Loading ...

Play interactive tourEdit tour

Windows Analysis Report Cailbers22LongRiflorderlist.exe

Overview

General Information

Sample Name:Cailbers22LongRiflorderlist.exe
Analysis ID:434934
MD5:da7e577b39dc1882d8c2f5819ead22e3
SHA1:4c7ff9565349068f73d96f48423ee5ae4f832fa6
SHA256:66e4fb4c25d6f26bd7322782642f7b3ffd5747ca736e64868f8a3c76467bf8c0
Tags:exe
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Initial sample is a PE file and has a suspicious name
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://onedrive.live.com/download?cid=CF699836D17ED884&resid=CF699836D17ED884%21110&authkey=AB6GufhtYFcXJ00P*"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
Cailbers22LongRiflorderlist.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000000.329521263.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
      00000000.00000002.697011620.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.Cailbers22LongRiflorderlist.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
          0.0.Cailbers22LongRiflorderlist.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000000.00000002.700409713.0000000002220000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://onedrive.live.com/download?cid=CF699836D17ED884&resid=CF699836D17ED884%21110&authkey=AB6GufhtYFcXJ00P*"}
            Source: Cailbers22LongRiflorderlist.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://onedrive.live.com/download?cid=CF699836D17ED884&resid=CF699836D17ED884%21110&authkey=AB6GufhtYFcXJ00P*
            Source: Cailbers22LongRiflorderlist.exe, 00000000.00000002.699942002.000000000077A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            System Summary:

            barindex
            Initial sample is a PE file and has a suspicious nameShow sources
            Source: initial sampleStatic PE information: Filename: Cailbers22LongRiflorderlist.exe
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225909 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225A23 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225A6C NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225AC6 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225B2C NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225B4F NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225938 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225998 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022259F0 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_00412054
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225909
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222A24
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0222263A
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02221216
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223E1C
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223E64
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223A6A
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222A68
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0222127C
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02224248
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02227E5E
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02224284
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222688
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223A93
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223A9C
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223AE8
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022212C2
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222AC0
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223EC0
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022256C8
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022242D0
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02220ED8
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02220F32
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02224338
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223F0A
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02221308
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222B1A
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223B64
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223B44
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02220F50
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223F50
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022267A1
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022243A4
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222BBA
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223B88
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222B9A
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223F98
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223FE1
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223BEC
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02220FC4
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0222402C
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223C34
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222C35
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02221014
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223467
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02221068
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223470
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0222207E
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222C4E
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02224454
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022210AC
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022244B0
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022294B1
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022234B4
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223C81
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222C92
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0222949A
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223899
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022294E4
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022244EA
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022210F0
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022294C6
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222CDA
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223CDA
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222D2D
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223D32
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0222253B
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225938
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02224102
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0222350A
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223170
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02229578
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02224140
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02224546
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222544
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022225A9
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022241AC
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022219BB
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02221180
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222981
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223D86
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222984
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02229590
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225998
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022225F0
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022245F4
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022229C2
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223DC6
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022211CC
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022241D8
            Source: Cailbers22LongRiflorderlist.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: Cailbers22LongRiflorderlist.exe, 00000000.00000002.699405710.0000000000442000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameNonamorousness5.exe vs Cailbers22LongRiflorderlist.exe
            Source: Cailbers22LongRiflorderlist.exe, 00000000.00000002.700365167.0000000002210000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs Cailbers22LongRiflorderlist.exe
            Source: Cailbers22LongRiflorderlist.exeBinary or memory string: OriginalFilenameNonamorousness5.exe vs Cailbers22LongRiflorderlist.exe
            Source: Cailbers22LongRiflorderlist.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal80.troj.evad.winEXE@1/0@0/0
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeFile created: C:\Users\user\AppData\Local\Temp\~DFEDBE4090EBA1C181.TMPJump to behavior
            Source: Cailbers22LongRiflorderlist.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: Cailbers22LongRiflorderlist.exe, type: SAMPLE
            Source: Yara matchFile source: 00000000.00000000.329521263.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.697011620.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.2.Cailbers22LongRiflorderlist.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.Cailbers22LongRiflorderlist.exe.400000.0.unpack, type: UNPACKEDPE
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0040A5BD push esp; retf
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02228AED push eax; ret
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022294B1
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0222949A
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022294E4
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022294FE
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_022294C6
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02229532
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_0222951C
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02229560
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02229578
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222981
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02229590
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeRDTSC instruction interceptor: First address: 0000000002229837 second address: 0000000002229837 instructions:
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeRDTSC instruction interceptor: First address: 0000000002229837 second address: 0000000002229837 instructions:
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeRDTSC instruction interceptor: First address: 00000000022252B7 second address: 0000000002225356 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov ecx, 39CEE144h 0x00000010 xor ecx, 97ACFF28h 0x00000016 xor ecx, 6735B1C6h 0x0000001c jmp 00007FBB14A12776h 0x0000001e cmp ch, dh 0x00000020 sub ecx, C8AE504Ah 0x00000026 mov dword ptr [ebp+00000211h], eax 0x0000002c cmp al, cl 0x0000002e mov eax, ecx 0x00000030 push eax 0x00000031 mov eax, dword ptr [ebp+00000211h] 0x00000037 call 00007FBB14A127ACh 0x0000003c call 00007FBB14A127B5h 0x00000041 lfence 0x00000044 mov edx, 361ACA44h 0x00000049 xor edx, 29F260C9h 0x0000004f sub edx, 4BA41BD5h 0x00000055 xor edx, ABBA8EACh 0x0000005b mov edx, dword ptr [edx] 0x0000005d lfence 0x00000060 ret 0x00000061 mov esi, edx 0x00000063 pushad 0x00000064 rdtsc
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeRDTSC instruction interceptor: First address: 0000000002225356 second address: 000000000222532F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 6CD18E72h 0x00000007 sub eax, 719C9E22h 0x0000000c xor eax, 72732D15h 0x00000011 sub eax, 8947DD44h 0x00000016 cpuid 0x00000018 jmp 00007FBB14B576F2h 0x0000001a test cl, cl 0x0000001c popad 0x0000001d call 00007FBB14B57700h 0x00000022 lfence 0x00000025 mov edx, 361ACA44h 0x0000002a xor edx, 29F260C9h 0x00000030 sub edx, 4BA41BD5h 0x00000036 xor edx, ABBA8EACh 0x0000003c mov edx, dword ptr [edx] 0x0000003e lfence 0x00000041 ret 0x00000042 sub edx, esi 0x00000044 ret 0x00000045 test eax, 78C4E04Dh 0x0000004a pop ecx 0x0000004b jmp 00007FBB14B576F6h 0x0000004d test bl, al 0x0000004f add edi, edx 0x00000051 test dh, FFFFFFE0h 0x00000054 dec ecx 0x00000055 pushad 0x00000056 lfence 0x00000059 rdtsc
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeRDTSC instruction interceptor: First address: 000000000222532F second address: 0000000002225356 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b cmp ecx, 00000000h 0x0000000e jne 00007FBB14A12714h 0x00000010 mov dword ptr [ebp+00000211h], eax 0x00000016 cmp al, cl 0x00000018 mov eax, ecx 0x0000001a push eax 0x0000001b mov eax, dword ptr [ebp+00000211h] 0x00000021 call 00007FBB14A127ACh 0x00000026 call 00007FBB14A127B5h 0x0000002b lfence 0x0000002e mov edx, 361ACA44h 0x00000033 xor edx, 29F260C9h 0x00000039 sub edx, 4BA41BD5h 0x0000003f xor edx, ABBA8EACh 0x00000045 mov edx, dword ptr [edx] 0x00000047 lfence 0x0000004a ret 0x0000004b mov esi, edx 0x0000004d pushad 0x0000004e rdtsc
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225909 rdtsc
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

