Loading ...

Play interactive tourEdit tour

Windows Analysis Report 97bXaukEWl.exe

Overview

General Information

Sample Name:97bXaukEWl.exe
Analysis ID:457852
MD5:9318cd06a9a0b788dc043a63c97d4fce
SHA1:a296ea3e1cf6d41f9d059d7d6e5058882b03161a
SHA256:7ad18b09938d40e8ec342ee6bee6b190a986ffedce7567a638b8d25b4098cb69
Tags:exeGuLoader
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
GuLoader behavior detected
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Found potential dummy code loops (likely to delay analysis)
Hides threads from debuggers
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
PE / OLE file has an invalid certificate
PE file contains strange resources
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • 97bXaukEWl.exe (PID: 7032 cmdline: 'C:\Users\user\Desktop\97bXaukEWl.exe' MD5: 9318CD06A9A0B788DC043A63C97D4FCE)
    • 97bXaukEWl.exe (PID: 2428 cmdline: 'C:\Users\user\Desktop\97bXaukEWl.exe' MD5: 9318CD06A9A0B788DC043A63C97D4FCE)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://kinmirai.org/wp-content/bin_NIapfDNXM183.bin"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.977918776.00000000021F0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000010.00000002.1723282507.0000000000560000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000000.00000002.977918776.00000000021F0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://kinmirai.org/wp-content/bin_NIapfDNXM183.bin"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: 97bXaukEWl.exeVirustotal: Detection: 24%Perma Link
      Source: 97bXaukEWl.exeReversingLabs: Detection: 17%
      Source: 97bXaukEWl.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\bayrerss.pdb source: 97bXaukEWl.exe
      Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\bayrerss.pdb source: 97bXaukEWl.exe

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: https://kinmirai.org/wp-content/bin_NIapfDNXM183.bin
      Source: 97bXaukEWl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
      Source: 97bXaukEWl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
      Source: 97bXaukEWl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
      Source: 97bXaukEWl.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
      Source: 97bXaukEWl.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
      Source: 97bXaukEWl.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
      Source: 97bXaukEWl.exeString found in binary or memory: http://ocsp.digicert.com0C
      Source: 97bXaukEWl.exeString found in binary or memory: http://ocsp.digicert.com0O
      Source: 97bXaukEWl.exeString found in binary or memory: http://www.digicert.com/CPS0
      Source: 97bXaukEWl.exeString found in binary or memory: https://www.digicert.com/CPS0
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8A72 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F1EDB NtWriteVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8F4F NtSetContextThread,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F578B NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0B81 NtWriteVirtualMemory,TerminateProcess,LoadLibraryA,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F04E5 EnumWindows,NtWriteVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4E0A NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F927E NtSetContextThread,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F46B8 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4AAA NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4ADA NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F433C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8F5C NtSetContextThread,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F3BB6 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8FB4 NtSetContextThread,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F73A9 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8FD6 NtSetContextThread,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F245F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F9058 NtSetContextThread,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4050 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F489B NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0495 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F90D7 NtSetContextThread,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4CF4 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F916F NtSetContextThread,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00565798 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7EA7
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F1EDB
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8F4F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F578B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0B81
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F04E5
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7E1F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0E0C
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7A0B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F2655
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F2A4A
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F2A75
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F9AB9
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F46B8
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4AAA
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4ADA
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F433C
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7B34
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8F5C
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0F4A
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F5B9B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F3BB6
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8FB4
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0FAC
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F73A9
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7BDB
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8FD6
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F83CF
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F1BF9
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F1BF7
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7C0D
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F2C04
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F5403
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7C02
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8029
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F245F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F9058
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4050
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0C4E
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F2877
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8874
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F489B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0495
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F90D7
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0CC2
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4CF4
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F88F1
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F3D14
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F352B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F792B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7528
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7922
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8921
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F554D
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F796F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F916F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8166
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F81B4
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F39D7
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F85F3
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00565798
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00564050
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056245F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00569058
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00562877
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00567C02
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00567C0D
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00564021
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_005690D7
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00564CF4
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056489B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056554D
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056796F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056916F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00563D14
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056792B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056352B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_005639D7
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00562655
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00567A0B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00564ADA
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_005646B8
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00569AB9
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00564AAA
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00568F5C
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00568F4F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00567B34
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056433C
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00568FD6
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00567BDB
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_005683CF
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_005673CC
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00561BF7
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00561BF9
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00563BB6
      Source: 97bXaukEWl.exeStatic PE information: invalid certificate
      Source: 97bXaukEWl.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 97bXaukEWl.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 97bXaukEWl.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: 97bXaukEWl.exe, 00000000.00000002.980269205.00000000029E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamebayrerss.exeFE2X vs 97bXaukEWl.exe
      Source: 97bXaukEWl.exe, 00000000.00000000.643884583.0000000000436000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamebayrerss.exe vs 97bXaukEWl.exe
      Source: 97bXaukEWl.exe, 00000010.00000000.977016207.0000000000436000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamebayrerss.exe vs 97bXaukEWl.exe
      Source: 97bXaukEWl.exeBinary or memory string: OriginalFilenamebayrerss.exe vs 97bXaukEWl.exe
      Source: 97bXaukEWl.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: classification engineClassification label: mal100.troj.evad.winEXE@3/0@0/0
      Source: 97bXaukEWl.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\97bXaukEWl.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: C:\Users\user\Desktop\97bXaukEWl.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: 97bXaukEWl.exeVirustotal: Detection: 24%
      Source: 97bXaukEWl.exeReversingLabs: Detection: 17%
      Source: unknownProcess created: C:\Users\user\Desktop\97bXaukEWl.exe 'C:\Users\user\Desktop\97bXaukEWl.exe'
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess created: C:\Users\user\Desktop\97bXaukEWl.exe 'C:\Users\user\Desktop\97bXaukEWl.exe'
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess created: C:\Users\user\Desktop\97bXaukEWl.exe 'C:\Users\user\Desktop\97bXaukEWl.exe'
      Source: 97bXaukEWl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\bayrerss.pdb source: 97bXaukEWl.exe
      Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\bayrerss.pdb source: 97bXaukEWl.exe

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000000.00000002.977918776.00000000021F0000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000010.00000002.1723282507.0000000000560000.00000040.00000001.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_00421041 push ss; retf
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_00422433 push eax; iretd
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_004200E2 push eax; iretd
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_004210A8 push ebx; retf
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_00421D79 pushfd ; iretd
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_00405D8C push eax; retf
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_004223E5 push eax; iretd
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8391 push edx; ret
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F83B8 push edx; ret
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056540E pushad ; retf
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00562F61 push esi; ret
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00560FFD push ebx; iretd
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00568391 push edx; ret
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_005683B8 push edx; ret
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F1EDB NtWriteVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0B81 NtWriteVirtualMemory,TerminateProcess,LoadLibraryA,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F04E5 EnumWindows,NtWriteVirtualMemory,LoadLibraryA,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7E1F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F2A4A
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F3296
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F3714
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F433C NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F5B9B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F3BB6 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F73A9 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F33E0
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8029
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F245F NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F4050 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F0495 NtWriteVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F352B LoadLibraryA,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8166
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F81B4
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00565798 NtAllocateVirtualMemory,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00564050
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056245F
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056352B
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00563714
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056433C
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_005673CC
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00563BB6
      Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F6EEA second address: 00000000021F73F6 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a add eax, FF6DF465h 0x0000000f add eax, 051D0E23h 0x00000014 cmp ch, FFFFFF9Bh 0x00000017 add eax, BB406732h 0x0000001c push ss 0x0000001d pop ss 0x0000001e jmp 00007F5D4C976313h 0x00000020 cmp dword ptr [ebp+0000024Eh], eax 0x00000026 mov eax, dword ptr [ebp+0000024Eh] 0x0000002c jne 00007F5D4C9763B8h 0x00000032 pushad 0x00000033 mov bl, 77h 0x00000035 cmp bl, 00000077h 0x00000038 jne 00007F5D4C978972h 0x0000003e popad 0x0000003f push 7DDA0CB7h 0x00000044 call 00007F5D4C97676Ah 0x00000049 mov eax, dword ptr fs:[00000030h] 0x0000004f mov eax, dword ptr [eax+0Ch] 0x00000052 test cx, ax 0x00000055 mov eax, dword ptr [eax+14h] 0x00000058 mov ecx, dword ptr [eax] 0x0000005a pushad 0x0000005b mov bx, 12CFh 0x0000005f cmp bx, 12CFh 0x00000064 jne 00007F5D4C96F563h 0x0000006a popad 0x0000006b mov eax, ecx 0x0000006d cmp dh, ah 0x0000006f jmp 00007F5D4C976316h 0x00000071 test bh, bh 0x00000073 mov ebx, dword ptr [eax+28h] 0x00000076 test bl, dl 0x00000078 mov dword ptr [ebp+00000238h], edx 0x0000007e pushad 0x0000007f lfence 0x00000082 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F92DD second address: 00000000021F92DD instructions:
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F031E second address: 00000000021F0397 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a add dword ptr [esp], DD0EB426h 0x00000011 xor dword ptr [esp], A2789713h 0x00000018 cmp bx, dx 0x0000001b sub dword ptr [esp], 57D82723h 0x00000022 cmp dl, bl 0x00000024 push dword ptr [ebp+24h] 0x00000027 push B41326CDh 0x0000002c add dword ptr [esp], 5BFCB3E1h 0x00000033 xor dword ptr [esp], 23E80C5Ch 0x0000003a cmp dx, dx 0x0000003d xor dword ptr [esp], 33E7D6F2h 0x00000044 test eax, AA1C1C90h 0x00000049 test edi, C711A858h 0x0000004f mov dword ptr [ebp+0000022Ch], edi 0x00000055 cmp cx, cx 0x00000058 mov edi, 3881A7FFh 0x0000005d nop 0x0000005e sub edi, 3134FF81h 0x00000064 xor edi, E289D110h 0x0000006a add edi, 1A3A8692h 0x00000070 test dl, al 0x00000072 push edi 0x00000073 pushad 0x00000074 mov edi, 00000083h 0x00000079 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F54F3 second address: 00000000021F54F3 instructions:
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F431B second address: 00000000021F431B instructions:
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F4503 second address: 00000000021F453E instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor dword ptr [edi-04h], A6386E0Bh 0x00000011 xor dword ptr [edi-04h], B9D6F6F7h 0x00000018 cmp cx, ax 0x0000001b add dword ptr [edi-04h], 7462BF15h 0x00000022 test cx, cx 0x00000025 sub edi, 08h 0x00000028 mov dword ptr [ebp+00000273h], ebx 0x0000002e cmp dx, BBD8h 0x00000033 mov ebx, edi 0x00000035 pushad 0x00000036 mov esi, 00000075h 0x0000003b rdtsc
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\97bXaukEWl.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\97bXaukEWl.exeFile opened: C:\Program Files\qga\qga.exe
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: 97bXaukEWl.exe, 00000000.00000002.977929920.0000000002200000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: 97bXaukEWl.exe, 00000000.00000002.977929920.0000000002200000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F6EEA second address: 00000000021F73F6 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a add eax, FF6DF465h 0x0000000f add eax, 051D0E23h 0x00000014 cmp ch, FFFFFF9Bh 0x00000017 add eax, BB406732h 0x0000001c push ss 0x0000001d pop ss 0x0000001e jmp 00007F5D4C976313h 0x00000020 cmp dword ptr [ebp+0000024Eh], eax 0x00000026 mov eax, dword ptr [ebp+0000024Eh] 0x0000002c jne 00007F5D4C9763B8h 0x00000032 pushad 0x00000033 mov bl, 77h 0x00000035 cmp bl, 00000077h 0x00000038 jne 00007F5D4C978972h 0x0000003e popad 0x0000003f push 7DDA0CB7h 0x00000044 call 00007F5D4C97676Ah 0x00000049 mov eax, dword ptr fs:[00000030h] 0x0000004f mov eax, dword ptr [eax+0Ch] 0x00000052 test cx, ax 0x00000055 mov eax, dword ptr [eax+14h] 0x00000058 mov ecx, dword ptr [eax] 0x0000005a pushad 0x0000005b mov bx, 12CFh 0x0000005f cmp bx, 12CFh 0x00000064 jne 00007F5D4C96F563h 0x0000006a popad 0x0000006b mov eax, ecx 0x0000006d cmp dh, ah 0x0000006f jmp 00007F5D4C976316h 0x00000071 test bh, bh 0x00000073 mov ebx, dword ptr [eax+28h] 0x00000076 test bl, dl 0x00000078 mov dword ptr [ebp+00000238h], edx 0x0000007e pushad 0x0000007f lfence 0x00000082 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F73F6 second address: 00000000021F74C0 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov edx, 2A63ED14h 0x00000010 cmp ax, dx 0x00000013 xor edx, 8CD6B9A0h 0x00000019 xor edx, 8DA3C863h 0x0000001f cmp eax, ecx 0x00000021 sub edx, 2B169CD7h 0x00000027 test ebx, E044EBDBh 0x0000002d cmp ebx, edx 0x0000002f mov edx, dword ptr [ebp+00000238h] 0x00000035 je 00007F5D4C979AC8h 0x0000003b fnop 0x0000003d mov dword ptr [ebp+00000222h], eax 0x00000043 pushad 0x00000044 mov bh, 9Ah 0x00000046 cmp bh, FFFFFF9Ah 0x00000049 jne 00007F5D4C976622h 0x0000004f popad 0x00000050 mov eax, ebx 0x00000052 push eax 0x00000053 mov eax, dword ptr [ebp+00000222h] 0x00000059 test dl, 0000005Ah 0x0000005c cmp cx, dx 0x0000005f call 00007F5D4C979AA7h 0x00000064 pushad 0x00000065 lfence 0x00000068 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F58DE second address: 00000000021F593B instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 sub dword ptr [esp], F2A63F26h 0x0000000a test bx, ax 0x0000000d xor dword ptr [esp], 1168D9BEh 0x00000014 mov dword ptr [ebp+00000148h], 00000000h 0x0000001e add ebx, 04h 0x00000021 mov dword ptr [ebp+0000018Bh], esi 0x00000027 mov esi, ebx 0x00000029 push esi 0x0000002a mov esi, dword ptr [ebp+0000018Bh] 0x00000030 cmp ch, dh 0x00000032 mov dword ptr [ebp+000001E4h], ecx 0x00000038 mov ecx, 785B2C8Ch 0x0000003d test ebx, eax 0x0000003f test bx, bx 0x00000042 xor ecx, C683D913h 0x00000048 cmp dl, 00000035h 0x0000004b add ecx, 3D510807h 0x00000051 sub ecx, FC29FDA7h 0x00000057 pushad 0x00000058 mov esi, 00000084h 0x0000005d rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F92DD second address: 00000000021F92DD instructions:
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F785E second address: 00000000021F785E instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e mov eax, 5C0051C0h 0x00000013 xor eax, 94AC04D9h 0x00000018 xor eax, B48B5376h 0x0000001d add eax, 83D8F992h 0x00000022 cpuid 0x00000024 bt ecx, 1Fh 0x00000028 jc 00007F5D4C9769F4h 0x0000002e popad 0x0000002f test ch, dh 0x00000031 call 00007F5D4C97645Bh 0x00000036 lfence 0x00000039 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F031E second address: 00000000021F0397 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a add dword ptr [esp], DD0EB426h 0x00000011 xor dword ptr [esp], A2789713h 0x00000018 cmp bx, dx 0x0000001b sub dword ptr [esp], 57D82723h 0x00000022 cmp dl, bl 0x00000024 push dword ptr [ebp+24h] 0x00000027 push B41326CDh 0x0000002c add dword ptr [esp], 5BFCB3E1h 0x00000033 xor dword ptr [esp], 23E80C5Ch 0x0000003a cmp dx, dx 0x0000003d xor dword ptr [esp], 33E7D6F2h 0x00000044 test eax, AA1C1C90h 0x00000049 test edi, C711A858h 0x0000004f mov dword ptr [ebp+0000022Ch], edi 0x00000055 cmp cx, cx 0x00000058 mov edi, 3881A7FFh 0x0000005d nop 0x0000005e sub edi, 3134FF81h 0x00000064 xor edi, E289D110h 0x0000006a add edi, 1A3A8692h 0x00000070 test dl, al 0x00000072 push edi 0x00000073 pushad 0x00000074 mov edi, 00000083h 0x00000079 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F81EC second address: 00000000021F822F instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b test edx, 94B68C09h 0x00000011 mov byte ptr [eax+02h], 00000037h 0x00000015 cmp ecx, 231EEF59h 0x0000001b xor byte ptr [eax+02h], 00000047h 0x0000001f test eax, ebx 0x00000021 xor byte ptr [eax+02h], FFFFFFD6h 0x00000025 cmp al, cl 0x00000027 sub byte ptr [eax+02h], FFFFFFEEh 0x0000002b test eax, 87C1F4F0h 0x00000030 mov edx, dword ptr [ebp+00000138h] 0x00000036 mov dword ptr [eax+03h], edx 0x00000039 mov byte ptr [eax+07h], 0000007Eh 0x0000003d cmp ah, ah 0x0000003f pushad 0x00000040 lfence 0x00000043 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F54F3 second address: 00000000021F54F3 instructions:
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F423B second address: 00000000021F429F instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 add dword ptr [edi+00000400h], AE13020Fh 0x0000000d sub dword ptr [edi+00000400h], 1CB14038h 0x00000017 add edi, 00000800h 0x0000001d cmp eax, ebx 0x0000001f mov dword ptr [ebp+00000258h], esi 0x00000025 mov esi, edi 0x00000027 push esi 0x00000028 pushad 0x00000029 mov ax, FC9Dh 0x0000002d cmp ax, 0000FC9Dh 0x00000031 jne 00007F5D4C9726BBh 0x00000037 popad 0x00000038 mov esi, dword ptr [ebp+00000258h] 0x0000003e test ch, ah 0x00000040 sub edi, 00000400h 0x00000046 push edi 0x00000047 mov dword ptr [ebp+000001C6h], ecx 0x0000004d cmp ax, 000007EAh 0x00000051 mov ecx, ED8EAE1Fh 0x00000056 test edx, eax 0x00000058 sub ecx, 1F47D02Eh 0x0000005e pushad 0x0000005f mov edx, 00000012h 0x00000064 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F429F second address: 00000000021F431B instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 xor ecx, B78BEEF4h 0x00000009 sub ecx, 79CD3305h 0x0000000f cmp eax, ebx 0x00000011 push ecx 0x00000012 mov ecx, dword ptr [ebp+000001C6h] 0x00000018 pushad 0x00000019 mov ax, 5815h 0x0000001d cmp ax, 00005815h 0x00000021 jne 00007F5D4C975DA7h 0x00000027 popad 0x00000028 mov dword ptr [ebp+00000267h], edx 0x0000002e test ch, ah 0x00000030 mov edx, 8B79DAF0h 0x00000035 sub edx, F6E40DCFh 0x0000003b cmp dl, cl 0x0000003d xor edx, 76741942h 0x00000043 cmp ch, FFFFFFEBh 0x00000046 add edx, 1D1E2B9Dh 0x0000004c push edx 0x0000004d mov edx, dword ptr [ebp+00000267h] 0x00000053 cmp dh, ch 0x00000055 push B85066C5h 0x0000005a sub dword ptr [esp], DCEC679Bh 0x00000061 xor dword ptr [esp], 7F44C44Fh 0x00000068 cmp ecx, 5F196E4Eh 0x0000006e add dword ptr [esp], 5BD8C49Fh 0x00000075 mov dword ptr [ebp+000001D2h], ebx 0x0000007b pushad 0x0000007c rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F431B second address: 00000000021F431B instructions:
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F6AC5 second address: 00000000021F6AC5 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b cmp byte ptr [eax], cl 0x0000000d mov ecx, dword ptr [ebp+000001EBh] 0x00000013 jne 00007F5D4C9799F6h 0x00000015 cmp eax, eax 0x00000017 mov dl, byte ptr [eax] 0x00000019 mov byte ptr [ebx], dl 0x0000001b cmp ecx, edx 0x0000001d add eax, 02h 0x00000020 add ebx, 02h 0x00000023 add ecx, 02h 0x00000026 mov dword ptr [ebp+000001EBh], ecx 0x0000002c test cx, ax 0x0000002f mov ecx, 8BD2E791h 0x00000034 test ecx, eax 0x00000036 xor ecx, 5E03D163h 0x0000003c add ecx, 15B5ED3Ch 0x00000042 xor ecx, EB87242Eh 0x00000048 pushad 0x00000049 lfence 0x0000004c rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F4503 second address: 00000000021F453E instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a xor dword ptr [edi-04h], A6386E0Bh 0x00000011 xor dword ptr [edi-04h], B9D6F6F7h 0x00000018 cmp cx, ax 0x0000001b add dword ptr [edi-04h], 7462BF15h 0x00000022 test cx, cx 0x00000025 sub edi, 08h 0x00000028 mov dword ptr [ebp+00000273h], ebx 0x0000002e cmp dx, BBD8h 0x00000033 mov ebx, edi 0x00000035 pushad 0x00000036 mov esi, 00000075h 0x0000003b rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F49A9 second address: 00000000021F49F6 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov dword ptr [ebp+0000020Bh], esi 0x00000011 mov esi, eax 0x00000013 cmp ch, FFFFFF92h 0x00000016 push esi 0x00000017 test ebx, 9D1B03B2h 0x0000001d mov esi, dword ptr [ebp+0000020Bh] 0x00000023 pushad 0x00000024 mov cx, FBE3h 0x00000028 cmp cx, FBE3h 0x0000002d jne 00007F5D4C975691h 0x00000033 popad 0x00000034 mov dword ptr [ebp+00000211h], ecx 0x0000003a mov ecx, 9C111FBCh 0x0000003f test al, al 0x00000041 cmp ecx, eax 0x00000043 xor ecx, E8D4BD1Ch 0x00000049 pushad 0x0000004a lfence 0x0000004d rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000021F4CB8 second address: 00000000021F4D88 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov dword ptr [ebp+00000100h], F6F0BFE9h 0x00000015 jmp 00007F5D4C976342h 0x00000017 xor dword ptr [ebp+00000100h], B2BDCA7Eh 0x00000021 add dword ptr [ebp+00000100h], 0276E553h 0x0000002b add dword ptr [ebp+00000100h], B94BA516h 0x00000035 cmp bh, FFFFFF8Dh 0x00000038 mov ebx, ebp 0x0000003a add ebx, 00000100h 0x00000040 cmp al, cl 0x00000042 mov dword ptr [ebp+000001A4h], esi 0x00000048 mov esi, ebx 0x0000004a push esi 0x0000004b mov esi, dword ptr [ebp+000001A4h] 0x00000051 cmp bl, bl 0x00000053 push 77130013h 0x00000058 xor dword ptr [esp], 6830176Dh 0x0000005f cld 0x00000060 xor dword ptr [esp], 455A7242h 0x00000067 test dl, al 0x00000069 xor dword ptr [esp], 5A79653Ch 0x00000070 mov dword ptr [ebp+00000104h], B7F099FDh 0x0000007a test ecx, 83670C26h 0x00000080 test bl, cl 0x00000082 xor dword ptr [ebp+00000104h], 1230A70Dh 0x0000008c pushad 0x0000008d lfence 0x00000090 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000005673F6 second address: 00000000005674C0 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov edx, 2A63ED14h 0x00000010 cmp ax, dx 0x00000013 xor edx, 8CD6B9A0h 0x00000019 xor edx, 8DA3C863h 0x0000001f cmp eax, ecx 0x00000021 sub edx, 2B169CD7h 0x00000027 test ebx, E044EBDBh 0x0000002d cmp ebx, edx 0x0000002f mov edx, dword ptr [ebp+00000238h] 0x00000035 je 00007F5D4C979AC8h 0x0000003b fnop 0x0000003d mov dword ptr [ebp+00000222h], eax 0x00000043 pushad 0x00000044 mov bh, 9Ah 0x00000046 cmp bh, FFFFFF9Ah 0x00000049 jne 00007F5D4C976622h 0x0000004f popad 0x00000050 mov eax, ebx 0x00000052 push eax 0x00000053 mov eax, dword ptr [ebp+00000222h] 0x00000059 test dl, 0000005Ah 0x0000005c cmp cx, dx 0x0000005f call 00007F5D4C979AA7h 0x00000064 pushad 0x00000065 lfence 0x00000068 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeRDTSC instruction interceptor: First address: 00000000005658DE second address: 000000000056593B instructions: 0x00000000 rdtsc 0x00000002 popad 0x00000003 sub dword ptr [esp], F2A63F26h 0x0000000a test bx, ax 0x0000000d xor dword ptr [esp], 1168D9BEh 0x00000014 mov dword ptr [ebp+00000148h], 00000000h 0x0000001e add ebx, 04h 0x00000021 mov dword ptr [ebp+0000018Bh], esi 0x00000027 mov esi, ebx 0x00000029 push esi 0x0000002a mov esi, dword ptr [ebp+0000018Bh] 0x00000030 cmp ch, dh 0x00000032 mov dword ptr [ebp+000001E4h], ecx 0x00000038 mov ecx, 785B2C8Ch 0x0000003d test ebx, eax 0x0000003f test bx, bx 0x00000042 xor ecx, C683D913h 0x00000048 cmp dl, 00000035h 0x0000004b add ecx, 3D510807h 0x00000051 sub ecx, FC29FDA7h 0x00000057 pushad 0x00000058 mov esi, 00000084h 0x0000005d rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7EA7 rdtsc
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: 97bXaukEWl.exe, 00000000.00000002.977929920.0000000002200000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
      Source: 97bXaukEWl.exe, 00000000.00000002.977929920.0000000002200000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\97bXaukEWl.exeSystem information queried: ModuleInformation

