Loading ...

Play interactive tourEdit tour

Analysis Report d81yNmZHaE.exe

Overview

General Information

Sample Name:d81yNmZHaE.exe
Analysis ID:432593
MD5:74b1969d9f41c94a1a07431b65bbf390
SHA1:54935d5f7a59384ba8d1b26e25bbbc394e91922a
SHA256:f50e2cbd23d058c6f0b1b147c1ee77ccd969b9f895375aed3c42ccbab0bbbe15
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Potential malicious icon found
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • d81yNmZHaE.exe (PID: 5416 cmdline: 'C:\Users\user\Desktop\d81yNmZHaE.exe' MD5: 74B1969D9F41C94A1A07431B65BBF390)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://genitoriborgosatollo.it/main/client_sOcehs220.bin, http://amandaduquenoy."}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
d81yNmZHaE.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000000.234240857.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
      00000000.00000002.760283199.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.0.d81yNmZHaE.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
          0.2.d81yNmZHaE.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000000.00000002.761203641.00000000022D0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://genitoriborgosatollo.it/main/client_sOcehs220.bin, http://amandaduquenoy."}
            Multi AV Scanner detection for submitted fileShow sources
            Source: d81yNmZHaE.exeVirustotal: Detection: 33%Perma Link
            Source: d81yNmZHaE.exeReversingLabs: Detection: 39%
            Source: d81yNmZHaE.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://genitoriborgosatollo.it/main/client_sOcehs220.bin, http://amandaduquenoy.

            System Summary:

            barindex
            Potential malicious icon foundShow sources
            Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6827 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6A71 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6884 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D68C9 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6911 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6955 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_00401C10
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_004055DB
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6827
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D3209
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D327D
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D334F
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D33BC
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D5040
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D512C
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D31AB
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D91DD
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D3624
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DB46C
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D36AD
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D46A5
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DA68D
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D46FD
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DA6D9
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D2702
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D1765
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DA74C
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D47A9
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DA7BD
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D47CF
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D346D
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DB46C
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D5471
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D3451
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D3531
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D65BD
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6584
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DBA0B
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D2A4A
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4A88
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4AF4
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4B81
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D88B9
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6884
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D68C9
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6911
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4969
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6955
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D49EC
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4EC9
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D1F7F
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D3F94
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D1FE4
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4C25
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D2C99
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D2D32
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4D5C
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D2DAD
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4DB5
            Source: d81yNmZHaE.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: d81yNmZHaE.exe, 00000000.00000002.760356186.0000000000424000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameBlver.exe vs d81yNmZHaE.exe
            Source: d81yNmZHaE.exe, 00000000.00000002.761074940.00000000021F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs d81yNmZHaE.exe
            Source: d81yNmZHaE.exeBinary or memory string: OriginalFilenameBlver.exe vs d81yNmZHaE.exe
            Source: d81yNmZHaE.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal88.rans.troj.evad.winEXE@1/0@0/0
            Source: d81yNmZHaE.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: d81yNmZHaE.exeVirustotal: Detection: 33%
            Source: d81yNmZHaE.exeReversingLabs: Detection: 39%

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: d81yNmZHaE.exe, type: SAMPLE
            Source: Yara matchFile source: 00000000.00000000.234240857.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.760283199.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.0.d81yNmZHaE.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.d81yNmZHaE.exe.400000.0.unpack, type: UNPACKEDPE
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_004030EE push dword ptr [ebp-44h]; ret
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_00408957 push ecx; retf
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_0040953D push es; retf
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D72B9 push ebx; iretd
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D0041 push cs; iretd
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D00C0 push cs; iretd
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D678D push cs; iretd
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D5A5A push ebp; retf
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6827 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D31AB
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D46A5
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D46FD
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D2702
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D47A9
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D47CF
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DBA0B
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4A88
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4AF4
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4B81
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D88B9
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4969
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D49EC
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D4C25
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeRDTSC instruction interceptor: First address: 00000000022D6127 second address: 00000000022D6127 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 54424F80h 0x00000007 xor eax, BD2BBA67h 0x0000000c add eax, 30109B8Dh 0x00000011 sub eax, 197A9173h 0x00000016 cpuid 0x00000018 popad 0x00000019 call 00007F36F0AD3678h 0x0000001e lfence 0x00000021 mov edx, 99F040D7h 0x00000026 add edx, 65972F3Fh 0x0000002c xor edx, B7C92FC9h 0x00000032 xor edx, 37B05FCBh 0x00000038 mov edx, dword ptr [edx] 0x0000003a lfence 0x0000003d ret 0x0000003e sub edx, esi 0x00000040 ret 0x00000041 pop ecx 0x00000042 add edi, edx 0x00000044 dec ecx 0x00000045 cmp ecx, 00000000h 0x00000048 jne 00007F36F0AD3655h 0x0000004a mov dword ptr [ebp+00000249h], eax 0x00000050 mov eax, ecx 0x00000052 push eax 0x00000053 mov eax, dword ptr [ebp+00000249h] 0x00000059 call 00007F36F0AD3687h 0x0000005e call 00007F36F0AD3699h 0x00000063 lfence 0x00000066 mov edx, 99F040D7h 0x0000006b add edx, 65972F3Fh 0x00000071 xor edx, B7C92FC9h 0x00000077 xor edx, 37B05FCBh 0x0000007d mov edx, dword ptr [edx] 0x0000007f lfence 0x00000082 ret 0x00000083 mov esi, edx 0x00000085 pushad 0x00000086 rdtsc
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6827 rdtsc
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

            Anti Debugging:

            barindex
            Found potential dummy code loops (likely to delay analysis)Show sources
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeProcess Stats: CPU usage > 90% for more than 60s
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D6827 rdtsc
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D90E4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D31AB mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DA68D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022DA6D9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D9AC5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D3BBC mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\d81yNmZHaE.exeCode function: 0_2_022D3F94 mov eax, dword ptr fs:[00000030h]
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: d81yNmZHaE.exe, 00000000.00000002.760833387.0000000000D80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: d81yNmZHaE.exe, 00000000.00000002.760833387.0000000000D80000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: d81yNmZHaE.exe, 00000000.00000002.760833387.0000000000D80000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
            Source: d81yNmZHaE.exe, 00000000.00000002.760833387.0000000000D80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
            Source: d81yNmZHaE.exe, 00000000.00000002.760833387.0000000000D80000.00000002.00000001.sdmpBinary or memory string: Progmanlock

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery21Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            d81yNmZHaE.exe33%VirustotalBrowse
            d81yNmZHaE.exe39%ReversingLabsWin32.Trojan.Jaik

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            https://genitoriborgosatollo.it/main/client_sOcehs220.bin, http://amandaduquenoy.0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            https://genitoriborgosatollo.it/main/client_sOcehs220.bin, http://amandaduquenoy.true
            • Avira URL Cloud: safe
            unknown

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:32.0.0 Black Diamond
            Analysis ID:432593
            Start date:10.06.2021
            Start time:15:19:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 33s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:d81yNmZHaE.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:28
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal88.rans.troj.evad.winEXE@1/0@0/0
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 1.4% (good quality ratio 0.3%)
            • Quality average: 11.5%
            • Quality standard deviation: 20.6%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, SearchUI.exe, RuntimeBroker.exe, backgroundTaskHost.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Not all processes where analyzed, report is missing behavior information

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            No created / dropped files found

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):5.567506613853901
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.15%
            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:d81yNmZHaE.exe
            File size:147456
            MD5:74b1969d9f41c94a1a07431b65bbf390
            SHA1:54935d5f7a59384ba8d1b26e25bbbc394e91922a
            SHA256:f50e2cbd23d058c6f0b1b147c1ee77ccd969b9f895375aed3c42ccbab0bbbe15
            SHA512:1f20e36948015e46dc30cc1b1aa7e03cb0c8586e045bfe02d0794b3306cb1ddbbf43b62c737d8a90b2db5ff5f85de9fa96af97e4e978f223fa9dc6a37ba9ad7c
            SSDEEP:1536:vMaIFFEMgx3vnWE7Hpm6IJNTcXmXSt4lYEQe3pyzBEkWKS:ExFQvWy8lxc14lwe3pyzyjKS
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...N.DU.....................0............... ....@................

            File Icon

            Icon Hash:20047c7c70f0e004

            Static PE Info

            General

            Entrypoint:0x401c10
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:
            Time Stamp:0x5544D64E [Sat May 2 13:51:10 2015 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:9b8686288ab82fdbf8ede30bc55c83b7

            Entrypoint Preview

            Instruction
            push 00401FBCh
            call 00007F36F0BC1175h
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            xor byte ptr [eax], al
            add byte ptr [eax], al
            inc eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            xchg eax, edi
            xchg eax, esp
            mov byte ptr [B6A34098h+esi*8], bh
            pop ss
            inc ebp
            inc esp
            sbb dword ptr [eax+0000004Dh], ebp
            add byte ptr [eax], al
            add byte ptr [ecx], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add al, bh
            call 00007F3755FE1371h
            insb
            insb
            jns 00007F36F0BC11E3h
            arpl word ptr [eax+65h], bp
            jc 00007F36F0BC1182h
            add ah, dh
            jnl 00007F36F0BC1183h
            add eax, dword ptr [eax]
            add byte ptr [eax], al
            add bh, bh
            int3
            xor dword ptr [eax], eax
            subps xmm4, dqword ptr [esi+4Eh]
            dec eax
            pop eax
            jnl 00007F36F0BC11B3h
            inc esi
            mov ch, 6Fh
            jecxz 00007F36F0BC1102h
            pop esi
            and edx, esp
            xlatb
            out 06h, eax
            lahf
            js 00007F36F0BC1180h
            pop ebp
            inc ebx
            inc ecx
            cdq
            jmp 00007F36F0BC11F7h
            xchg byte ptr [eax], bl
            test dword ptr [eax], AD4F3AC5h
            xor ebx, dword ptr [ecx-48EE309Ah]
            or al, 00h
            stosb
            add byte ptr [eax-2Dh], ah
            xchg eax, ebx
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            cdq
            add al, byte ptr [eax]
            add byte ptr [edx+00h], cl
            add byte ptr [eax], al
            add byte ptr [eax], cl
            add byte ptr [ecx+ebp*2+76h], cl
            jc 00007F36F0BC11EBh
            jnc 00007F36F0BC11F6h
            xor al, byte ptr [eax]
            or eax, 53000A01h
            dec ebx
            inc ecx
            inc edx
            inc ecx
            inc edi

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x20a840x28.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x938.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
            IMAGE_DIRECTORY_ENTRY_IAT0x10000x1c4.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x201480x21000False0.350423177083data5.81715288276IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .data0x220000x12500x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .rsrc0x240000x9380x1000False0.16943359375data2.00254326763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_ICON0x248080x130data
            RT_ICON0x245200x2e8data
            RT_ICON0x243f80x128GLS_BINARY_LSB_FIRST
            RT_GROUP_ICON0x243c80x30data
            RT_VERSION0x241500x278dataEnglishUnited States

            Imports

            DLLImport
            MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaStrCat, __vbaSetSystemError, __vbaRecDestruct, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaCyStr, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaObjVar, __vbaI2I4, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRecUniToAnsi, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaFileOpen, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, __vbaLateMemCallLd, __vbaRecDestructAnsi, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

            Version Infos

            DescriptionData
            Translation0x0409 0x04b0
            InternalNameBlver
            FileVersion1.00
            CompanyNameMortagage
            CommentsMortagage
            ProductNameMortagage
            ProductVersion1.00
            FileDescriptionMortagage
            OriginalFilenameBlver.exe

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States

            Network Behavior

            No network behavior found

            Code Manipulations

            Statistics

            System Behavior

            General

            Start time:15:19:54
            Start date:10/06/2021
            Path:C:\Users\user\Desktop\d81yNmZHaE.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\d81yNmZHaE.exe'
            Imagebase:0x400000
            File size:147456 bytes
            MD5 hash:74B1969D9F41C94A1A07431B65BBF390
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Visual Basic
            Yara matches:
            • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000000.234240857.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000002.760283199.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >