Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9u4xTDR5bG

Overview

General Information

Sample Name:9u4xTDR5bG (renamed file extension from none to exe)
Analysis ID:561346
MD5:82c5cdde9df0a76e2933c1cd8bfc7887
SHA1:7b391b4429dfbf19030fb49ce750aa3c8b844a6b
SHA256:243ae30d42e90000b882779fae40e0056eab332b95e2c938446138a80868909e
Tags:32exesignedtrojan
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Drops PE files
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • 9u4xTDR5bG.exe (PID: 3224 cmdline: "C:\Users\user\Desktop\9u4xTDR5bG.exe" MD5: 82C5CDDE9DF0A76E2933C1CD8BFC7887)
  • cleanup
{"Payload URL": "https://bangladeshshoecity.com/images/2w"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.764364094.0000000002A50000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.764364094.0000000002A50000.00000040.00000800.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://bangladeshshoecity.com/images/2w"}
    Source: 9u4xTDR5bG.exeVirustotal: Detection: 31%Perma Link
    Source: 9u4xTDR5bG.exeReversingLabs: Detection: 44%
    Source: 9u4xTDR5bG.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: 9u4xTDR5bG.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://bangladeshshoecity.com/images/2w
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://ocsp.digicert.com0C
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://ocsp.digicert.com0O
    Source: 9u4xTDR5bG.exeString found in binary or memory: http://www.digicert.com/CPS0
    Source: 9u4xTDR5bG.exeString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: 9u4xTDR5bG.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_0040755C
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_00406D85
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_73201BFF
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A55694
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A53CAF
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A54EDA
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A57839
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A5521F
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A57658
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A55982
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A53B8F
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A5279C
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A53FE2
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A57564
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A52749
    Source: 9u4xTDR5bG.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A55694 NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeProcess Stats: CPU usage > 98%
    Source: 9u4xTDR5bG.exeVirustotal: Detection: 31%
    Source: 9u4xTDR5bG.exeReversingLabs: Detection: 44%
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeFile read: C:\Users\user\Desktop\9u4xTDR5bG.exeJump to behavior
    Source: 9u4xTDR5bG.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeFile created: C:\Users\user\AppData\Local\Temp\nsl4A9B.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/3@0/0
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: 9u4xTDR5bG.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.764364094.0000000002A50000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_732030C0 push eax; ret
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_73201BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4CBF.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeRDTSC instruction interceptor: First address: 0000000002A551C3 second address: 0000000002A551C3 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 42A4596Fh 0x00000007 sub eax, FBADDA8Dh 0x0000000c xor eax, 87ED79C8h 0x00000011 xor eax, C11B072Bh 0x00000016 cpuid 0x00000018 popad 0x00000019 call 00007F151CAE4FDEh 0x0000001e lfence 0x00000021 mov edx, B78E5550h 0x00000026 xor edx, 614933DAh 0x0000002c add edx, 0CEF4ABFh 0x00000032 xor edx, 9C48B15Dh 0x00000038 mov edx, dword ptr [edx] 0x0000003a lfence 0x0000003d ret 0x0000003e test dx, bx 0x00000041 sub edx, esi 0x00000043 ret 0x00000044 pop ecx 0x00000045 cmp ch, 0000007Eh 0x00000048 add edi, edx 0x0000004a dec ecx 0x0000004b mov dword ptr [ebp+00000227h], 169B01A4h 0x00000055 xor dword ptr [ebp+00000227h], BF933C27h 0x0000005f fnop 0x00000061 sub dword ptr [ebp+00000227h], B3AFC749h 0x0000006b xor dword ptr [ebp+00000227h], F558763Ah 0x00000075 cmp ecx, dword ptr [ebp+00000227h] 0x0000007b jne 00007F151CAE4F85h 0x0000007d mov dword ptr [ebp+0000024Ch], esi 0x00000083 mov esi, ecx 0x00000085 push esi 0x00000086 mov esi, dword ptr [ebp+0000024Ch] 0x0000008c call 00007F151CAE503Fh 0x00000091 call 00007F151CAE4FFFh 0x00000096 lfence 0x00000099 mov edx, B78E5550h 0x0000009e xor edx, 614933DAh 0x000000a4 add edx, 0CEF4ABFh 0x000000aa xor edx, 9C48B15Dh 0x000000b0 mov edx, dword ptr [edx] 0x000000b2 lfence 0x000000b5 ret 0x000000b6 mov esi, edx 0x000000b8 pushad 0x000000b9 rdtsc
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A5542A rdtsc
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A550A9 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A56CD9 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A56A06 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A537EC mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A57564 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_73201BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A5542A rdtsc
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_02A58130 RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\9u4xTDR5bG.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    9u4xTDR5bG.exe31%VirustotalBrowse
    9u4xTDR5bG.exe11%MetadefenderBrowse
    9u4xTDR5bG.exe44%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\Bosporus5.dat2%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsm4CBF.tmp\System.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsm4CBF.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://bangladeshshoecity.com/images/2w0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    https://bangladeshshoecity.com/images/2wtrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorError9u4xTDR5bG.exefalse
      high
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:561346
      Start date:27.01.2022
      Start time:11:27:47
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 8m 22s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:9u4xTDR5bG (renamed file extension from none to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:25
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal72.troj.evad.winEXE@1/3@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 40.2% (good quality ratio 39.6%)
      • Quality average: 86.9%
      • Quality standard deviation: 21.2%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\9u4xTDR5bG.exe
      File Type:DOS executable (COM)
      Category:dropped
      Size (bytes):33702
      Entropy (8bit):7.640543622166051
      Encrypted:false
      SSDEEP:768:1FwMrbBlFp7y+OzxSaYStTVsui/XXjqC4iYBnDyvfWjbvx0K:nwMrbnFp7y1wJSJVsPGChMevOF
      MD5:2C2658C12C970777B7D352045683823D
      SHA1:6EEDC661A65C91EBF2F0CB013ED683CFD704757E
      SHA-256:2514D174967C285492114476DC13AAABBBD4248A756770BDD2B60117EE347752
      SHA-512:C6778168D222A85C58B7FE38AD81E96413D05DA70603130B74454ACB9A2CA759E8707F71CAEFD1DC16ECF8F4F419A9C4171814D346297280DF78DB0786F86677
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 2%
      Reputation:low
      Preview:.__.?.u.....u.....u..........o....It....s..svu.....3.....B]..*...W..o...Z1..4..u.N....9.u.W........N..U.-.t .....2D.B.h....R..D..b..K7$"jX[,...1...a........^W.....oz.'.Ut.'..7.Hg..G.....pY..3n.:.u..)..\.4.......ugUB...`..vw.@_iPr..v.5...8.l........F..W...8..k.)...M.c.P.........O...!b....!G.A.......m.......]S5.....JI.s8<K.w..<G...g.<......7}...<..M....5.&.....,........!A...N..\.{.X...P.....bt.N.u.N..>..u.NH.....V.j....w.N........0.Lu....N.....|X.j.....A.g.w.H.iFwX..vo...T./u..!.N.0...L..cic.Ev/.(..N..P....R..#.@.-).u.w..\..u..._..u..9.N.......L.u.O...N.u1.Pu.jQ._....ZQ.5>o}..cX:.}..2SX".}.....!6..I.?.B.r.'.N..- .AX..........X...\....`L...t.e...~....'.N.."\.G....!r^.w...Xz.w.r...j..i..A.......t....2.5.I.1~.F..d ..4..XJ..]Z0..k)p........Xz.Qv.J..j.$D..N..u&.....kO.ub..YW..qlj...Z.(.:I}...ZZ..2.k0...p...&R.t.N.<......v.P..|&d..Fz..@......SOF&..6...%..`7yDP......O.u`G.........(..}...5...$R..t.NF#U...\0,u...J.5...z........l.z.[Fc"TZe...'*%R.Pw
      Process:C:\Users\user\Desktop\9u4xTDR5bG.exe
      File Type:ASCII text, with very long lines, with no line terminators
      Category:dropped
      Size (bytes):16555
      Entropy (8bit):5.9518641421213605
      Encrypted:false
      SSDEEP:384:HpBOk6soHG6Nun3UPBApXPE8eMag91API7ee872UmLZ7:HmkfOG6NNyp/dn19N7U71mLZ
      MD5:695A2030432B3D981B012A42EDCA055A
      SHA1:31283CF8F970E22E7C9B6FCB811B9C1608997211
      SHA-256:F0568B8400FE6F4621B3E62C56B3C3AB9712DD6D30966A348EB3497ACF6B226A
      SHA-512:0095FE21135FCCB9C5723D583C2087FB9D9CD61CB90BB5C96E11EA76469A3744B7F068B7301F7342AF95642D18921763B250FBB9E8F16F5CC9124300E6A97C5C
      Malicious:false
      Reputation:low
      Preview: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
      Process:C:\Users\user\Desktop\9u4xTDR5bG.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):12288
      Entropy (8bit):5.814115788739565
      Encrypted:false
      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
      MD5:CFF85C549D536F651D4FB8387F1976F2
      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
      Malicious:false
      Antivirus:
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:moderate, very likely benign file
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Entropy (8bit):7.524133406272662
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:9u4xTDR5bG.exe
      File size:95632
      MD5:82c5cdde9df0a76e2933c1cd8bfc7887
      SHA1:7b391b4429dfbf19030fb49ce750aa3c8b844a6b
      SHA256:243ae30d42e90000b882779fae40e0056eab332b95e2c938446138a80868909e
      SHA512:ee64b01a269422e45a458d9e77151435ecfbdeb96b2c7d80e961f3e4cfbacb9626f2df1cb32790dfa174aa2d517868abd4fd8a9fbed3c5b8feac3dae0a790c7e
      SSDEEP:1536:2/T2X/jN2vxZz0DTHUpouZZbUc6JgjJPQPovf/5AmNHLBH8k29xE+1Gl1c:2bG7N2kDTHUpouZZbUc6JgjJ4PKfRAI6
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
      Icon Hash:b2a88c96b2ca6a72
      Entrypoint:0x40352d
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
      Signature Valid:false
      Signature Issuer:E=Overorganizes@Unprincipledness.Dy, CN=VRDIOMRAADERNE, OU=Specialprogrammeringer1, O=protoloph, L=Budcykler2, S=Semipiousness8, C=WS
      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
      Error Number:-2146762487
      Not Before, Not After
      • 1/23/2022 7:50:12 AM 1/23/2023 7:50:12 AM
      Subject Chain
      • E=Overorganizes@Unprincipledness.Dy, CN=VRDIOMRAADERNE, OU=Specialprogrammeringer1, O=protoloph, L=Budcykler2, S=Semipiousness8, C=WS
      Version:3
      Thumbprint MD5:A0E586DC6F36D2B05AA723846EDECA3F
      Thumbprint SHA-1:5930C7EB1C7523DFDABC8145BE3CB723E4CA4F29
      Thumbprint SHA-256:B0DA08480B8FCBD3467A408ABC7F8FC17E3386E77474C654BDF4633441981F3A
      Serial:00
      Instruction
      push ebp
      mov ebp, esp
      sub esp, 000003F4h
      push ebx
      push esi
      push edi
      push 00000020h
      pop edi
      xor ebx, ebx
      push 00008001h
      mov dword ptr [ebp-14h], ebx
      mov dword ptr [ebp-04h], 0040A2E0h
      mov dword ptr [ebp-10h], ebx
      call dword ptr [004080CCh]
      mov esi, dword ptr [004080D0h]
      lea eax, dword ptr [ebp-00000140h]
      push eax
      mov dword ptr [ebp-0000012Ch], ebx
      mov dword ptr [ebp-2Ch], ebx
      mov dword ptr [ebp-28h], ebx
      mov dword ptr [ebp-00000140h], 0000011Ch
      call esi
      test eax, eax
      jne 00007F151CB8E85Ah
      lea eax, dword ptr [ebp-00000140h]
      mov dword ptr [ebp-00000140h], 00000114h
      push eax
      call esi
      mov ax, word ptr [ebp-0000012Ch]
      mov ecx, dword ptr [ebp-00000112h]
      sub ax, 00000053h
      add ecx, FFFFFFD0h
      neg ax
      sbb eax, eax
      mov byte ptr [ebp-26h], 00000004h
      not eax
      and eax, ecx
      mov word ptr [ebp-2Ch], ax
      cmp dword ptr [ebp-0000013Ch], 0Ah
      jnc 00007F151CB8E82Ah
      and word ptr [ebp-00000132h], 0000h
      mov eax, dword ptr [ebp-00000134h]
      movzx ecx, byte ptr [ebp-00000138h]
      mov dword ptr [00434FB8h], eax
      xor eax, eax
      mov ah, byte ptr [ebp-0000013Ch]
      movzx eax, ax
      or eax, ecx
      xor ecx, ecx
      mov ch, byte ptr [ebp-2Ch]
      movzx ecx, cx
      shl eax, 10h
      or eax, ecx
      Programming Language:
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000xe28.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x160d80x14b8.data
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .ndata0x360000x160000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x4c0000xe280x1000False0.378662109375data4.00654037497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_ICON0x4c2080x2e8dataEnglishUnited States
      RT_DIALOG0x4c4f00x100dataEnglishUnited States
      RT_DIALOG0x4c5f00x11cdataEnglishUnited States
      RT_DIALOG0x4c7100xc4dataEnglishUnited States
      RT_DIALOG0x4c7d80x60dataEnglishUnited States
      RT_GROUP_ICON0x4c8380x14dataEnglishUnited States
      RT_VERSION0x4c8500x294dataEnglishUnited States
      RT_MANIFEST0x4cae80x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
      DLLImport
      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
      DescriptionData
      LegalCopyrightLesney Products
      FileVersion1.2.1
      CompanyNameLesney Products
      LegalTrademarksLesney Products
      CommentsLesney Products
      ProductNameLesney Products
      FileDescriptionLesney Products
      Translation0x0409 0x04b0
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found
      No statistics
      Target ID:0
      Start time:11:28:45
      Start date:27/01/2022
      Path:C:\Users\user\Desktop\9u4xTDR5bG.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\9u4xTDR5bG.exe"
      Imagebase:0x400000
      File size:95632 bytes
      MD5 hash:82C5CDDE9DF0A76E2933C1CD8BFC7887
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.764364094.0000000002A50000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low

      No disassembly