Loading ...

Play interactive tourEdit tour

Windows Analysis Report FACTURA.exe

Overview

General Information

Sample Name:FACTURA.exe
Analysis ID:499407
MD5:740463ed3266f7aee8331978f50c731c
SHA1:a9310948476693d72be937f23e1b53b3607bf92f
SHA256:fa9e12a03b909482d5bacd2d7ab1a8d672528bfcf43402c04b6d3a30702b0c4d
Tags:exeguloader
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected GuLoader
Found potential dummy code loops (likely to delay analysis)
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Contains functionality to call native functions
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to read the PEB
Program does not show much activity (idle)
Uses code obfuscation techniques (call, push, ret)
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Detected potential crypto function

Classification

Process Tree

  • System is w10x64
  • FACTURA.exe (PID: 4840 cmdline: 'C:\Users\user\Desktop\FACTURA.exe' MD5: 740463ED3266F7AEE8331978F50C731C)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=dor"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.809528334.00000000021A0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    No Sigma rule has matched

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000000.00000002.809528334.00000000021A0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=dor"}
    Source: FACTURA.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=dor
    Source: FACTURA.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A78BE NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A7A9E NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A78C2 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A7973 NtAllocateVirtualMemory,
    Source: FACTURA.exe, 00000000.00000000.286217984.000000000041B000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCounterfoil7.exe vs FACTURA.exe
    Source: FACTURA.exe, 00000000.00000002.809631589.00000000022A0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCounterfoil7.exeFE2XCollides Systems, Inc. Collides Systems, Inc. vs FACTURA.exe
    Source: FACTURA.exeBinary or memory string: OriginalFilenameCounterfoil7.exe vs FACTURA.exe
    Source: FACTURA.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\FACTURA.exeProcess Stats: CPU usage > 98%
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A78BE
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABD75
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABE16
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AAE3D
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AA22C
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABE7E
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A7E6A
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A626C
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AB68E
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A76B0
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A5EAA
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A5B0A
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABF0E
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AA302
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AAF36
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A6349
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABF6C
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A8362
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A7F90
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABFB9
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A5FB4
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A53A7
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A57C6
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AB3C6
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AA7FA
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A540E
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A5C38
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A642E
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AA456
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AB056
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A809A
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A7093
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A54AC
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AC0A4
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A50D1
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AB0D4
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A78C2
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AACC4
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A58FC
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A60E2
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A650A
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AC151
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AB148
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A7973
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AAD64
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A1991
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABDAA
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A7DA7
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AA1A5
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AC1D6
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A51EB
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A59E6
    Source: C:\Users\user\Desktop\FACTURA.exeFile created: C:\Users\user\AppData\Local\Temp\~DFF9C88DFC12285A65.TMPJump to behavior
    Source: FACTURA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\FACTURA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\FACTURA.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: classification engineClassification label: mal68.troj.evad.winEXE@1/0@0/0

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000000.00000002.809528334.00000000021A0000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A0B20 push ds; iretd
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A3CBF push es; retf
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A4191 push es; iretd
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A2DC7 push esi; iretd
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\FACTURA.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\user\Desktop\FACTURA.exeRDTSC instruction interceptor: First address: 000000000040F386 second address: 000000000040F386 instructions: 0x00000000 rdtsc 0x00000002 nop 0x00000003 mfence 0x00000006 popad 0x00000007 pushfd 0x00000008 popfd 0x00000009 cmp eax, 000000F9h 0x0000000e dec edi 0x0000000f wait 0x00000010 cmp eax, 67h 0x00000013 cmp edi, 00000000h 0x00000016 jne 00007F49089A7E50h 0x00000018 pushfd 0x00000019 popfd 0x0000001a wait 0x0000001b pushad 0x0000001c mfence 0x0000001f mfence 0x00000022 rdtsc
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A7514 rdtsc

    Anti Debugging:

    barindex
    Found potential dummy code loops (likely to delay analysis)Show sources
    Source: C:\Users\user\Desktop\FACTURA.exeProcess Stats: CPU usage > 90% for more than 60s
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A9A96 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A9A94 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A6FB7 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A9FE0 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AACC4 mov eax, dword ptr fs:[00000030h]
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021A7514 rdtsc
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABD75 RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABE16 RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABE7E RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABF0E RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AC30D RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABF6C RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABFB9 RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AC0A4 RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AC151 RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021ABDAA RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\FACTURA.exeCode function: 0_2_021AC1D6 RtlAddVectoredExceptionHandler,
    Source: FACTURA.exe, 00000000.00000002.809398242.0000000000C60000.00000002.00020000.sdmpBinary or memory string: Program Manager
    Source: FACTURA.exe, 00000000.00000002.809398242.0000000000C60000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: FACTURA.exe, 00000000.00000002.809398242.0000000000C60000.00000002.00020000.sdmpBinary or memory string: Progman
    Source: FACTURA.exe, 00000000.00000002.809398242.0000000000C60000.00000002.00020000.sdmpBinary or memory string: Progmanlock

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion11OS Credential DumpingSecurity Software Discovery21Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryVirtualization/Sandbox Evasion11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Information Discovery11Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted IPs

    No contacted IP infos

    General Information

    Joe Sandbox Version:33.0.0 White Diamond
    Analysis ID:499407
    Start date:08.10.2021
    Start time:10:52:17
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 7m 29s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:FACTURA.exe
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:21
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal68.troj.evad.winEXE@1/0@0/0
    EGA Information:Failed
    HDC Information:
    • Successful, ratio: 1.4% (good quality ratio 0%)
    • Quality average: 0%
    • Quality standard deviation: 0%
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
    • Excluded IPs from analysis (whitelisted): 184.28.85.136, 20.82.210.154, 93.184.221.240, 20.199.120.151, 20.199.120.182, 20.82.209.183, 20.199.120.85, 2.20.178.24, 2.20.178.33, 52.251.79.25, 20.54.110.249, 40.112.88.60, 20.50.102.62
    • Excluded domains from analysis (whitelisted): consumer-displaycatalogrp-aks2aks-useast.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, client.wns.windows.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, eus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, displaycatalog-rp-useast.md.mp.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: /opt/package/joesandbox/database/analysis/499407/sample/FACTURA.exe

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    No created / dropped files found

    Static File Info

    General

    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.2442298972838195
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.01%
    • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
    • Visual Basic Script (13500/0) 0.13%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    File name:FACTURA.exe
    File size:143360
    MD5:740463ed3266f7aee8331978f50c731c
    SHA1:a9310948476693d72be937f23e1b53b3607bf92f
    SHA256:fa9e12a03b909482d5bacd2d7ab1a8d672528bfcf43402c04b6d3a30702b0c4d
    SHA512:15bd20faadbcc09b236e8408cf0b5f0903ad39cb1183b99e9a767e0a58ddc65624f27fa0fc983900af669bbe43a7766e7e6493d4e002833b3d3e5026b63079af
    SSDEEP:3072:tPM2YNAkMB0fkeX4QKDmBnmY4tmT9tzh/jrVB:tPM2YNAkMBykeX4wrLrVB
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i.......................*..............Rich....................PE..L....+.N..........................................@........

    File Icon

    Icon Hash:00e4d2c2dac20042

    Static PE Info

    General

    Entrypoint:0x4018dc
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    DLL Characteristics:
    Time Stamp:0x4E922BCC [Sun Oct 9 23:18:36 2011 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:d0ac0bdf3a5152bcac064d77eed21690

    Entrypoint Preview

    Instruction
    push 004106A8h
    call 00007F4908DD8DD3h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    xor byte ptr [eax], al
    add byte ptr [eax], al
    dec eax
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add dh, bh
    lodsb
    fdiv qword ptr [ecx+68h]
    and byte ptr [esi+46h], bh
    xchg eax, ebp
    add al, EFh
    mov bh, A9h
    sbb al, E3h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add dword ptr [eax], eax
    add byte ptr [eax], al
    add byte ptr [eax+00000000h], al
    jo 00007F4908DD8E55h
    jne 00007F4908DD8E47h
    outsd
    jnc 00007F4908DD8E56h
    jne 00007F4908DD8E46h
    imul ebp, dword ptr [edi+75h], 00796C73h
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add bh, bh
    int3
    xor dword ptr [eax], eax
    cmp bl, cl
    cmc
    push eax
    and ebx, dword ptr [ebx+4Eh]
    add dword ptr [ebp+eax*4-7Dh], eax
    and dword ptr [ebx], edi
    add al, CFh
    mov dh, byte ptr [ebp-6650AD4Bh]
    xchg eax, esp
    test al, 67h
    inc edi
    call far 8565h : 7219F9CBh
    mov ebp, 33AD4F3Ah
    cdq
    iretw
    adc dword ptr [edi+00AA000Ch], esi
    pushad
    rcl dword ptr [ebx+00000000h], cl
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add ebx, ebp
    add byte ptr [eax], al
    call far 0005h : 00000001h
    push 736B6E61h
    add byte ptr [41000E01h], cl

    Data Directories

    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x18e840x28.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1b0000x75f9.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
    IMAGE_DIRECTORY_ENTRY_IAT0x10000x1c0.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

    Sections

    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x184f00x19000False0.479140625data6.34090617011IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    .data0x1a0000xd200x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
    .rsrc0x1b0000x75f90x8000False0.238891601562data5.20756276635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

    Resources

    NameRVASizeTypeLanguageCountry
    CUSTOM0x1b6280x6fd1ASCII text, with CRLF line terminatorsEnglishUnited States
    RT_ICON0x1b5000x128GLS_BINARY_LSB_FIRST
    RT_GROUP_ICON0x1b4ec0x14data
    RT_VERSION0x1b1400x3acdataEnglishUnited States

    Imports

    DLLImport
    MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaFreeVarList, __vbaEnd, _adj_fdiv_m64, _adj_fprem1, __vbaRecAnsiToUni, __vbaSetSystemError, __vbaRecDestruct, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaBoolStr, __vbaOnError, __vbaObjSet, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaAryConstruct2, __vbaVarTstEq, DllFunctionCall, _adj_fpatan, __vbaRecUniToAnsi, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, _CIlog, __vbaErrorOverflow, __vbaInStr, __vbaNew2, __vbaVar2Vec, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaLateMemCall, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaFpI4, __vbaRecDestructAnsi, _CIatan, __vbaStrMove, __vbaUI1Str, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

    Version Infos

    DescriptionData
    Translation0x0409 0x04b0
    LegalCopyrightCollides Systems, Inc.
    InternalNameCounterfoil7
    FileVersion4.00
    CompanyNameCollides Systems, Inc.
    LegalTrademarksCollides Systems, Inc.
    CommentsCollides Systems, Inc.
    ProductNameCollides Systems, Inc.
    ProductVersion4.00
    FileDescriptionCollides Systems, Inc.
    OriginalFilenameCounterfoil7.exe

    Possible Origin

    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States

    Network Behavior

    No network behavior found

    Code Manipulations

    Statistics

    System Behavior

    General

    Start time:10:53:12
    Start date:08/10/2021
    Path:C:\Users\user\Desktop\FACTURA.exe
    Wow64 process (32bit):true
    Commandline:'C:\Users\user\Desktop\FACTURA.exe'
    Imagebase:0x400000
    File size:143360 bytes
    MD5 hash:740463ED3266F7AEE8331978F50C731C
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Visual Basic
    Yara matches:
    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.809528334.00000000021A0000.00000040.00000001.sdmp, Author: Joe Security
    Reputation:low

    Disassembly

    Code Analysis

    Reset < >