Loading ...

Play interactive tourEdit tour

Windows Analysis Report 7keerHhHvn.exe

Overview

General Information

Sample Name:7keerHhHvn.exe
Analysis ID:458550
MD5:782783574d2d4b67666b77b686c2e673
SHA1:8eeec0963fa7eaf3115335c03315ecc203babf9b
SHA256:0d2aeb4a2f85b9bf8ae3990a3ddea5a242d0db5186263e3ccf2435bbc48ec478
Tags:exeMalware
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Detected potential crypto function
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w10x64
  • 7keerHhHvn.exe (PID: 5616 cmdline: 'C:\Users\user\Desktop\7keerHhHvn.exe' MD5: 782783574D2D4B67666B77B686C2E673)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://onedrive.live.com/download?cid=6D6F7"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.763490129.0000000002D70000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000000.00000002.763490129.0000000002D70000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://onedrive.live.com/download?cid=6D6F7"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: 7keerHhHvn.exeVirustotal: Detection: 25%Perma Link
    Machine Learning detection for sampleShow sources
    Source: 7keerHhHvn.exeJoe Sandbox ML: detected
    Source: 7keerHhHvn.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://onedrive.live.com/download?cid=6D6F7
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_004028BC GetAsyncKeyState,
    Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess Stats: CPU usage > 98%
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D76825 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7687F NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D769A7 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D76825
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D794D7
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D792D3
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D76EDC
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D798C4
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D714C4
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74ACE
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D78ECA
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D746CA
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73CF4
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74AF4
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7A0FC
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D730F8
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D72AEE
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7AEBF
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D706BD
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D792BA
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D72AAE
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D79E57
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7245B
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D72C58
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7AE46
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73445
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74C43
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7304D
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7687F
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7A478
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D75262
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74817
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7A015
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73219
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73018
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D71218
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74234
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74A23
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7082B
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D70FDD
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D79BD9
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D715C7
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D78DC3
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73FC9
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73BF4
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D793FA
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73FF9
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74FF9
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D76FE2
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D76D95
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D79D9A
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D70F85
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73D83
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D79B89
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D76DB1
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7AFBE
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7B3BA
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D745B8
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D747AE
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7ADAB
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7AF52
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74551
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7655D
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7AD47
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D71174
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D72D70
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74970
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7417B
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74D78
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D71F6E
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7156A
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74F07
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7090B
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7490B
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D74B36
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7AD35
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D71331
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D72B31
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73325
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D79F2C
    Source: 7keerHhHvn.exe, 00000000.00000002.761350467.0000000002270000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs 7keerHhHvn.exe
    Source: 7keerHhHvn.exe, 00000000.00000002.760792159.0000000000423000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAbsurditiesun.exe vs 7keerHhHvn.exe
    Source: 7keerHhHvn.exeBinary or memory string: OriginalFilenameAbsurditiesun.exe vs 7keerHhHvn.exe
    Source: 7keerHhHvn.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: classification engineClassification label: mal84.troj.evad.winEXE@1/0@0/0
    Source: C:\Users\user\Desktop\7keerHhHvn.exeFile created: C:\Users\user\AppData\Local\Temp\~DF8F1F4DFF04104EF7.TMPJump to behavior
    Source: 7keerHhHvn.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\7keerHhHvn.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Users\user\Desktop\7keerHhHvn.exeFile read: C:\$Recycle.Bin\S-1-5-21-3853321935-2125563209-4053062332-1002\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\7keerHhHvn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: 7keerHhHvn.exeVirustotal: Detection: 25%
    Source: C:\Users\user\Desktop\7keerHhHvn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4a04656d-52aa-49de-8a09-cb178760e748}\InProcServer32

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000000.00000002.763490129.0000000002D70000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_004066EE push edx; iretd
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_00407D67 push es; ret
    Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D70FDD
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D70F85
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\user\Desktop\7keerHhHvn.exeRDTSC instruction interceptor: First address: 0000000002D76090 second address: 0000000002D76090 instructions: 0x00000000 rdtsc 0x00000002 mov eax, D06691AFh 0x00000007 xor eax, 51795B17h 0x0000000c sub eax, E89895FEh 0x00000011 sub eax, 988734B9h 0x00000016 cpuid 0x00000018 jmp 00007FDE10E500D6h 0x0000001a test bx, 62F2h 0x0000001f popad 0x00000020 call 00007FDE10E5008Ch 0x00000025 lfence 0x00000028 mov edx, 3126F457h 0x0000002d xor edx, A11635D2h 0x00000033 xor edx, 122A2AF9h 0x00000039 xor edx, FDE4EB68h 0x0000003f mov edx, dword ptr [edx] 0x00000041 lfence 0x00000044 ret 0x00000045 cmp dh, ch 0x00000047 sub edx, esi 0x00000049 ret 0x0000004a test ah, dh 0x0000004c pop ecx 0x0000004d add edi, edx 0x0000004f dec ecx 0x00000050 mov dword ptr [ebp+0000017Ch], 339F83C1h 0x0000005a sub dword ptr [ebp+0000017Ch], 00B60B54h 0x00000064 sub dword ptr [ebp+0000017Ch], 2594365Ah 0x0000006e add dword ptr [ebp+0000017Ch], F2AABDEDh 0x00000078 cmp ecx, dword ptr [ebp+0000017Ch] 0x0000007e jne 00007FDE10E4FFD4h 0x00000084 jmp 00007FDE10E500E2h 0x00000086 test ch, dh 0x00000088 mov dword ptr [ebp+00000274h], edi 0x0000008e mov edi, ecx 0x00000090 push edi 0x00000091 mov edi, dword ptr [ebp+00000274h] 0x00000097 call 00007FDE10E500F4h 0x0000009c call 00007FDE10E50108h 0x000000a1 lfence 0x000000a4 mov edx, 3126F457h 0x000000a9 xor edx, A11635D2h 0x000000af xor edx, 122A2AF9h 0x000000b5 xor edx, FDE4EB68h 0x000000bb mov edx, dword ptr [edx] 0x000000bd lfence 0x000000c0 ret 0x000000c1 mov esi, edx 0x000000c3 pushad 0x000000c4 rdtsc
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73ED1 rdtsc
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

    Anti Debugging:

    barindex
    Found potential dummy code loops (likely to delay analysis)Show sources
    Source: C:\Users\user\Desktop\7keerHhHvn.exeProcess Stats: CPU usage > 90% for more than 60s
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73ED1 rdtsc
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D75EA3 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D78C1A mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73018 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D73BF4 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D79D9A mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\7keerHhHvn.exeCode function: 0_2_02D7915A mov eax, dword ptr fs:[00000030h]
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: 7keerHhHvn.exe, 00000000.00000002.761089547.0000000000D80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: 7keerHhHvn.exe, 00000000.00000002.761089547.0000000000D80000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: 7keerHhHvn.exe, 00000000.00000002.761089547.0000000000D80000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
    Source: 7keerHhHvn.exe, 00000000.00000002.761089547.0000000000D80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
    Source: 7keerHhHvn.exe, 00000000.00000002.761089547.0000000000D80000.00000002.00000001.sdmpBinary or memory string: Progmanlock

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11Input Capture11Security Software Discovery31Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery21SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    7keerHhHvn.exe26%VirustotalBrowse
    7keerHhHvn.exe100%Joe Sandbox ML

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    https://onedrive.live.com/download?cid=6D6F7false
      high

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:33.0.0 White Diamond
      Analysis ID:458550
      Start date:03.08.2021
      Start time:14:35:22
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 49s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:7keerHhHvn.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:32
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal84.troj.evad.winEXE@1/0@0/0
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 2.9% (good quality ratio 0.5%)
      • Quality average: 7.6%
      • Quality standard deviation: 17.7%
      HCA Information:Failed
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtQueryValueKey calls found.

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      No created / dropped files found

      Static File Info

      General

      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.460043863848558
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.15%
      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:7keerHhHvn.exe
      File size:143360
      MD5:782783574d2d4b67666b77b686c2e673
      SHA1:8eeec0963fa7eaf3115335c03315ecc203babf9b
      SHA256:0d2aeb4a2f85b9bf8ae3990a3ddea5a242d0db5186263e3ccf2435bbc48ec478
      SHA512:1e500c34d0a1cb7d53661a5759c9d1325a119d86813fd4204f6586b5bf5d16fbf774c694ab6ae367567c38fa38077dd8f1b47991245afa4b6ba5292b235839fa
      SSDEEP:3072:S5CCbi+/47tQatuMBmrBeMn5m4vvt6g58:Ai+/g/tuMQlzVntV
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...S..Q.....................0....................@................

      File Icon

      Icon Hash:c4e8c8cccce0e8e8

      Static PE Info

      General

      Entrypoint:0x4014b4
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:
      Time Stamp:0x51ACB753 [Mon Jun 3 15:33:39 2013 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:fef384fc3a66a559dff455f07d497ca0

      Entrypoint Preview

      Instruction
      push 00401F54h
      call 00007FDE10A7E923h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      xor byte ptr [eax], al
      add byte ptr [eax], al
      inc eax
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax-67h], dl
      sbb esi, dword ptr [ebx+4EFEB052h]
      stosb
      sbb cl, byte ptr [ecx+74h]
      ret
      test dword ptr [edx], esi
      in al, dx
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add dword ptr [eax], eax
      add byte ptr [eax], al
      inc ecx
      add byte ptr [eax], ah
      or byte ptr [ecx+00h], al
      inc esi
      popad
      insb
      jc 00007FDE10A7E995h
      insb
      jne 00007FDE10A7E99Fh
      imul esi, dword ptr [eax+eax], 00000000h
      add byte ptr [eax], al
      dec esp
      xor dword ptr [eax], eax
      add bh, dl
      movsb
      add al, 03h
      pop eax
      movsd
      test byte ptr [ebx-43h], 00000048h
      dec eax
      inc ebp
      ror dl, 0000002Fh
      and al, byte ptr [edx+6Eh]
      mov al, 41h
      fistp word ptr [ecx+43h]
      xchg eax, edi
      sti
      push ebx
      mov ebx, 3AE1F6F1h
      dec edi
      lodsd
      xor ebx, dword ptr [ecx-48EE309Ah]
      or al, 00h
      stosb
      add byte ptr [eax-2Dh], ah
      xchg eax, ebx
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      adc al, 09h
      add byte ptr [eax], al
      wbinvd
      add byte ptr [eax], al
      add byte ptr [esi], al
      add byte ptr [ebp+4Fh], cl
      inc ecx
      dec esi
      dec ecx
      inc esi
      add byte ptr [54000901h], cl
      jne 00007FDE10A7E9A0h
      insd
      je 00007FDE10A7E994h

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x206f40x28.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000xc20.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
      IMAGE_DIRECTORY_ENTRY_IAT0x10000x190.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x1fcec0x20000False0.384429931641data6.7545432225IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .data0x210000x11bc0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0x230000xc200x1000False0.314453125data3.28015845724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_ICON0x233780x8a8data
      RT_GROUP_ICON0x233640x14data
      RT_VERSION0x230f00x274dataChineseTaiwan

      Imports

      DLLImport
      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaVarForInit, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaR4Str, DllFunctionCall, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, __vbaR8Str, __vbaVar2Vec, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, _CIatan, __vbaStrMove, __vbaCastObj, _allmul, __vbaLateIdSt, _CItan, __vbaVarForNext, _CIexp, __vbaFreeObj, __vbaFreeStr

      Version Infos

      DescriptionData
      Translation0x0404 0x04b0
      InternalNameAbsurditiesun
      FileVersion1.00
      CompanyNameIntersection Road
      CommentsIntersection Road
      ProductNameUnrapedb6
      ProductVersion1.00
      OriginalFilenameAbsurditiesun.exe

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      ChineseTaiwan

      Network Behavior

      No network behavior found

      Code Manipulations

      Statistics

      System Behavior

      General

      Start time:14:36:30
      Start date:03/08/2021
      Path:C:\Users\user\Desktop\7keerHhHvn.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\7keerHhHvn.exe'
      Imagebase:0x400000
      File size:143360 bytes
      MD5 hash:782783574D2D4B67666B77B686C2E673
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Visual Basic
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.763490129.0000000002D70000.00000040.00000001.sdmp, Author: Joe Security
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >