Loading ...

Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.Variant.Graftor.981190.24096.12674

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Graftor.981190.24096.12674 (renamed file extension from 12674 to exe)
Analysis ID:451828
MD5:19cac1ee3a6e5e9f83054616f5d5ce6f
SHA1:5b7f16098760f887b0bdc5fee9223d022e0597fb
SHA256:3709110cc04e0eaffe10bec5e8a5c82b858bee4195975e7bcd30c50b246f56c3
Tags:exe
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
PE / OLE file has an invalid certificate
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://kinmirai.org/wp-content/bin_lOulvHP91.bip"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Variant.Graftor.981190.24096.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000002.00000000.325526342.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
      00000002.00000002.850474872.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
        00000002.00000002.852029233.0000000002A90000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          2.2.SecuriteInfo.com.Variant.Graftor.981190.24096.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
            2.0.SecuriteInfo.com.Variant.Graftor.981190.24096.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

              Sigma Overview

              No Sigma rule has matched

              Jbx Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeMalware Configuration Extractor: GuLoader {"Payload URL": "https://kinmirai.org/wp-content/bin_lOulvHP91.bip"}
              Multi AV Scanner detection for submitted fileShow sources
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeVirustotal: Detection: 14%Perma Link
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeReversingLabs: Detection: 19%
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\typo.pdb source: SecuriteInfo.com.Variant.Graftor.981190.24096.exe

              Networking:

              barindex
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: https://kinmirai.org/wp-content/bin_lOulvHP91.bip
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: http://ocsp.digicert.com0C
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: http://ocsp.digicert.com0O
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: http://www.digicert.com/CPS0
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeString found in binary or memory: https://www.digicert.com/CPS0
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exe, 00000002.00000002.850725852.000000000073A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeProcess Stats: CPU usage > 98%
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A953FF NtAllocateVirtualMemory,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A953FB NtAllocateVirtualMemory,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A95541 NtAllocateVirtualMemory,
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A953FF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93EB2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A97EB4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A97AEF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A906E2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A97AF5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A926CA
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93EC0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A906D2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A97229
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A90626
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A98605
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A91207
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A9824D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93FA8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A937A5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93FE9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93BE2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A953FB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A947FF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93FC2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A91B2E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A91B24
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A91706
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A96F73
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A94345
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A98B5E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A98B51
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A938B4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A97CB7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A98C81
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A940EF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A904C0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A958D6
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A92407
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A9207C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A9444B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A95844
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A951A4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A901E9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A905D8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A921DB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A901DA
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A92567
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A96D5C
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeStatic PE information: invalid certificate
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exe, 00000002.00000000.325551670.0000000000435000.00000002.00020000.sdmpBinary or memory string: OriginalFilenametypo.exe vs SecuriteInfo.com.Variant.Graftor.981190.24096.exe
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeBinary or memory string: OriginalFilenametypo.exe vs SecuriteInfo.com.Variant.Graftor.981190.24096.exe
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: classification engineClassification label: mal84.troj.evad.winEXE@1/0@0/0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeFile created: C:\Users\user\AppData\Local\Temp\~DF84A7F2EA291541CF.TMPJump to behavior
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeVirustotal: Detection: 14%
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeReversingLabs: Detection: 19%
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\typo.pdb source: SecuriteInfo.com.Variant.Graftor.981190.24096.exe

              Data Obfuscation:

              barindex
              Yara detected GuLoaderShow sources
              Source: Yara matchFile source: 00000002.00000002.852029233.0000000002A90000.00000040.00000001.sdmp, type: MEMORY
              Yara detected GuLoaderShow sources
              Source: Yara matchFile source: SecuriteInfo.com.Variant.Graftor.981190.24096.exe, type: SAMPLE
              Source: Yara matchFile source: 2.2.SecuriteInfo.com.Variant.Graftor.981190.24096.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.SecuriteInfo.com.Variant.Graftor.981190.24096.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000000.325526342.0000000000401000.00000020.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.850474872.0000000000401000.00000020.00020000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A99662 push esp; iretd
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A99672 push esp; iretd
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A99676 push esp; iretd
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93FA8 push ebp; retf
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A9634A push 00000020h; retf
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A91589 push ebp; retf
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A935DC push ebp; ret
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93EB2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A97EB4
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A906E2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A906D2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A90626
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A98605
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93FA8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A937A5
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93FE9
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93FC2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A94345
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A98B51
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A97CB7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A940EF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A904C0
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A92407
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A9207C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A905D8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A921DB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A92567
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A96D5C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93EB2 rdtsc
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

              Anti Debugging:

              barindex
              Found potential dummy code loops (likely to delay analysis)Show sources
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeProcess Stats: CPU usage > 90% for more than 60s
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A93EB2 rdtsc
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A96B34 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A970BE mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A97CB7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A95022 mov eax, dword ptr fs:[00000030h]
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exe, 00000002.00000002.850792525.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exe, 00000002.00000002.850792525.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exe, 00000002.00000002.850792525.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
              Source: SecuriteInfo.com.Variant.Graftor.981190.24096.exe, 00000002.00000002.850792525.0000000000CC0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exeCode function: 2_2_02A96E24 cpuid

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11Input Capture1Security Software Discovery21Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery111Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              SecuriteInfo.com.Variant.Graftor.981190.24096.exe15%VirustotalBrowse
              SecuriteInfo.com.Variant.Graftor.981190.24096.exe20%ReversingLabsWin32.Trojan.Graftor

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              No Antivirus matches

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              https://kinmirai.org/wp-content/bin_lOulvHP91.bip0%VirustotalBrowse
              https://kinmirai.org/wp-content/bin_lOulvHP91.bip0%Avira URL Cloudsafe

              Domains and IPs

              Contacted Domains

              No contacted domains info

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              https://kinmirai.org/wp-content/bin_lOulvHP91.biptrue
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:33.0.0 White Diamond
              Analysis ID:451828
              Start date:21.07.2021
              Start time:12:02:10
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 38s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:SecuriteInfo.com.Variant.Graftor.981190.24096.12674 (renamed file extension from 12674 to exe)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:21
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal84.troj.evad.winEXE@1/0@0/0
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:Failed
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Override analysis time to 240s for sample files taking high CPU consumption
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
              • Not all processes where analyzed, report is missing behavior information

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              No created / dropped files found

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):4.635501230509535
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.15%
              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:SecuriteInfo.com.Variant.Graftor.981190.24096.exe
              File size:246888
              MD5:19cac1ee3a6e5e9f83054616f5d5ce6f
              SHA1:5b7f16098760f887b0bdc5fee9223d022e0597fb
              SHA256:3709110cc04e0eaffe10bec5e8a5c82b858bee4195975e7bcd30c50b246f56c3
              SHA512:75d7cc20b44224ab616b9d4e6edd2c527c4245f5752430a08ed7a68a3d1596bfe5f9a16a447a57e8cbbe965b7377c6259f481c6a1ae8d262238ad25dce14a0ad
              SSDEEP:3072:MtU2Qf98DH332/jEvQuUZZNzPmhd3QPBP:KU2Qf9iXm/jduUNzPKNC
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........y.....................................Rich............PE..L.....QU.................0...p......0........@....@................

              File Icon

              Icon Hash:e8ccce8e8ececce8

              Static PE Info

              General

              Entrypoint:0x401330
              Entrypoint Section:.text
              Digitally signed:true
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              DLL Characteristics:
              Time Stamp:0x5551E11C [Tue May 12 11:16:44 2015 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:4e1e57f6de47f654992269152dd1e659

              Authenticode Signature

              Signature Valid:false
              Signature Issuer:E=Lertj1@impifo.Tw, CN=Konc, OU=HVEPSERED, O=Sulfur2, L=Delings, S=tyskla, C=IS
              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
              Error Number:-2146762487
              Not Before, Not After
              • 7/20/2021 2:04:04 PM 7/20/2022 2:04:04 PM
              Subject Chain
              • E=Lertj1@impifo.Tw, CN=Konc, OU=HVEPSERED, O=Sulfur2, L=Delings, S=tyskla, C=IS
              Version:3
              Thumbprint MD5:E001EFB7FC2CF4F9AF90A05F56C0FF24
              Thumbprint SHA-1:FCE4066FC44A76DB5BD40EDCD674457947994F61
              Thumbprint SHA-256:30E21C2F0117B69F54088BA86D9ACD07DCB63504497576DBD473335F67BB6F5D
              Serial:00

              Entrypoint Preview

              Instruction
              push 0042F010h
              call 00007FA8548FED93h
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              xor byte ptr [eax], al
              add byte ptr [eax], al
              cmp byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              jnle 00007FA8548FED52h
              mov dh, EDh
              lodsb
              jl 00007FA8548FED37h
              inc ebx
              mov ecx, BEBDAAA6h
              insd
              das
              out dx, al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add dword ptr [eax], eax
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              dec esp
              jne 00007FA8548FEE10h
              popad
              je 00007FA8548FEE03h
              imul eax, dword ptr [eax], 00000000h
              dec esp
              xor dword ptr [eax], eax
              adc al, 59h
              push esi
              rcl dword ptr [ebp+eax*4+6Eh], 1
              add byte ptr [edx+ebx*4-14h], al
              movsb
              loope 00007FA8548FEDA0h
              cld
              outsd
              clc
              and eax, 9AF307A8h
              inc ebp
              inc ebx
              inc esp
              stosb
              and ecx, ecx
              push edi
              cmp byte ptr [ebx+4F3A3B76h], FFFFFFADh
              xor ebx, dword ptr [ecx-48EE309Ah]
              or al, 00h
              stosb
              add byte ptr [eax-2Dh], ah
              xchg eax, ebx
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              push es
              fild dword ptr [edx]
              add byte ptr [ecx+4Fh], bh
              add byte ptr [eax], al
              add byte ptr [eax], cl
              add byte ptr [edi+ebp*2+74h], ah
              imul ebp, dword ptr [esi+67h], 0D006373h
              add dword ptr [eax+eax], eax
              push edx
              dec ecx
              inc edi
              dec eax
              add byte ptr [ecx], bl
              add dword ptr [eax], eax
              inc edx
              add byte ptr [edx], ah
              add byte ptr [ebx], ah
              dec edi

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x330540x28.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x350000x54b4.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x3b0500x1418
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x11000x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
              IMAGE_DIRECTORY_ENTRY_IAT0x10000xf8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x324a00x33000False0.249899471507data4.58227124451IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .data0x340000xb900x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0x350000x54b40x6000False0.293172200521data4.10742387863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_ICON0x39e4c0x668dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 4265541880, next used block 7936
              RT_ICON0x39b640x2e8data
              RT_ICON0x3997c0x1e8data
              RT_ICON0x398540x128GLS_BINARY_LSB_FIRST
              RT_ICON0x389ac0xea8data
              RT_ICON0x381040x8a8data
              RT_ICON0x37a3c0x6c8data
              RT_ICON0x374d40x568GLS_BINARY_LSB_FIRST
              RT_ICON0x3642c0x10a8data
              RT_ICON0x35aa40x988data
              RT_ICON0x3563c0x468GLS_BINARY_LSB_FIRST
              RT_GROUP_ICON0x3559c0xa0data
              RT_VERSION0x352d00x2ccdataEnglishUnited States

              Imports

              DLLImport
              MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaObjVar, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaLateMemCall, __vbaStrToAnsi, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

              Version Infos

              DescriptionData
              Translation0x0409 0x04b0
              LegalCopyrightClicked
              InternalNametypo
              FileVersion7.00
              CompanyNameClicked
              LegalTrademarksClicked
              CommentsClicked
              ProductNameClicked
              ProductVersion7.00
              FileDescriptionClicked
              OriginalFilenametypo.exe

              Possible Origin

              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              System Behavior

              General

              Start time:12:03:02
              Start date:21/07/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Variant.Graftor.981190.24096.exe'
              Imagebase:0x400000
              File size:246888 bytes
              MD5 hash:19CAC1EE3A6E5E9F83054616F5D5CE6F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:Visual Basic
              Yara matches:
              • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000002.00000000.325526342.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000002.00000002.850474872.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.852029233.0000000002A90000.00000040.00000001.sdmp, Author: Joe Security
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >