Loading ...

Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.__vbaHresultCheckObj.11013.exe

Overview

General Information

Sample Name:SecuriteInfo.com.__vbaHresultCheckObj.11013.exe
Analysis ID:451415
MD5:c6066a473750ed5ad023d20ce532c8c8
SHA1:b2c181c008fd857b0f0122dbfd05d4193654ccc2
SHA256:932f31e907302148994f479eafe8dfbf203537491bbd586c43190c59afa248ff
Tags:exe
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://andreameixueiro.com/IRANSAT_Vsidob74.bin"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.__vbaHresultCheckObj.11013.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1302794449.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
      00000000.00000000.218200781.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.0.SecuriteInfo.com.__vbaHresultCheckObj.11013.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
          0.2.SecuriteInfo.com.__vbaHresultCheckObj.11013.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeMalware Configuration Extractor: GuLoader {"Payload URL": "https://andreameixueiro.com/IRANSAT_Vsidob74.bin"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeVirustotal: Detection: 26%Perma Link
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeReversingLabs: Detection: 30%
            Machine Learning detection for sampleShow sources
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeJoe Sandbox ML: detected
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://andreameixueiro.com/IRANSAT_Vsidob74.bin
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02988274 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298827B NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029883BF NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02988306 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02988487 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298840D NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02988274
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298469A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986A9C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CE96
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BE97
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981A89
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02985A8B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298428C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981680
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DE80
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029866BD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980AB2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983EB5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02987EAB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980ED0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CAD5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DEF2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029812E9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986EEF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029832E5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CA17
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CE00
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CA3F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983E36
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DE22
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983E26
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298725B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298D25D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986E50
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981A57
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298124F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DE43
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298827B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980A71
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980A77
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298626C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986F9B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298B791
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986B91
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CF8C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983B8D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298678D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C783
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029817BF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029813AA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980FDB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02982BDE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981BD7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BBCE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980BC2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029887F0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029843F5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DFE3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029863E7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298171F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298570B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02987B0E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986B04
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983B36
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DF36
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980B2C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981B27
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986327
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C350
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C750
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BF51
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DF4F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986742
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984347
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298E772
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CB77
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983F6F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EC92
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986C95
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986497
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298E097
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981083
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984485
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029830B9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BCB6
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029844A8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029860D4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CCCB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029808FA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C8FB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CCFF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983CF6
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029868E9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029810EB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029814EF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02982C1C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CC1F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02985C10
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C010
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BC08
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986C05
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298143F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983C37
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298305E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298705F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C45F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C453
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980C4A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C84F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981874
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298086C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298446C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986866
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298159A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298619D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986991
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C993
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029845B9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DDBB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298D1B1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029871B4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983DB6
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029841B7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029859D3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983DC9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029819C3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BDFC
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986DFE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C9FF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029841F2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029865ED
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029815E1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DD0F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DD02
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02987104
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DD3F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983D33
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984524
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981925
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02985551
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298CD55
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02985549
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298594C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BD42
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983D43
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986545
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298DD78
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984560
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986D63
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exe, 00000000.00000002.1304848116.00000000020D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs SecuriteInfo.com.__vbaHresultCheckObj.11013.exe
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exe, 00000000.00000002.1303115469.0000000000435000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameObject.exe vs SecuriteInfo.com.__vbaHresultCheckObj.11013.exe
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeBinary or memory string: OriginalFilenameObject.exe vs SecuriteInfo.com.__vbaHresultCheckObj.11013.exe
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: classification engineClassification label: mal88.troj.evad.winEXE@1/0@0/0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeFile created: C:\Users\user\AppData\Local\Temp\~DFCF65BA1571E1F766.TMPJump to behavior
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeVirustotal: Detection: 26%
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exeReversingLabs: Detection: 30%

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.SecuriteInfo.com.__vbaHresultCheckObj.11013.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.__vbaHresultCheckObj.11013.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1302794449.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.218200781.0000000000401000.00000020.00020000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0040663B push ebp; iretd
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EEAD push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02988AF9 push ebp; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EE10 push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EE5C push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EE78 push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EE70 push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EE74 push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EE68 push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EE6C push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EE60 push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EE64 push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298EC92 push esi; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02988274 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986A9C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BE97
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298428C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981680
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029866BD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980ED0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984EF8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298D2FF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029812E9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029832E5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298D25D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986E50
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984E4B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298124F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298626C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986B91
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983B8D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298678D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984FBB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029817BF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298D3A8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029813AA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298D3A4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02980FDB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BBCE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029843F5
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029863E7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298171F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986B04
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983B36
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986327
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C350
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BF51
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986742
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984347
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298E772
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986C95
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986497
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02981083
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984485
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BCB6
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029844A8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029860D4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984CC9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029808FA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983CF6
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984CF7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029868E9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029810EB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029814EF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02985C10
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C010
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BC08
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986C05
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298143F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983C37
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298B846
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984C70
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984C68
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298086C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298446C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298506C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986866
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298159A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984D9B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298619D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986991
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298D1B1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029841B7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BDFC
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986DFE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029841F2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029865ED
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029815E1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983D33
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984524
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02985551
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298BD42
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02983D43
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986545
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984560
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02986D63
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298B3DF second address: 000000000298B409 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor edx, AD6145DAh 0x00000010 cmp bh, dh 0x00000012 test bh, ah 0x00000014 xor edx, 12B119F7h 0x0000001a test bx, dx 0x0000001d cmp ecx, ecx 0x0000001f xor edx, D2104AFFh 0x00000025 test ebx, edx 0x00000027 mov ebx, edx 0x00000029 pushad 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298B409 second address: 000000000298B409 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a shl edx, 05h 0x0000000d add edx, ebx 0x0000000f movzx ebx, byte ptr [esi] 0x00000012 cmp bh, dh 0x00000014 add edx, ebx 0x00000016 xor edx, 09D23C6Ah 0x0000001c jmp 00007FE97C6ED5EEh 0x0000001e push ss 0x0000001f pop ss 0x00000020 jmp 00007FE97C6ED5E9h 0x00000022 add esi, 02h 0x00000025 mov word ptr [ebp+00000271h], bx 0x0000002c mov bx, word ptr [esi] 0x0000002f cmp bx, 0000h 0x00000033 mov bx, word ptr [ebp+00000271h] 0x0000003a jne 00007FE97C6ED530h 0x00000040 mov ebx, edx 0x00000042 pushad 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298B3B8 second address: 000000000298B3B8 instructions:
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298E29D second address: 000000000298E29D instructions:
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298C060 second address: 000000000298C075 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a mov edx, 9D78574Ah 0x0000000f pushad 0x00000010 mov edx, 000000F5h 0x00000015 rdtsc
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298B3DF second address: 000000000298B409 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor edx, AD6145DAh 0x00000010 cmp bh, dh 0x00000012 test bh, ah 0x00000014 xor edx, 12B119F7h 0x0000001a test bx, dx 0x0000001d cmp ecx, ecx 0x0000001f xor edx, D2104AFFh 0x00000025 test ebx, edx 0x00000027 mov ebx, edx 0x00000029 pushad 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298B409 second address: 000000000298B409 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a shl edx, 05h 0x0000000d add edx, ebx 0x0000000f movzx ebx, byte ptr [esi] 0x00000012 cmp bh, dh 0x00000014 add edx, ebx 0x00000016 xor edx, 09D23C6Ah 0x0000001c jmp 00007FE97C6ED5EEh 0x0000001e push ss 0x0000001f pop ss 0x00000020 jmp 00007FE97C6ED5E9h 0x00000022 add esi, 02h 0x00000025 mov word ptr [ebp+00000271h], bx 0x0000002c mov bx, word ptr [esi] 0x0000002f cmp bx, 0000h 0x00000033 mov bx, word ptr [ebp+00000271h] 0x0000003a jne 00007FE97C6ED530h 0x00000040 mov ebx, edx 0x00000042 pushad 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298B3B8 second address: 000000000298B3B8 instructions:
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298E29D second address: 000000000298E29D instructions:
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298C060 second address: 000000000298C075 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a mov edx, 9D78574Ah 0x0000000f pushad 0x00000010 mov edx, 000000F5h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298C075 second address: 000000000298C0A1 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 xor edx, 2F78EC29h 0x00000009 xor edx, 66DC7D09h 0x0000000f cmp cx, cx 0x00000012 cmp bx, cx 0x00000015 add edx, 2B23399Ah 0x0000001b cmp bl, bl 0x0000001d cmp dword ptr [edi+14h], edx 0x00000020 mov edx, dword ptr [ebp+000001CDh] 0x00000026 je 00007FE97C6ED5D6h 0x00000028 pushad 0x00000029 lfence 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeRDTSC instruction interceptor: First address: 000000000298C0A1 second address: 000000000298BD95 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b jmp 00007FE97C9C9548h 0x00000010 jmp 00007FE97C9C9972h 0x00000012 cmp bx, bx 0x00000015 add esi, 00001000h 0x0000001b test bh, ah 0x0000001d test ch, ch 0x0000001f mov dword ptr [ebp+000001CEh], esi 0x00000025 mov esi, D1CB123Dh 0x0000002a test ax, bx 0x0000002d xor esi, 9D079601h 0x00000033 cmp bl, al 0x00000035 xor esi, 6EEE3B7Fh 0x0000003b test ax, ax 0x0000003e sub esi, 2221CF43h 0x00000044 test bl, bl 0x00000046 cmp dword ptr [ebp+000001CEh], esi 0x0000004c mov esi, dword ptr [ebp+000001CEh] 0x00000052 je 00007FE97C9CA267h 0x00000058 test ah, ch 0x0000005a test ax, 00005041h 0x0000005e mov dword ptr [ebp+00000218h], esi 0x00000064 cmp cl, FFFFFFB9h 0x00000067 mov esi, 1CDCD8D0h 0x0000006c jmp 00007FE97C9C9976h 0x0000006e test bx, cx 0x00000071 cmp edx, ecx 0x00000073 xor esi, 8DEA0809h 0x00000079 test edi, 1851CFE8h 0x0000007f cmp ch, bh 0x00000081 xor esi, 46C5E00Dh 0x00000087 pushad 0x00000088 mov ebx, 000000B2h 0x0000008d rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02988274 rdtsc
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

            Anti Debugging:

            barindex
            Found potential dummy code loops (likely to delay analysis)Show sources
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeProcess Stats: CPU usage > 90% for more than 60s
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02988274 rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298B2B6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298AA71 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C783 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C350 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298C750 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02987C90 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984C70 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_02984C68 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_029841B7 mov eax, dword ptr fs:[00000030h]
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exe, 00000000.00000002.1304340706.0000000000C40000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exe, 00000000.00000002.1304340706.0000000000C40000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exe, 00000000.00000002.1304340706.0000000000C40000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: SecuriteInfo.com.__vbaHresultCheckObj.11013.exe, 00000000.00000002.1304340706.0000000000C40000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exeCode function: 0_2_0298B4B5 cpuid

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery41Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery311Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

            Behavior Graph

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            SecuriteInfo.com.__vbaHresultCheckObj.11013.exe26%VirustotalBrowse
            SecuriteInfo.com.__vbaHresultCheckObj.11013.exe30%ReversingLabsWin32.Trojan.GuLoader
            SecuriteInfo.com.__vbaHresultCheckObj.11013.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            https://andreameixueiro.com/IRANSAT_Vsidob74.bin0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            https://andreameixueiro.com/IRANSAT_Vsidob74.bintrue
            • Avira URL Cloud: safe
            unknown

            Contacted IPs

            No contacted IP infos

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:451415
            Start date:20.07.2021
            Start time:16:15:36
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 12m 42s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:SecuriteInfo.com.__vbaHresultCheckObj.11013.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Run name:Suspected Instruction Hammering Hide Perf
            Number of analysed new started processes analysed:36
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal88.troj.evad.winEXE@1/0@0/0
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 6.3% (good quality ratio 1.8%)
            • Quality average: 16.1%
            • Quality standard deviation: 26.2%
            HCA Information:Failed
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing disassembly code.

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            No context

            Domains

            No context

            ASN

            No context

            JA3 Fingerprints

            No context

            Dropped Files

            No context

            Created / dropped Files

            No created / dropped files found

            Static File Info

            General

            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.2543149496955905
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.15%
            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:SecuriteInfo.com.__vbaHresultCheckObj.11013.exe
            File size:241664
            MD5:c6066a473750ed5ad023d20ce532c8c8
            SHA1:b2c181c008fd857b0f0122dbfd05d4193654ccc2
            SHA256:932f31e907302148994f479eafe8dfbf203537491bbd586c43190c59afa248ff
            SHA512:eb1bc3dfd845ba94e4e936b48dda25fff41fb59267593eb82facf9e92688ec5c0ed81d8db69855d5e39563ab8449466b3e7cb28ba1eb25c045481283293a6a3b
            SSDEEP:3072:Or3BepJlZa/X16SU2Aara5K8EyrNRlu2mHJlZapGBR:OFiUXI15KHyrDMHP
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L....B.O................. ...................0....@................

            File Icon

            Icon Hash:f8fcd4ccf4e4e8d0

            Static PE Info

            General

            Entrypoint:0x4019b0
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:
            Time Stamp:0x4FA642B9 [Sun May 6 09:22:01 2012 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:e9f7dd0da1a2a1266893e1ae4ef42b67

            Entrypoint Preview

            Instruction
            push 00408AD0h
            call 00007FE97CE21895h
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            xor byte ptr [eax], al
            add byte ptr [eax], al
            inc eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax+64h], dl
            pop esp
            in eax, B8h
            dec esp
            pushad
            inc edx
            xchg eax, ebp
            sbb al, A7h
            rcr dword ptr [edi+0014C50Ah], cl
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [ecx], al
            add byte ptr [eax], al
            add byte ptr [esi], ch
            dec edi
            jo 00007FE97CE21916h
            imul ebp, dword ptr [edi+41h], 45444F50h
            dec ebp
            inc ecx
            dec edi
            inc edx
            add byte ptr [ebp+6Fh], cl
            or eax, 0000000Ah
            add bh, bh
            int3
            xor dword ptr [eax], eax
            xor ecx, esp
            rcr dword ptr [esi-0F04F7E5h], 48h
            cdq

            Data Directories

            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x325240x28.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x350000x6d12.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
            IMAGE_DIRECTORY_ENTRY_IAT0x10000x1a4.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

            Sections

            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x31b940x32000False0.394462890625data6.41394682438IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .data0x330000x12900x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .rsrc0x350000x6d120x7000False0.482003348214data5.46106000111IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

            Resources

            NameRVASizeTypeLanguageCountry
            RT_ICON0x3ae6a0xea8data
            RT_ICON0x3a5c20x8a8data
            RT_ICON0x39efa0x6c8data
            RT_ICON0x399920x568GLS_BINARY_LSB_FIRST
            RT_ICON0x373ea0x25a8dBase III DBT, version number 0, next free block index 40
            RT_ICON0x363420x10a8data
            RT_ICON0x359ba0x988data
            RT_ICON0x355520x468GLS_BINARY_LSB_FIRST
            RT_GROUP_ICON0x354dc0x76data
            RT_VERSION0x352400x29cdataEnglishUnited States

            Imports

            DLLImport
            MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaLenBstr, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaCyStr, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaI2I4, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaFpCmpCy, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaInStrVar, __vbaDateVar, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaNew2, __vbaVar2Vec, __vbaInStr, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

            Version Infos

            DescriptionData
            Translation0x0409 0x04b0
            LegalCopyrightSocialbakers
            InternalNameObject
            FileVersion1.00
            CompanyNameSocialbakers
            LegalTrademarksSocialbakers
            ProductNameAPODEMAOB
            ProductVersion1.00
            OriginalFilenameObject.exe

            Possible Origin

            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States

            Network Behavior

            No network behavior found

            Code Manipulations

            Statistics

            System Behavior

            General

            Start time:16:16:31
            Start date:20/07/2021
            Path:C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exe
            Wow64 process (32bit):true
            Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.__vbaHresultCheckObj.11013.exe'
            Imagebase:0x400000
            File size:241664 bytes
            MD5 hash:C6066A473750ED5AD023D20CE532C8C8
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Visual Basic
            Yara matches:
            • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000002.1302794449.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000000.00000000.218200781.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
            Reputation:low

            Disassembly

            Code Analysis

            Reset < >