Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cP5nXH8fQI

Overview

General Information

Sample Name:cP5nXH8fQI (renamed file extension from none to exe)
Analysis ID:559052
MD5:37fc2aa213d1607545a9b876f4aa543e
SHA1:7da3e745ac618d2aee602d1de1957aa4442c98ed
SHA256:4486318d812a32852db5a4b8bd19dc456890b6c9a1bd03ffe94e2ef189394d90
Tags:32exetrojan
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Drops PE files
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cP5nXH8fQI.exe (PID: 6392 cmdline: "C:\Users\user\Desktop\cP5nXH8fQI.exe" MD5: 37FC2AA213D1607545A9B876F4AA543E)
  • cleanup
{"Payload URL": "https://bangladeshshoecity.com/im"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.767624973.0000000002940000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.767624973.0000000002940000.00000040.00000800.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://bangladeshshoecity.com/im"}
    Source: cP5nXH8fQI.exeVirustotal: Detection: 10%Perma Link
    Source: cP5nXH8fQI.exeReversingLabs: Detection: 18%
    Source: cP5nXH8fQI.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: cP5nXH8fQI.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://bangladeshshoecity.com/im
    Source: cP5nXH8fQI.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: cP5nXH8fQI.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: cP5nXH8fQI.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: cP5nXH8fQI.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: cP5nXH8fQI.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: cP5nXH8fQI.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: cP5nXH8fQI.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: cP5nXH8fQI.exeString found in binary or memory: http://ocsp.digicert.com0C
    Source: cP5nXH8fQI.exeString found in binary or memory: http://ocsp.digicert.com0O
    Source: cP5nXH8fQI.exeString found in binary or memory: http://www.digicert.com/CPS0
    Source: cP5nXH8fQI.exeString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: cP5nXH8fQI.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0040755C
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_00406D85
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_70581BFF
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0294559A
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02943A95
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02945881
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_029452F8
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02940217
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02945435
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0294744F
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0294767A
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0294719A
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_029441F1
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_029439FE
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_029415FB
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02946D17
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02943B22
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02943D5A
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0294734F
    Source: cP5nXH8fQI.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0294559A NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_029452F8 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeProcess Stats: CPU usage > 98%
    Source: cP5nXH8fQI.exeVirustotal: Detection: 10%
    Source: cP5nXH8fQI.exeReversingLabs: Detection: 18%
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeFile read: C:\Users\user\Desktop\cP5nXH8fQI.exeJump to behavior
    Source: cP5nXH8fQI.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeFile created: C:\Users\user\AppData\Local\Temp\nsr50D.tmpJump to behavior
    Source: classification engineClassification label: mal68.troj.winEXE@1/3@0/0
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: cP5nXH8fQI.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.767624973.0000000002940000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_705830C0 push eax; ret
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02942EF0 push es; iretd
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_70581BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeFile created: C:\Users\user\AppData\Local\Temp\nss731.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_029450C4 rdtsc
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0294689E mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0294744F mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02944F83 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_02946BA0 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_70581BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_029450C4 rdtsc
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0294809F RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\cP5nXH8fQI.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    cP5nXH8fQI.exe11%VirustotalBrowse
    cP5nXH8fQI.exe19%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nss731.tmp\System.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nss731.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://bangladeshshoecity.com/im0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    0,0,238381330,0000000000095000,00000104,00000010,00020000,00000000,1,0true
      low
      https://bangladeshshoecity.com/imtrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorErrorcP5nXH8fQI.exefalse
        high
        No contacted IP infos
        Joe Sandbox Version:34.0.0 Boulder Opal
        Analysis ID:559052
        Start date:24.01.2022
        Start time:20:09:34
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 7m 43s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:cP5nXH8fQI (renamed file extension from none to exe)
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:28
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal68.troj.winEXE@1/3@0/0
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 41.6% (good quality ratio 41%)
        • Quality average: 86.9%
        • Quality standard deviation: 21.2%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
        • Excluded IPs from analysis (whitelisted): 23.3.109.212
        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\cP5nXH8fQI.exe
        File Type:DOS executable (COM)
        Category:dropped
        Size (bytes):33645
        Entropy (8bit):7.620146538761287
        Encrypted:false
        SSDEEP:768:tEn1wCHxTRSJLLV7yueznYuQa6OjAaOIOaW3BISs:8UJ/V7ytYy6oebxIn
        MD5:0614A80093A3722C605EFD8B79692F37
        SHA1:16CBC940F64C331B2AD8F75C1C59321EB7CDEF1D
        SHA-256:FE4DB2C0884A3AD00C2B0D47C119B1293520E35308993870EAC4B211847E7229
        SHA-512:3E4110AC344CCF265F5FB28D247A6AD62D00485D2CC22398012B10E679E4D043FACC0CC1AFD6DA4D565D15304C082684E525490571AB349D963C38A6D669B815
        Malicious:false
        Reputation:low
        Preview:.W_.?.u.....u.....u........h.U!C.4$...i.4$P.k...$....,$.x...,$lcK.Z1..4.Tf......9.u.W..........T..,..F......j.va...j....}@W.3...........tV=...B...". ..^z.D.:......T..;...nL~..#Kvx.1X..g....O.........z@.W..s-.q..Y.....F......j.va...j....}@W.3...........tV=...B...". ..^z.D.:......T..;...nL~..#Kvx.1X..g....O.........z@.W..s-.q..Y.q.l..6.#H.\:.g!..S.6y...z...V.QB....V!.|7..K$.:..c..T.x...8o.^(!.*..Tf..T...Tfw.......9.f.o."..5f.o....T...q.y.......HlQy.......mzUf...5...#.m.zBZ.p.......#.....`.2.].Tfqc.f..3x.T>qk.g....m....T......T...Tf.c....T..!.B.@.o.g B...#g B.s..og.B.h..0b..*.........).{.0...\f..".y.p...........b...N*:....}i.K...<........%..R.....*%Af...W...c.....h....y....[.B4.2%..v.... F...I.TfA..j.g......9....g....f7sk.g..<.b...m.Uf.\`V....'.......1*D*"H...n...N.Z.(.|....'h.=y$XC......X.;}.../...9.V.....Tf4..H.....E*....a.:....@.*3?.gPB.Bb.y.pr..U.......<........kR..'K.oF.........#...d..R.........R.+e.'*1T.......j.<.T&...f.y.p."t.m2E..9.(...
        Process:C:\Users\user\Desktop\cP5nXH8fQI.exe
        File Type:ASCII text, with very long lines, with no line terminators
        Category:dropped
        Size (bytes):16555
        Entropy (8bit):5.9518641421213605
        Encrypted:false
        SSDEEP:384:HpBOk6soHG6Nun3UPBApXPE8eMag91API7ee872UmLZ7:HmkfOG6NNyp/dn19N7U71mLZ
        MD5:695A2030432B3D981B012A42EDCA055A
        SHA1:31283CF8F970E22E7C9B6FCB811B9C1608997211
        SHA-256:F0568B8400FE6F4621B3E62C56B3C3AB9712DD6D30966A348EB3497ACF6B226A
        SHA-512:0095FE21135FCCB9C5723D583C2087FB9D9CD61CB90BB5C96E11EA76469A3744B7F068B7301F7342AF95642D18921763B250FBB9E8F16F5CC9124300E6A97C5C
        Malicious:false
        Reputation:low
        Preview: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
        Process:C:\Users\user\Desktop\cP5nXH8fQI.exe
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):12288
        Entropy (8bit):5.814115788739565
        Encrypted:false
        SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
        MD5:CFF85C549D536F651D4FB8387F1976F2
        SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
        SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
        SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
        Malicious:false
        Antivirus:
        • Antivirus: Metadefender, Detection: 0%, Browse
        • Antivirus: ReversingLabs, Detection: 0%
        Reputation:moderate, very likely benign file
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Entropy (8bit):7.521910150341084
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:cP5nXH8fQI.exe
        File size:95264
        MD5:37fc2aa213d1607545a9b876f4aa543e
        SHA1:7da3e745ac618d2aee602d1de1957aa4442c98ed
        SHA256:4486318d812a32852db5a4b8bd19dc456890b6c9a1bd03ffe94e2ef189394d90
        SHA512:bf750937cde6af507628a730b34be52bba983be99861f46fd92ebfbc3f4a9c7d30534ac5378e802a0b09bad8d168450679abd6d5e5543a8ed88467c051d1a32a
        SSDEEP:1536:6/T2X/jN2vxZz0DTHUpouZZb5a6fy2W8utruxlQIj/qrlyZ6PeZuH8k29xE+1Q:6bG7N2kDTHUpouZZbUuy2W8uxuzRQT4o
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
        Icon Hash:b2a88c96b2ca6a72
        Entrypoint:0x40352d
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
        Signature Valid:false
        Signature Issuer:E=DAALAMMENES@sdvane.Tre, CN=Gennemtrkke, OU=begynderkursusset, O=Prudences, L=UNPIONEERING, S=FILTERKURVERS, C=MM
        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
        Error Number:-2146762487
        Not Before, Not After
        • 1/23/2022 7:50:30 AM 1/23/2023 7:50:30 AM
        Subject Chain
        • E=DAALAMMENES@sdvane.Tre, CN=Gennemtrkke, OU=begynderkursusset, O=Prudences, L=UNPIONEERING, S=FILTERKURVERS, C=MM
        Version:3
        Thumbprint MD5:671A5B893A26A086EBCF47C366C6CA07
        Thumbprint SHA-1:F6F1C0182560058469D9B93DE8B83C062BB3AB74
        Thumbprint SHA-256:B66611C64E384A6777717730C3A835575A37176671AF55C8410BC11848B75E0C
        Serial:00
        Instruction
        push ebp
        mov ebp, esp
        sub esp, 000003F4h
        push ebx
        push esi
        push edi
        push 00000020h
        pop edi
        xor ebx, ebx
        push 00008001h
        mov dword ptr [ebp-14h], ebx
        mov dword ptr [ebp-04h], 0040A2E0h
        mov dword ptr [ebp-10h], ebx
        call dword ptr [004080CCh]
        mov esi, dword ptr [004080D0h]
        lea eax, dword ptr [ebp-00000140h]
        push eax
        mov dword ptr [ebp-0000012Ch], ebx
        mov dword ptr [ebp-2Ch], ebx
        mov dword ptr [ebp-28h], ebx
        mov dword ptr [ebp-00000140h], 0000011Ch
        call esi
        test eax, eax
        jne 00007F9D10A94DAAh
        lea eax, dword ptr [ebp-00000140h]
        mov dword ptr [ebp-00000140h], 00000114h
        push eax
        call esi
        mov ax, word ptr [ebp-0000012Ch]
        mov ecx, dword ptr [ebp-00000112h]
        sub ax, 00000053h
        add ecx, FFFFFFD0h
        neg ax
        sbb eax, eax
        mov byte ptr [ebp-26h], 00000004h
        not eax
        and eax, ecx
        mov word ptr [ebp-2Ch], ax
        cmp dword ptr [ebp-0000013Ch], 0Ah
        jnc 00007F9D10A94D7Ah
        and word ptr [ebp-00000132h], 0000h
        mov eax, dword ptr [ebp-00000134h]
        movzx ecx, byte ptr [ebp-00000138h]
        mov dword ptr [00434FB8h], eax
        xor eax, eax
        mov ah, byte ptr [ebp-0000013Ch]
        movzx eax, ax
        or eax, ecx
        xor ecx, ecx
        mov ch, byte ptr [ebp-2Ch]
        movzx ecx, cx
        shl eax, 10h
        or eax, ecx
        Programming Language:
        • [EXP] VC++ 6.0 SP5 build 8804
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000xe28.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x15fa00x1480.data
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
        .ndata0x360000x160000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x4c0000xe280x1000False0.378662109375data4.00654037497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountry
        RT_ICON0x4c2080x2e8dataEnglishUnited States
        RT_DIALOG0x4c4f00x100dataEnglishUnited States
        RT_DIALOG0x4c5f00x11cdataEnglishUnited States
        RT_DIALOG0x4c7100xc4dataEnglishUnited States
        RT_DIALOG0x4c7d80x60dataEnglishUnited States
        RT_GROUP_ICON0x4c8380x14dataEnglishUnited States
        RT_VERSION0x4c8500x294dataEnglishUnited States
        RT_MANIFEST0x4cae80x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
        DLLImport
        ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
        SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
        ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
        COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
        USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
        GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
        KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
        DescriptionData
        LegalCopyrightLesney Products
        FileVersion1.2.1
        CompanyNameLesney Products
        LegalTrademarksLesney Products
        CommentsLesney Products
        ProductNameLesney Products
        FileDescriptionLesney Products
        Translation0x0409 0x04b0
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found
        No statistics
        Start time:20:10:29
        Start date:24/01/2022
        Path:C:\Users\user\Desktop\cP5nXH8fQI.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\cP5nXH8fQI.exe"
        Imagebase:0x400000
        File size:95264 bytes
        MD5 hash:37FC2AA213D1607545A9B876F4AA543E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.767624973.0000000002940000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
        Reputation:low

        No disassembly