Loading ...

Play interactive tourEdit tour

Windows Analysis Report June-July_Commission_List_Summary-2021.exe

Overview

General Information

Sample Name:June-July_Commission_List_Summary-2021.exe
Analysis ID:457757
MD5:bc6d6f6c55211e9ffc8972f330135da7
SHA1:07b6f45608594b9ee812a9a95f80e51d644424c9
SHA256:4326190ec077d66ad458337eed8a4f517cfd354247e921c4d01d9f50d9346e32
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected potential crypto function
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "http://91.245.255.54/remcos_a_QlYzBK"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.1304299129.0000000002330000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000001.00000002.1304299129.0000000002330000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://91.245.255.54/remcos_a_QlYzBK"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: June-July_Commission_List_Summary-2021.exeVirustotal: Detection: 29%Perma Link
    Source: June-July_Commission_List_Summary-2021.exeReversingLabs: Detection: 17%
    Machine Learning detection for sampleShow sources
    Source: June-July_Commission_List_Summary-2021.exeJoe Sandbox ML: detected
    Source: June-July_Commission_List_Summary-2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: http://91.245.255.54/remcos_a_QlYzBK
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess Stats: CPU usage > 98%
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233A014 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233A23E NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233A307 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233A07C NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233A19C NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233A014
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02341630
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233523A
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02338610
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02333E18
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02337A74
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02337E47
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02338E4D
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023366A3
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02337288
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233DAEC
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02330EC3
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233EEC4
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02341ACC
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233F323
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02337B2E
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02337F10
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233830E
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233270D
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233EF7F
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02330F6F
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233676C
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02337345
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02340F4F
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233DFB4
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023377A3
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02340FA6
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02334BA6
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023383FA
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023327E3
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023353DF
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023387C4
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02340830
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02334C39
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02338C14
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02337C1B
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02338805
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233E070
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02337074
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233A07C
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233E070
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02330C49
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023414A5
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023388AB
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233649B
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233E535
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233812F
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233F110
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02337904
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02341577
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02335574
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233E554
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02338149
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0234194F
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233819E
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02338D9C
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02336586
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02333DE4
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02333DEA
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023359CC
    Source: June-July_Commission_List_Summary-2021.exe, 00000001.00000000.219924452.0000000000473000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameWivrejaygeesca9.exe vs June-July_Commission_List_Summary-2021.exe
    Source: June-July_Commission_List_Summary-2021.exe, 00000001.00000002.1304125341.0000000002250000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs June-July_Commission_List_Summary-2021.exe
    Source: June-July_Commission_List_Summary-2021.exeBinary or memory string: OriginalFilenameWivrejaygeesca9.exe vs June-July_Commission_List_Summary-2021.exe
    Source: June-July_Commission_List_Summary-2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: classification engineClassification label: mal88.troj.evad.winEXE@1/0@0/0
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeFile created: C:\Users\user\AppData\Local\Temp\~DFC32100787B3DE00F.TMPJump to behavior
    Source: June-July_Commission_List_Summary-2021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: June-July_Commission_List_Summary-2021.exeVirustotal: Detection: 29%
    Source: June-July_Commission_List_Summary-2021.exeReversingLabs: Detection: 17%

