 00000000.00000002.493866250.00000000020A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs cotizacion.exe
            Source: cotizacion.exe, 00000000.00000002.493157991.000000000041A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameForkvakledes.exe vs cotizacion.exe
            Source: cotizacion.exe, 00000000.00000002.502916759.0000000004FA0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameSHELL32.DLL.MUIj% vs cotizacion.exe
            Source: cotizacion.exe, 00000000.00000002.494036894.0000000002200000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameForkvakledes.exeFE2XCluster-CCluster-C vs cotizacion.exe
            Source: cotizacion.exeBinary or memory string: OriginalFilenameForkvakledes.exe vs cotizacion.exe
            Source: cotizacion.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal68.troj.winEXE@1/0@0/0
            Source: C:\Users\user\Desktop\cotizacion.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DF8BE9C0E48D19B38F.TMPJump to behavior
            Source: cotizacion.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\cotizacion.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\Desktop\cotizacion.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: cotizacion.exeVirustotal: Detection: 62%
            Source: cotizacion.exeMetadefender: Detection: 32%
            Source: cotizacion.exeReversingLabs: Detection: 70%

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: cotizacion.exe, type: SAMPLE
            Source: Yara matchFile source: 00000000.00000002.493125170.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.229099820.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.0.cotizacion.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.cotizacion.exe.400000.0.unpack, type: UNPACKEDPE
            Source: cotizacion.exeStatic PE information: real checksum: 0x279ca should be: 0x1d63d
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00407C52 push es; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00401275 push 02A3CF73h; iretd
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00406E16 pushad ; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_0040261A push es; retf
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_004078E3 pushad ; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_004092E9 push es; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00409C8F push esi; iretd
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00406C97 push cs; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00405140 push ss; retf
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00407D73 pushad ; retf
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00404D04 push es; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00405310 push ecx; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00403D1F push eax; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00404BD3 push es; retf
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_0040298C push ecx; retf
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_00403792 push eax; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_004037AE push eax; ret
            Source: C:\Users\user\Desktop\cotizacion.exeCode function: 0_2_004029B7 push es; retf

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
            Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (71).png
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\cotizacion.exeWindow / User API: threadDelayed 8041
            Source: C:\Users\user\Desktop\cotizacion.exeWindow / User API: threadDelayed 1959
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\cotizacion.exeLast function: Thread delayed
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: cotizacion.exe, 00000000.00000002.493462189.0000000000C20000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
            Source: cotizacion.exe, 00000000.00000002.493462189.0000000000C20000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: cotizacion.exe, 00000000.00000002.493462189.0000000000C20000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: cotizacion.exe, 00000000.00000002.493462189.0000000000C20000.00000002.00000001.sdmpBinary or memory string: Progmanlock

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingProcess Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            cotizacion.exe63%VirustotalBrowse
            cotizacion.exe32%MetadefenderBrowse
            cotizacion.exe70%ReversingLabsWin32.Trojan.VBObfuse
            cotizacion.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            No Antivirus matches

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:395265
            Start date:22.04.2021
            Start time:11:16:18
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 4m 52s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:cotizacion.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:12
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal68.troj.winEXE@1/0@0/0
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 95.3% (good quality ratio 56.3%)
            • Quality average: 28.7%
            • Quality standard deviation: 26.6%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            No created / dropped files found

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):5.714049017467046
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.15%
            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:cotizacion.exe
            File size:118784
            MD5:35f5d83dbc44b907d379c5ab35f725f8
            SHA1:745ba0ab77e726e01d3f2fca4506383948906e24
            SHA256:daf8d6de50e27c49b372d6cb0a7c6b7cd7a0946f959d13d3d3eb8d5d892c9eb7
            SHA512:76404764d6eb8d7392207ced43ba52b39702bdcff84e0b3842af2fa35105000abdf8d1e8c34a778fceab651ae4f52369d6e85645e0452db49c53ade5cd37e775
            SSDEEP:1536:PA1ybwSbXGgN79EiSJ99mLUaYugzYxrm19Ko2o/1hQr5UOaM0tmxswXpuqltL:P0KbVN7VSDXUxrh0G
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L....).M.................p...`......h.............@................

            File Icon

            Icon Hash:c0c6f2e0e4fefe3f

            Static PE Info

            General

            Entrypoint:0x401968
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:
            Time Stamp:0x4DAB29E3 [Sun Apr 17 17:56:51 2011 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:7677b40f5f8927412a58af017314f1ed

            Entrypoint Preview

            Instruction
            push 0040F0A8h
            call 00007FC704574F23h
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            xor byte ptr [eax], al
            add byte ptr [eax], al
            inc eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [esi], dh
            loopne 00007FC704574F21h
            mov edx, 4F5D2BC2h
            mov es, ax
            dec ebp
            dec ecx
            push 00000037h
            hlt
            and dword ptr [eax], eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [ecx], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [ebp+45h], cl
            push esp
            inc ecx
            dec esp
            dec edi
            inc edi
            dec ecx
            inc ebx
            inc ecx
            dec esp
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add bh, bh
            int3
            xor dword ptr [eax], eax
            or al, ACh
            sbb eax, dword ptr [esi]
            push ebx
            aaa
            loop 00007FC704574ED9h
            inc ebp
            xchg eax, esi
            and byte ptr [eax+4Fh], bl
            lea ecx, dword ptr [esp+esi]
            je 00007FC704574F4Ch
            in al, dx
            or al, D1h
            and cl, bl
            call far 69DBh : CB71A849h
            xchg eax, edi
            wait

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x173240x28.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x383a.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
            IMAGE_DIRECTORY_ENTRY_IAT0x10000x1a8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x169080x17000False0.442064368207data6.09226152403IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .data0x180000x12600x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .rsrc0x1a0000x383a0x4000False0.462524414062data5.1445020687IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_ICON0x1cf920x8a8data
            RT_ICON0x1c8ca0x6c8data
            RT_ICON0x1c3620x568GLS_BINARY_LSB_FIRST
            RT_ICON0x1b2ba0x10a8data
            RT_ICON0x1a9320x988data
            RT_ICON0x1a4ca0x468GLS_BINARY_LSB_FIRST
            RT_GROUP_ICON0x1a4700x5adata
            RT_VERSION0x1a1e00x290MS Windows COFF PA-RISC object fileEnglishUnited States

            Imports

            DLLImport
            MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaLenBstr, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarAdd, __vbaStrToAnsi, __vbaVarDup, __vbaFpI4, __vbaLateMemCallLd, _CIatan, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, __vbaFPInt, _CIexp, __vbaFreeStr, __vbaFreeObj

            Version Infos

            DescriptionData
            Translation0x0409 0x04b0
            InternalNameForkvakledes
            FileVersion1.00
            CompanyNameCluster-C
            CommentsCluster-C
            ProductNameCluster-C
            ProductVersion1.00
            FileDescriptionCluster-C
            OriginalFilenameForkvakledes.exe

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States

            Network Behavior

            No network behavior found

            Code Manipulations

            Statistics

            System Behavior

            General

            Start time:11:17:10
            Start date:22/04/2021
            Path:C:\Users\user\Desktop\cotizacion.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\cotizacion.exe'
            Imagebase:0x400000
            File size:118784 bytes
            MD5 hash:35F5D83DBC44B907D379C5AB35F725F8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Visual Basic
            Yara matches:
            • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000002.493125170.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000000.229099820.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >