Loading ...

Play interactive tourEdit tour

Analysis Report EXErprijFY

Overview

General Information

Sample Name:EXErprijFY (renamed file extension from none to exe)
Analysis ID:433989
MD5:ee83942376ea5717149517fcc832ab9f
SHA1:ec75b10c6ef046cb63eaa20470ac94529fb4873a
SHA256:b3498937a71913d7101fafb04eb48a791106bec97e21839b2e1be8bb55a3f5fc
Tags:32exeGuLoadertrojan
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Potential malicious icon found
Yara detected GuLoader
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • EXErprijFY.exe (PID: 6896 cmdline: 'C:\Users\user\Desktop\EXErprijFY.exe' MD5: EE83942376EA5717149517FCC832AB9F)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bin"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
EXErprijFY.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1164652170.0000000002230000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.0.EXErprijFY.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
        0.2.EXErprijFY.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus / Scanner detection for submitted sampleShow sources
          Source: EXErprijFY.exeAvira: detected
          Antivirus detection for URL or domainShow sources
          Source: https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.binAvira URL Cloud: Label: malware
          Found malware configurationShow sources
          Source: EXErprijFY.exeMalware Configuration Extractor: GuLoader {"Payload URL": "https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bin"}
          Source: EXErprijFY.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bin
          Source: EXErprijFY.exe, 00000000.00000002.1164512673.00000000006FA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          System Summary:

          barindex
          Potential malicious icon foundShow sources
          Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess Stats: CPU usage > 98%
          Source: C:\Users\user\Desktop\EXErprijFY.exeCode function: 0_2_004018A4
          Source: C:\Users\user\Desktop\EXErprijFY.exeCode function: 0_2_00405732
          Source: EXErprijFY.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: EXErprijFY.exe, 00000000.00000000.641912573.0000000000424000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamepetered.exe vs EXErprijFY.exe
          Source: EXErprijFY.exe, 00000000.00000002.1164581076.00000000020E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamepetered.exeFE2X2 vs EXErprijFY.exe
          Source: EXErprijFY.exe, 00000000.00000002.1164581076.00000000020E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamepetered.exeFE2X vs EXErprijFY.exe
          Source: EXErprijFY.exe, 00000000.00000002.1164581076.00000000020E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamepetered.exeFE2XpJ4 vs EXErprijFY.exe
          Source: EXErprijFY.exe, 00000000.00000002.1164581076.00000000020E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamepetered.exeFE2X_I vs EXErprijFY.exe
          Source: EXErprijFY.exe, 00000000.00000002.1164581076.00000000020E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamepetered.exeFE2X>N~ vs EXErprijFY.exe
          Source: EXErprijFY.exe, 00000000.00000002.1164581076.00000000020E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamepetered.exeFE2XxO< vs EXErprijFY.exe
          Source: EXErprijFY.exe, 00000000.00000002.1164564990.00000000020A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs EXErprijFY.exe
          Source: EXErprijFY.exeBinary or memory string: OriginalFilenamepetered.exe vs EXErprijFY.exe
          Source: EXErprijFY.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@1/0@0/0
          Source: EXErprijFY.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\EXErprijFY.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
          Source: C:\Users\user\Desktop\EXErprijFY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers

          Data Obfuscation:

          barindex
          Yara detected GuLoaderShow sources
          Source: Yara matchFile source: 00000000.00000002.1164652170.0000000002230000.00000040.00000001.sdmp, type: MEMORY
          Yara detected GuLoaderShow sources
          Source: Yara matchFile source: EXErprijFY.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.EXErprijFY.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.EXErprijFY.exe.400000.0.unpack, type: UNPACKEDPE
          Source: C:\Users\user\Desktop\EXErprijFY.exeCode function: 0_2_004059CC pushfd ; iretd
          Source: C:\Users\user\Desktop\EXErprijFY.exeCode function: 0_2_00406199 push ss; ret
          Source: C:\Users\user\Desktop\EXErprijFY.exeCode function: 0_2_00407E0A push ecx; iretd
          Source: C:\Users\user\Desktop\EXErprijFY.exeCode function: 0_2_004062BD push ss; ret
          Source: C:\Users\user\Desktop\EXErprijFY.exeCode function: 0_2_00402F0B push dword ptr [ebp-1Ch]; ret
          Source: C:\Users\user\Desktop\EXErprijFY.exeCode function: 0_2_00409B16 push ecx; retf
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
          Source: C:\Users\user\Desktop\EXErprijFY.exeRDTSC instruction interceptor: First address: 0000000002237154 second address: 0000000002237154 instructions:
          Source: C:\Users\user\Desktop\EXErprijFY.exeRDTSC instruction interceptor: First address: 000000000223A078 second address: 000000000223A078 instructions:
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\EXErprijFY.exeRDTSC instruction interceptor: First address: 0000000002237154 second address: 0000000002237154 instructions:
          Source: C:\Users\user\Desktop\EXErprijFY.exeRDTSC instruction interceptor: First address: 000000000223A021 second address: 000000000223A078 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 53673179h 0x00000007 sub eax, 2CF91FC3h 0x0000000c xor eax, 4DAF12BEh 0x00000011 sub eax, 6BC10307h 0x00000016 cpuid 0x00000018 jmp 00007F311485C18Eh 0x0000001a pushad 0x0000001b rdtsc
          Source: C:\Users\user\Desktop\EXErprijFY.exeRDTSC instruction interceptor: First address: 000000000223A078 second address: 000000000223A078 instructions:
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

          Anti Debugging:

          barindex
          Found potential dummy code loops (likely to delay analysis)Show sources
          Source: C:\Users\user\Desktop\EXErprijFY.exeProcess Stats: CPU usage > 90% for more than 60s
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: EXErprijFY.exe, 00000000.00000002.1164536037.0000000000C80000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: EXErprijFY.exe, 00000000.00000002.1164536037.0000000000C80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: EXErprijFY.exe, 00000000.00000002.1164536037.0000000000C80000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: EXErprijFY.exe, 00000000.00000002.1164536037.0000000000C80000.00000002.00000001.sdmpBinary or memory string: Progmanlock

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11Input Capture1Security Software Discovery3Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery21Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          EXErprijFY.exe9%ReversingLabsWin32.Malware.Generic
          EXErprijFY.exe100%AviraHEUR/AGEN.1134908

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          0.2.EXErprijFY.exe.400000.0.unpack100%AviraHEUR/AGEN.1134908Download File
          0.0.EXErprijFY.exe.400000.0.unpack100%AviraHEUR/AGEN.1134908Download File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bin100%Avira URL Cloudmalware

          Domains and IPs

          Contacted Domains

          No contacted domains info

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bintrue
          • Avira URL Cloud: malware
          unknown

          Contacted IPs

          No contacted IP infos

          General Information

          Joe Sandbox Version:32.0.0 Black Diamond
          Analysis ID:433989
          Start date:14.06.2021
          Start time:09:17:28
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 6m 57s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:EXErprijFY (renamed file extension from none to exe)
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:17
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.rans.troj.evad.winEXE@1/0@0/0
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 44.8% (good quality ratio 14.8%)
          • Quality average: 16.1%
          • Quality standard deviation: 26.4%
          HCA Information:Failed
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Override analysis time to 240s for sample files taking high CPU consumption
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/433989/sample/EXErprijFY.exe

          Simulations

          Behavior and APIs

          No simulations

          Joe Sandbox View / Context

          IPs

          No context

          Domains

          No context

          ASN

          No context

          JA3 Fingerprints

          No context

          Dropped Files

          No context

          Created / dropped Files

          No created / dropped files found

          Static File Info

          General

          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):5.822963661672907
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.15%
          • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:EXErprijFY.exe
          File size:147456
          MD5:ee83942376ea5717149517fcc832ab9f
          SHA1:ec75b10c6ef046cb63eaa20470ac94529fb4873a
          SHA256:b3498937a71913d7101fafb04eb48a791106bec97e21839b2e1be8bb55a3f5fc
          SHA512:431cdd7e43fd6a4c4df862297eebc42e9cb68909647b57288a63bfe036d9d0560cc0e97d759bda096e1389e3cd18d243e627cce692660e2a384be430623b2551
          SSDEEP:1536:zK7pvMMhAYlnYgtuELhUQwe6KjEw5bMNccnuMG5reMFbCJQ:zCBqg197dvjEw5yccw5r7d
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...@.`R.....................0............... ....@................

          File Icon

          Icon Hash:20047c7c70f0e004

          Static PE Info

          General

          Entrypoint:0x4018a4
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          DLL Characteristics:
          Time Stamp:0x5260BB40 [Fri Oct 18 04:38:24 2013 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:2c08d8f9644132654eb702b279083d5c

          Entrypoint Preview

          Instruction
          push 00401C44h
          call 00007F31147D6CF5h
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          xor byte ptr [eax], al
          add byte ptr [eax], al
          inc eax
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [esp+ebp-2Eh], cl
          adc esi, dword ptr [ebx-49h]
          inc edx
          test cl, ah
          outsd
          add esi, dword ptr [ebx+00978FBDh]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [ecx], al
          add byte ptr [eax], al
          add byte ptr [ebx], al
          add ecx, dword ptr [ecx]
          add byte ptr [eax], al
          add byte ptr [ebx+6Fh], al
          arpl word ptr [ebx+65h], bp
          jc 00007F31147D6D67h
          add byte ptr fs:[eax], cl
          inc ecx
          add al, dh
          pop es
          inc ecx
          add byte ptr [eax], al
          add byte ptr [eax], al
          add bh, bh
          int3
          xor dword ptr [eax], eax

          Data Directories

          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x217c40x28.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x930.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
          IMAGE_DIRECTORY_ENTRY_IAT0x10000x1dc.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

          Sections

          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x20e9c0x21000False0.381784150095data6.07881532282IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .data0x220000x12780x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
          .rsrc0x240000x9300x1000False0.16943359375data2.02923021572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

          Resources

          NameRVASizeTypeLanguageCountry
          RT_ICON0x248000x130data
          RT_ICON0x245180x2e8data
          RT_ICON0x243f00x128GLS_BINARY_LSB_FIRST
          RT_GROUP_ICON0x243c00x30data
          RT_VERSION0x241500x270dataEnglishUnited States

          Imports

          DLLImport
          MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaHresultCheck, __vbaFreeVar, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaBoolStr, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaErase, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, __vbaR4Str, __vbaObjVar, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRedim, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaInStrVar, _CIlog, __vbaNew2, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarAdd, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, __vbaVarCopy, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

          Version Infos

          DescriptionData
          Translation0x0409 0x04b0
          InternalNamepetered
          FileVersion1.00
          CompanyNameWorkday
          CommentsWorkday
          ProductNameWorkday
          ProductVersion1.00
          FileDescriptionWorkday
          OriginalFilenamepetered.exe

          Possible Origin

          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States

          Network Behavior

          No network behavior found

          Code Manipulations

          Statistics

          System Behavior

          General

          Start time:09:18:13
          Start date:14/06/2021
          Path:C:\Users\user\Desktop\EXErprijFY.exe
          Wow64 process (32bit):true
          Commandline:'C:\Users\user\Desktop\EXErprijFY.exe'
          Imagebase:0x400000
          File size:147456 bytes
          MD5 hash:EE83942376EA5717149517FCC832AB9F
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Visual Basic
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1164652170.0000000002230000.00000040.00000001.sdmp, Author: Joe Security
          Reputation:low

          Disassembly

          Code Analysis

          Reset < >