      Anti Debugging:

      barindex
      Found potential dummy code loops (likely to delay analysis)Show sources
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess Stats: CPU usage > 90% for more than 60s
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\97bXaukEWl.exeThread information set: HideFromDebugger
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7EA7 rdtsc
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F6352 LdrInitializeThunk,
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F7E1F mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F6E4F mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F2A4A mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F73A9 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F5403 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F8029 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 0_2_021F352B mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_0056352B mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\97bXaukEWl.exeCode function: 16_2_00566E4F mov eax, dword ptr fs:[00000030h]
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\97bXaukEWl.exeProcess created: C:\Users\user\Desktop\97bXaukEWl.exe 'C:\Users\user\Desktop\97bXaukEWl.exe'
      Source: 97bXaukEWl.exe, 00000010.00000002.1723555308.0000000000ED0000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: 97bXaukEWl.exe, 00000010.00000002.1723555308.0000000000ED0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: 97bXaukEWl.exe, 00000010.00000002.1723555308.0000000000ED0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: 97bXaukEWl.exe, 00000010.00000002.1723555308.0000000000ED0000.00000002.00000001.sdmpBinary or memory string: Progmanlock

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection12Virtualization/Sandbox Evasion311OS Credential DumpingSecurity Software Discovery721Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemoryVirtualization/Sandbox Evasion311Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery32Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      97bXaukEWl.exe24%VirustotalBrowse
      97bXaukEWl.exe17%ReversingLabsWin32.Infostealer.Generic

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      https://kinmirai.org/wp-content/bin_NIapfDNXM183.bin0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      https://kinmirai.org/wp-content/bin_NIapfDNXM183.bintrue
      • Avira URL Cloud: safe
      unknown

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:33.0.0 White Diamond
      Analysis ID:457852
      Start date:02.08.2021
      Start time:12:00:17
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 11m 42s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:97bXaukEWl.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Run name:Suspected Instruction Hammering Hide Perf
      Number of analysed new started processes analysed:30
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@3/0@0/0
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 0.4% (good quality ratio 0.4%)
      • Quality average: 55.3%
      • Quality standard deviation: 9.3%
      HCA Information:
      • Successful, ratio: 76%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, RuntimeBroker.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      No created / dropped files found

      Static File Info

      General

      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):4.6012516392465255
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.15%
      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:97bXaukEWl.exe
      File size:259192
      MD5:9318cd06a9a0b788dc043a63c97d4fce
      SHA1:a296ea3e1cf6d41f9d059d7d6e5058882b03161a
      SHA256:7ad18b09938d40e8ec342ee6bee6b190a986ffedce7567a638b8d25b4098cb69
      SHA512:da057bf10d5a7ae8863dd0310b3d4116af6535aacc68074c9c301e79f580860c2cecba991628d274d62e029ee210f92705c12125dc390072556ca031a16cd4b3
      SSDEEP:1536:2blgLWMXncWYqmOeDA6W6h8eaBWTvYeigJ2cI6wt:NLWMXntzVAA6W6GwZJgt
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........y.....................................Rich............PE..L.....zY.................@...................P....@................

      File Icon

      Icon Hash:e8cccece8ececc68

      Static PE Info

      General

      Entrypoint:0x401388
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:
      Time Stamp:0x597AB081 [Fri Jul 28 03:33:21 2017 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:c75b2cceb55bee276cddf57134b154d2

      Authenticode Signature

      Signature Valid:false
      Signature Issuer:E=Andreyg5@anaerobi.Pr, CN=ANSTNDI, OU=COLOROTO, O=krem, L=Toker, S=Skuffels5, C=PG
      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
      Error Number:-2146762487
      Not Before, Not After
      • 8/1/2021 10:24:20 PM 8/1/2022 10:24:20 PM
      Subject Chain
      • E=Andreyg5@anaerobi.Pr, CN=ANSTNDI, OU=COLOROTO, O=krem, L=Toker, S=Skuffels5, C=PG
      Version:3
      Thumbprint MD5:5F240938C81B57F5F43DD818766923DB
      Thumbprint SHA-1:D39BA4A993AF1C3AF864520F7A5E572CFBAF3C4A
      Thumbprint SHA-256:98F39CD1A5C825C14DA71726F851E1712E5FD89B52C590FC4D1763D249A25976
      Serial:00

      Entrypoint Preview

      Instruction
      push 004311CCh
      call 00007F5D4CA42185h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      xor byte ptr [eax], al
      add byte ptr [eax], al
      cmp byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      dec edi
      mov eax, dword ptr [1781393Ch]
      imul ecx, dword ptr [edi-70h], CC0C945Fh
      cmpsb
      push ds
      mov ah, 00h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [ecx], al
      add byte ptr [eax], al
      add byte ptr [ecx+00h], al
      xchg byte ptr [eax-7Eh], dl
      add dword ptr [ecx+73h], ebp
      jc 00007F5D4CA42193h
      add al, byte ptr [eax]
      add byte ptr [eax], al
      add bh, bh
      int3
      xor dword ptr [eax], eax
      pop ss
      mov ah, CBh
      salc
      push edi
      mov dl, al
      pop edx
      inc edi
      test eax, 3D345146h
      mov dword ptr [D5F49639h], eax
      mov ss, word ptr [edi-16h]
      xchg eax, edi
      outsd
      inc ebp
      xchg eax, edi
      jnp 00007F5D4CA421FEh
      imul edx, eax, 3AB8B9ACh
      dec edi
      lodsd
      xor ebx, dword ptr [ecx-48EE309Ah]
      or al, 00h
      stosb
      add byte ptr [eax-2Dh], ah
      xchg eax, ebx
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      jnc 00007F5D4CA4218Eh
      add al, byte ptr [eax]
      imul eax, dword ptr [eax], 00h
      add byte ptr [ecx], cl
      add byte ptr [esi+esi*2+72h], dl
      bound ebp, dword ptr [edx+6Ch]
      imul esp, dword ptr [ebp+31h], 00h
      or eax, 42000A01h
      imul esp, dword ptr [edx+65h], 7274736Ch
      imul esi, dword ptr [ebx], 00h
      sbb dword ptr [ecx], eax

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x346240x28.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x360000x70f2.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x3e0580x1420
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x11000x1c.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
      IMAGE_DIRECTORY_ENTRY_IAT0x10000xf4.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x33a640x34000False0.258328951322data4.55415043374IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .data0x350000xb940x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0x360000x70f20x8000False0.2998046875data4.01130957517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_ICON0x3ca8a0x668dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 4265541880, next used block 7936
      RT_ICON0x3c7a20x2e8data
      RT_ICON0x3c5ba0x1e8data
      RT_ICON0x3c4920x128GLS_BINARY_LSB_FIRST
      RT_ICON0x3b5ea0xea8data
      RT_ICON0x3ad420x8a8data
      RT_ICON0x3a67a0x6c8data
      RT_ICON0x3a1120x568GLS_BINARY_LSB_FIRST
      RT_ICON0x3846a0x1ca8data
      RT_ICON0x381020x368GLS_BINARY_LSB_FIRST
      RT_ICON0x3705a0x10a8data
      RT_ICON0x366d20x988data
      RT_GROUP_ICON0x366240xaedata
      RT_VERSION0x363000x324dataEnglishUnited States

      Imports

      DLLImport
      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, _adj_fdiv_m16i, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaStrCmp, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaStrToAnsi, __vbaVarDup, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

      Version Infos

      DescriptionData
      Translation0x0409 0x04b0
      LegalCopyrightSentinelStack
      InternalNamebayrerss
      FileVersion1.00
      CompanyNameSentinelStack
      LegalTrademarksSentinelStack
      CommentsSentinelStack
      ProductNameSentinelStack
      ProductVersion1.00
      FileDescriptionSentinelStack
      OriginalFilenamebayrerss.exe

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States

      Network Behavior

      No network behavior found

      Code Manipulations

      Statistics

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:12:01:04
      Start date:02/08/2021
      Path:C:\Users\user\Desktop\97bXaukEWl.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\97bXaukEWl.exe'
      Imagebase:0x400000
      File size:259192 bytes
      MD5 hash:9318CD06A9A0B788DC043A63C97D4FCE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Visual Basic
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.977918776.00000000021F0000.00000040.00000001.sdmp, Author: Joe Security
      Reputation:low

      General

      Start time:12:03:40
      Start date:02/08/2021
      Path:C:\Users\user\Desktop\97bXaukEWl.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\97bXaukEWl.exe'
      Imagebase:0x400000
      File size:259192 bytes
      MD5 hash:9318CD06A9A0B788DC043A63C97D4FCE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000010.00000002.1723282507.0000000000560000.00000040.00000001.sdmp, Author: Joe Security
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >