Loading ...

Play interactive tourEdit tour

Analysis Report Lista produkt#U00f3w.exe

Overview

General Information

Sample Name:Lista produkt#U00f3w.exe
Analysis ID:411100
MD5:c7f305d2e4f5e91e8118ac32ec796b0c
SHA1:c477a3d238b96c2a58e77bb7c818775e23f7d656
SHA256:0d28b94959edb70309a2754a83f2c9230b3176618ab571995d81955751ca2dbe
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w7x64
  • Lista produkt#U00f3w.exe (PID: 1492 cmdline: 'C:\Users\user\Desktop\Lista produkt#U00f3w.exe' MD5: C7F305D2E4F5E91E8118AC32EC796B0C)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=17FenSUBd1a7PqzhRX-elu4bxZvs0LF9Y"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.3167430661.0000000001D70000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: Lista produkt#U00f3w.exeMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=17FenSUBd1a7PqzhRX-elu4bxZvs0LF9Y"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: Lista produkt#U00f3w.exeVirustotal: Detection: 34%Perma Link
    Source: Lista produkt#U00f3w.exeReversingLabs: Detection: 17%
    Source: Lista produkt#U00f3w.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=17FenSUBd1a7PqzhRX-elu4bxZvs0LF9Y
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeProcess Stats: CPU usage > 98%
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeMemory allocated: 76E20000 page execute and read and write
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeMemory allocated: 76D20000 page execute and read and write
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D733E1 NtProtectVirtualMemory,
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D71B3F NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_00407206
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_00407246
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_0040176F
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_00401580
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_004017BC
    Source: Lista produkt#U00f3w.exe, 00000000.00000000.2086108427.0000000000414000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFarveskrmene.exe vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3167446836.0000000001E58000.00000004.00000040.sdmpBinary or memory string: OriginalFilenameFarveskrmene.exeFE2X vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewersvcj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewbengine.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepuiapi.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWfsR.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewmplayer.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemsfltr32.acm.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameaudiosrv.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamebatt.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameMDMINST.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWCNCSVC.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamePOWRPROF.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameAUTOPLAY.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamedmdskres.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamegpscript.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamesdcpl.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamesrchadmin.dll.mui@ vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWPDSp.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameVfWWDM32.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameUsbui.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameERCj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamecscsvc.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameehRecvr.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamessdpsrv.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameRUNDLL32.EXE.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenetcfgx.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemsfeedsbs.dll.muiD vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameunregmp2.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWUDFSvc.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWPCCPL.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameTrustedInstaller.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameUxTheme.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenetprof.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamebattc.sys.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewevtsvc.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameappmgmts.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameSHDOCVW.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamesti_ci.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamefaultrep.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewdc.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameqwavedrv.sys.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewucltux.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameunpnhost.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameappinfo.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemidimap.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemmcndmgr.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameAccessibilityCpl.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameMSRATING.DLL.MUID vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameoleres.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewmploc.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameACCTRES.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameOLEACCRC.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameIPBusEnum.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamerstrui.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameieinstal.exe.muiD vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewmisvc.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameSRVSVC.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamedeskadp.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamePowerCPL.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemsadp32.acm.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameSRV.SYS.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameiccvid.drv.muiN vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamegpapi.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamebluetooth.cpl.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewpd_ci.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameINETRES.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameMFC42.DLL.MUIR vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameSWPRV.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamePhotoScreensaver.scr.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameATL.DLL.MUIR vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemmcbase.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamelhdfrgui.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamePDH.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWMPNSSCI.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamescsiport.sys.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameAVIFIL32.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemmci.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenametermsrv.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameBubblesj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameIE4UINIT.EXE.MUID vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameiedkcs32.dll.muiD vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWinMail.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewevtutil.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameTBSSVC.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameulib.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamei8042prt.sys.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemycomput.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameparport.sys.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamedsound.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamefwcfg.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameqwave.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameumrdp.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameehres.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWMPSideShowGadgetj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameonex.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemsvfw32.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamethumbcache.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamelocalsec.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameUI0Detect.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWLANGPUI.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameMSV1_0.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamehotplug.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameSTI.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemmcss.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewuaueng.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameOLE32.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamew32time.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameslui.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameUSERCPL.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenametaskschd.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWMDM.dll.muiZ vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamebthci.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameMSHTMLER.DLL.MUID vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenapdsnap.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameREGSVC.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamesbdropj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamebrserid.sys.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamecomdlg32.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameSXS.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamedps.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWMPNSCFG.EXE.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamesdclt.exe.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWEBCHECK.DLL.MUID vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameAuxiliaryDisplayCpl.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameMBLCTR.EXE.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameEFSADU.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameWPDMTPDR.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameNetworkItemFactory.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameMSCTF.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameaudiodev.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameaelupsvc.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamejscript.dll.muiH vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamegpedit.dll.muij% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameMSOERES.DLL.MUIj% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3167374879.00000000004A0000.00000008.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exeBinary or memory string: OriginalFilenameFarveskrmene.exe vs Lista produkt#U00f3w.exe
    Source: Lista produkt#U00f3w.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
    Source: classification engineClassification label: mal80.troj.evad.winEXE@1/0@0/0
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeFile created: C:\Users\user\AppData\Local\Temp\~DF9757055F2834F01E.TMPJump to behavior
    Source: Lista produkt#U00f3w.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: Lista produkt#U00f3w.exeVirustotal: Detection: 34%
    Source: Lista produkt#U00f3w.exeReversingLabs: Detection: 17%

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000000.00000002.3167430661.0000000001D70000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_00406613 push edx; ret
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_00405A15 push esp; ret
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_00405889 push eax; ret
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_0040576B push edi; retf
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_00404B1B push esp; retn 0000h
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_0040459E pushfd ; ret
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D71B3F pushfd ; iretd
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D71CA1 pushfd ; iretd
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D70D16
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D70511
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D71301
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D70C5E
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeRDTSC instruction interceptor: First address: 0000000001D71972 second address: 0000000001D71972 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F23ACD81D8Ah 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d pop ecx 0x0000001e add edi, edx 0x00000020 cmp bx, ax 0x00000023 dec ecx 0x00000024 cmp dh, ah 0x00000026 cmp ecx, 00000000h 0x00000029 jne 00007F23ACD81D6Ah 0x0000002b push ecx 0x0000002c cmp bl, al 0x0000002e cmp bl, cl 0x00000030 call 00007F23ACD81D9Fh 0x00000035 call 00007F23ACD81D9Ah 0x0000003a lfence 0x0000003d mov edx, dword ptr [7FFE0014h] 0x00000043 lfence 0x00000046 ret 0x00000047 mov esi, edx 0x00000049 pushad 0x0000004a rdtsc
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D707C4 rdtsc
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

    Anti Debugging:

    barindex
    Found potential dummy code loops (likely to delay analysis)Show sources
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeProcess Stats: CPU usage > 90% for more than 60s
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D707C4 rdtsc
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D72B82 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D72D69 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D70D16 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D7111A mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D718E2 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D730ED mov eax, dword ptr fs:[00000030h]
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3167403263.00000000008E0000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3167403263.00000000008E0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: Lista produkt#U00f3w.exe, 00000000.00000002.3167403263.00000000008E0000.00000002.00000001.sdmpBinary or memory string: !Progman
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeCode function: 0_2_01D71B3F cpuid
    Source: C:\Users\user\Desktop\Lista produkt#U00f3w.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery212Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Lista produkt#U00f3w.exe34%VirustotalBrowse
    Lista produkt#U00f3w.exe17%ReversingLabsWin32.Trojan.Vebzenpak

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckLista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpfalse
      high
      http://www.windows.com/pctv.Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpfalse
        high
        http://investor.msn.comLista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpfalse
          high
          http://www.msnbc.com/news/ticker.txtLista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpfalse
            high
            http://www.icra.org/vocabulary/.Lista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://windowsmedia.com/redir/services.asp?WMPFriendly=trueLista produkt#U00f3w.exe, 00000000.00000002.3168905603.0000000003647000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.hotmail.com/oeLista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpfalse
              high
              http://investor.msn.com/Lista produkt#U00f3w.exe, 00000000.00000002.3168785172.0000000003460000.00000002.00000001.sdmpfalse
                high

                Contacted IPs

                No contacted IP infos

                General Information

                Joe Sandbox Version:32.0.0 Black Diamond
                Analysis ID:411100
                Start date:11.05.2021
                Start time:16:11:34
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 11m 52s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:Lista produkt#U00f3w.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:2
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal80.troj.evad.winEXE@1/0@0/0
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 30.8% (good quality ratio 15.9%)
                • Quality average: 28.9%
                • Quality standard deviation: 34.1%
                HCA Information:
                • Successful, ratio: 53%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .exe

                Simulations

                Behavior and APIs

                No simulations

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                No created / dropped files found

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):5.711108381776406
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.15%
                • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:Lista produkt#U00f3w.exe
                File size:81920
                MD5:c7f305d2e4f5e91e8118ac32ec796b0c
                SHA1:c477a3d238b96c2a58e77bb7c818775e23f7d656
                SHA256:0d28b94959edb70309a2754a83f2c9230b3176618ab571995d81955751ca2dbe
                SHA512:6eebcaff0963b5a69f574ceb0eb11f07ac1e6a195476c32b863e026f825f563e6b2406f7e6f34cc2ade6515cb14980e2be471a010fc8c8cf8727faa4f1421b56
                SSDEEP:1536:cDMp+5asYexpjWzziwuVlCqRryDqRZkD:cV57+iwuV9RZk
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......`.....................0............... ....@................

                File Icon

                Icon Hash:b09298b8cc8a19c6

                Static PE Info

                General

                Entrypoint:0x4013f0
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:
                Time Stamp:0x6099DDA9 [Tue May 11 01:28:09 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:ec8e962978786706cf0189109090c85e

                Entrypoint Preview

                Instruction
                push 00401F34h
                call 00007F23AC9F8F63h
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                xor byte ptr [eax], al
                add byte ptr [eax], al
                inc eax
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [edx+ecx*2-47h], cl
                aas
                mov byte ptr [ebx+0Bh], dh
                inc edi
                mov eax, 8AB5048Eh
                les ecx, fword ptr [edx+09h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add dword ptr [eax], eax
                add byte ptr [eax], al
                add byte ptr [eax], al
                call 00007F23F8A29D04h
                push ebp
                dec ebp
                dec ecx
                dec esi
                dec ecx
                inc esi
                dec ecx
                inc ebx
                inc ebp
                dec esi
                push esp
                add byte ptr [eax], cl
                inc ecx
                add byte ptr [eax], al
                add byte ptr [eax], al
                add bh, bh
                int3
                xor dword ptr [eax], eax
                push es
                into
                sbb bh, byte ptr [esi]
                or esp, dword ptr [eax+56B54785h]
                jnp 00007F23AC9F8FD3h
                or eax, dword ptr [edi+33h]
                push ebp
                jc 00007F23AC9F8F35h
                sub dword ptr [esi-6Eh], edx
                xchg byte ptr [edi+eax*2], dh
                xchg dword ptr [ebp-3B91C6C1h], edx
                push ebp
                pop eax
                cmp cl, byte ptr [edi-53h]
                xor ebx, dword ptr [ecx-48EE309Ah]
                or al, 00h
                stosb
                add byte ptr [eax-2Dh], ah
                xchg eax, ebx
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                cmp byte ptr [edx], cl
                add byte ptr [eax], al
                and al, 09h
                add byte ptr [eax], al
                add byte ptr [edi], al
                add byte ptr [edx+65h], al
                arpl word ptr [ebp+72h], si
                jnc 00007F23AC9F8FD7h
                add byte ptr [47001201h], cl
                jc 00007F23AC9F8FE7h
                jo 00007F23AC9F8FE2h
                jnc 00007F23AC9F8FD4h

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x111d40x28.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000xc1c.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                IMAGE_DIRECTORY_ENTRY_IAT0x10000x158.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x107d40x11000False0.422291475184data6.18941304283IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .data0x120000x11f40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .rsrc0x140000xc1c0x1000False0.291015625data3.0223027499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_ICON0x143740x8a8data
                RT_GROUP_ICON0x143600x14data
                RT_VERSION0x140f00x270dataChineseTaiwan

                Imports

                DLLImport
                MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenVar, _adj_fdiv_m32, __vbaAryDestruct, __vbaVarForInit, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, __vbaI2I4, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaNew2, __vbaVar2Vec, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaStrToAnsi, __vbaVarDup, __vbaFpI4, __vbaVarCopy, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, __vbaVarForNext, _CIexp, __vbaFreeObj, __vbaFreeStr

                Version Infos

                DescriptionData
                Translation0x0404 0x04b0
                InternalNameFarveskrmene
                FileVersion1.00
                CompanyNameAsso Filler
                ProductNameAsso Filler
                ProductVersion1.00
                FileDescriptionAsso Filler
                OriginalFilenameFarveskrmene.exe

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                ChineseTaiwan

                Network Behavior

                No network behavior found

                Code Manipulations

                Statistics

                System Behavior

                General

                Start time:16:12:40
                Start date:11/05/2021
                Path:C:\Users\user\Desktop\Lista produkt#U00f3w.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\user\Desktop\Lista produkt#U00f3w.exe'
                Imagebase:0x400000
                File size:81920 bytes
                MD5 hash:C7F305D2E4F5E91E8118AC32EC796B0C
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Visual Basic
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3167430661.0000000001D70000.00000040.00000001.sdmp, Author: Joe Security
                Reputation:low

                Disassembly

                Code Analysis

                Reset < >