Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SdEkI4IDqd.exe

Overview

General Information

Sample Name:SdEkI4IDqd.exe
Analysis ID:559536
MD5:003a7c37f9c06d75aaaa6f9b25dc3c41
SHA1:a847ef8c72d26731963b189caff925a8a757d563
SHA256:4f29b22b6b787babc2f984172f8ae0e3999b7621aeb6775ce023f2ef5db0b2e7
Tags:exesigned
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Drops PE files
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • SdEkI4IDqd.exe (PID: 5912 cmdline: "C:\Users\user\Desktop\SdEkI4IDqd.exe" MD5: 003A7C37F9C06D75AAAA6F9B25DC3C41)
  • cleanup
{"Payload URL": "https://dariamob.ro/wed/eee_XScUCMEVL47.bin"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.823231609.0000000004300000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000001.00000002.823231609.0000000004300000.00000040.00000800.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://dariamob.ro/wed/eee_XScUCMEVL47.bin"}
    Source: SdEkI4IDqd.exeReversingLabs: Detection: 11%
    Source: SdEkI4IDqd.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: SdEkI4IDqd.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://dariamob.ro/wed/eee_XScUCMEVL47.bin
    Source: SdEkI4IDqd.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: SdEkI4IDqd.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: SdEkI4IDqd.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: SdEkI4IDqd.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: SdEkI4IDqd.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: SdEkI4IDqd.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: SdEkI4IDqd.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: SdEkI4IDqd.exeString found in binary or memory: http://ocsp.digicert.com0C
    Source: SdEkI4IDqd.exeString found in binary or memory: http://ocsp.digicert.com0O
    Source: SdEkI4IDqd.exeString found in binary or memory: http://www.digicert.com/CPS0
    Source: SdEkI4IDqd.exeString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: SdEkI4IDqd.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0040755C
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_00406D85
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_702A1BFF
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0430584A
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04306034
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04305E2F
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0430801C
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04305855
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04305CB0
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_043042ED
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_043082D0
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04304D3E
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04305B2F
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04307D7D
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04304543
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0430554A
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04306F88
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04305BD9
    Source: SdEkI4IDqd.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0430584A NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04305855 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeProcess Stats: CPU usage > 98%
    Source: SdEkI4IDqd.exeReversingLabs: Detection: 11%
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeFile read: C:\Users\user\Desktop\SdEkI4IDqd.exeJump to behavior
    Source: SdEkI4IDqd.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeFile created: C:\Users\user\AppData\Local\Temp\nsp7CAF.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/3@0/0
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: SdEkI4IDqd.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000001.00000002.823231609.0000000004300000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_702A30C0 push eax; ret
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04306436 push edi; retf
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0430300E push ecx; ret
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0430304F push es; retn 0010h
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_043010AF push edx; ret
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04306487 push esi; iretd
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_043007E3 push cs; retf
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_702A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeFile created: C:\Users\user\AppData\Local\Temp\nsv7EA4.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeRDTSC instruction interceptor: First address: 0000000004307462 second address: 0000000004307462 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 767D2D08h 0x00000007 xor eax, 3DB3D81Dh 0x0000000c xor eax, 7DF81DA8h 0x00000011 add eax, C9C91744h 0x00000016 cpuid 0x00000018 popad 0x00000019 call 00007F71B8C8FACAh 0x0000001e lfence 0x00000021 mov edx, 719799E7h 0x00000026 xor edx, 4CF121DBh 0x0000002c add edx, F85B2DFFh 0x00000032 xor edx, 4A3FE62Fh 0x00000038 mov edx, dword ptr [edx] 0x0000003a lfence 0x0000003d cmp ax, dx 0x00000040 cmp ebx, edx 0x00000042 ret 0x00000043 sub edx, esi 0x00000045 ret 0x00000046 add edi, edx 0x00000048 dec dword ptr [ebp+000000F8h] 0x0000004e cmp dword ptr [ebp+000000F8h], 00000000h 0x00000055 jne 00007F71B8C8FAACh 0x00000057 call 00007F71B8C8FB15h 0x0000005c call 00007F71B8C8FAEBh 0x00000061 lfence 0x00000064 mov edx, 719799E7h 0x00000069 xor edx, 4CF121DBh 0x0000006f add edx, F85B2DFFh 0x00000075 xor edx, 4A3FE62Fh 0x0000007b mov edx, dword ptr [edx] 0x0000007d lfence 0x00000080 cmp ax, dx 0x00000083 cmp ebx, edx 0x00000085 ret 0x00000086 mov esi, edx 0x00000088 pushad 0x00000089 rdtsc
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0430745A rdtsc
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04305429 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0430707C mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04307D7D mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_043041D3 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_04306BD6 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_702A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0430745A rdtsc
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_043089CA RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\SdEkI4IDqd.exeCode function: 1_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SdEkI4IDqd.exe6%VirustotalBrowse
    SdEkI4IDqd.exe12%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsv7EA4.tmp\System.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nsv7EA4.tmp\System.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsv7EA4.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://dariamob.ro/wed/eee_XScUCMEVL47.bin0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    https://dariamob.ro/wed/eee_XScUCMEVL47.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorSdEkI4IDqd.exefalse
      high
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:559536
      Start date:25.01.2022
      Start time:13:18:52
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 8m 5s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:SdEkI4IDqd.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:20
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal72.troj.evad.winEXE@1/3@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 39.9% (good quality ratio 39.3%)
      • Quality average: 86.9%
      • Quality standard deviation: 21.2%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\SdEkI4IDqd.exe
      File Type:DOS executable (COM)
      Category:dropped
      Size (bytes):36366
      Entropy (8bit):7.621225978231947
      Encrypted:false
      SSDEEP:768:RcwJQKlTyjsiu4sY3Hs4bvuSyEXCjYL7XoaFZLkcszAI:a+FlOoiuJYMS2SyEyULTZI
      MD5:448942A62FED29DEF36D74EECFE7D736
      SHA1:4312E7D4BE729BF6200A1F87C1C84391CF0706F3
      SHA-256:87ADB3A77D22DD8C88F4900513775B411512F1964EBAC4DD4354554B4C36A68E
      SHA-512:3DC538388099228A260F1F48F50F713C9A476EE1E23F70F50A6D1758456E6024CA34DC17291A47E65A7F347BAA287DE36EEAB5548768EB3FE94E10DE03E4FFEB
      Malicious:false
      Reputation:low
      Preview:.__.?.u.....u.....u................O4|..J.YH.. elC..\<.....+..0.0R......Z1..4..,.%....9.u.W.........%.}"M.jB .d..+.3...O..Tl.T....=\...,5..M...|...._.I.4.v..K....gI.rs....s...$...dD.P.~...#...N.0.+}D....n......J..t5D.cU).m..<.$...X..]{.C....4K...;<..Z...u....H.^.#.a..B....p@.{d..v.z...-...mS.G.i...*...G.9."jM....g......]C...w..C(.`...C.....Y..{.y.|...h..P..y..`.h.Y.....*......p(...:$.,.%.,>....%.....Ca.YB.....,`..Y.Th>..Kc%.D....."|...%.1..W...("P.x..yz.%.i.....\0..e....E.%.i.C..`..K9......L.,...,.%.t.%...=I..].,...L`...`...*.5.%.MW..T.%.F....%..{..,...h"-'...X"-.q.u.X"-./.H.X"-.......:=kk.'qd.....n.....%.V...5g....$bs).....0..Q..".....1*..J...t=&...$.,..1.e.....U..m.....v...}...-.%yOH>.DiS.!5D..$.2.........x.h..."U......(...*....GyuKZj....,.....$............E....".Y...[.A....,..8.IM.Z.|...$.,....Q...?....&)...j.y~...-.%y..Y.D..7...5a.C..*...D6.("q.-.M.8...*'.,.c-....../...f:.;..[wt1z..=..%........L...N-.K..M...ny.*.d.".......5"H._...~8...
      Process:C:\Users\user\Desktop\SdEkI4IDqd.exe
      File Type:ASCII text, with very long lines, with no line terminators
      Category:dropped
      Size (bytes):16555
      Entropy (8bit):5.9518641421213605
      Encrypted:false
      SSDEEP:384:HpBOk6soHG6Nun3UPBApXPE8eMag91API7ee872UmLZ7:HmkfOG6NNyp/dn19N7U71mLZ
      MD5:695A2030432B3D981B012A42EDCA055A
      SHA1:31283CF8F970E22E7C9B6FCB811B9C1608997211
      SHA-256:F0568B8400FE6F4621B3E62C56B3C3AB9712DD6D30966A348EB3497ACF6B226A
      SHA-512:0095FE21135FCCB9C5723D583C2087FB9D9CD61CB90BB5C96E11EA76469A3744B7F068B7301F7342AF95642D18921763B250FBB9E8F16F5CC9124300E6A97C5C
      Malicious:false
      Reputation:low
      Preview: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
      Process:C:\Users\user\Desktop\SdEkI4IDqd.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):12288
      Entropy (8bit):5.814115788739565
      Encrypted:false
      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
      MD5:CFF85C549D536F651D4FB8387F1976F2
      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
      Malicious:false
      Antivirus:
      • Antivirus: Virustotal, Detection: 0%, Browse
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:moderate, very likely benign file
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Entropy (8bit):7.540130212507592
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:SdEkI4IDqd.exe
      File size:97752
      MD5:003a7c37f9c06d75aaaa6f9b25dc3c41
      SHA1:a847ef8c72d26731963b189caff925a8a757d563
      SHA256:4f29b22b6b787babc2f984172f8ae0e3999b7621aeb6775ce023f2ef5db0b2e7
      SHA512:4067ddae5bdf8f620d1cf1673536a8383664fd47a2b6bb0f7932eb005e43fdf0c5269d0f84a9aef6afd215bddbcc1536584216d07179a1bb66bb3f7645b0f1a2
      SSDEEP:1536:K/T2X/jN2vxZz0DTHUpouZZbnneGmqJdg9i6/g7ld317J1H8k29xE+19+coGd:KbG7N2kDTHUpouZZbnnnJdl11T4Pd
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
      Icon Hash:b2a88c96b2ca6a72
      Entrypoint:0x40352d
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
      Signature Valid:false
      Signature Issuer:E=Blosteret@HOVEDPUNKT.fl, CN=Tallowed4, OU=SEKSUALFORBRYDERES, O=Fiorin, L=Nonlyrically, S=CARPOPTOSIS, C=CN
      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
      Error Number:-2146762487
      Not Before, Not After
      • 1/25/2022 1:49:28 AM 1/25/2023 1:49:28 AM
      Subject Chain
      • E=Blosteret@HOVEDPUNKT.fl, CN=Tallowed4, OU=SEKSUALFORBRYDERES, O=Fiorin, L=Nonlyrically, S=CARPOPTOSIS, C=CN
      Version:3
      Thumbprint MD5:80D66677069923CF4D67981C0E1FBA70
      Thumbprint SHA-1:E8B77C74D42CA6EC42A14CF926CC0D402018DB27
      Thumbprint SHA-256:CF9CD9DC0548C1F076D43ECBF2CD2398423AE538B83271032EEBA04757E6E5E1
      Serial:00
      Instruction
      push ebp
      mov ebp, esp
      sub esp, 000003F4h
      push ebx
      push esi
      push edi
      push 00000020h
      pop edi
      xor ebx, ebx
      push 00008001h
      mov dword ptr [ebp-14h], ebx
      mov dword ptr [ebp-04h], 0040A2E0h
      mov dword ptr [ebp-10h], ebx
      call dword ptr [004080CCh]
      mov esi, dword ptr [004080D0h]
      lea eax, dword ptr [ebp-00000140h]
      push eax
      mov dword ptr [ebp-0000012Ch], ebx
      mov dword ptr [ebp-2Ch], ebx
      mov dword ptr [ebp-28h], ebx
      mov dword ptr [ebp-00000140h], 0000011Ch
      call esi
      test eax, eax
      jne 00007F71B8C025BAh
      lea eax, dword ptr [ebp-00000140h]
      mov dword ptr [ebp-00000140h], 00000114h
      push eax
      call esi
      mov ax, word ptr [ebp-0000012Ch]
      mov ecx, dword ptr [ebp-00000112h]
      sub ax, 00000053h
      add ecx, FFFFFFD0h
      neg ax
      sbb eax, eax
      mov byte ptr [ebp-26h], 00000004h
      not eax
      and eax, ecx
      mov word ptr [ebp-2Ch], ax
      cmp dword ptr [ebp-0000013Ch], 0Ah
      jnc 00007F71B8C0258Ah
      and word ptr [ebp-00000132h], 0000h
      mov eax, dword ptr [ebp-00000134h]
      movzx ecx, byte ptr [ebp-00000138h]
      mov dword ptr [00434FB8h], eax
      xor eax, eax
      mov ah, byte ptr [ebp-0000013Ch]
      movzx eax, ax
      or eax, ecx
      xor ecx, ecx
      mov ch, byte ptr [ebp-2Ch]
      movzx ecx, cx
      shl eax, 10h
      or eax, ecx
      Programming Language:
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000xe28.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x169680x1470.data
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .ndata0x360000x160000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x4c0000xe280x1000False0.378662109375data4.00654037497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_ICON0x4c2080x2e8dataEnglishUnited States
      RT_DIALOG0x4c4f00x100dataEnglishUnited States
      RT_DIALOG0x4c5f00x11cdataEnglishUnited States
      RT_DIALOG0x4c7100xc4dataEnglishUnited States
      RT_DIALOG0x4c7d80x60dataEnglishUnited States
      RT_GROUP_ICON0x4c8380x14dataEnglishUnited States
      RT_VERSION0x4c8500x294dataEnglishUnited States
      RT_MANIFEST0x4cae80x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
      DLLImport
      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
      DescriptionData
      LegalCopyrightLesney Products
      FileVersion1.2.1
      CompanyNameLesney Products
      LegalTrademarksLesney Products
      CommentsLesney Products
      ProductNameLesney Products
      FileDescriptionLesney Products
      Translation0x0409 0x04b0
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found
      No statistics
      Target ID:1
      Start time:13:19:53
      Start date:25/01/2022
      Path:C:\Users\user\Desktop\SdEkI4IDqd.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\SdEkI4IDqd.exe"
      Imagebase:0x400000
      File size:97752 bytes
      MD5 hash:003A7C37F9C06D75AAAA6F9B25DC3C41
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.823231609.0000000004300000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low

      No disassembly