Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9TpV4rfMmJ

Overview

General Information

Sample Name:9TpV4rfMmJ (renamed file extension from none to exe)
Analysis ID:562499
MD5:38034f18af511c3b04b25170735e8b8e
SHA1:797252e9139d3d46825440335437ad9d538f6b5b
SHA256:7babdd2c7d3752b7b48729110f0ab94de7cf74c478b7e1ea7a71a468748e70c0
Tags:32exetrojan
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • 9TpV4rfMmJ.exe (PID: 4500 cmdline: "C:\Users\user\Desktop\9TpV4rfMmJ.exe" MD5: 38034F18AF511C3B04B25170735E8B8E)
  • cleanup
{"Payload URL": "https://www.konutmarket.com/2022file_iz"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1182087160.00000000027F0000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.1182087160.00000000027F0000.00000040.00000800.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://www.konutmarket.com/2022file_iz"}
    Source: 9TpV4rfMmJ.exeReversingLabs: Detection: 25%
    Source: 9TpV4rfMmJ.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: 9TpV4rfMmJ.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: secur32.pdb source: secur32.dll.0.dr
    Source: Binary string: SxsStore.pdb source: sxsstore.dll.0.dr
    Source: Binary string: secur32.pdbUGP source: secur32.dll.0.dr
    Source: Binary string: SxsStore.pdbGCTL source: sxsstore.dll.0.dr
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://www.konutmarket.com/2022file_iz
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://ocsp.digicert.com0C
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://ocsp.digicert.com0O
    Source: 9TpV4rfMmJ.exeString found in binary or memory: http://www.digicert.com/CPS0
    Source: 9TpV4rfMmJ.exeString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: 9TpV4rfMmJ.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: 9TpV4rfMmJ.exe, 00000000.00000002.1181768585.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSxsStore.dllj% vs 9TpV4rfMmJ.exe
    Source: 9TpV4rfMmJ.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 9TpV4rfMmJ.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 9TpV4rfMmJ.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_0040755C
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_00406D85
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_6FC51BFF
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F9C2E
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F9462
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027FDAF1
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F8AD9
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F9963
    Source: 9TpV4rfMmJ.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F9C2E NtAllocateVirtualMemory,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeProcess Stats: CPU usage > 98%
    Source: 9TpV4rfMmJ.exeReversingLabs: Detection: 25%
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeFile read: C:\Users\user\Desktop\9TpV4rfMmJ.exeJump to behavior
    Source: 9TpV4rfMmJ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeFile created: C:\Users\user\AppData\Local\Temp\nsh3327.tmpJump to behavior
    Source: classification engineClassification label: mal68.troj.winEXE@1/4@0/0
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: 9TpV4rfMmJ.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: secur32.pdb source: secur32.dll.0.dr
    Source: Binary string: SxsStore.pdb source: sxsstore.dll.0.dr
    Source: Binary string: secur32.pdbUGP source: secur32.dll.0.dr
    Source: Binary string: SxsStore.pdbGCTL source: sxsstore.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.1182087160.00000000027F0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_6FC530C0 push eax; ret
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F2C74 push edx; retf
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F6C4F push 910F868Eh; ret
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F2C14 push edx; retf
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F3CD9 push CACC293Ch; retf
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F4ECB push eax; iretd
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F50CB push esi; retf
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F5EB5 push D0CC293Ch; retf
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F2C99 push edx; retf
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F1B54 push FFFFFF81h; ret
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F594F pushfd ; retf
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F1F2D push edx; retf
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F1F27 push 00000027h; iretd
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F111B push esi; ret
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F5919 pushfd ; retf
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F49EF pushad ; iretd
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F6BD2 push 910F868Eh; ret
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F6BA9 push 910F868Eh; ret
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F59A1 pushfd ; retf
    Source: secur32.dll.0.drStatic PE information: section name: .didat
    Source: secur32.dll.0.drStatic PE information: 0xAEC0B68B [Mon Nov 27 15:00:27 2062 UTC]
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_6FC51BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeFile created: C:\Users\user\AppData\Local\Temp\nsd3616.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeFile created: C:\Users\user\AppData\Local\Temp\secur32.dllJump to dropped file
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeFile created: C:\Users\user\AppData\Local\Temp\sxsstore.dllJump to dropped file
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\secur32.dllJump to dropped file
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\sxsstore.dllJump to dropped file
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F9366 rdtsc
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027FDAF1 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027FCAD3 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F9128 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027FC501 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_6FC51BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027F9366 rdtsc
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_027FEF3F RtlAddVectoredExceptionHandler,
    Source: C:\Users\user\Desktop\9TpV4rfMmJ.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Timestomp
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager3
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    9TpV4rfMmJ.exe25%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsd3616.tmp\System.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsd3616.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\secur32.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\secur32.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\sxsstore.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\sxsstore.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://www.konutmarket.com/2022file_iz0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    https://www.konutmarket.com/2022file_iztrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorError9TpV4rfMmJ.exefalse
      high
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:562499
      Start date:28.01.2022
      Start time:22:58:03
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 41s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:9TpV4rfMmJ (renamed file extension from none to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:17
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal68.troj.winEXE@1/4@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 27.1% (good quality ratio 26.5%)
      • Quality average: 88.3%
      • Quality standard deviation: 21%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
      • Excluded IPs from analysis (whitelisted): 204.79.197.222
      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fp.msedge.net, a-0019.a-msedge.net, store-images.s-microsoft.com, a-0019.standard.a-msedge.net, ctldl.windowsupdate.com, 1.perf.msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
      • VT rate limit hit for: 9TpV4rfMmJ.exe
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\9TpV4rfMmJ.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):12288
      Entropy (8bit):5.814115788739565
      Encrypted:false
      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
      MD5:CFF85C549D536F651D4FB8387F1976F2
      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
      Malicious:false
      Antivirus:
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:moderate, very likely benign file
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\9TpV4rfMmJ.exe
      File Type:data
      Category:dropped
      Size (bytes):63168
      Entropy (8bit):6.498454279155086
      Encrypted:false
      SSDEEP:1536:TsB1Fc6jtZl4FMiQMaFIdINIK6SaUf6ROv:TsB1Fc6+uiXaFoINJ8mv
      MD5:D65C77AD010482FBF9F7983146D0A6B5
      SHA1:8400E92DA91E588A3CF2C9C419CB4BAB2CA60B7C
      SHA-256:F4BAA8F8FC7D5DF13DC487345B430C8733C59C0D37DD5E5462FBBD33945E724D
      SHA-512:55849D60E498EB6F39D7B629F9426B4DF7EB25A882B07C5A7E9FD288B1E7E245FB5A8839E434238EF026DFCD11C378AD8C91C12FC0659A66A5D4C2B1DFE1691E
      Malicious:false
      Reputation:low
      Preview:9......._8.f9..?.u...f9.....u...9.....u...9.9.........9........;.xf9.....e.p........r9.8....@l9.9....x<.8.8.. 3L9...W..........Z9.9.1.9...4..{<)9.f9....f9...9.u..9.Wf9.9...9.8..K...Yx=).y.0....T.\...N...Q'.G..S..0\.......v..R#.B.`..=.f....c.....73t.C-.{!u0.......;...P.....poa.9..:..q....................................................^.>..7.....A........^..2;.L....%....r(....G.M...2.(&....:$.n.W;..3...8n..w..F..B}...[GEl3..7.(tv....d[K..................................................[W............................................Z.i...............................................B...................................................................................................\.2M.....5....................................................[K.................................................................................................................................................4.......................................................[M.s8..mC....km.&.......
      Process:C:\Users\user\Desktop\9TpV4rfMmJ.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):23040
      Entropy (8bit):5.575148216618883
      Encrypted:false
      SSDEEP:384:A9zuL7jiVVvNORNHzTdXaP4osxlUoLYuC/NWiOCW:A8zc2RJdqP4oLoQ/8
      MD5:E1FA0E4751888A35553A93778A348A24
      SHA1:98667AE0AB2D955E69C365D62F2DD1A8C839E14E
      SHA-256:A074AA8C960FF9F9F609604DB0B6FEFDD454CEB746DE6749753A551FE7B99B51
      SHA-512:E93E62CC3FFBC2621FD87BD6DAEDF3699799217B49A006D4A891CDBFE4DD89B33DA258C6A4D8CC28FF615CC0F033D83BF761502169D05A6FC9CBC5FF5FC2ABF1
      Malicious:false
      Antivirus:
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4...p...p...p...y.7.d...d...s...p...K...d...v...d...q...d...v...d.[.q...d...q...Richp...........PE..L..................!.....<.......... ........P.....Q......................................@E........................P3.......`..................................X...`...T............................................`.......1.......................text...~;.......<.................. ..`.data...8....P.......@..............@....idata..D....`.......D..............@..@.didat..0....p.......N..............@....rsrc................P..............@..@.reloc..X............V..............@..B................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\9TpV4rfMmJ.exe
      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):23040
      Entropy (8bit):6.138116359523764
      Encrypted:false
      SSDEEP:384:4j1Pm6AenqNEb9jGvRtb30lEVybDPukC+Rfb6ql4PrxWpmWZr:xlMsP4l2ybJawRr
      MD5:3F305E85F2751C4AA1A4EFDF3240EDA6
      SHA1:FBD849B83E98E5D0F2A2B2F8E3649ADA7078B2E9
      SHA-256:95444BF7752F9092FE00CA6F96FD170820026ED990B1EA59CE34524978B4EB12
      SHA-512:3BC1B150ACC164818C169448E7BCD8BEC7780278E60581E3A21722BE947BDF6016D7A99FB1F06E59057F71A3C965CD882CA974EAF288172D5285B1CEA93769C6
      Malicious:false
      Antivirus:
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.I...'...'...'.......'...$...'...#...'...&.B.'...&...'..."...'...'...'.......'......'...%...'.Rich..'.................PE..L.....{............!.....B..........pH.......`.......................................P....@A........................PQ......(q..........................................T...........................h................p..$............................text....A.......B.................. ..`.data........`.......F..............@....idata.......p.......H..............@..@.rsrc................R..............@..@.reloc...............V..............@..B................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Entropy (8bit):7.481059066220283
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:9TpV4rfMmJ.exe
      File size:166200
      MD5:38034f18af511c3b04b25170735e8b8e
      SHA1:797252e9139d3d46825440335437ad9d538f6b5b
      SHA256:7babdd2c7d3752b7b48729110f0ab94de7cf74c478b7e1ea7a71a468748e70c0
      SHA512:da2ce49e148bc8877d391316d785a067083ebdf0884b9389f2e3db6b71f6e3269fed55d39a1a4557db1e628316abf50e520594d8b5a416c7535003f963d7038c
      SSDEEP:3072:cbG7N2kDTHUpou0lvStHlquLNLbzKhBvOQsn7DdTAk5RmIdaDm2ghplP:cbE/HUMFSeK+hYQsn7CXIoDyhpl
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
      Icon Hash:e4fa3cf8888c88ce
      Entrypoint:0x40352d
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
      Signature Valid:false
      Signature Issuer:E=SANITISED@FILKOPIERINGS.Ans, CN=Knallerter4, OU=misarranged, O=Nonsecretory, L=Tllede6, S=melange, C=WS
      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
      Error Number:-2146762487
      Not Before, Not After
      • 1/28/2022 6:43:20 AM 1/28/2023 6:43:20 AM
      Subject Chain
      • E=SANITISED@FILKOPIERINGS.Ans, CN=Knallerter4, OU=misarranged, O=Nonsecretory, L=Tllede6, S=melange, C=WS
      Version:3
      Thumbprint MD5:C6282834878BB7165E5E606019677AD2
      Thumbprint SHA-1:8BB39E8EE588FA14DEED258E56A6E9A51D4F2730
      Thumbprint SHA-256:B7F1E132885ECBE632DEEACE43B09D8AAF984C146DB830BD5ACA8C82BCBE7D89
      Serial:00
      Instruction
      push ebp
      mov ebp, esp
      sub esp, 000003F4h
      push ebx
      push esi
      push edi
      push 00000020h
      pop edi
      xor ebx, ebx
      push 00008001h
      mov dword ptr [ebp-14h], ebx
      mov dword ptr [ebp-04h], 0040A2E0h
      mov dword ptr [ebp-10h], ebx
      call dword ptr [004080CCh]
      mov esi, dword ptr [004080D0h]
      lea eax, dword ptr [ebp-00000140h]
      push eax
      mov dword ptr [ebp-0000012Ch], ebx
      mov dword ptr [ebp-2Ch], ebx
      mov dword ptr [ebp-28h], ebx
      mov dword ptr [ebp-00000140h], 0000011Ch
      call esi
      test eax, eax
      jne 00007FA958BF187Ah
      lea eax, dword ptr [ebp-00000140h]
      mov dword ptr [ebp-00000140h], 00000114h
      push eax
      call esi
      mov ax, word ptr [ebp-0000012Ch]
      mov ecx, dword ptr [ebp-00000112h]
      sub ax, 00000053h
      add ecx, FFFFFFD0h
      neg ax
      sbb eax, eax
      mov byte ptr [ebp-26h], 00000004h
      not eax
      and eax, ecx
      mov word ptr [ebp-2Ch], ax
      cmp dword ptr [ebp-0000013Ch], 0Ah
      jnc 00007FA958BF184Ah
      and word ptr [ebp-00000132h], 0000h
      mov eax, dword ptr [ebp-00000134h]
      movzx ecx, byte ptr [ebp-00000138h]
      mov dword ptr [00434FB8h], eax
      xor eax, eax
      mov ah, byte ptr [ebp-0000013Ch]
      movzx eax, ax
      or eax, ecx
      xor ecx, ecx
      mov ch, byte ptr [ebp-2Ch]
      movzx ecx, cx
      shl eax, 10h
      or eax, ecx
      Programming Language:
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000xd5c8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x274d00x1468.data
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .ndata0x360000x160000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x4c0000xd5c80xd600False0.704731308411data6.81165454669IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_ICON0x4c3b80x669ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
      RT_ICON0x52a580x25a9dataEnglishUnited States
      RT_ICON0x550080x10a9dataEnglishUnited States
      RT_ICON0x560b80xea9dataEnglishUnited States
      RT_ICON0x56f680x8a9dataEnglishUnited States
      RT_ICON0x578180x669dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 251721983, next used block 4294967295EnglishUnited States
      RT_ICON0x57e880x569GLS_BINARY_LSB_FIRSTEnglishUnited States
      RT_ICON0x583f80x469GLS_BINARY_LSB_FIRSTEnglishUnited States
      RT_ICON0x588680x2e9dataEnglishUnited States
      RT_ICON0x58b580x129GLS_BINARY_LSB_FIRSTEnglishUnited States
      RT_DIALOG0x58c880x100dataEnglishUnited States
      RT_DIALOG0x58d880x11cdataEnglishUnited States
      RT_DIALOG0x58ea80xc4dataEnglishUnited States
      RT_DIALOG0x58f700x60dataEnglishUnited States
      RT_GROUP_ICON0x58fd00x92dataEnglishUnited States
      RT_VERSION0x590680x220dataEnglishUnited States
      RT_MANIFEST0x592880x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
      DLLImport
      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
      DescriptionData
      LegalCopyrightAlidas
      FileVersion1.2.1
      CompanyNameAlida
      LegalTrademarksAlida
      CommentsAlida
      ProductNameAlida
      FileDescriptionAlida
      Translation0x0409 0x04b0
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found
      No statistics
      Target ID:0
      Start time:22:58:56
      Start date:28/01/2022
      Path:C:\Users\user\Desktop\9TpV4rfMmJ.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\9TpV4rfMmJ.exe"
      Imagebase:0x400000
      File size:166200 bytes
      MD5 hash:38034F18AF511C3B04B25170735E8B8E
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1182087160.00000000027F0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low

      No disassembly