            Anti Debugging:

            barindex
            Found potential dummy code loops (likely to delay analysis)Show sources
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeProcess Stats: CPU usage > 90% for more than 60s
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225909 rdtsc
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02225204 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02227EEA mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02227B6C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223467 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02223470 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02222981 mov eax, dword ptr fs:[00000030h]
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: Cailbers22LongRiflorderlist.exe, 00000000.00000002.700096171.0000000000E00000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: Cailbers22LongRiflorderlist.exe, 00000000.00000002.700096171.0000000000E00000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: Cailbers22LongRiflorderlist.exe, 00000000.00000002.700096171.0000000000E00000.00000002.00000001.sdmpBinary or memory string: &Program Manager
            Source: Cailbers22LongRiflorderlist.exe, 00000000.00000002.700096171.0000000000E00000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exeCode function: 0_2_02220691 cpuid

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11Input Capture1Security Software Discovery41Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery311Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

            Behavior Graph

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            Cailbers22LongRiflorderlist.exe2%ReversingLabs

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            No Antivirus matches

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            https://onedrive.live.com/download?cid=CF699836D17ED884&resid=CF699836D17ED884%21110&authkey=AB6GufhtYFcXJ00P*false
              high

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:32.0.0 Black Diamond
              Analysis ID:434934
              Start date:15.06.2021
              Start time:16:55:18
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 6m 8s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:Cailbers22LongRiflorderlist.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:21
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal80.troj.evad.winEXE@1/0@0/0
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 2.8% (good quality ratio 0.1%)
              • Quality average: 4.9%
              • Quality standard deviation: 19.8%
              HCA Information:Failed
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              • Override analysis time to 240s for sample files taking high CPU consumption
              Warnings:
              Show All
              • Max analysis timeout: 220s exceeded, the analysis took too long
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: /opt/package/joesandbox/database/analysis/434934/sample/Cailbers22LongRiflorderlist.exe

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              No created / dropped files found

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):5.908882457092713
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.15%
              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:Cailbers22LongRiflorderlist.exe
              File size:270336
              MD5:da7e577b39dc1882d8c2f5819ead22e3
              SHA1:4c7ff9565349068f73d96f48423ee5ae4f832fa6
              SHA256:66e4fb4c25d6f26bd7322782642f7b3ffd5747ca736e64868f8a3c76467bf8c0
              SHA512:1d0ba9a828c6ed666ad5a7ac4bfc79f2f3ba2b8f555b02980365fa686296ac8bbb2fc4cd2a0e265d2c2967d45005bcab54b9d4114410b4ffb2f75df0be7988f7
              SSDEEP:3072:SH1hZYJQKX+an/XNSn3N59UN9+xc9+OTPl3p1YCxsaX5vt42TM:eyvNy5aN8xK+OB3zYwHo
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........c.S............&........ .......$......Rich....................PE..L....8.P.....................0.......(............@........

              File Icon

              Icon Hash:2828bae9d2777576

              Static PE Info

              General

              Entrypoint:0x402894
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              DLL Characteristics:
              Time Stamp:0x50E938CB [Sun Jan 6 08:41:47 2013 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:adaafa2c180eccb7addf1201d12c8322

              Entrypoint Preview

              Instruction
              push 004035CCh
              call 00007FBB149B2783h
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              xor byte ptr [eax], al
              add byte ptr [eax], al
              inc eax
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], bh
              in eax, dx
              lodsb
              fxch7 st(7)
              inc ecx
              xchg eax, esi
              or eax, CE5BEE49h
              jle 00007FBB149B27DFh
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add dword ptr [eax], eax
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              insb
              imul esi, dword ptr [ebx+74h], 6C617665h
              add byte ptr [bx+si], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add bh, bh
              int3
              xor dword ptr [eax], eax
              add byte ptr [edi+00h], dh
              scasb
              push es
              add byte ptr [edi-2877B1F6h], cl
              mov esi, EDC7B255h
              sbb dword ptr [eax-24h], FFFFFFF2h
              sbb edi, dword ptr [ecx]
              dec esi
              mov ebx, 6A7E8640h
              lds esi, fword ptr [ecx]
              jmp 00007FBB63D55FFBh
              lodsd
              xor ebx, dword ptr [ecx-48EE309Ah]
              or al, 00h
              stosb
              add byte ptr [eax-2Dh], ah
              xchg eax, ebx
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              mov es, word ptr [esi]
              add byte ptr [eax], al
              mov dword ptr [esi], eax
              add byte ptr [eax], al
              add byte ptr [edx], cl
              add byte ptr [ebx+74h], dl
              popad
              jc 00007FBB149B27FAh
              jc 00007FBB149B27C6h
              add byte ptr [42000B01h], cl
              jc 00007FBB149B27F8h

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x3e9f40x28.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x420000x9ec.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x1b0.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x3e0ac0x3f000False0.288361080109data6.04226982534IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .data0x400000x1be80x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0x420000x9ec0x1000False0.229248046875data2.11966183681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_ICON0x427040x2e8data
              RT_ICON0x4251c0x1e8data
              RT_ICON0x423f40x128GLS_BINARY_LSB_FIRST
              RT_GROUP_ICON0x423c40x30data
              RT_VERSION0x421500x274dataEnglishUnited States

              Imports

              DLLImport
              MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaLineInputStr, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaI2I4, __vbaObjVar, DllFunctionCall, _adj_fpatan, __vbaRedim, __vbaRecUniToAnsi, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaNew2, __vbaVar2Vec, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, __vbaVarLateMemCallLd, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

              Version Infos

              DescriptionData
              Translation0x0409 0x04b0
              InternalNameNonamorousness5
              FileVersion1.00
              CompanyNameOrion Solutions
              CommentsOrion Solutions
              ProductNamelistevalg
              ProductVersion1.00
              OriginalFilenameNonamorousness5.exe

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              System Behavior

              General

              Start time:16:56:09
              Start date:15/06/2021
              Path:C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\Cailbers22LongRiflorderlist.exe'
              Imagebase:0x400000
              File size:270336 bytes
              MD5 hash:DA7E577B39DC1882D8C2F5819EAD22E3
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Visual Basic
              Yara matches:
              • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000000.329521263.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000002.697011620.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >