Loading ...

Play interactive tourEdit tour

Analysis Report shipping Document and Bill Of Landing.exe

Overview

General Information

Sample Name:shipping Document and Bill Of Landing.exe
Analysis ID:411858
MD5:7196e6e67a39225a9b73af0c6f6b5b0e
SHA1:c0da8d54393e9365d1fa0f0a88cf4b52496992b1
SHA256:4d5e7bff4f749a4f1a357c61098c19c345246b142308f4048aebc6dfdaf4fc73
Tags:GuLoader
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Executable has a suspicious name (potential lure to open the executable)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
PE file contains an invalid checksum
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://reachglobal-in.com/fdeb/bin_dXfiGRj156.bin"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000D.00000002.469283991.0000000000560000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000001.00000002.296439672.0000000002290000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 0000000D.00000002.469283991.0000000000560000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://reachglobal-in.com/fdeb/bin_dXfiGRj156.bin"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: shipping Document and Bill Of Landing.exeVirustotal: Detection: 52%Perma Link
      Source: shipping Document and Bill Of Landing.exeReversingLabs: Detection: 29%
      Machine Learning detection for sampleShow sources
      Source: shipping Document and Bill Of Landing.exeJoe Sandbox ML: detected
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_00413514 CryptDestroyHash,
      Source: shipping Document and Bill Of Landing.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: https://reachglobal-in.com/fdeb/bin_dXfiGRj156.bin
      Source: unknownDNS traffic detected: query: reachglobal-in.com replaycode: Server failure (2)
      Source: unknownDNS traffic detected: queries for: reachglobal-in.com
      Source: shipping Document and Bill Of Landing.exe, 0000000D.00000002.469283991.0000000000560000.00000040.00000001.sdmpString found in binary or memory: https://reachglobal-in.com/fdeb/bin_dXfiGRj156.bin

      System Summary:

      barindex
      Potential malicious icon foundShow sources
      Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
      Executable has a suspicious name (potential lure to open the executable)Show sources
      Source: shipping Document and Bill Of Landing.exeStatic file information: Suspicious name
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: shipping Document and Bill Of Landing.exe
      Source: initial sampleStatic PE information: Filename: shipping Document and Bill Of Landing.exe
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02296EB1 NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02290715 EnumWindows,NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229292A NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229350C NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02296962 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02293636 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229720A NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292A0C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02297277 NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292A5C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02297257 NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02296EBE NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292A8B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022972E0 NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292AD8 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02296F38 NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292B32 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292B6F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02296F48 NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02296FEA NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292BD4 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02293C23 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292C0F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229700E NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292C56 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292CAE NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022970B6 NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02297087 NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022970FB NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02297130 NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229290F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292D04 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229351C NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229194A NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229714E NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292943 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292D5C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02293554 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292DA7 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022935A6 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022971BE NtUnmapViewOfSection,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229299B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022935E0 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022935D1 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022929D0 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00566962 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_0056350C NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005609FB NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00566EB1 NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_0056700E NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005670FB NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00567087 NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005670B6 NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00563554 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_0056714E NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_0056351C NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00567130 NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005635D1 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005635E0 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005671BE NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005635A6 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00567257 NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00567277 NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_0056720A NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00563636 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005672E0 NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00566EBE NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00566F48 NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00566F38 NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00560FFA NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00566FEA NtSetInformationThread,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00560FAC NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00560FA8 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02295460
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00565460
      Source: shipping Document and Bill Of Landing.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: shipping Document and Bill Of Landing.exe, 00000001.00000002.297195400.0000000002A10000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameThe.exeFE2X< vs shipping Document and Bill Of Landing.exe
      Source: shipping Document and Bill Of Landing.exe, 00000001.00000002.296409915.0000000002210000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs shipping Document and Bill Of Landing.exe
      Source: shipping Document and Bill Of Landing.exe, 00000001.00000002.296018416.000000000042F000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameThe.exe vs shipping Document and Bill Of Landing.exe
      Source: shipping Document and Bill Of Landing.exe, 0000000D.00000000.294760484.000000000042F000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameThe.exe vs shipping Document and Bill Of Landing.exe
      Source: shipping Document and Bill Of Landing.exeBinary or memory string: OriginalFilenameThe.exe vs shipping Document and Bill Of Landing.exe
      Source: shipping Document and Bill Of Landing.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@3/0@43/0
      Source: shipping Document and Bill Of Landing.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: shipping Document and Bill Of Landing.exeVirustotal: Detection: 52%
      Source: shipping Document and Bill Of Landing.exeReversingLabs: Detection: 29%
      Source: unknownProcess created: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe 'C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe'
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess created: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe 'C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe'
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess created: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe 'C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe'

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 0000000D.00000002.469283991.0000000000560000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.296439672.0000000002290000.00000040.00000001.sdmp, type: MEMORY
      Source: shipping Document and Bill Of Landing.exeStatic PE information: real checksum: 0x3be80 should be: 0x37542
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_00401CCC push edx; retf 2E00h
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0040424D push ss; iretd
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_00404334 push ss; iretd
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02296628 push eax; ret
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00566628 push eax; ret
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeFile created: \shipping document and bill of landing.exe
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeFile created: \shipping document and bill of landing.exe
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02297644
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229765E
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_0056765E
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00567644
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002295F8A second address: 0000000002295F8A instructions:
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002296025 second address: 0000000002296025 instructions:
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002295F27 second address: 0000000002295F27 instructions:
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002295D71 second address: 0000000002295D71 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FDABC9E8338h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test cx, cx 0x00000020 test bh, dh 0x00000022 add edi, edx 0x00000024 cmp ah, dh 0x00000026 dec dword ptr [ebp+000000F8h] 0x0000002c cmp dx, bx 0x0000002f cmp dword ptr [ebp+000000F8h], 00000000h 0x00000036 jne 00007FDABC9E830Fh 0x00000038 cmp ax, bx 0x0000003b call 00007FDABC9E837Eh 0x00000040 call 00007FDABC9E8348h 0x00000045 lfence 0x00000048 mov edx, dword ptr [7FFE0014h] 0x0000004e lfence 0x00000051 ret 0x00000052 mov esi, edx 0x00000054 pushad 0x00000055 rdtsc
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002293DBD second address: 0000000002293DBD instructions:
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeFile opened: C:\Program Files\qga\qga.exe
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeFile opened: C:\Program Files\qga\qga.exe
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: shipping Document and Bill Of Landing.exe, 00000001.00000002.296445757.00000000022A0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: shipping Document and Bill Of Landing.exe, 00000001.00000002.296445757.00000000022A0000.00000004.00000001.sdmp, shipping Document and Bill Of Landing.exe, 0000000D.00000002.469952233.0000000000740000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: shipping Document and Bill Of Landing.exe, 0000000D.00000002.469952233.0000000000740000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=WININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002295F8A second address: 0000000002295F8A instructions:
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002296025 second address: 0000000002296025 instructions:
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002295F27 second address: 0000000002295F27 instructions:
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002295D71 second address: 0000000002295D71 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007FDABC9E8338h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d test cx, cx 0x00000020 test bh, dh 0x00000022 add edi, edx 0x00000024 cmp ah, dh 0x00000026 dec dword ptr [ebp+000000F8h] 0x0000002c cmp dx, bx 0x0000002f cmp dword ptr [ebp+000000F8h], 00000000h 0x00000036 jne 00007FDABC9E830Fh 0x00000038 cmp ax, bx 0x0000003b call 00007FDABC9E837Eh 0x00000040 call 00007FDABC9E8348h 0x00000045 lfence 0x00000048 mov edx, dword ptr [7FFE0014h] 0x0000004e lfence 0x00000051 ret 0x00000052 mov esi, edx 0x00000054 pushad 0x00000055 rdtsc
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002295DB1 second address: 0000000002295DB1 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FDABC9BB85Eh 0x0000001d popad 0x0000001e call 00007FDABC9BB41Bh 0x00000023 lfence 0x00000026 rdtsc
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000002293DBD second address: 0000000002293DBD instructions:
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeRDTSC instruction interceptor: First address: 0000000000565DB1 second address: 0000000000565DB1 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007FDABC9BB85Eh 0x0000001d popad 0x0000001e call 00007FDABC9BB41Bh 0x00000023 lfence 0x00000026 rdtsc
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229350C rdtsc
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeLast function: Thread delayed
      Source: shipping Document and Bill Of Landing.exe, 0000000D.00000002.469952233.0000000000740000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeMsi.dllPublishershell32advapi32TEMP=wininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
      Source: shipping Document and Bill Of Landing.exe, 00000001.00000002.296445757.00000000022A0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeMsi.dllPublishershell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
      Source: shipping Document and Bill Of Landing.exe, 00000001.00000002.296445757.00000000022A0000.00000004.00000001.sdmp, shipping Document and Bill Of Landing.exe, 0000000D.00000002.469952233.0000000000740000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229350C rdtsc
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02294174 LdrInitializeThunk,
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02295A88 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022952C8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022952DA mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022923FC mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022963F1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022963F4 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02291BC7 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292415 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02296416 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_0229644C mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_02292440 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 1_2_022930E0 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00562440 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_0056644C mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00566416 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00562415 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005630E0 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005652DA mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005652C8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00565A88 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_00561BC7 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005663F4 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005663F1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeCode function: 13_2_005623FC mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exeProcess created: C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe 'C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe'
      Source: shipping Document and Bill Of Landing.exe, 0000000D.00000002.470425237.0000000000EF0000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: shipping Document and Bill Of Landing.exe, 0000000D.00000002.470425237.0000000000EF0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: shipping Document and Bill Of Landing.exe, 0000000D.00000002.470425237.0000000000EF0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: shipping Document and Bill Of Landing.exe, 0000000D.00000002.470425237.0000000000EF0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion21OS Credential DumpingSecurity Software Discovery621Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryVirtualization/Sandbox Evasion21Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol11Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery31Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      shipping Document and Bill Of Landing.exe52%VirustotalBrowse
      shipping Document and Bill Of Landing.exe30%ReversingLabsWin32.Trojan.Vebzenpak
      shipping Document and Bill Of Landing.exe100%Joe Sandbox ML

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      https://reachglobal-in.com/fdeb/bin_dXfiGRj156.bin0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      reachglobal-in.com
      unknown
      unknowntrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        https://reachglobal-in.com/fdeb/bin_dXfiGRj156.bintrue
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        No contacted IP infos

        General Information

        Joe Sandbox Version:32.0.0 Black Diamond
        Analysis ID:411858
        Start date:12.05.2021
        Start time:08:00:38
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 5m 44s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:shipping Document and Bill Of Landing.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:33
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.rans.troj.evad.winEXE@3/0@43/0
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 7% (good quality ratio 3.2%)
        • Quality average: 26.4%
        • Quality standard deviation: 33.2%
        HCA Information:
        • Successful, ratio: 73%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Excluded IPs from analysis (whitelisted): 40.88.32.150, 92.122.145.220, 104.43.193.48, 168.61.161.212, 13.64.90.137, 23.218.208.56, 20.82.209.183, 92.122.213.194, 92.122.213.247, 20.54.26.129
        • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ris-prod.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        No simulations

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        No context

        ASN

        No context

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        No created / dropped files found

        Static File Info

        General

        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):5.954249338916242
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.15%
        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:shipping Document and Bill Of Landing.exe
        File size:192512
        MD5:7196e6e67a39225a9b73af0c6f6b5b0e
        SHA1:c0da8d54393e9365d1fa0f0a88cf4b52496992b1
        SHA256:4d5e7bff4f749a4f1a357c61098c19c345246b142308f4048aebc6dfdaf4fc73
        SHA512:d977f3ef74715984e3d1f536975a8ab0a361724f2303305abcf6e14895461ef2288096c0f05be69c84656c9cb8eebc51b586e5f38119bae0507102fc1c7209f7
        SSDEEP:3072:OTqw9SpYIjV4Swtm3hdcIYZKZEXaXk/L:OTqw9PSukCKZKaU/
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......M.....................0....................@................

        File Icon

        Icon Hash:20047c7c70f0e004

        Static PE Info

        General

        Entrypoint:0x401ccc
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        DLL Characteristics:
        Time Stamp:0x4DE4F581 [Tue May 31 14:04:49 2011 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:3af66fbc6abd133270fa3848991f9c33

        Entrypoint Preview

        Instruction
        push 0041222Ch
        call 00007FDABCAC72C3h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        xor byte ptr [eax], al
        add byte ptr [eax], al
        inc eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [ebx], al
        pushad
        in eax, dx
        fcom dword ptr [ecx-64B32A36h]
        test dword ptr [edi+3Ah], eax
        mov edx, esi
        and eax, 0000000Fh
        add byte ptr [eax], al
        add byte ptr [ecx], al
        add byte ptr [eax], al
        add byte ptr [edx+00h], al
        push es
        push eax
        add dword ptr [ecx], 41h
        insd
        je 00007FDABCAC734Ch
        jnc 00007FDABCAC7346h
        jc 00007FDABCAC7307h
        add byte ptr [eax], al
        mov ah, 28h
        or eax, 00000003h
        add bh, bh
        int3
        xor dword ptr [eax], eax
        or al, FDh
        salc
        cmp eax, ebx
        call 00007FDA3DEF2BDDh
        sbb dh, ch
        jmp far 1A55h : 7BB8AF0Bh
        cld
        mov edx, 44E62D63h
        mov ebp, BC1E9B46h
        dec ebp
        and byte ptr [edx], al
        cmp cl, byte ptr [edi-53h]
        xor ebx, dword ptr [ecx-48EE309Ah]
        or al, 00h
        stosb
        add byte ptr [eax-2Dh], ah
        xchg eax, ebx
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        pop esp
        add al, 01h
        add byte ptr [edx+02h], ch
        add dword ptr [eax], eax
        add byte ptr [ecx], cl
        add byte ptr [edi+68h], dh
        insb
        jc 00007FDABCAC7346h
        add byte ptr [43000501h], cl
        outsd
        outsd
        jo 00007FDABCAC7307h

        Data Directories

        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x2bc740x28.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2f0000x900.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
        IMAGE_DIRECTORY_ENTRY_IAT0x10000x140.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

        Sections

        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x2b2000x2c000False0.31094082919data6.14682442454IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .data0x2d0000x11f40x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .rsrc0x2f0000x9000x1000False0.16650390625data1.96156765674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

        Resources

        NameRVASizeTypeLanguageCountry
        RT_ICON0x2f7d00x130data
        RT_ICON0x2f4e80x2e8data
        RT_ICON0x2f3c00x128GLS_BINARY_LSB_FIRST
        RT_GROUP_ICON0x2f3900x30data
        RT_VERSION0x2f1500x240dataEnglishUnited States

        Imports

        DLLImport
        MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaStrCat, __vbaSetSystemError, __vbaRecDestruct, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaStrToAnsi, __vbaFpI4, __vbaRecDestructAnsi, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

        Version Infos

        DescriptionData
        Translation0x0409 0x04b0
        InternalNameThe
        FileVersion1.00
        CompanyNameOrigin! CAD
        ProductNameOrigin! CAD
        ProductVersion1.00
        FileDescriptionOrigin!
        OriginalFilenameThe.exe

        Possible Origin

        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States

        Network Behavior

        Snort IDS Alerts

        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        05/12/21-08:02:35.204329ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:02:36.222464ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:02:37.240826ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:02:40.491414ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:02:41.527466ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:02:46.372764ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:02:50.638500ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:02:51.639741ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:02:55.687460ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:02:56.734923ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:00.783150ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:02.811944ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:05.906613ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:06.938617ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:11.031996ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:12.079577ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:16.126441ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:17.141343ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:19.140188ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:22.289451ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:23.327932ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:25.321499ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:27.403886ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:28.393190ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:33.424666ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8
        05/12/21-08:03:34.472475ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.38.8.8.8

        Network Port Distribution

        UDP Packets

        TimestampSource PortDest PortSource IPDest IP
        May 12, 2021 08:01:19.031388044 CEST6493853192.168.2.38.8.8.8
        May 12, 2021 08:01:19.080117941 CEST53649388.8.8.8192.168.2.3
        May 12, 2021 08:01:20.157840967 CEST6015253192.168.2.38.8.8.8
        May 12, 2021 08:01:20.225888968 CEST53601528.8.8.8192.168.2.3
        May 12, 2021 08:01:22.002157927 CEST5754453192.168.2.38.8.8.8
        May 12, 2021 08:01:22.053714037 CEST53575448.8.8.8192.168.2.3
        May 12, 2021 08:01:22.813426971 CEST5598453192.168.2.38.8.8.8
        May 12, 2021 08:01:22.865047932 CEST53559848.8.8.8192.168.2.3
        May 12, 2021 08:01:24.007102966 CEST6418553192.168.2.38.8.8.8
        May 12, 2021 08:01:24.055876970 CEST53641858.8.8.8192.168.2.3
        May 12, 2021 08:01:25.481729031 CEST6511053192.168.2.38.8.8.8
        May 12, 2021 08:01:25.539752007 CEST53651108.8.8.8192.168.2.3
        May 12, 2021 08:01:26.385723114 CEST5836153192.168.2.38.8.8.8
        May 12, 2021 08:01:26.437232018 CEST53583618.8.8.8192.168.2.3
        May 12, 2021 08:01:27.526230097 CEST6349253192.168.2.38.8.8.8
        May 12, 2021 08:01:27.575057030 CEST53634928.8.8.8192.168.2.3
        May 12, 2021 08:01:28.726255894 CEST6083153192.168.2.38.8.8.8
        May 12, 2021 08:01:28.778234005 CEST53608318.8.8.8192.168.2.3
        May 12, 2021 08:01:30.069235086 CEST6010053192.168.2.38.8.8.8
        May 12, 2021 08:01:30.118036032 CEST53601008.8.8.8192.168.2.3
        May 12, 2021 08:01:31.603904009 CEST5319553192.168.2.38.8.8.8
        May 12, 2021 08:01:31.655699968 CEST53531958.8.8.8192.168.2.3
        May 12, 2021 08:01:34.786555052 CEST5014153192.168.2.38.8.8.8
        May 12, 2021 08:01:34.841972113 CEST53501418.8.8.8192.168.2.3
        May 12, 2021 08:01:35.618351936 CEST5302353192.168.2.38.8.8.8
        May 12, 2021 08:01:35.667068005 CEST53530238.8.8.8192.168.2.3
        May 12, 2021 08:01:36.700438976 CEST4956353192.168.2.38.8.8.8
        May 12, 2021 08:01:36.749245882 CEST53495638.8.8.8192.168.2.3
        May 12, 2021 08:01:37.594563961 CEST5135253192.168.2.38.8.8.8
        May 12, 2021 08:01:37.643485069 CEST53513528.8.8.8192.168.2.3
        May 12, 2021 08:01:38.529011011 CEST5934953192.168.2.38.8.8.8
        May 12, 2021 08:01:38.577831984 CEST53593498.8.8.8192.168.2.3
        May 12, 2021 08:01:39.541491032 CEST5708453192.168.2.38.8.8.8
        May 12, 2021 08:01:39.590857983 CEST53570848.8.8.8192.168.2.3
        May 12, 2021 08:01:44.314141989 CEST5882353192.168.2.38.8.8.8
        May 12, 2021 08:01:44.365715981 CEST53588238.8.8.8192.168.2.3
        May 12, 2021 08:01:45.483055115 CEST5756853192.168.2.38.8.8.8
        May 12, 2021 08:01:45.531965971 CEST53575688.8.8.8192.168.2.3
        May 12, 2021 08:01:55.487745047 CEST5054053192.168.2.38.8.8.8
        May 12, 2021 08:01:55.559851885 CEST53505408.8.8.8192.168.2.3
        May 12, 2021 08:02:29.154186964 CEST5436653192.168.2.38.8.8.8
        May 12, 2021 08:02:30.151031017 CEST5436653192.168.2.38.8.8.8
        May 12, 2021 08:02:31.166793108 CEST5436653192.168.2.38.8.8.8
        May 12, 2021 08:02:32.352262974 CEST5303453192.168.2.38.8.8.8
        May 12, 2021 08:02:32.424287081 CEST53530348.8.8.8192.168.2.3
        May 12, 2021 08:02:33.167016029 CEST5436653192.168.2.38.8.8.8
        May 12, 2021 08:02:34.206736088 CEST53543668.8.8.8192.168.2.3
        May 12, 2021 08:02:35.203108072 CEST53543668.8.8.8192.168.2.3
        May 12, 2021 08:02:35.250248909 CEST5776253192.168.2.38.8.8.8
        May 12, 2021 08:02:36.219311953 CEST53543668.8.8.8192.168.2.3
        May 12, 2021 08:02:36.419112921 CEST5776253192.168.2.38.8.8.8
        May 12, 2021 08:02:37.240662098 CEST53543668.8.8.8192.168.2.3
        May 12, 2021 08:02:37.461003065 CEST5776253192.168.2.38.8.8.8
        May 12, 2021 08:02:39.314114094 CEST53577628.8.8.8192.168.2.3
        May 12, 2021 08:02:40.333544970 CEST5543553192.168.2.38.8.8.8
        May 12, 2021 08:02:40.487884045 CEST53577628.8.8.8192.168.2.3
        May 12, 2021 08:02:41.323945045 CEST5543553192.168.2.38.8.8.8
        May 12, 2021 08:02:41.524218082 CEST53577628.8.8.8192.168.2.3
        May 12, 2021 08:02:42.370624065 CEST5543553192.168.2.38.8.8.8
        May 12, 2021 08:02:44.397491932 CEST53554358.8.8.8192.168.2.3
        May 12, 2021 08:02:45.529561043 CEST5071353192.168.2.38.8.8.8
        May 12, 2021 08:02:46.372621059 CEST53554358.8.8.8192.168.2.3
        May 12, 2021 08:02:46.434206009 CEST53554358.8.8.8192.168.2.3
        May 12, 2021 08:02:46.574399948 CEST5071353192.168.2.38.8.8.8
        May 12, 2021 08:02:47.574556112 CEST5071353192.168.2.38.8.8.8
        May 12, 2021 08:02:49.593126059 CEST53507138.8.8.8192.168.2.3
        May 12, 2021 08:02:49.597605944 CEST5613253192.168.2.38.8.8.8
        May 12, 2021 08:02:49.658670902 CEST53561328.8.8.8192.168.2.3
        May 12, 2021 08:02:50.613149881 CEST5898753192.168.2.38.8.8.8
        May 12, 2021 08:02:50.638376951 CEST53507138.8.8.8192.168.2.3
        May 12, 2021 08:02:51.621308088 CEST5898753192.168.2.38.8.8.8
        May 12, 2021 08:02:51.639637947 CEST53507138.8.8.8192.168.2.3
        May 12, 2021 08:02:52.668411970 CEST5898753192.168.2.38.8.8.8
        May 12, 2021 08:02:54.678493023 CEST53589878.8.8.8192.168.2.3
        May 12, 2021 08:02:55.687346935 CEST53589878.8.8.8192.168.2.3
        May 12, 2021 08:02:55.696567059 CEST5657953192.168.2.38.8.8.8
        May 12, 2021 08:02:56.718844891 CEST5657953192.168.2.38.8.8.8
        May 12, 2021 08:02:56.734673023 CEST53589878.8.8.8192.168.2.3
        May 12, 2021 08:02:57.762463093 CEST5657953192.168.2.38.8.8.8
        May 12, 2021 08:02:58.541511059 CEST6063353192.168.2.38.8.8.8
        May 12, 2021 08:02:58.606501102 CEST53606338.8.8.8192.168.2.3
        May 12, 2021 08:02:59.762057066 CEST53565798.8.8.8192.168.2.3
        May 12, 2021 08:03:00.782874107 CEST53565798.8.8.8192.168.2.3
        May 12, 2021 08:03:00.853844881 CEST6129253192.168.2.38.8.8.8
        May 12, 2021 08:03:01.841365099 CEST6129253192.168.2.38.8.8.8
        May 12, 2021 08:03:02.811834097 CEST53565798.8.8.8192.168.2.3
        May 12, 2021 08:03:02.872667074 CEST6129253192.168.2.38.8.8.8
        May 12, 2021 08:03:04.917594910 CEST53612928.8.8.8192.168.2.3
        May 12, 2021 08:03:05.906464100 CEST53612928.8.8.8192.168.2.3
        May 12, 2021 08:03:05.970653057 CEST6361953192.168.2.38.8.8.8
        May 12, 2021 08:03:06.937756062 CEST53612928.8.8.8192.168.2.3
        May 12, 2021 08:03:06.966382980 CEST6361953192.168.2.38.8.8.8
        May 12, 2021 08:03:08.013849020 CEST6361953192.168.2.38.8.8.8
        May 12, 2021 08:03:10.035644054 CEST53636198.8.8.8192.168.2.3
        May 12, 2021 08:03:11.031840086 CEST53636198.8.8.8192.168.2.3
        May 12, 2021 08:03:11.059521914 CEST6493853192.168.2.38.8.8.8
        May 12, 2021 08:03:12.060440063 CEST6493853192.168.2.38.8.8.8
        May 12, 2021 08:03:12.079459906 CEST53636198.8.8.8192.168.2.3
        May 12, 2021 08:03:13.076947927 CEST6493853192.168.2.38.8.8.8
        May 12, 2021 08:03:13.364254951 CEST6194653192.168.2.38.8.8.8
        May 12, 2021 08:03:13.421365976 CEST53619468.8.8.8192.168.2.3
        May 12, 2021 08:03:15.076543093 CEST6493853192.168.2.38.8.8.8
        May 12, 2021 08:03:16.107876062 CEST53649388.8.8.8192.168.2.3
        May 12, 2021 08:03:16.125893116 CEST53649388.8.8.8192.168.2.3
        May 12, 2021 08:03:17.141036034 CEST53649388.8.8.8192.168.2.3
        May 12, 2021 08:03:17.201738119 CEST6491053192.168.2.38.8.8.8
        May 12, 2021 08:03:17.604834080 CEST5212353192.168.2.38.8.8.8
        May 12, 2021 08:03:17.666291952 CEST53521238.8.8.8192.168.2.3
        May 12, 2021 08:03:18.217997074 CEST6491053192.168.2.38.8.8.8
        May 12, 2021 08:03:19.140124083 CEST53649388.8.8.8192.168.2.3
        May 12, 2021 08:03:19.264046907 CEST6491053192.168.2.38.8.8.8
        May 12, 2021 08:03:21.264622927 CEST6491053192.168.2.38.8.8.8
        May 12, 2021 08:03:21.267046928 CEST53649108.8.8.8192.168.2.3
        May 12, 2021 08:03:22.285006046 CEST53649108.8.8.8192.168.2.3
        May 12, 2021 08:03:22.291197062 CEST5613053192.168.2.38.8.8.8
        May 12, 2021 08:03:23.327791929 CEST53649108.8.8.8192.168.2.3
        May 12, 2021 08:03:23.341129065 CEST5613053192.168.2.38.8.8.8
        May 12, 2021 08:03:24.327455997 CEST5613053192.168.2.38.8.8.8
        May 12, 2021 08:03:25.321345091 CEST53649108.8.8.8192.168.2.3
        May 12, 2021 08:03:26.345091105 CEST53561308.8.8.8192.168.2.3
        May 12, 2021 08:03:27.366398096 CEST5633853192.168.2.38.8.8.8
        May 12, 2021 08:03:27.403759003 CEST53561308.8.8.8192.168.2.3
        May 12, 2021 08:03:28.375382900 CEST5633853192.168.2.38.8.8.8
        May 12, 2021 08:03:28.393043995 CEST53561308.8.8.8192.168.2.3
        May 12, 2021 08:03:29.421453953 CEST5633853192.168.2.38.8.8.8
        May 12, 2021 08:03:31.420943975 CEST53563388.8.8.8192.168.2.3
        May 12, 2021 08:03:32.444873095 CEST5942053192.168.2.38.8.8.8
        May 12, 2021 08:03:33.424427986 CEST53563388.8.8.8192.168.2.3
        May 12, 2021 08:03:33.437156916 CEST5942053192.168.2.38.8.8.8
        May 12, 2021 08:03:34.437467098 CEST5942053192.168.2.38.8.8.8
        May 12, 2021 08:03:34.472316980 CEST53563388.8.8.8192.168.2.3
        May 12, 2021 08:03:36.453270912 CEST5942053192.168.2.38.8.8.8

        ICMP Packets

        TimestampSource IPDest IPChecksumCodeType
        May 12, 2021 08:02:35.204329014 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:02:36.222464085 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:02:37.240825891 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:02:40.491414070 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:02:41.527466059 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:02:46.372764111 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:02:50.638499975 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:02:51.639740944 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:02:55.687459946 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:02:56.734922886 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:00.783149958 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:02.811944008 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:05.906613111 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:06.938616991 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:11.031996012 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:12.079576969 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:16.126441002 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:17.141343117 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:19.140187979 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:22.289450884 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:23.327931881 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:25.321499109 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:27.403886080 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:28.393189907 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:33.424665928 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable
        May 12, 2021 08:03:34.472475052 CEST192.168.2.38.8.8.8cff5(Port unreachable)Destination Unreachable

        DNS Queries

        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
        May 12, 2021 08:02:29.154186964 CEST192.168.2.38.8.8.80x5a7cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:30.151031017 CEST192.168.2.38.8.8.80x5a7cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:31.166793108 CEST192.168.2.38.8.8.80x5a7cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:33.167016029 CEST192.168.2.38.8.8.80x5a7cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:35.250248909 CEST192.168.2.38.8.8.80x681cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:36.419112921 CEST192.168.2.38.8.8.80x681cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:37.461003065 CEST192.168.2.38.8.8.80x681cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:40.333544970 CEST192.168.2.38.8.8.80x9ec5Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:41.323945045 CEST192.168.2.38.8.8.80x9ec5Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:42.370624065 CEST192.168.2.38.8.8.80x9ec5Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:45.529561043 CEST192.168.2.38.8.8.80x6936Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:46.574399948 CEST192.168.2.38.8.8.80x6936Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:47.574556112 CEST192.168.2.38.8.8.80x6936Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:50.613149881 CEST192.168.2.38.8.8.80x214cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:51.621308088 CEST192.168.2.38.8.8.80x214cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:52.668411970 CEST192.168.2.38.8.8.80x214cStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:55.696567059 CEST192.168.2.38.8.8.80x72d7Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:56.718844891 CEST192.168.2.38.8.8.80x72d7Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:02:57.762463093 CEST192.168.2.38.8.8.80x72d7Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:00.853844881 CEST192.168.2.38.8.8.80xf2a4Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:01.841365099 CEST192.168.2.38.8.8.80xf2a4Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:02.872667074 CEST192.168.2.38.8.8.80xf2a4Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:05.970653057 CEST192.168.2.38.8.8.80xf19Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:06.966382980 CEST192.168.2.38.8.8.80xf19Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:08.013849020 CEST192.168.2.38.8.8.80xf19Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:11.059521914 CEST192.168.2.38.8.8.80xa27bStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:12.060440063 CEST192.168.2.38.8.8.80xa27bStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:13.076947927 CEST192.168.2.38.8.8.80xa27bStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:15.076543093 CEST192.168.2.38.8.8.80xa27bStandard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:17.201738119 CEST192.168.2.38.8.8.80x2838Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:18.217997074 CEST192.168.2.38.8.8.80x2838Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:19.264046907 CEST192.168.2.38.8.8.80x2838Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:21.264622927 CEST192.168.2.38.8.8.80x2838Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:22.291197062 CEST192.168.2.38.8.8.80x48c9Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:23.341129065 CEST192.168.2.38.8.8.80x48c9Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:24.327455997 CEST192.168.2.38.8.8.80x48c9Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:27.366398096 CEST192.168.2.38.8.8.80x9d40Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:28.375382900 CEST192.168.2.38.8.8.80x9d40Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:29.421453953 CEST192.168.2.38.8.8.80x9d40Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:32.444873095 CEST192.168.2.38.8.8.80x89c0Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:33.437156916 CEST192.168.2.38.8.8.80x89c0Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:34.437467098 CEST192.168.2.38.8.8.80x89c0Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)
        May 12, 2021 08:03:36.453270912 CEST192.168.2.38.8.8.80x89c0Standard query (0)reachglobal-in.comA (IP address)IN (0x0001)

        DNS Answers

        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
        May 12, 2021 08:02:34.206736088 CEST8.8.8.8192.168.2.30x5a7cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:35.203108072 CEST8.8.8.8192.168.2.30x5a7cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:36.219311953 CEST8.8.8.8192.168.2.30x5a7cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:37.240662098 CEST8.8.8.8192.168.2.30x5a7cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:39.314114094 CEST8.8.8.8192.168.2.30x681cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:40.487884045 CEST8.8.8.8192.168.2.30x681cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:41.524218082 CEST8.8.8.8192.168.2.30x681cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:44.397491932 CEST8.8.8.8192.168.2.30x9ec5Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:46.372621059 CEST8.8.8.8192.168.2.30x9ec5Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:46.434206009 CEST8.8.8.8192.168.2.30x9ec5Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:49.593126059 CEST8.8.8.8192.168.2.30x6936Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:50.638376951 CEST8.8.8.8192.168.2.30x6936Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:51.639637947 CEST8.8.8.8192.168.2.30x6936Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:54.678493023 CEST8.8.8.8192.168.2.30x214cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:55.687346935 CEST8.8.8.8192.168.2.30x214cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:56.734673023 CEST8.8.8.8192.168.2.30x214cServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:02:59.762057066 CEST8.8.8.8192.168.2.30x72d7Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:00.782874107 CEST8.8.8.8192.168.2.30x72d7Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:02.811834097 CEST8.8.8.8192.168.2.30x72d7Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:04.917594910 CEST8.8.8.8192.168.2.30xf2a4Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:05.906464100 CEST8.8.8.8192.168.2.30xf2a4Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:06.937756062 CEST8.8.8.8192.168.2.30xf2a4Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:10.035644054 CEST8.8.8.8192.168.2.30xf19Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:11.031840086 CEST8.8.8.8192.168.2.30xf19Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:12.079459906 CEST8.8.8.8192.168.2.30xf19Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:16.107876062 CEST8.8.8.8192.168.2.30xa27bServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:16.125893116 CEST8.8.8.8192.168.2.30xa27bServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:17.141036034 CEST8.8.8.8192.168.2.30xa27bServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:19.140124083 CEST8.8.8.8192.168.2.30xa27bServer failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:21.267046928 CEST8.8.8.8192.168.2.30x2838Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:22.285006046 CEST8.8.8.8192.168.2.30x2838Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:23.327791929 CEST8.8.8.8192.168.2.30x2838Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:25.321345091 CEST8.8.8.8192.168.2.30x2838Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:26.345091105 CEST8.8.8.8192.168.2.30x48c9Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:27.403759003 CEST8.8.8.8192.168.2.30x48c9Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:28.393043995 CEST8.8.8.8192.168.2.30x48c9Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:31.420943975 CEST8.8.8.8192.168.2.30x9d40Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:33.424427986 CEST8.8.8.8192.168.2.30x9d40Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)
        May 12, 2021 08:03:34.472316980 CEST8.8.8.8192.168.2.30x9d40Server failure (2)reachglobal-in.comnonenoneA (IP address)IN (0x0001)

        Code Manipulations

        Statistics

        Behavior

        Click to jump to process

        System Behavior

        General

        Start time:08:01:26
        Start date:12/05/2021
        Path:C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe'
        Imagebase:0x400000
        File size:192512 bytes
        MD5 hash:7196E6E67A39225A9B73AF0C6F6B5B0E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Visual Basic
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.296439672.0000000002290000.00000040.00000001.sdmp, Author: Joe Security
        Reputation:low

        General

        Start time:08:02:09
        Start date:12/05/2021
        Path:C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\shipping Document and Bill Of Landing.exe'
        Imagebase:0x400000
        File size:192512 bytes
        MD5 hash:7196E6E67A39225A9B73AF0C6F6B5B0E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000D.00000002.469283991.0000000000560000.00000040.00000001.sdmp, Author: Joe Security
        Reputation:low

        Disassembly

        Code Analysis

        Reset < >