Loading ...

Play interactive tourEdit tour

Windows Analysis Report URGENT SWIFT COPY FOR JUNE 14 2021.exe

Overview

General Information

Sample Name:URGENT SWIFT COPY FOR JUNE 14 2021.exe
Analysis ID:434445
MD5:13fe879d4b0acd6b10e9e4db7fcf3a49
SHA1:c513f61b28a5602768fc3a07bea6efe0b743dc26
SHA256:f3a520aa6296de59468c3a38d45660091097c056b7249a66d3443f3bd4ecf997
Tags:exe
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Potentially malicious time measurement code found
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://onedrive.live.com/download?cid=BAC03012EC7BD279&resid=BAC03012EC7BD279%21114&authkey=AETxWDW7LlqQvxw"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.575162168.00000000007D0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000000.00000002.575162168.00000000007D0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://onedrive.live.com/download?cid=BAC03012EC7BD279&resid=BAC03012EC7BD279%21114&authkey=AETxWDW7LlqQvxw"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exeReversingLabs: Detection: 10%
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://onedrive.live.com/download?cid=BAC03012EC7BD279&resid=BAC03012EC7BD279%21114&authkey=AETxWDW7LlqQvxw
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exe, 00000000.00000002.575222704.00000000007EA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeProcess Stats: CPU usage > 98%
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D5977 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D5A5A NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D5A0F NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D5B02 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D5B81 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_00412160
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D5977
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D407B
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1470
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1463
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3451
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0C50
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D443D
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D343B
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D102F
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D402E
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3C1D
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D44FA
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0CF4
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D10F3
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0CDC
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D14BB
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0CAD
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D34AB
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D4090
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1092
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D448D
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3C83
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D4168
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D296A
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3D51
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D254C
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0D35
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1535
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2533
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D452B
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D410B
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3D01
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0D00
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1500
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0DFB
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3DF4
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D41F4
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D95F1
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D29D3
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D19C0
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D45BD
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D15BE
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D19AE
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D41A4
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3DA3
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D259E
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0D8F
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D458F
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D158E
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D9674
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2A70
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0E62
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D4259
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3E50
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D963B
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2A2D
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D9621
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1620
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D461C
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D5A0F
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D9608
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2600
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D96FD
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3EF4
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2ADE
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3AD0
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3AC9
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D96CB
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0EAC
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3EA1
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D9688
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3F78
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D576E
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3B64
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0F67
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D4352
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3F48
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2B32
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D9717
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3B0F
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D4308
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0BFC
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0FCA
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3FC3
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0BBC
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3BBA
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D43A3
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2B9E
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0B95
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exe, 00000000.00000002.574379251.0000000000442000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSerails4.exe vs URGENT SWIFT COPY FOR JUNE 14 2021.exe
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exe, 00000000.00000002.575132852.00000000007C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs URGENT SWIFT COPY FOR JUNE 14 2021.exe
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exeBinary or memory string: OriginalFilenameSerails4.exe vs URGENT SWIFT COPY FOR JUNE 14 2021.exe
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: classification engineClassification label: mal88.troj.evad.winEXE@1/0@0/0
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeFile created: C:\Users\user\AppData\Local\Temp\~DF5BE9B5AE29950903.TMPJump to behavior
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exeReversingLabs: Detection: 10%

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000000.00000002.575162168.00000000007D0000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_00409F9B push esp; iretd
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D8C2F push eax; ret
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1FD9 push FFFFFFF6h; ret
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D6BB1 push cs; retf
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D407B
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1470
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1463
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D402E
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3C1D
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D14BB
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D4090
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3C83
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D296A
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3D51
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1535
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3D01
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D1500
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3DF4
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D29D3
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D15BE
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3DA3
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D158E
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2A70
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3E50
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2A2D
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3EF4
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2ADE
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3AD0
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3AC9
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3EA1
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3F78
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3B64
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3F48
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3B0F
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3FC3
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3BBA
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D0B95
    Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeRDTSC instruction interceptor: First address: 00000000007D5B13 second address: 00000000007D5B13 instructions:
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeRDTSC instruction interceptor: First address: 00000000007D5B13 second address: 00000000007D5B13 instructions:
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeRDTSC instruction interceptor: First address: 00000000007D7BBF second address: 00000000007D7BBF instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 mov byte ptr [ebx], al 0x00000005 test cl, FFFFFF8Ch 0x00000008 inc ebx 0x00000009 inc edx 0x0000000a dec ecx 0x0000000b test ecx, ecx 0x0000000d jne 00007FE24CE437DBh 0x0000000f mov al, byte ptr [edx] 0x00000011 pushad 0x00000012 mov esi, 00000046h 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeRDTSC instruction interceptor: First address: 00000000007D5C53 second address: 00000000007D5C9E instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b sub edi, C59F85C6h 0x00000011 test ecx, 1D95ACF7h 0x00000017 xor edi, 41F17E9Fh 0x0000001d jmp 00007FE24C3A1002h 0x0000001f cmp dl, FFFFFFDBh 0x00000022 test dh, dh 0x00000024 push edi 0x00000025 cmp eax, ecx 0x00000027 mov edi, dword ptr [ebp+0000027Fh] 0x0000002d test ch, dh 0x0000002f cmp bl, al 0x00000031 push dword ptr [ebp+00000140h] 0x00000037 pushad 0x00000038 lfence 0x0000003b rdtsc
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeRDTSC instruction interceptor: First address: 00000000007D53A0 second address: 00000000007D53A0 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 2022209Bh 0x00000007 xor eax, 80859C35h 0x0000000c xor eax, 9F31FB3Eh 0x00000011 xor eax, 3F964791h 0x00000016 cpuid 0x00000018 jmp 00007FE24CE43802h 0x0000001a cmp bx, cx 0x0000001d popad 0x0000001e test cl, bl 0x00000020 call 00007FE24CE437FDh 0x00000025 lfence 0x00000028 mov edx, B4C5CB13h 0x0000002d xor edx, 7102A7F7h 0x00000033 xor edx, 1935794Bh 0x00000039 xor edx, A30C15BBh 0x0000003f mov edx, dword ptr [edx] 0x00000041 lfence 0x00000044 ret 0x00000045 cmp di, FA17h 0x0000004a sub edx, esi 0x0000004c ret 0x0000004d test dx, 46E5h 0x00000052 pop ecx 0x00000053 add edi, edx 0x00000055 test cx, ax 0x00000058 dec ecx 0x00000059 cmp ecx, 00000000h 0x0000005c jne 00007FE24CE437AFh 0x0000005e jmp 00007FE24CE43806h 0x00000060 test eax, edx 0x00000062 mov dword ptr [ebp+0000025Eh], edi 0x00000068 mov edi, ecx 0x0000006a cmp ax, dx 0x0000006d push edi 0x0000006e test ax, bx 0x00000071 mov edi, dword ptr [ebp+0000025Eh] 0x00000077 call 00007FE24CE4382Bh 0x0000007c call 00007FE24CE43835h 0x00000081 lfence 0x00000084 mov edx, B4C5CB13h 0x00000089 xor edx, 7102A7F7h 0x0000008f xor edx, 1935794Bh 0x00000095 xor edx, A30C15BBh 0x0000009b mov edx, dword ptr [edx] 0x0000009d lfence 0x000000a0 ret 0x000000a1 mov esi, edx 0x000000a3 pushad 0x000000a4 rdtsc
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D407B rdtsc
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

    Anti Debugging:

    barindex
    Found potential dummy code loops (likely to delay analysis)Show sources
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeProcess Stats: CPU usage > 90% for more than 60s
    Potentially malicious time measurement code foundShow sources
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2A70 Start: 007D2BFF End: 007D2B0A
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2A2D Start: 007D2BFF End: 007D2B0A
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D2ADE Start: 007D2BFF End: 007D2B0A
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D407B rdtsc
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D3451 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D343B mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D296A mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D526B mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D7F7D mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exeCode function: 0_2_007D7BD1 mov eax, dword ptr fs:[00000030h]
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exe, 00000000.00000002.575438310.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exe, 00000000.00000002.575438310.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exe, 00000000.00000002.575438310.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: URGENT SWIFT COPY FOR JUNE 14 2021.exe, 00000000.00000002.575438310.0000000000D70000.00000002.00000001.sdmpBinary or memory string: Progmanlock

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11Input Capture1Security Software Discovery41Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery31Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    URGENT SWIFT COPY FOR JUNE 14 2021.exe11%ReversingLabsWin32.Trojan.Wacatac

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    https://onedrive.live.com/download?cid=BAC03012EC7BD279&resid=BAC03012EC7BD279%21114&authkey=AETxWDW7LlqQvxwfalse
      high

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:32.0.0 Black Diamond
      Analysis ID:434445
      Start date:15.06.2021
      Start time:00:30:18
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 6m 0s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:URGENT SWIFT COPY FOR JUNE 14 2021.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:28
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal88.troj.evad.winEXE@1/0@0/0
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 2.5% (good quality ratio 0%)
      • Quality average: 0.1%
      • Quality standard deviation: 0.5%
      HCA Information:Failed
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      Warnings:
      Show All
      • Max analysis timeout: 220s exceeded, the analysis took too long
      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Not all processes where analyzed, report is missing behavior information

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      No created / dropped files found

      Static File Info

      General

      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):5.913443213153397
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.15%
      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:URGENT SWIFT COPY FOR JUNE 14 2021.exe
      File size:270336
      MD5:13fe879d4b0acd6b10e9e4db7fcf3a49
      SHA1:c513f61b28a5602768fc3a07bea6efe0b743dc26
      SHA256:f3a520aa6296de59468c3a38d45660091097c056b7249a66d3443f3bd4ecf997
      SHA512:faade3ba99908dd10a0ca2f473dd55483256cdd38d795a6c1a41f97838a56f00f8cb4431477907cf099af2733893812c854b598575bd3b4dcf8970d8b61095f4
      SSDEEP:3072:HqCxEJQKX+an/XCf1Tth5P9+Zz3YaXygA1kkX31Z902v4:K3vCf1Bh51+Zsjgqdl8
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........c.S............&........ .......$......Rich....................PE..L....}.H.....................0.......(............@........

      File Icon

      Icon Hash:2828baa9d2777576

      Static PE Info

      General

      Entrypoint:0x402894
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:
      Time Stamp:0x48F37DB6 [Mon Oct 13 16:56:22 2008 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:adaafa2c180eccb7addf1201d12c8322

      Entrypoint Preview

      Instruction
      push 004035CCh
      call 00007FE24CC9ECC3h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      xor byte ptr [eax], al
      add byte ptr [eax], al
      inc eax
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add al, bh
      hlt
      pop edx
      out dx, eax
      in eax, 32h
      sbb al, byte ptr [ebx-5Bh]
      stosb
      retf F444h
      aaa
      dec esp
      cmp eax, dword ptr [eax]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [ecx], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [edx+75h], ah
      imul esi, dword ptr [ebx+65h], 62h
      outsb
      outsb
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add bh, bh
      int3
      xor dword ptr [eax], eax
      add byte ptr [eax], al
      jecxz 00007FE24CC9ECF4h
      aaa
      jl 00007FE24CC9ECF7h
      inc edi
      cmpsd
      jnc 00007FE24CC9ECE8h
      mov eax, 868A8D7Eh
      sub byte ptr [ebp-4Bh], al
      rcl ebp, 1
      xor dh, byte ptr [edi]
      inc esp
      xchg byte ptr [esi], dl
      mov ah, 3Bh
      mov edi, 3A0FD7EBh
      dec edi
      lodsd
      xor ebx, dword ptr [ecx-48EE309Ah]
      or al, 00h
      stosb
      add byte ptr [eax-2Dh], ah
      xchg eax, ebx
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      mov word ptr [esi], es
      add byte ptr [eax], al
      xchg dword ptr [esi], eax
      add byte ptr [eax], al
      add byte ptr [esi], al
      add byte ptr [edx+61h], cl
      add byte ptr fs:[di], cl
      add dword ptr [eax+eax], ecx
      jnc 00007FE24CC9ED42h
      imul esi, dword ptr [edx+69h], 65737574h

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x3ebb40x28.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x420000x9d8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
      IMAGE_DIRECTORY_ENTRY_IAT0x10000x1b0.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x3e26c0x3f000False0.288419208829data6.04648752589IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .data0x400000x1be80x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0x420000x9d80x1000False0.226806640625data2.09916860007IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_ICON0x426f00x2e8data
      RT_ICON0x425080x1e8data
      RT_ICON0x423e00x128GLS_BINARY_LSB_FIRST
      RT_GROUP_ICON0x423b00x30data
      RT_VERSION0x421500x260dataEnglishUnited States

      Imports

      DLLImport
      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaLineInputStr, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaI2I4, __vbaObjVar, DllFunctionCall, _adj_fpatan, __vbaRedim, __vbaRecUniToAnsi, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaNew2, __vbaVar2Vec, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, __vbaVarLateMemCallLd, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

      Version Infos

      DescriptionData
      Translation0x0409 0x04b0
      InternalNameSerails4
      FileVersion1.00
      CompanyNameOrion Solutions
      CommentsOrion Solutions
      ProductNamebuksebenene
      ProductVersion1.00
      OriginalFilenameSerails4.exe

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States

      Network Behavior

      No network behavior found

      Code Manipulations

      Statistics

      System Behavior

      General

      Start time:00:31:04
      Start date:15/06/2021
      Path:C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\URGENT SWIFT COPY FOR JUNE 14 2021.exe'
      Imagebase:0x400000
      File size:270336 bytes
      MD5 hash:13FE879D4B0ACD6B10E9E4DB7FCF3A49
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Visual Basic
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.575162168.00000000007D0000.00000040.00000001.sdmp, Author: Joe Security
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >