Loading ...

Play interactive tourEdit tour

Windows Analysis Report Hong Tak Engineering SB Payment Receipt 241121_PDF.exe

Overview

General Information

Sample Name:Hong Tak Engineering SB Payment Receipt 241121_PDF.exe
Analysis ID:528205
MD5:b2e24bc0f1f55f2ac9d8034098dfe32f
SHA1:4a20778acf6d512792077dc339f23acfbdf22875
SHA256:d5ace58c68d1ff767b284deb172b5ce0550e96023a509a171fa7b34f0929b8e0
Infos:

Most interesting Screenshot:

Detection

GuLoader Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Remcos RAT
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Hides threads from debuggers
Installs a global keyboard hook
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Executable has a suspicious name (potential lure to open the executable)
C2 URLs / IPs found in malware configuration
Uses dynamic DNS services
Uses 32bit PE files
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Sleep loop found (likely to delay execution)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Creates processes with suspicious names
Contains functionality for execution timing, often used to detect debuggers
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
PE / OLE file has an invalid certificate
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64native
  • Hong Tak Engineering SB Payment Receipt 241121_PDF.exe (PID: 3648 cmdline: "C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe" MD5: B2E24BC0F1F55F2AC9D8034098DFE32F)
    • ieinstal.exe (PID: 5020 cmdline: "C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe" MD5: 7871873BABCEA94FBA13900B561C7C55)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://onedrive.live.com/download?cid=7FA6B3"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.5679272163.000000000302B000.00000004.00000020.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000003.00000002.1038188324.00000000022D0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      0000000F.00000000.759017370.0000000002CE0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: ieinstal.exe PID: 5020JoeSecurity_RemcosYara detected Remcos RATJoe Security

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000003.00000002.1038188324.00000000022D0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://onedrive.live.com/download?cid=7FA6B3"}
          Multi AV Scanner detection for submitted fileShow sources
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeVirustotal: Detection: 39%Perma Link
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeReversingLabs: Detection: 27%
          Yara detected Remcos RATShow sources
          Source: Yara matchFile source: 0000000F.00000002.5679272163.000000000302B000.00000004.00000020.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ieinstal.exe PID: 5020, type: MEMORYSTR
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Temp\Agerhnsjagtfi\Countysygej.exeVirustotal: Detection: 39%Perma Link
          Source: C:\Users\user\AppData\Local\Temp\Agerhnsjagtfi\Countysygej.exeReversingLabs: Detection: 27%
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: https://onedrive.live.com/download?cid=7FA6B3
          Uses dynamic DNS servicesShow sources
          Source: unknownDNS query: name: olufem.ddns.net
          Source: Joe Sandbox ViewASN Name: TMNET-AS-APTMNetInternetServiceProviderMY TMNET-AS-APTMNetInternetServiceProviderMY
          Source: global trafficTCP traffic: 192.168.11.20:49768 -> 124.82.81.98:6111
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: ieinstal.exe, 0000000F.00000003.951398551.0000000002FD8000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5677573236.0000000002FD8000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: ieinstal.exe, 0000000F.00000003.951398551.0000000002FD8000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5677573236.0000000002FD8000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: ieinstal.exe, 0000000F.00000003.951398551.0000000002FD8000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5677573236.0000000002FD8000.00000004.00000020.sdmpString found in binary or memory: https://7ybh4q.bn.files.1drv.com/
          Source: ieinstal.exe, 0000000F.00000003.951398551.0000000002FD8000.00000004.00000001.sdmpString found in binary or memory: https://7ybh4q.bn.files.1drv.com/D
          Source: ieinstal.exe, 0000000F.00000002.5677573236.0000000002FD8000.00000004.00000020.sdmpString found in binary or memory: https://7ybh4q.bn.files.1drv.com/f
          Source: ieinstal.exe, 0000000F.00000003.951398551.0000000002FD8000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5677573236.0000000002FD8000.00000004.00000020.sdmp, ieinstal.exe, 0000000F.00000003.951864678.0000000003030000.00000004.00000001.sdmpString found in binary or memory: https://7ybh4q.bn.files.1drv.com/y4mrYMhoGbjFe4lMap9L9LeL2yBCYdzRMAuRmtg6XK6YTbK2Pi7yHWQHU8EnZiLbINN
          Source: ieinstal.exe, 0000000F.00000002.5674818296.0000000002F58000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/
          Source: ieinstal.exe, 0000000F.00000002.5674818296.0000000002F58000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/E
          Source: ieinstal.exe, 0000000F.00000002.5681941208.0000000004970000.00000004.00000001.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=7FA6B3539DFD0E74&resid=7FA6B3539DFD0E74%211122&authkey=AFlmPX
          Source: unknownDNS traffic detected: queries for: onedrive.live.com

          Key, Mouse, Clipboard, Microphone and Screen Capturing:

          barindex
          Installs a global keyboard hookShow sources
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\internet explorer\ieinstal.exe

          E-Banking Fraud:

          barindex
          Yara detected Remcos RATShow sources
          Source: Yara matchFile source: 0000000F.00000002.5679272163.000000000302B000.00000004.00000020.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ieinstal.exe PID: 5020, type: MEMORYSTR

          System Summary:

          barindex
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe
          Source: initial sampleStatic PE information: Filename: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe
          Executable has a suspicious name (potential lure to open the executable)Show sources
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeStatic file information: Suspicious name
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD82A
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D8863
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DB5A0
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DFDCF
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DEA2B
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D1E67
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D1272
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D1E5C
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDF39
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D6F34
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D6F0E
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD76D
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDF76
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDF44
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D67AF
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDFA4
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D47EF
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D6FF3
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D67C6
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD82C
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D7824
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D6820
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DF032
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D481B
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD863
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD8BF
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DB48A
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D7093
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D08F9
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD8CC
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D48C3
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D70DE
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D4933
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD903
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D4967
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D0943
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D495D
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D8556
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DB5AB
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D11B1
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D498F
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D41F7
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D11F3
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D41C0
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_02CF0710
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD82A NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D8863 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DF872 NtProtectVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDA3B NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDA6A NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDAA6 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDAD3 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDB38 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDB00 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDB76 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDBC7 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD82C NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DDC13 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD863 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D887B NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD8BF NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD8CC NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD93B NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD903 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D896B NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD9B2 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD983 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD9E5 NtAllocateVirtualMemory,
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_02CF0B83 Sleep,NtProtectVirtualMemory,
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_02CF0C78 NtProtectVirtualMemory,
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_02CF0CC8 NtProtectVirtualMemory,
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_02CF0C47 NtProtectVirtualMemory,
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_02CF0BD8 NtProtectVirtualMemory,
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_02CF0D17 NtProtectVirtualMemory,
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_02CF0C7F NtProtectVirtualMemory,
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeCode function: 15_2_02CF0C77 NtProtectVirtualMemory,
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000000.602674209.000000000041C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameGRUDGEFULUNNOT.exe vs Hong Tak Engineering SB Payment Receipt 241121_PDF.exe
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeBinary or memory string: OriginalFilenameGRUDGEFULUNNOT.exe vs Hong Tak Engineering SB Payment Receipt 241121_PDF.exe
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Countysygej.exe.15.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeSection loaded: edgegdi.dll
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeSection loaded: edgegdi.dll
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeStatic PE information: invalid certificate
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeVirustotal: Detection: 39%
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeReversingLabs: Detection: 27%
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
          Source: unknownProcess created: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe "C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe"
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe "C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe"
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe "C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe"
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile created: C:\Users\user\AppData\Roaming\wifitsklJump to behavior
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeFile created: C:\Users\user\AppData\Local\Temp\~DFDA925A6B9EAC6C8F.TMPJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/3@10/1
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeMutant created: \Sessions\1\BaseNamedObjects\audiotsk-5IOG84

          Data Obfuscation:

          barindex
          Yara detected GuLoaderShow sources
          Source: Yara matchFile source: 00000003.00000002.1038188324.00000000022D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000000.759017370.0000000002CE0000.00000040.00000001.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_00407484 push 1002C579h; iretd
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_00404764 push esi; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D9605 push es; iretd
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D5A4B pushad ; retf
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D037F push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D03BB push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D0383 push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DA7FF push cs; iretd
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D043F push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D0403 push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D046F push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D04A7 push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D04EC push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D0CD1 push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D0CD3 push ds; ret
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D116B pushfd ; iretd
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D95F5 push es; iretd
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeFile created: \hong tak engineering sb payment receipt 241121_pdf.exe
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeFile created: \hong tak engineering sb payment receipt 241121_pdf.exe
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile created: C:\Users\user\AppData\Local\Temp\Agerhnsjagtfi\Countysygej.exeJump to dropped file
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run TanadarforureningsJump to behavior
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run TanadarforureningsJump to behavior
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to detect Any.runShow sources
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeFile opened: C:\Program Files\qga\qga.exe
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039492404.0000000002CF0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32PSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WIN64; X64) APPLEWEBKIT/537.36 (KHTML, LIKE GECKO) CHROME/91.0.4472.124 SAFARI/537.36SHELL32ADVAPI32TEMP=PROGRAMFILES=\INTERNET EXPLORER\IEINSTAL.EXEWINDIR=\SYSWOW64\MSVBVM60.DLL
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039492404.0000000002CF0000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5681941208.0000000004970000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
          Source: ieinstal.exe, 0000000F.00000002.5681941208.0000000004970000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEUSER32PSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WIN64; X64) APPLEWEBKIT/537.36 (KHTML, LIKE GECKO) CHROME/91.0.4472.124 SAFARI/537.36SHELL32ADVAPI32TEMP=\COUNTYSYGEJ.EXE\AGERHNSJAGTFISOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNTANADARFORURENINGSHTTPS://ONEDRIVE.LIVE.COM/DOWNLOAD?CID=7FA6B3539DFD0E74&RESID=7FA6B3539DFD0E74%211122&AUTHKEY=AFLMPX3MS1VU7IU
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe TID: 8196Thread sleep count: 9176 > 30
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe TID: 8196Thread sleep time: -45880s >= -30000s
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread sleep count: Count: 9176 delay: -5
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D4123 rdtsc
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeWindow / User API: threadDelayed 9176
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeWindow / User API: foregroundWindowGot 673
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeSystem information queried: ModuleInformation
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039593867.0000000003249000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
          Source: ieinstal.exe, 0000000F.00000002.5674818296.0000000002F58000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW8
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039593867.0000000003249000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
          Source: ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: vmicshutdown
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039593867.0000000003249000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039492404.0000000002CF0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32psapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36shell32advapi32TEMP=ProgramFiles=\internet explorer\ieinstal.exewindir=\syswow64\msvbvm60.dll
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039593867.0000000003249000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039593867.0000000003249000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: Hyper-V Time Synchronization Service
          Source: ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: vmicvss
          Source: ieinstal.exe, 0000000F.00000002.5677340949.0000000002FC9000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
          Source: ieinstal.exe, 0000000F.00000002.5681941208.0000000004970000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exeuser32psapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36shell32advapi32TEMP=\Countysygej.exe\AgerhnsjagtfiSoftware\Microsoft\Windows\CurrentVersion\RunTanadarforureningshttps://onedrive.live.com/download?cid=7FA6B3539DFD0E74&resid=7FA6B3539DFD0E74%211122&authkey=AFlmPX3ms1Vu7IU
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039492404.0000000002CF0000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5681941208.0000000004970000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039593867.0000000003249000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: Hyper-V Data Exchange Service
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039593867.0000000003249000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: Hyper-V Heartbeat Service
          Source: Hong Tak Engineering SB Payment Receipt 241121_PDF.exe, 00000003.00000002.1039593867.0000000003249000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Service Interface
          Source: ieinstal.exe, 0000000F.00000002.5674818296.0000000002F58000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWVY
          Source: ieinstal.exe, 0000000F.00000002.5682267147.0000000004A49000.00000004.00000001.sdmpBinary or memory string: vmicheartbeat

          Anti Debugging:

          barindex
          Hides threads from debuggersShow sources
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeThread information set: HideFromDebugger
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeThread information set: HideFromDebugger
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D4123 rdtsc
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DEA2B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DC345 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022D9889 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DD108 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeProcess queried: DebugPort
          Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeCode function: 3_2_022DAD16 LdrInitializeThunk,

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Writes to foreign memory regionsShow sources
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeMemory written: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 2CE0000
          Source: C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exeProcess created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe "C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe"
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program Managers.net:6111E
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program Managers.net:6111
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmp, ieinstal.exe, 0000000F.00000002.5680749572.0000000003560000.00000002.00020000.sdmpBinary or memory string: Program Manager
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program ManagerEM t8
          Source: ieinstal.exe, 0000000F.00000002.5680749572.0000000003560000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program Manager1064_03
          Source: ieinstal.exe, 0000000F.00000002.5680749572.0000000003560000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program ManagerModules.`
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program ManagerEM
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program ManagernsoleS5`
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program Manageroca
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program Manager\Users\<`
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program Managers.net:61118
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program Managerpc
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program Managers.net:6111U
          Source: ieinstal.exe, 0000000F.00000002.5680749572.0000000003560000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: ieinstal.exe, 0000000F.00000002.5676396416.0000000002F9D000.00000004.00000020.sdmpBinary or memory string: Program Managers.net:
          Source: ieinstal.exe, 0000000F.00000002.5674818296.0000000002F58000.00000004.00000020.sdmp, logs.dat.15.drBinary or memory string: [Program Manager]

          Stealing of Sensitive Information:

          barindex
          Yara detected Remcos RATShow sources
          Source: Yara matchFile source: 0000000F.00000002.5679272163.000000000302B000.00000004.00000020.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ieinstal.exe PID: 5020, type: MEMORYSTR

          Remote Access Functionality:

          barindex
          Yara detected Remcos RATShow sources
          Source: Yara matchFile source: 0000000F.00000002.5679272163.000000000302B000.00000004.00000020.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ieinstal.exe PID: 5020, type: MEMORYSTR

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection112Masquerading1Input Capture11Security Software Discovery421Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobDLL Side-Loading1Registry Run Keys / Startup Folder1Virtualization/Sandbox Evasion23LSASS MemoryVirtualization/Sandbox Evasion23Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Process Injection112Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol21SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsSystem Information Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Hong Tak Engineering SB Payment Receipt 241121_PDF.exe40%VirustotalBrowse
          Hong Tak Engineering SB Payment Receipt 241121_PDF.exe27%ReversingLabsWin32.Downloader.GuLoader

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\Agerhnsjagtfi\Countysygej.exe40%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\Agerhnsjagtfi\Countysygej.exe27%ReversingLabsWin32.Downloader.GuLoader

          Unpacked PE Files

          No Antivirus matches

          Domains

          No Antivirus matches

          URLs

          No Antivirus matches

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          olufem.ddns.net
          124.82.81.98
          truetrue
            unknown
            onedrive.live.com
            unknown
            unknownfalse
              high
              7ybh4q.bn.files.1drv.com
              unknown
              unknownfalse
                high

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                https://onedrive.live.com/download?cid=7FA6B3false
                  high

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  https://onedrive.live.com/download?cid=7FA6B3539DFD0E74&resid=7FA6B3539DFD0E74%211122&authkey=AFlmPXieinstal.exe, 0000000F.00000002.5681941208.0000000004970000.00000004.00000001.sdmpfalse
                    high
                    https://7ybh4q.bn.files.1drv.com/Dieinstal.exe, 0000000F.00000003.951398551.0000000002FD8000.00000004.00000001.sdmpfalse
                      high
                      https://7ybh4q.bn.files.1drv.com/ieinstal.exe, 0000000F.00000003.951398551.0000000002FD8000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5677573236.0000000002FD8000.00000004.00000020.sdmpfalse
                        high
                        https://7ybh4q.bn.files.1drv.com/fieinstal.exe, 0000000F.00000002.5677573236.0000000002FD8000.00000004.00000020.sdmpfalse
                          high
                          https://7ybh4q.bn.files.1drv.com/y4mrYMhoGbjFe4lMap9L9LeL2yBCYdzRMAuRmtg6XK6YTbK2Pi7yHWQHU8EnZiLbINNieinstal.exe, 0000000F.00000003.951398551.0000000002FD8000.00000004.00000001.sdmp, ieinstal.exe, 0000000F.00000002.5677573236.0000000002FD8000.00000004.00000020.sdmp, ieinstal.exe, 0000000F.00000003.951864678.0000000003030000.00000004.00000001.sdmpfalse
                            high
                            https://onedrive.live.com/Eieinstal.exe, 0000000F.00000002.5674818296.0000000002F58000.00000004.00000020.sdmpfalse
                              high
                              https://onedrive.live.com/ieinstal.exe, 0000000F.00000002.5674818296.0000000002F58000.00000004.00000020.sdmpfalse
                                high

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                124.82.81.98
                                olufem.ddns.netMalaysia
                                4788TMNET-AS-APTMNetInternetServiceProviderMYtrue

                                General Information

                                Joe Sandbox Version:34.0.0 Boulder Opal
                                Analysis ID:528205
                                Start date:24.11.2021
                                Start time:21:11:59
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 13m 43s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:Hong Tak Engineering SB Payment Receipt 241121_PDF.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                Run name:Suspected Instruction Hammering
                                Number of analysed new started processes analysed:41
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@3/3@10/1
                                EGA Information:Failed
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 75%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): taskhostw.exe, MusNotification.exe, dllhost.exe, RuntimeBroker.exe, BdeUISrv.exe, SIHClient.exe, backgroundTaskHost.exe, MoUsoCoreWorker.exe, MusNotificationUx.exe, IntelPTTEKRecertification.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • TCP Packets have been reduced to 100
                                • Excluded IPs from analysis (whitelisted): 51.105.236.244, 20.82.207.122, 13.107.42.13, 13.107.43.12
                                • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, slscr.update.microsoft.com, arc.msn.com, odc-bn-files-geo.onedrive.akadns.net, l-0004.l-msedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, login.live.com, continuum.dds.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, www.bing.com, client.wns.windows.com, fs.microsoft.com, bn-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-web-geo.onedrive.akadns.net, odc-bn-files-brs.onedrive.akadns.net, tile-service.weather.microsoft.com, wd-prod-cp-eu-north-2-fe.northeurope.cloudapp.azure.com, l-0003.dc-msedge.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, wdcp.microsoft.com, wd-prod-cp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, ris.api.iris.microsoft.com, wdcpalt.microsoft.com, evoke-windowsservices-tas.msedge.net, wd-prod-cp-eu-west-1-fe.westeurope.cloudapp.azure.com, nexusrules.officeapps.live.com, manage.devcenter.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                21:15:22Task SchedulerRun new task: Intel PTT EK Recertification path: "C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\IntelPTTEKRecertification.exe"
                                21:15:54AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Tanadarforurenings C:\Users\user\AppData\Local\Temp\Agerhnsjagtfi\Countysygej.exe
                                21:16:02AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Tanadarforurenings C:\Users\user\AppData\Local\Temp\Agerhnsjagtfi\Countysygej.exe

                                Joe Sandbox View / Context

                                IPs

                                No context

                                Domains

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                olufem.ddns.netEASTWAY COMNAGA SB PAYMENT BANK IN SLIP 250521_PDF.exeGet hashmaliciousBrowse
                                • 192.253.242.6

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                TMNET-AS-APTMNetInternetServiceProviderMY8WJ1mWaBwNGet hashmaliciousBrowse
                                • 60.49.58.145
                                j9ZfvcmyKNGet hashmaliciousBrowse
                                • 1.32.15.223
                                jJE7aD1zMEGet hashmaliciousBrowse
                                • 219.93.31.44
                                SSIuSyaBAFGet hashmaliciousBrowse
                                • 210.187.51.227
                                arm-20211121-1750Get hashmaliciousBrowse
                                • 175.145.81.50
                                Z4GtdTRjuRGet hashmaliciousBrowse
                                • 175.139.103.110
                                4IjC16LtGDGet hashmaliciousBrowse
                                • 60.51.38.70
                                n3586AtaJ2Get hashmaliciousBrowse
                                • 110.159.188.159
                                XLKPMXNVFzGet hashmaliciousBrowse
                                • 60.49.58.145
                                uranium.armGet hashmaliciousBrowse
                                • 115.133.184.135
                                6czmI0PCR3Get hashmaliciousBrowse
                                • 202.188.38.151
                                hIejwF53ztGet hashmaliciousBrowse
                                • 219.93.199.24
                                arm7Get hashmaliciousBrowse
                                • 175.143.137.156
                                armGet hashmaliciousBrowse
                                • 219.95.72.247
                                TAwWC6sZFEGet hashmaliciousBrowse
                                • 42.189.114.232
                                he7hRoAnnxGet hashmaliciousBrowse
                                • 175.143.137.179
                                mipsGet hashmaliciousBrowse
                                • 115.132.43.74
                                0v5QUcQFnCGet hashmaliciousBrowse
                                • 1.32.134.252
                                arm5-20211114-0109Get hashmaliciousBrowse
                                • 175.139.159.156
                                0tCtZXUxNWGet hashmaliciousBrowse
                                • 118.101.211.234

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Temp\Agerhnsjagtfi\Countysygej.exe
                                Process:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):128816
                                Entropy (8bit):5.999498053134024
                                Encrypted:false
                                SSDEEP:1536:I+3sCKWgen7J84YCrMYpNxXeBwodguvRZkVT7yaBOJzFHKAgYX5:I1PX0JLHrJNvoPvoVT58JzFh5
                                MD5:B2E24BC0F1F55F2AC9D8034098DFE32F
                                SHA1:4A20778ACF6D512792077DC339F23ACFBDF22875
                                SHA-256:D5ACE58C68D1FF767B284DEB172B5CE0550E96023A509A171FA7B34F0929B8E0
                                SHA-512:01DBC321743ACF74EF5557F9429D26AA5892B196C695A5E4ED0342D626C4E98A650D01729975D20812653EDAF5295FDC7484A43949738D9DE5EFFDB1DCB7B896
                                Malicious:true
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 40%, Browse
                                • Antivirus: ReversingLabs, Detection: 27%
                                Reputation:low
                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........u..&..&..&T.&..&..&..&..&..&Rich..&................PE..L......V.....................`...... .............@..................................A......................................d...(.......<7..............0...................................................0... ....................................text...(........................... ..`.data...............................@....rsrc...<7.......@..................@..@..^............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFDA925A6B9EAC6C8F.TMP
                                Process:C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe
                                File Type:Composite Document File V2 Document, Cannot read section info
                                Category:dropped
                                Size (bytes):16384
                                Entropy (8bit):1.3863194741075688
                                Encrypted:false
                                SSDEEP:96:GaabmG8CL3uSTdfPBeQaabmG8CL3uSTdf:i93jJBeU93j
                                MD5:B3A27F74C52AC98DDE14EA7A804ECFD6
                                SHA1:5F6D3F7644E0973D8A059AC228042EA60C507836
                                SHA-256:F6C6736ACA8B6A743732E216DBB62B59B65DCBB0B6308B2B28D67706ABBC7F0C
                                SHA-512:F7129070C7133C63C57BE7724B322B2A8F3FB6624F35B7A4E730DECD418E488CBF53292E845255DEDCFBA1502A0332D7DB17EF29D0E2A2A4DD345F87EECB36BE
                                Malicious:false
                                Reputation:low
                                Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Roaming\wifitskl\logs.dat
                                Process:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):144
                                Entropy (8bit):3.3458058208756873
                                Encrypted:false
                                SSDEEP:3:rklKlFlUef4qClDl5JWRal2Jl+7R0DAlBG45klovDl6v:IlKPlPf4qCb5YcIeeDAlOWAv
                                MD5:15929DC814DA0FBE525987A12E1802A8
                                SHA1:AF68046542D879732F3D447B3046FD02D5B5EFC1
                                SHA-256:3D48A06F43C9DC735B6174D4019EFBF866D9F11946A8D2F691CA7DF33460823F
                                SHA-512:74C074F001B04538BE027C1E8FCE6F1CBC5A36D01083B3AB455DFDA14DC61850E12B816C5A4E9C7D3A22422E223E866306D874293DB157415B0C70DF3A1A8C3F
                                Malicious:false
                                Reputation:low
                                Preview: ....[.2.0.2.1./.1.1./.2.4. .2.1.:.1.6.:.0.3. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):5.999498053134024
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.15%
                                • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:Hong Tak Engineering SB Payment Receipt 241121_PDF.exe
                                File size:128816
                                MD5:b2e24bc0f1f55f2ac9d8034098dfe32f
                                SHA1:4a20778acf6d512792077dc339f23acfbdf22875
                                SHA256:d5ace58c68d1ff767b284deb172b5ce0550e96023a509a171fa7b34f0929b8e0
                                SHA512:01dbc321743acf74ef5557f9429d26aa5892b196c695a5e4ed0342d626c4e98a650d01729975d20812653edaf5295fdc7484a43949738d9de5effdb1dcb7b896
                                SSDEEP:1536:I+3sCKWgen7J84YCrMYpNxXeBwodguvRZkVT7yaBOJzFHKAgYX5:I1PX0JLHrJNvoPvoVT58JzFh5
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........u...&...&...&T..&...&...&...&...&...&Rich...&................PE..L......V.....................`...... .............@........

                                File Icon

                                Icon Hash:42b97ce4f0e1f2e4

                                Static PE Info

                                General

                                Entrypoint:0x401320
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                DLL Characteristics:
                                Time Stamp:0x56BC1AFE [Thu Feb 11 05:24:14 2016 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:995d60149de3040b4890e5871343f4eb

                                Authenticode Signature

                                Signature Valid:false
                                Signature Issuer:E=dykkerklokkeado@LOKALITET.Sk, CN=godkendelsesmil, OU=Iroquoianspri1, O=Klarissenobie, L=KEDECHRYSLEROVEREF, S=AFSPADSERING, C=SC
                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                Error Number:-2146762487
                                Not Before, Not After
                                • 24/11/2021 04:20:15 24/11/2022 04:20:15
                                Subject Chain
                                • E=dykkerklokkeado@LOKALITET.Sk, CN=godkendelsesmil, OU=Iroquoianspri1, O=Klarissenobie, L=KEDECHRYSLEROVEREF, S=AFSPADSERING, C=SC
                                Version:3
                                Thumbprint MD5:8ACCDE5BD3D9438F5ED6CE6C1979787E
                                Thumbprint SHA-1:E6BE6E4C60B6588F4C337C033C6165C6914F3249
                                Thumbprint SHA-256:A2E6DA055CC6C343D9251796595BC0A1882C21EC31DBD14C72A656EC419A4096
                                Serial:00

                                Entrypoint Preview

                                Instruction
                                push 0040284Ch
                                call 00007F7778890783h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                xor byte ptr [eax], al
                                add byte ptr [eax], al
                                inc eax
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [esi-71919BE2h], al
                                inc esi
                                mov byte ptr [ecx-66h], cl
                                popfd
                                std
                                iretd
                                adc dword ptr [ebp+00003112h], eax
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add dword ptr [eax], eax
                                add byte ptr [eax], al
                                inc eax
                                add bh, byte ptr [eax]
                                or byte ptr [ecx+00h], al
                                inc esp
                                outsd
                                jnbe 00007F7778890800h
                                imul esp, dword ptr [ebp+73h], 6E6F6B74h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add bh, bh
                                int3
                                xor dword ptr [eax], eax
                                add esp, ebx
                                mov byte ptr [DB0681D6h], al
                                mov eax, dword ptr [DCCA9944h]
                                clc
                                mov dword ptr [128312C7h], eax
                                sub eax, 4704A48Fh
                                scasd
                                dec ebp
                                test al, E0h
                                inc esi
                                xor eax, ecx
                                scasd
                                call 00007F7725D84231h
                                xor ebx, dword ptr [ecx-48EE309Ah]
                                or al, 00h
                                stosb
                                add byte ptr [eax-2Dh], ah
                                xchg eax, ebx
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                stosb
                                push cs
                                add byte ptr [eax], al
                                mov dword ptr [esi], ecx
                                add byte ptr [eax], al
                                add byte ptr [eax+eax], cl
                                push ebx
                                jne 00007F7778890800h
                                jbe 00007F77788907F9h
                                jc 00007F77788907FDh
                                xor dword ptr [eax], eax
                                or eax, 42000701h
                                popad

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x192640x28.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x373c.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x1f0000x730.rsrc
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
                                IMAGE_DIRECTORY_ENTRY_IAT0x10000x118.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x187280x19000False0.47935546875data6.37312654175IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .data0x1a0000x1a940x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                .rsrc0x1c0000x373c0x4000False0.217163085938data3.71594095347IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                SET0x1d2960x24a6MS Windows icon resource - 3 icons, 24x24, 16 colors, 4 bits/pixel, 24x24, 8 bits/pixelEnglishUnited States
                                RT_ICON0x1c9ee0x8a8data
                                RT_ICON0x1c4860x568GLS_BINARY_LSB_FIRST
                                RT_GROUP_ICON0x1c4640x22data
                                RT_VERSION0x1c1700x2f4dataChineseTaiwan

                                Imports

                                DLLImport
                                MSVBVM60.DLL_CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaStrVarMove, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFPFix, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, __vbaObjVar, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, _CIlog, __vbaNew2, __vbaR8Str, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarTstNe, __vbaStrToAnsi, __vbaFpI4, __vbaLateMemCallLd, _CIatan, __vbaStrMove, __vbaR8IntI4, _allmul, __vbaLateIdSt, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr

                                Version Infos

                                DescriptionData
                                Translation0x0404 0x04b0
                                LegalCopyrightClamore
                                InternalNameGRUDGEFULUNNOT
                                FileVersion1.00
                                CompanyNameClamore
                                LegalTrademarksClamore
                                CommentsClamore
                                ProductNameClamore
                                ProductVersion1.00
                                FileDescriptionClamore
                                OriginalFilenameGRUDGEFULUNNOT.exe

                                Possible Origin

                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                ChineseTaiwan

                                Network Behavior

                                Snort IDS Alerts

                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                11/24/21-21:16:03.943231UDP254DNS SPOOF query response with TTL of 1 min. and no authority53549931.1.1.1192.168.11.20
                                11/24/21-21:17:10.219978UDP254DNS SPOOF query response with TTL of 1 min. and no authority53613881.1.1.1192.168.11.20
                                11/24/21-21:18:16.486809UDP254DNS SPOOF query response with TTL of 1 min. and no authority53563921.1.1.1192.168.11.20
                                11/24/21-21:19:22.754077UDP254DNS SPOOF query response with TTL of 1 min. and no authority53538511.1.1.1192.168.11.20
                                11/24/21-21:20:29.035139UDP254DNS SPOOF query response with TTL of 1 min. and no authority53570691.1.1.1192.168.11.20
                                11/24/21-21:21:35.301983UDP254DNS SPOOF query response with TTL of 1 min. and no authority53507631.1.1.1192.168.11.20
                                11/24/21-21:22:41.570485UDP254DNS SPOOF query response with TTL of 1 min. and no authority53628051.1.1.1192.168.11.20
                                11/24/21-21:23:47.834671UDP254DNS SPOOF query response with TTL of 1 min. and no authority53635001.1.1.1192.168.11.20

                                Network Port Distribution

                                TCP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Nov 24, 2021 21:16:03.944188118 CET497686111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:04.954806089 CET497686111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:06.969886065 CET497686111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:10.984575987 CET497686111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:18.998584032 CET497686111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:26.054233074 CET497766111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:27.059231997 CET497766111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:29.058798075 CET497766111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:33.073483944 CET497766111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:41.087390900 CET497766111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:48.120667934 CET497836111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:49.132457972 CET497836111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:51.147586107 CET497836111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:16:55.162360907 CET497836111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:03.176305056 CET497836111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:10.221398115 CET497866111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:11.221426964 CET497866111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:13.236635923 CET497866111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:17.251171112 CET497866111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:25.265109062 CET497866111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:32.297257900 CET497896111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:33.310327053 CET497896111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:35.325279951 CET497896111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:39.340059042 CET497896111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:47.353986025 CET497896111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:54.386050940 CET497916111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:55.399092913 CET497916111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:17:57.414266109 CET497916111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:01.429003000 CET497916111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:09.442759037 CET497916111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:16.487657070 CET497936111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:17.487942934 CET497936111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:19.503175020 CET497936111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:23.522046089 CET497936111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:31.531696081 CET497936111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:38.563545942 CET497966111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:39.576857090 CET497966111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:41.591892958 CET497966111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:45.606659889 CET497966111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:18:53.620731115 CET497966111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:00.652743101 CET497996111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:01.665728092 CET497996111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:03.680870056 CET497996111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:07.695575953 CET497996111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:15.709378004 CET497996111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:22.755846024 CET498006111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:23.770164013 CET498006111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:25.785235882 CET498006111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:29.800086021 CET498006111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:37.814014912 CET498006111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:44.845944881 CET498026111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:45.859019995 CET498026111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:47.874130964 CET498026111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:51.889010906 CET498026111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:19:59.902756929 CET498026111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:06.934803963 CET498056111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:07.947868109 CET498056111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:09.963076115 CET498056111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:13.977791071 CET498056111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:21.991703987 CET498056111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:29.036036968 CET498076111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:30.036818027 CET498076111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:32.051997900 CET498076111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:36.066572905 CET498076111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:44.080523014 CET498076111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:51.112462997 CET498086111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:52.125577927 CET498086111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:54.140883923 CET498086111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:20:58.155420065 CET498086111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:06.169336081 CET498086111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:13.201263905 CET498106111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:14.214443922 CET498106111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:16.229585886 CET498106111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:20.244519949 CET498106111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:28.258208990 CET498106111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:35.302795887 CET498136111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:36.303348064 CET498136111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:38.318450928 CET498136111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:42.333194971 CET498136111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:50.347140074 CET498136111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:57.379214048 CET498216111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:21:58.392088890 CET498216111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:00.407411098 CET498216111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:04.422167063 CET498216111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:12.435956001 CET498216111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:19.469208956 CET498246111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:20.480978966 CET498246111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:22.496289968 CET498246111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:26.510926962 CET498246111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:34.524770975 CET498246111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:41.571574926 CET498276111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:42.585546017 CET498276111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:44.600801945 CET498276111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:48.615540981 CET498276111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:22:56.629332066 CET498276111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:23:03.661417007 CET498306111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:23:04.674488068 CET498306111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:23:06.689634085 CET498306111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:23:10.704372883 CET498306111192.168.11.20124.82.81.98
                                Nov 24, 2021 21:23:18.718188047 CET498306111192.168.11.20124.82.81.98

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Nov 24, 2021 21:15:56.838493109 CET6539453192.168.11.201.1.1.1
                                Nov 24, 2021 21:15:57.603185892 CET6350753192.168.11.201.1.1.1
                                Nov 24, 2021 21:16:03.931648970 CET5499353192.168.11.201.1.1.1
                                Nov 24, 2021 21:16:03.943231106 CET53549931.1.1.1192.168.11.20
                                Nov 24, 2021 21:17:10.207977057 CET6138853192.168.11.201.1.1.1
                                Nov 24, 2021 21:17:10.219978094 CET53613881.1.1.1192.168.11.20
                                Nov 24, 2021 21:18:16.474395037 CET5639253192.168.11.201.1.1.1
                                Nov 24, 2021 21:18:16.486809015 CET53563921.1.1.1192.168.11.20
                                Nov 24, 2021 21:19:22.741189957 CET5385153192.168.11.201.1.1.1
                                Nov 24, 2021 21:19:22.754076958 CET53538511.1.1.1192.168.11.20
                                Nov 24, 2021 21:20:29.023251057 CET5706953192.168.11.201.1.1.1
                                Nov 24, 2021 21:20:29.035139084 CET53570691.1.1.1192.168.11.20
                                Nov 24, 2021 21:21:35.289797068 CET5076353192.168.11.201.1.1.1
                                Nov 24, 2021 21:21:35.301983118 CET53507631.1.1.1192.168.11.20
                                Nov 24, 2021 21:22:41.556521893 CET6280553192.168.11.201.1.1.1
                                Nov 24, 2021 21:22:41.570485115 CET53628051.1.1.1192.168.11.20
                                Nov 24, 2021 21:23:47.822930098 CET6350053192.168.11.201.1.1.1
                                Nov 24, 2021 21:23:47.834671021 CET53635001.1.1.1192.168.11.20

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Nov 24, 2021 21:15:56.838493109 CET192.168.11.201.1.1.10x7c5fStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                Nov 24, 2021 21:15:57.603185892 CET192.168.11.201.1.1.10xb6f5Standard query (0)7ybh4q.bn.files.1drv.comA (IP address)IN (0x0001)
                                Nov 24, 2021 21:16:03.931648970 CET192.168.11.201.1.1.10xcd2cStandard query (0)olufem.ddns.netA (IP address)IN (0x0001)
                                Nov 24, 2021 21:17:10.207977057 CET192.168.11.201.1.1.10xf8f8Standard query (0)olufem.ddns.netA (IP address)IN (0x0001)
                                Nov 24, 2021 21:18:16.474395037 CET192.168.11.201.1.1.10x77acStandard query (0)olufem.ddns.netA (IP address)IN (0x0001)
                                Nov 24, 2021 21:19:22.741189957 CET192.168.11.201.1.1.10x6f48Standard query (0)olufem.ddns.netA (IP address)IN (0x0001)
                                Nov 24, 2021 21:20:29.023251057 CET192.168.11.201.1.1.10x5463Standard query (0)olufem.ddns.netA (IP address)IN (0x0001)
                                Nov 24, 2021 21:21:35.289797068 CET192.168.11.201.1.1.10x2889Standard query (0)olufem.ddns.netA (IP address)IN (0x0001)
                                Nov 24, 2021 21:22:41.556521893 CET192.168.11.201.1.1.10xdd45Standard query (0)olufem.ddns.netA (IP address)IN (0x0001)
                                Nov 24, 2021 21:23:47.822930098 CET192.168.11.201.1.1.10x4b0fStandard query (0)olufem.ddns.netA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Nov 24, 2021 21:15:56.848558903 CET1.1.1.1192.168.11.200x7c5fNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                Nov 24, 2021 21:15:57.780812979 CET1.1.1.1192.168.11.200xb6f5No error (0)7ybh4q.bn.files.1drv.combn-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                Nov 24, 2021 21:15:57.780812979 CET1.1.1.1192.168.11.200xb6f5No error (0)bn-files.fe.1drv.comodc-bn-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                Nov 24, 2021 21:16:03.943231106 CET1.1.1.1192.168.11.200xcd2cNo error (0)olufem.ddns.net124.82.81.98A (IP address)IN (0x0001)
                                Nov 24, 2021 21:17:10.219978094 CET1.1.1.1192.168.11.200xf8f8No error (0)olufem.ddns.net124.82.81.98A (IP address)IN (0x0001)
                                Nov 24, 2021 21:18:16.486809015 CET1.1.1.1192.168.11.200x77acNo error (0)olufem.ddns.net124.82.81.98A (IP address)IN (0x0001)
                                Nov 24, 2021 21:19:22.754076958 CET1.1.1.1192.168.11.200x6f48No error (0)olufem.ddns.net124.82.81.98A (IP address)IN (0x0001)
                                Nov 24, 2021 21:20:29.035139084 CET1.1.1.1192.168.11.200x5463No error (0)olufem.ddns.net124.82.81.98A (IP address)IN (0x0001)
                                Nov 24, 2021 21:21:35.301983118 CET1.1.1.1192.168.11.200x2889No error (0)olufem.ddns.net124.82.81.98A (IP address)IN (0x0001)
                                Nov 24, 2021 21:22:41.570485115 CET1.1.1.1192.168.11.200xdd45No error (0)olufem.ddns.net124.82.81.98A (IP address)IN (0x0001)
                                Nov 24, 2021 21:23:47.834671021 CET1.1.1.1192.168.11.200x4b0fNo error (0)olufem.ddns.net124.82.81.98A (IP address)IN (0x0001)

                                Code Manipulations

                                Statistics

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:21:15:22
                                Start date:24/11/2021
                                Path:C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe"
                                Imagebase:0x400000
                                File size:128816 bytes
                                MD5 hash:B2E24BC0F1F55F2AC9D8034098DFE32F
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Visual Basic
                                Yara matches:
                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.1038188324.00000000022D0000.00000040.00000001.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:21:15:37
                                Start date:24/11/2021
                                Path:C:\Program Files (x86)\Internet Explorer\ieinstal.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Hong Tak Engineering SB Payment Receipt 241121_PDF.exe"
                                Imagebase:0xc60000
                                File size:480256 bytes
                                MD5 hash:7871873BABCEA94FBA13900B561C7C55
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.5679272163.000000000302B000.00000004.00000020.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000F.00000000.759017370.0000000002CE0000.00000040.00000001.sdmp, Author: Joe Security
                                Reputation:moderate

                                Disassembly

                                Code Analysis

                                Reset < >