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000001.00000002.1304299129.0000000002330000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_00404923 push ds; ret
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0040659A push esp; retf
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0040569B push ebp; retf
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_00408B7B push ebx; iretd
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_00406F8F push ebp; retf
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233AE57 pushad ; retf
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233AE82 pushad ; retf
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023310DE push FA63AFCBh; retf
    Source: initial sampleStatic PE information: section name: .text entropy: 7.14012596914
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02341630
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233523A
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233EEC4
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023353DF
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233446F
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023414A5
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233449C
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233D52B
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02341577
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02335574
    Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 000000000233E4B4 second address: 000000000233E4B4 instructions:
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 0000000002341AA0 second address: 0000000002341AA0 instructions:
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 000000000233E4B4 second address: 000000000233E4B4 instructions:
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 000000000233DC02 second address: 000000000233DDA2 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov esi, dword ptr [ebp+00000223h] 0x00000011 mov dword ptr [ebp+0000021Bh], eax 0x00000017 mov eax, esi 0x00000019 push eax 0x0000001a cmp dl, cl 0x0000001c mov eax, dword ptr [ebp+0000021Bh] 0x00000022 mov dword ptr [ebp+0000019Ch], ebx 0x00000028 test dx, F826h 0x0000002d mov ebx, edx 0x0000002f test bx, 655Ch 0x00000034 push ebx 0x00000035 mov ebx, dword ptr [ebp+0000019Ch] 0x0000003b call 00007F90ECE82998h 0x00000040 test edx, ebx 0x00000042 mov esi, dword ptr [esp+04h] 0x00000046 mov eax, 020D0734h 0x0000004b xor eax, 97E8A2A4h 0x00000050 jmp 00007F90ECE829F9h 0x00000055 test dx, bx 0x00000058 xor eax, 66496E64h 0x0000005d sub eax, F3ACB6EFh 0x00000062 test ax, cx 0x00000065 test ax, ax 0x00000068 mov dword ptr [ebp+000001DCh], ebx 0x0000006e mov ebx, FD8668ABh 0x00000073 pushad 0x00000074 mov edx, 00000025h 0x00000079 rdtsc
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 000000000233DDA2 second address: 000000000233DDA2 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 add ebx, 2EB48951h 0x00000009 xor ebx, 4D05852Ah 0x0000000f test ah, ah 0x00000011 sub ebx, 613F7432h 0x00000017 cmp byte ptr [esi], bl 0x00000019 mov ebx, dword ptr [ebp+000001DCh] 0x0000001f jnc 00007F90EC99618Dh 0x00000021 mov ebx, eax 0x00000023 test dh, ch 0x00000025 shl eax, 05h 0x00000028 add eax, ebx 0x0000002a movzx ecx, byte ptr [esi] 0x0000002d test bh, dh 0x0000002f add eax, ecx 0x00000031 xor eax, 87814D76h 0x00000036 test dh, dh 0x00000038 inc esi 0x00000039 mov dword ptr [ebp+00000199h], ecx 0x0000003f mov ecx, 8083BC92h 0x00000044 cmp edx, E060B676h 0x0000004a test al, bl 0x0000004c xor ecx, 15B192FBh 0x00000052 xor ecx, 1B76C997h 0x00000058 test ecx, eax 0x0000005a xor ecx, 8E44E7FEh 0x00000060 cmp ebx, D7C88536h 0x00000066 cmp dh, FFFFFFD5h 0x00000069 cmp byte ptr [esi], cl 0x0000006b mov ecx, dword ptr [ebp+00000199h] 0x00000071 jne 00007F90EC9960AEh 0x00000077 mov dword ptr [ebp+000001DCh], ebx 0x0000007d mov ebx, FD8668ABh 0x00000082 pushad 0x00000083 mov edx, 00000025h 0x00000088 rdtsc
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 0000000002341903 second address: 0000000002341903 instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 cmp dword ptr [ebp+000001DAh], ebx 0x00000009 jne 00007F90ECE82916h 0x0000000b xor dword ptr [eax], edx 0x0000000d add eax, 04h 0x00000010 mov dword ptr [ebp+000001DAh], eax 0x00000016 pushad 0x00000017 mov eax, 000000FCh 0x0000001c rdtsc
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 0000000002341AA0 second address: 0000000002341AA0 instructions:
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeRDTSC instruction interceptor: First address: 000000000233F545 second address: 000000000233DDA2 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b push ecx 0x0000000c mov ecx, dword ptr [ebp+000001B8h] 0x00000012 test bh, dh 0x00000014 mov dword ptr [ebp+0000020Fh], edx 0x0000001a mov edx, ecx 0x0000001c cmp ch, dh 0x0000001e push edx 0x0000001f cmp eax, D3D4D650h 0x00000024 mov edx, dword ptr [ebp+0000020Fh] 0x0000002a mov dword ptr [ebp+0000024Ah], ecx 0x00000030 mov ecx, esi 0x00000032 push ecx 0x00000033 mov ecx, dword ptr [ebp+0000024Ah] 0x00000039 test dl, cl 0x0000003b mov dword ptr [ebp+00000210h], eax 0x00000041 mov eax, esi 0x00000043 push eax 0x00000044 cmp ah, dh 0x00000046 mov eax, dword ptr [ebp+00000210h] 0x0000004c cmp cx, bx 0x0000004f add dword ptr [esp], ecx 0x00000052 call 00007F90ECE8103Eh 0x00000057 test edx, ebx 0x00000059 mov esi, dword ptr [esp+04h] 0x0000005d mov eax, 020D0734h 0x00000062 xor eax, 97E8A2A4h 0x00000067 jmp 00007F90ECE829F9h 0x0000006c test dx, bx 0x0000006f xor eax, 66496E64h 0x00000074 sub eax, F3ACB6EFh 0x00000079 test ax, cx 0x0000007c test ax, ax 0x0000007f mov dword ptr [ebp+000001DCh], ebx 0x00000085 mov ebx, FD8668ABh 0x0000008a pushad 0x0000008b mov edx, 00000025h 0x00000090 rdtsc
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233A014 rdtsc
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

    Anti Debugging:

    barindex
    Found potential dummy code loops (likely to delay analysis)Show sources
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeProcess Stats: CPU usage > 90% for more than 60s
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233A014 rdtsc
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233523A mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233E26D mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023366A3 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233E347 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_023397E2 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233D812 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_0233649B mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02336586 mov eax, dword ptr fs:[00000030h]
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: June-July_Commission_List_Summary-2021.exe, 00000001.00000002.1303735073.0000000000DF0000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: June-July_Commission_List_Summary-2021.exe, 00000001.00000002.1303735073.0000000000DF0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: June-July_Commission_List_Summary-2021.exe, 00000001.00000002.1303735073.0000000000DF0000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: June-July_Commission_List_Summary-2021.exe, 00000001.00000002.1303735073.0000000000DF0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exeCode function: 1_2_02339235 cpuid

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery41Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsSoftware Packing1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSSystem Information Discovery311Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    June-July_Commission_List_Summary-2021.exe30%VirustotalBrowse
    June-July_Commission_List_Summary-2021.exe17%ReversingLabsWin32.Trojan.Mucc
    June-July_Commission_List_Summary-2021.exe100%Joe Sandbox ML

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://91.245.255.54/remcos_a_QlYzBK0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://91.245.255.54/remcos_a_QlYzBKtrue
    • Avira URL Cloud: safe
    unknown

    Contacted IPs

    No contacted IP infos

    General Information

    Joe Sandbox Version:33.0.0 White Diamond
    Analysis ID:457757
    Start date:02.08.2021
    Start time:09:32:27
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 12m 4s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:June-July_Commission_List_Summary-2021.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Run name:Suspected Instruction Hammering Hide Perf
    Number of analysed new started processes analysed:41
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal88.troj.evad.winEXE@1/0@0/0
    EGA Information:Failed
    HDC Information:
    • Successful, ratio: 39.5% (good quality ratio 22.2%)
    • Quality average: 32.7%
    • Quality standard deviation: 34.4%
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .exe
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
    • Not all processes where analyzed, report is missing behavior information

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    No created / dropped files found

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):4.8708154897145
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:June-July_Commission_List_Summary-2021.exe
    File size:471040
    MD5:bc6d6f6c55211e9ffc8972f330135da7
    SHA1:07b6f45608594b9ee812a9a95f80e51d644424c9
    SHA256:4326190ec077d66ad458337eed8a4f517cfd354247e921c4d01d9f50d9346e32
    SHA512:a7947412f8c4d063d8fc4618f806d3900df4a47cc042da6ebbc893f7399eb2be20361ca92c324b31f37ffb896c2b827ca161cf7d24d17ceda0c9a2a8db85afec
    SSDEEP:3072:W1bzponwO9HPBFRXBQnmCpy4eeF9d6tTbsYPYcF4v98C8OZW44PcpLg7SO32OGl0:W1bz+woHOmtmmTNYMSB
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......S.....................@....................@................

    File Icon

    Icon Hash:09090d0909040901

    Static PE Info

    General

    Entrypoint:0x4015bc
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    DLL Characteristics:
    Time Stamp:0x5317A394 [Wed Mar 5 22:22:12 2014 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:6a2215b83e94f57aa594370ef2448759

    Entrypoint Preview

    Instruction
    push 004027A4h
    call 00007F90EC8BD2F5h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    xor byte ptr [eax], al
    add byte ptr [eax], al
    inc eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [edi+6A214ED7h], al
    shr dword ptr [ebp+48h], cl
    mov dl, 49h
    jo 00007F90EC8BD324h
    lds ebp, esi
    lodsb
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add dword ptr [eax], eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    mov al, 8Fh
    adc byte ptr [ebx], al
    dec ebx
    jne 00007F90EC8BD36Eh
    insd
    imul ebp, dword ptr [esi+65h], 666C6974h
    add byte ptr [eax], ah
    or byte ptr [ecx+00h], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    dec esp
    xor dword ptr [eax], eax
    or al, 41h
    in al, dx
    out 9Dh, eax
    sahf
    or al, byte ptr [edi-4Dh]
    cmpsd
    adc dword ptr [edx-2Eh], edi
    inc esi
    wait
    jbe 00007F90EC8BD2D4h
    or byte ptr [ecx+44C5F4EFh], ch
    mov cl, F3h
    xchg eax, ebx
    nop
    cmp byte ptr [ebx+eax*8], cl
    mov byte ptr [33AD4F3Ah], al
    cdq
    iretw
    adc dword ptr [edi+00AA000Ch], esi
    pushad
    rcl dword ptr [ebx+00000000h], cl
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    push esp
    adc byte ptr [eax], al
    add byte ptr [ebp+0000000Eh], al
    or al, byte ptr [eax]
    push ebx
    popad
    outsb
    outsb
    arpl word ptr [edi+61h], bp
    xor eax, 05010D00h
    add byte ptr [ecx+4Eh], al
    push ebx
    dec ecx

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x2f9540x28.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x41ae4.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
    IMAGE_DIRECTORY_ENTRY_IAT0x10000x16c.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x2ee9c0x2f000False0.605172664561data7.14012596914IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .data0x300000x11e80x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x320000x41ae40x42000False0.052353367661data2.16158172255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    RT_ICON0x320e80x417e8data
    RT_GROUP_ICON0x738d00x14data
    RT_VERSION0x738e40x200dataEnglishUnited States

    Imports

    DLLImport
    MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaBoolStr, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, __vbaObjVar, __vbaI2I4, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaErrorOverflow, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

    Version Infos

    DescriptionData
    Translation0x0409 0x04b0
    ProductVersion1.04
    InternalNameWivrejaygeesca9
    FileVersion1.04
    OriginalFilenameWivrejaygeesca9.exe
    ProductNameKulminetilf

    Possible Origin

    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States

    Network Behavior

    No network behavior found

    Code Manipulations

    Statistics

    System Behavior

    General

    Start time:09:33:24
    Start date:02/08/2021
    Path:C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\June-July_Commission_List_Summary-2021.exe'
    Imagebase:0x400000
    File size:471040 bytes
    MD5 hash:BC6D6F6C55211E9FFC8972F330135DA7
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Yara matches:
    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.1304299129.0000000002330000.00000040.00000001.sdmp, Author: Joe Security
    Reputation:low

    Disassembly

    Code Analysis

    Reset < >