Loading ...

Play interactive tourEdit tour

Analysis Report DOCUMENTOS CORREOS.exe

Overview

General Information

Sample Name:DOCUMENTOS CORREOS.exe
Analysis ID:430603
MD5:c73ab52ccb3b77ffda43ab3764fff1ab
SHA1:99e3f024e741388c0a788df19fb87bf105ab84f4
SHA256:8fe1d7d807635615314910e8145e2e050afd648a5eb7be85908563b30290e2fd
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to hide a thread from the debugger
Executable has a suspicious name (potential lure to open the executable)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • DOCUMENTOS CORREOS.exe (PID: 5320 cmdline: 'C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe' MD5: C73AB52CCB3B77FFDA43AB3764FFF1AB)
    • DOCUMENTOS CORREOS.exe (PID: 5392 cmdline: 'C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe' MD5: C73AB52CCB3B77FFDA43AB3764FFF1AB)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://www.mediafire.com/file/md0mc3zocq6uh6b/gbam_encrypted_65A39A0.bin/file\u0000\u0000", "User Agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.279722809.0000000000620000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
    00000004.00000000.278693331.0000000000560000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
      00000004.00000002.486013693.0000000000560000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
        Process Memory Space: DOCUMENTOS CORREOS.exe PID: 5392JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
          Process Memory Space: DOCUMENTOS CORREOS.exe PID: 5392JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: DOCUMENTOS CORREOS.exeAvira: detected
            Found malware configurationShow sources
            Source: 00000000.00000002.279722809.0000000000620000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://www.mediafire.com/file/md0mc3zocq6uh6b/gbam_encrypted_65A39A0.bin/file\u0000\u0000", "User Agent": "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: DOCUMENTOS CORREOS.exeVirustotal: Detection: 75%Perma Link
            Source: DOCUMENTOS CORREOS.exeReversingLabs: Detection: 86%
            Source: 0.0.DOCUMENTOS CORREOS.exe.400000.0.unpackAvira: Label: TR/AD.VBCryptor.vjznr
            Source: 4.0.DOCUMENTOS CORREOS.exe.400000.0.unpackAvira: Label: TR/AD.VBCryptor.vjznr
            Source: DOCUMENTOS CORREOS.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: unknownHTTPS traffic detected: 104.16.203.237:443 -> 192.168.2.3:49723 version: TLS 1.2

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://www.mediafire.com/file/md0mc3zocq6uh6b/gbam_encrypted_65A39A0.bin/file
            Source: Joe Sandbox ViewIP Address: 104.16.203.237 104.16.203.237
            Source: Joe Sandbox ViewIP Address: 104.16.203.237 104.16.203.237
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_0056A75D InternetReadFile,
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: <!DOCTYPE html> <html lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> equals www.facebook.com (Facebook)
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: </script> <noscript><img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=542578585845936&ev=PageView&noscript=1" alt="Facebook"/></noscript> equals www.facebook.com (Facebook)
            Source: unknownDNS traffic detected: queries for: www.mediafire.com
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Open
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: https://static.cloudflareinsights.com/beacon.min.js
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/recaptcha/api.js
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=UA-829541-1
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: https://www.googletagmanager.com/gtm.js?id=
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: https://www.googletagmanager.com/ns.html?id=GTM-53LP4T
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: https://www.mediafire.com
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.485885466.000000000019A000.00000004.00000001.sdmpString found in binary or memory: https://www.mediafire.com/file/md0mc3zocq6uh6b/gbam_encrypted_65A39
            Source: DOCUMENTOS CORREOS.exeString found in binary or memory: https://www.mediafire.com/file/md0mc3zocq6uh6b/gbam_encrypted_65A39A0.bin/file
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpString found in binary or memory: https://www.mediafire.com/images/logos/mf_logo250x250.png
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
            Source: unknownHTTPS traffic detected: 104.16.203.237:443 -> 192.168.2.3:49723 version: TLS 1.2

            System Summary:

            barindex
            Potential malicious icon foundShow sources
            Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
            Executable has a suspicious name (potential lure to open the executable)Show sources
            Source: DOCUMENTOS CORREOS.exeStatic file information: Suspicious name
            Initial sample is a PE file and has a suspicious nameShow sources
            Source: initial sampleStatic PE information: Filename: DOCUMENTOS CORREOS.exe
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_0056A2A9 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_00560636 NtSetInformationThread,
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_00560526 NtSetInformationThread,
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: String function: 00401450 appears 32 times
            Source: DOCUMENTOS CORREOS.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: DOCUMENTOS CORREOS.exe, 00000000.00000002.279069921.000000000041D000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLepidop6.exe vs DOCUMENTOS CORREOS.exe
            Source: DOCUMENTOS CORREOS.exe, 00000000.00000002.280743215.00000000021E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLepidop6.exeFE2X vs DOCUMENTOS CORREOS.exe
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.493784317.000000001EFB0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs DOCUMENTOS CORREOS.exe
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.493701104.000000001EE60000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemswsock.dll.muij% vs DOCUMENTOS CORREOS.exe
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000000.277944455.000000000041D000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLepidop6.exe vs DOCUMENTOS CORREOS.exe
            Source: DOCUMENTOS CORREOS.exeBinary or memory string: OriginalFilenameLepidop6.exe vs DOCUMENTOS CORREOS.exe
            Source: DOCUMENTOS CORREOS.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@3/0@1/2
            Source: DOCUMENTOS CORREOS.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: DOCUMENTOS CORREOS.exeVirustotal: Detection: 75%
            Source: DOCUMENTOS CORREOS.exeReversingLabs: Detection: 86%
            Source: unknownProcess created: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe 'C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe'
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess created: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe 'C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe'
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess created: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe 'C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe'

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000000.00000002.279722809.0000000000620000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000000.278693331.0000000000560000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.486013693.0000000000560000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DOCUMENTOS CORREOS.exe PID: 5392, type: MEMORY
            Yara detected VB6 Downloader GenericShow sources
            Source: Yara matchFile source: Process Memory Space: DOCUMENTOS CORREOS.exe PID: 5392, type: MEMORY
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 0_2_004114EA push dword ptr [edi+3ABAD03Ah]; iretd
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 0_2_00408972 push cs; iretd
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 0_2_004055E0 push esi; retf
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 0_2_00409A4B pushfd ; retf
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 0_2_00409E31 push 2955CA9Fh; ret
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 0_2_0040573B push cs; iretd
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 0_2_00406F87 push D0AFF143h; ret
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe TID: 4724Thread sleep count: 107 > 30
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe TID: 4724Thread sleep time: -1070000s >= -30000s
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeLast function: Thread delayed

            Anti Debugging:

            barindex
            Contains functionality to hide a thread from the debuggerShow sources
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_00560636 NtSetInformationThread 000000FE,00000011,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000
            Hides threads from debuggersShow sources
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_00561D70 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_00564403 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_00568B2A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_00562BF7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_00568190 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeCode function: 4_2_00569886 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exeProcess created: C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe 'C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe'
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.487569983.0000000000FB0000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.487569983.0000000000FB0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.487569983.0000000000FB0000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: DOCUMENTOS CORREOS.exe, 00000004.00000002.487569983.0000000000FB0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery2Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsSystem Information Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            DOCUMENTOS CORREOS.exe75%VirustotalBrowse
            DOCUMENTOS CORREOS.exe86%ReversingLabsWin32.Trojan.Guloader
            DOCUMENTOS CORREOS.exe100%AviraTR/AD.VBCryptor.vjznr

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            0.0.DOCUMENTOS CORREOS.exe.400000.0.unpack100%AviraTR/AD.VBCryptor.vjznrDownload File
            4.0.DOCUMENTOS CORREOS.exe.400000.0.unpack100%AviraTR/AD.VBCryptor.vjznrDownload File
            0.2.DOCUMENTOS CORREOS.exe.400000.0.unpack100%AviraHEUR/AGEN.1134906Download File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            https://static.cloudflareinsights.com/beacon.min.js0%URL Reputationsafe
            https://static.cloudflareinsights.com/beacon.min.js0%URL Reputationsafe
            https://static.cloudflareinsights.com/beacon.min.js0%URL Reputationsafe
            https://static.cloudflareinsights.com/beacon.min.js0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            www.mediafire.com
            104.16.203.237
            truefalse
              high

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              https://www.mediafire.com/file/md0mc3zocq6uh6b/gbam_encrypted_65A39A0.bin/filefalse
                high

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://www.mediafire.comDOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpfalse
                  high
                  https://www.mediafire.com/file/md0mc3zocq6uh6b/gbam_encrypted_65A39A0.bin/fileDOCUMENTOS CORREOS.exefalse
                    high
                    https://static.cloudflareinsights.com/beacon.min.jsDOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://www.mediafire.com/file/md0mc3zocq6uh6b/gbam_encrypted_65A39DOCUMENTOS CORREOS.exe, 00000004.00000002.485885466.000000000019A000.00000004.00000001.sdmpfalse
                      high
                      https://www.mediafire.com/images/logos/mf_logo250x250.pngDOCUMENTOS CORREOS.exe, 00000004.00000002.488373545.0000000002580000.00000004.00000001.sdmpfalse
                        high

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        104.16.203.237
                        www.mediafire.comUnited States
                        13335CLOUDFLARENETUSfalse

                        Private

                        IP
                        192.168.2.1

                        General Information

                        Joe Sandbox Version:32.0.0 Black Diamond
                        Analysis ID:430603
                        Start date:07.06.2021
                        Start time:17:26:33
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 15s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:DOCUMENTOS CORREOS.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:22
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.rans.troj.evad.winEXE@3/0@1/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 13.7% (good quality ratio 10.9%)
                        • Quality average: 43.3%
                        • Quality standard deviation: 26.4%
                        HCA Information:
                        • Successful, ratio: 55%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                        • TCP Packets have been reduced to 100
                        • Excluded IPs from analysis (whitelisted): 204.79.197.200, 13.107.21.200, 93.184.220.29, 40.88.32.150, 104.43.193.48, 92.122.145.220, 13.64.90.137, 104.43.139.144, 104.42.151.234, 23.57.80.111, 20.82.210.154, 2.20.142.210, 2.20.142.209, 92.122.213.194, 92.122.213.247, 20.54.26.129
                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, cs9.wac.phicdn.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing network information.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        17:28:09API Interceptor107x Sleep call for process: DOCUMENTOS CORREOS.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        104.16.203.237http://download2224.mediafire.com/5rqvtr7atabg/4ufxk777x7qfcdd/FastStoneCapturePortableTW_9.0_azo.exeGet hashmaliciousBrowse
                        • www.mediafire.com/images/icons/myfiles/default.png
                        http://download2134.mediafire.com/6d7pu7669u7g/5vpr2kr4s29utk7/PAG004.tgzGet hashmaliciousBrowse
                        • www.mediafire.com/download_repair.php?flag=3&dkey=6d7pu7669u7&qkey=5vpr2kr4s29utk7&ip=84.17.52.40&ref=3
                        http://www.mediafire.com/file/cnwik2kgdebsisy/PAG0002.tgz/fileGet hashmaliciousBrowse
                        • www.mediafire.com/images/icons/myfiles/default.png
                        http://www.mediafire.com/file/4xm9i7c25z2wtqj/Parsel+Detaylar%C4%B1.7z/fileGet hashmaliciousBrowse
                        • www.mediafire.com/file/4xm9i7c25z2wtqj/Parsel+Detaylar%C4%B1.7z/file
                        https://download1580.mediafire.com/4xprc4caulsg/qpuaxqx0pdqcik8/Solicitud+de+presupuesto.7zGet hashmaliciousBrowse
                        • www.mediafire.com/upgrade
                        http://www.mediafire.com/file/f28ppsxzjuy1xsb/UPSRO+2809203321.7z/fileGet hashmaliciousBrowse
                        • www.mediafire.com/file/f28ppsxzjuy1xsb/UPSRO+2809203321.7z/file
                        http://www.mediafire.com/file/xn60pc8souxfqax/fac_01200.7z/fileGet hashmaliciousBrowse
                        • www.mediafire.com/file/xn60pc8souxfqax/fac_01200.7z/file
                        http://www.mediafire.com/file/cmzz439j3nr3cp9/TNT1.7z/fileGet hashmaliciousBrowse
                        • www.mediafire.com/file/cmzz439j3nr3cp9/TNT1.7z/file
                        http://www.mediafire.com/file/59pevvifny3y35x/Comanda+de+achizitie.7z/fileGet hashmaliciousBrowse
                        • www.mediafire.com/file/59pevvifny3y35x/Comanda+de+achizitie.7z/file
                        https://download2272.mediafire.com/dee0x8gd9lhg/kfsfaocy6dzql61/Cheque+Copy.7zGet hashmaliciousBrowse
                        • www.mediafire.com/about/
                        http://www.mediafire.com/file/449cj5l0pxynnlh/Endesa-Facturacion20201806.zipGet hashmaliciousBrowse
                        • www.mediafire.com/file/449cj5l0pxynnlh/Endesa-Facturacion20201806.zip
                        http://cartadelcobro.com/pdf_carta_cobro-23-04-2020/Get hashmaliciousBrowse
                        • www.mediafire.com/file/ss26bj0bvghigyj/Cobro.zip/file

                        Domains

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        www.mediafire.comDOCUMENTOS CORREOS.exeGet hashmaliciousBrowse
                        • 104.16.202.237
                        BRnRfGXrIP.exeGet hashmaliciousBrowse
                        • 104.16.202.237
                        http://download2224.mediafire.com/5rqvtr7atabg/4ufxk777x7qfcdd/FastStoneCapturePortableTW_9.0_azo.exeGet hashmaliciousBrowse
                        • 104.16.202.237
                        Autuacao-2305148784007A.exeGet hashmaliciousBrowse
                        • 104.16.202.237
                        http://download2134.mediafire.com/6d7pu7669u7g/5vpr2kr4s29utk7/PAG004.tgzGet hashmaliciousBrowse
                        • 104.16.203.237
                        http://www.mediafire.com/file/cnwik2kgdebsisy/PAG0002.tgz/fileGet hashmaliciousBrowse
                        • 104.16.203.237
                        http://download1716.mediafire.com/4ovq1dagh3qg/llznllwcu118fj5/New+Order.tgzGet hashmaliciousBrowse
                        • 104.16.202.237
                        http://www.mediafire.com/file/4xm9i7c25z2wtqj/Parsel+Detaylar%C4%B1.7z/fileGet hashmaliciousBrowse
                        • 104.16.203.237
                        http://www.mediafire.com/file/4xm9i7c25z2wtqj/Parsel+Detaylar%C4%B1.7z/fileGet hashmaliciousBrowse
                        • 104.16.202.237
                        https://download1580.mediafire.com/4xprc4caulsg/qpuaxqx0pdqcik8/Solicitud+de+presupuesto.7zGet hashmaliciousBrowse
                        • 104.16.203.237
                        https://download1582.mediafire.com/ntorjrq3jvwg/xpqdxdvhyo668qg/Android+WhatsApp+to+iPhone+Transfer+-+DU+x32.zipGet hashmaliciousBrowse
                        • 104.16.202.237
                        http://www.mediafire.com/file/f28ppsxzjuy1xsb/UPSRO+2809203321.7z/fileGet hashmaliciousBrowse
                        • 104.16.203.237
                        https://www.mediafire.com/file/que9zdctac0t9w8/Cerere_de_achizitie.7z/fileGet hashmaliciousBrowse
                        • 104.16.203.237
                        http://www.mediafire.com/file/69twv65ip7pnmit/Pago+de+septiembre.7z/fileGet hashmaliciousBrowse
                        • 104.16.202.237
                        http://www.mediafire.com/file/xn60pc8souxfqax/fac_01200.7z/fileGet hashmaliciousBrowse
                        • 104.16.203.237
                        http://www.mediafire.com/file/cmzz439j3nr3cp9/TNT1.7z/fileGet hashmaliciousBrowse
                        • 104.16.203.237
                        http://download1525.mediafire.com/a2niozn5iheg/ayhephnsi8hnlgv/test.exeGet hashmaliciousBrowse
                        • 104.16.202.237
                        https://www.mediafire.com/file/q4ic4hzhjjsvrdr/Posta+Romana+12082033201829.7z/fileGet hashmaliciousBrowse
                        • 104.16.202.237
                        https://www.mediafire.com/file/q4ic4hzhjjsvrdr/Posta+Romana+12082033201829.7z/fileGet hashmaliciousBrowse
                        • 104.16.203.237

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        CLOUDFLARENETUSDOCUMENTOS CORREOS.exeGet hashmaliciousBrowse
                        • 104.16.202.237
                        DOCUMENTOS CORREOS.exeGet hashmaliciousBrowse
                        • 104.16.202.237
                        BBS FX.xlsxGet hashmaliciousBrowse
                        • 104.26.0.222
                        PAYMENT RECEIPT #FO1420111.exeGet hashmaliciousBrowse
                        • 104.21.19.200
                        StubV4.exeGet hashmaliciousBrowse
                        • 172.67.188.154
                        Order No. BCM #03122020.exeGet hashmaliciousBrowse
                        • 104.21.93.53
                        Confirmation Transfer Note MT103 Ref#8892626882.exeGet hashmaliciousBrowse
                        • 172.67.188.154
                        Shipping documents & Proforma invoice.exeGet hashmaliciousBrowse
                        • 172.67.188.154
                        TT500202106029589435472.exeGet hashmaliciousBrowse
                        • 104.21.19.200
                        Payment Swift copy MT103.exeGet hashmaliciousBrowse
                        • 104.21.19.200
                        plagin.exeGet hashmaliciousBrowse
                        • 104.25.233.53
                        New Order.exeGet hashmaliciousBrowse
                        • 172.67.155.26
                        rtgs_2021-06-07_02-01.exeGet hashmaliciousBrowse
                        • 104.21.93.70
                        FORM C1.xlsxGet hashmaliciousBrowse
                        • 104.21.61.102
                        rtgs_pdf.exeGet hashmaliciousBrowse
                        • 104.21.93.70
                        triage_dropped_file.exeGet hashmaliciousBrowse
                        • 23.227.38.74
                        sample.EXEGet hashmaliciousBrowse
                        • 172.67.206.104
                        CSTB FR ORDER 789.exeGet hashmaliciousBrowse
                        • 172.67.193.3
                        SC-BANK TRANSFER TT-COPY-FRIDAY0621_pdf.exeGet hashmaliciousBrowse
                        • 172.67.188.154
                        PAYMENT MT103 REMITTANCE SWIFT.exeGet hashmaliciousBrowse
                        • 104.21.19.200

                        JA3 Fingerprints

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        37f463bf4616ecd445d4a1937da06e19OewA04QDBh.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        plagin.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        statistic-608048546.xlsGet hashmaliciousBrowse
                        • 104.16.203.237
                        Zd1j3hnY8u.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        HNUQajtypz.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        SOA_Outstanding_Balance.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        85OpNw6eXm.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        QUMuMnixcc.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        riy66qgtIR.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        R43YJpd6nj.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        RFQ.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        #Ud83d#Udcde_#U25b6#Ufe0fPlay_to_Listen.htmGet hashmaliciousBrowse
                        • 104.16.203.237
                        SecuriteInfo.com.Trojan.DownLoader39.38629.28832.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        3vuLRePalU.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        sZBBKNIKMX.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        lnD4uofi2O.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        KWLMpN39y2.exeGet hashmaliciousBrowse
                        • 104.16.203.237
                        JJ1PbTh0SP.dllGet hashmaliciousBrowse
                        • 104.16.203.237
                        Secured-Message_7634-7.htmlGet hashmaliciousBrowse
                        • 104.16.203.237
                        treetop-payroll-075491-pdf.HtmLGet hashmaliciousBrowse
                        • 104.16.203.237

                        Dropped Files

                        No context

                        Created / dropped Files

                        No created / dropped files found

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):4.338112761945723
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.15%
                        • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:DOCUMENTOS CORREOS.exe
                        File size:122880
                        MD5:c73ab52ccb3b77ffda43ab3764fff1ab
                        SHA1:99e3f024e741388c0a788df19fb87bf105ab84f4
                        SHA256:8fe1d7d807635615314910e8145e2e050afd648a5eb7be85908563b30290e2fd
                        SHA512:80a6e6794465186450b8e8776de0b0598459319b42494a4937da373caa2dae63f12e197130c76edb76d3f5cba86c611f5eaa221eb62152089a682d0ff33decfe
                        SSDEEP:1536:Qth8H3nVcq+YnRThE1K/ZZusX0b/g8uz:QU3n6pYFRu+08p
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........y.....................................Rich............PE..L....e`K..................... ......$.............@................

                        File Icon

                        Icon Hash:20047c7c70f0e004

                        Static PE Info

                        General

                        Entrypoint:0x401524
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                        DLL Characteristics:
                        Time Stamp:0x4B6065C8 [Wed Jan 27 16:11:52 2010 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f40fcd81751084aec6b61b1899b8625f

                        Entrypoint Preview

                        Instruction
                        push 004130C0h
                        call 00007F8C10E238E3h
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        xor byte ptr [eax], al
                        add byte ptr [eax], al
                        cmp byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        sbb byte ptr [ecx-415C509Ch], bl
                        nop
                        inc edx
                        cdq
                        mov dword ptr [E9366C07h], eax
                        jmp 00007F8C10E238EFh
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add dword ptr [eax], eax
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        xor byte ptr [edi+ecx+02h], ch
                        inc ebx
                        inc ecx
                        push ebx
                        dec ecx
                        push esp
                        add byte ptr [ebx], ch
                        add al, byte ptr [eax]
                        add byte ptr [eax], al
                        add bh, bh
                        int3
                        xor dword ptr [eax], eax
                        inc esp
                        das
                        mov ch, 2Eh

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x1b4040x28.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x934.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
                        IMAGE_DIRECTORY_ENTRY_IAT0x10000x170.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x1a9780x1b000False0.30138708044data4.55242334496IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .data0x1c0000xb4c0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .rsrc0x1d0000x9340x1000False0.173828125data1.99326688739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        RT_ICON0x1d8040x130data
                        RT_ICON0x1d51c0x2e8data
                        RT_ICON0x1d3f40x128GLS_BINARY_LSB_FIRST
                        RT_GROUP_ICON0x1d3c40x30data
                        RT_VERSION0x1d1500x274dataEnglishUnited States

                        Imports

                        DLLImport
                        MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, _adj_fprem1, __vbaStrCat, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaLateMemSt, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaCyStr, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, __vbaObjVar, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, __vbaDerefAry1, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarDup, __vbaLateMemCallLd, _CIatan, __vbaAryCopy, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                        Version Infos

                        DescriptionData
                        Translation0x0409 0x04b0
                        InternalNameLepidop6
                        FileVersion1.00
                        CompanyNameNERBing
                        CommentsNERBing
                        ProductNametragtede
                        ProductVersion1.00
                        FileDescriptionOverdre
                        OriginalFilenameLepidop6.exe

                        Possible Origin

                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States

                        Network Behavior

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Jun 7, 2021 17:28:09.059087992 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.102716923 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.102834940 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.131134987 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.173614025 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.182578087 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.182632923 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.182650089 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.182667017 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.182724953 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.182764053 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.315078020 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.357559919 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.362318993 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.364324093 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.387787104 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.430459023 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.679585934 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.679807901 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.702694893 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.745126009 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.965553045 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.965604067 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.965642929 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.965668917 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.965677023 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.965734005 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.965874910 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.965917110 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.965986967 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.966964006 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.967015028 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.967042923 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.967077971 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.967994928 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.968036890 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.968117952 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.969140053 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.969178915 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.969201088 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.969218016 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.970068932 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.970112085 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.970177889 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.971131086 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.971183062 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.971194983 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.971226931 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.972162962 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.972206116 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.972230911 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.972260952 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.973283052 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.973325968 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.973422050 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.974281073 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.974328041 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.974371910 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.974395990 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.975326061 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.975369930 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.975450039 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.976336002 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.976386070 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.976404905 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.976437092 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.977365017 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.977408886 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.977474928 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.978415966 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.978456974 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.978487968 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.978513956 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.979454994 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.979500055 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.979619980 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.980499983 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.980576038 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.980587959 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.980639935 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:09.981585979 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.981667042 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:09.981760025 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:10.008208036 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.008323908 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.008446932 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:10.008625984 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.008697033 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.008699894 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:10.008759975 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:10.009695053 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.009763002 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.009862900 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:10.010677099 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.010768890 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:10.010775089 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.010824919 CEST49723443192.168.2.3104.16.203.237
                        Jun 7, 2021 17:28:10.011812925 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.011867046 CEST44349723104.16.203.237192.168.2.3
                        Jun 7, 2021 17:28:10.011893034 CEST49723443192.168.2.3104.16.203.237

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Jun 7, 2021 17:28:08.968982935 CEST192.168.2.38.8.8.80x39a7Standard query (0)www.mediafire.comA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Jun 7, 2021 17:28:09.019900084 CEST8.8.8.8192.168.2.30x39a7No error (0)www.mediafire.com104.16.203.237A (IP address)IN (0x0001)
                        Jun 7, 2021 17:28:09.019900084 CEST8.8.8.8192.168.2.30x39a7No error (0)www.mediafire.com104.16.202.237A (IP address)IN (0x0001)

                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:17:27:29
                        Start date:07/06/2021
                        Path:C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe'
                        Imagebase:0x400000
                        File size:122880 bytes
                        MD5 hash:C73AB52CCB3B77FFDA43AB3764FFF1AB
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Visual Basic
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000000.00000002.279722809.0000000000620000.00000040.00000001.sdmp, Author: Joe Security
                        Reputation:low

                        General

                        Start time:17:27:56
                        Start date:07/06/2021
                        Path:C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\DOCUMENTOS CORREOS.exe'
                        Imagebase:0x400000
                        File size:122880 bytes
                        MD5 hash:C73AB52CCB3B77FFDA43AB3764FFF1AB
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000004.00000000.278693331.0000000000560000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000004.00000002.486013693.0000000000560000.00000040.00000001.sdmp, Author: Joe Security
                        Reputation:low

                        Disassembly

                        Code Analysis

                        Reset < >