Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3GJ6S3Kwnb

Overview

General Information

Sample Name:3GJ6S3Kwnb (renamed file extension from none to exe)
Analysis ID:623825
MD5:6c6a52c18f0ca26d357f2b4430f31568
SHA1:9b32a592e54100a67d907e2ad039b164961dc042
SHA256:cbd91a64900eacff9502b5509769b33adb8472efadd2861d99fd95a06c5630be
Tags:exeGuLoader
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • 3GJ6S3Kwnb.exe (PID: 3256 cmdline: "C:\Users\user\Desktop\3GJ6S3Kwnb.exe" MD5: 6C6A52C18F0CA26D357F2B4430F31568)
  • cleanup
{"Payload URL": "http://bprbeulentechnik.ch/loader/amagidom_VRCLkUVry246.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.773047400.0000000003300000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.773047400.0000000003300000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://bprbeulentechnik.ch/loader/amagidom_VRCLkUVry246.bin"}
    Source: 3GJ6S3Kwnb.exeVirustotal: Detection: 42%Perma Link
    Source: 3GJ6S3Kwnb.exeReversingLabs: Detection: 24%
    Source: 3GJ6S3Kwnb.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: 3GJ6S3Kwnb.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: DIFXAPI.pdb source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr
    Source: Binary string: D:\P4\depot\esw\projects\azure\Maglev\DesignerBranches\ezheng\newarch\Vista-AddOn\ExtArch\bin\x64\Release\NativeAdapter.pdb source: 3GJ6S3Kwnb.exe, 00000000.00000003.256271269.000000000281B000.00000004.00000800.00020000.00000000.sdmp, NativeAdapter.dll.0.dr
    Source: Binary string: D:\Stanely\00.work\03.Project\AINR2.0\_tmp\igoaudsessionmonitor\igoAudSessionMonitor\x64\Release\igoAudSessionMonitor.pdb source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.dr
    Source: Binary string: DIFXAPI.pdbH source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\DesktopExtension\x64\UAP\HPPrintScanDoctorDeploymentMgr.pdb source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\DesktopExtension\x64\UAP\HPPrintScanDoctorDeploymentMgr.pdb.. source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.dr
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://bprbeulentechnik.ch/loader/amagidom_VRCLkUVry246.bin
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0B
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: 3GJ6S3Kwnb.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://ocsp.digicert.com0H
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://ocsp.digicert.com0I
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr, HPPrintScanDoctorDeploymentMgr.exe.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0~
    Source: igoAudSessionMonitor.dll.0.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.drString found in binary or memory: https://www.globalsign.com/repository/06
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_004056A8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: 3GJ6S3Kwnb.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameigoAudSe.dll` vs 3GJ6S3Kwnb.exe
    Source: 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameigoAudSe.dll` vs 3GJ6S3Kwnb.exe
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrintScanDoctorExtension.exeR vs 3GJ6S3Kwnb.exe
    Source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDIFxAPI.dllp( vs 3GJ6S3Kwnb.exe
    Source: 3GJ6S3Kwnb.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 3GJ6S3Kwnb.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 3GJ6S3Kwnb.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: NativeAdapter.dll.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_00406BFE
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_73331BFF
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeProcess Stats: CPU usage > 98%
    Source: 3GJ6S3Kwnb.exeVirustotal: Detection: 42%
    Source: 3GJ6S3Kwnb.exeReversingLabs: Detection: 24%
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile read: C:\Users\user\Desktop\3GJ6S3Kwnb.exeJump to behavior
    Source: 3GJ6S3Kwnb.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile created: C:\Users\user\AppData\Local\Temp\nsi9D4A.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/9@0/0
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_00404954 GetDlgItem,SetWindowTextW,SHAutoComplete,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceExW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: 3GJ6S3Kwnb.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: DIFXAPI.pdb source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr
    Source: Binary string: D:\P4\depot\esw\projects\azure\Maglev\DesignerBranches\ezheng\newarch\Vista-AddOn\ExtArch\bin\x64\Release\NativeAdapter.pdb source: 3GJ6S3Kwnb.exe, 00000000.00000003.256271269.000000000281B000.00000004.00000800.00020000.00000000.sdmp, NativeAdapter.dll.0.dr
    Source: Binary string: D:\Stanely\00.work\03.Project\AINR2.0\_tmp\igoaudsessionmonitor\igoAudSessionMonitor\x64\Release\igoAudSessionMonitor.pdb source: 3GJ6S3Kwnb.exe, 00000000.00000002.771779733.000000000040A000.00000004.00000001.01000000.00000003.sdmp, 3GJ6S3Kwnb.exe, 00000000.00000002.772699080.000000000281C000.00000004.00000800.00020000.00000000.sdmp, igoAudSessionMonitor.dll.0.dr
    Source: Binary string: DIFXAPI.pdbH source: 3GJ6S3Kwnb.exe, 00000000.00000003.254238343.000000000281B000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\DesktopExtension\x64\UAP\HPPrintScanDoctorDeploymentMgr.pdb source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\DesktopExtension\x64\UAP\HPPrintScanDoctorDeploymentMgr.pdb.. source: 3GJ6S3Kwnb.exe, 00000000.00000003.255317617.000000000281E000.00000004.00000800.00020000.00000000.sdmp, HPPrintScanDoctorDeploymentMgr.exe.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.773047400.0000000003300000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_733330C0 push eax; ret
    Source: NativeAdapter.dll.0.drStatic PE information: section name: .nep
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_73331BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile created: C:\Users\user\AppData\Local\Temp\igoAudSessionMonitor.dllJump to dropped file
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile created: C:\Users\user\AppData\Local\Temp\HPPrintScanDoctorDeploymentMgr.exeJump to dropped file
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile created: C:\Users\user\AppData\Local\Temp\nsj9DE8.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile created: C:\Users\user\AppData\Local\Temp\NativeAdapter.dllJump to dropped file
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile created: C:\Users\user\AppData\Local\Temp\DiFxAPI.dllJump to dropped file
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeRDTSC instruction interceptor: First address: 0000000003303226 second address: 0000000003303226 instructions: 0x00000000 rdtsc 0x00000002 test dx, bx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F7EF8F15682h 0x00000009 test ch, bh 0x0000000b inc ebp 0x0000000c test ax, dx 0x0000000f inc ebx 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\igoAudSessionMonitor.dllJump to dropped file
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\HPPrintScanDoctorDeploymentMgr.exeJump to dropped file
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\NativeAdapter.dllJump to dropped file
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DiFxAPI.dllJump to dropped file
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformation
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeFile Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformation
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_73331BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\3GJ6S3Kwnb.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Obfuscated Files or Information
    LSASS Memory1
    Query Registry
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS14
    System Information Discovery
    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    3GJ6S3Kwnb.exe42%VirustotalBrowse
    3GJ6S3Kwnb.exe24%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\DiFxAPI.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\DiFxAPI.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\DiFxAPI.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://bprbeulentechnik.ch/loader/amagidom_VRCLkUVry246.bin0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://bprbeulentechnik.ch/loader/amagidom_VRCLkUVry246.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorError3GJ6S3Kwnb.exefalse
      high
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:623825
      Start date and time: 10/05/202221:02:382022-05-10 21:02:38 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 8m 5s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:3GJ6S3Kwnb (renamed file extension from none to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:25
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal72.troj.evad.winEXE@1/9@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 62.9% (good quality ratio 61.7%)
      • Quality average: 88.6%
      • Quality standard deviation: 21.4%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Excluded IPs from analysis (whitelisted): 20.223.24.244
      • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, time.windows.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
      Category:dropped
      Size (bytes):6869
      Entropy (8bit):7.844036691616615
      Encrypted:false
      SSDEEP:96:BSTzREW0VVUFRpw7uGkoTRs6iWOZnUhu+LRX6Xi/CwUxLekFFbzUVUL3mBXooPCn:oXRsVaEdDtZiFZn3+LRrmcUXLuCDDvoi
      MD5:B64BD3B79B7C8E73D671029057DB3AF5
      SHA1:FF782EE8498DA70E9032E5FB7C9219BB1F6BC877
      SHA-256:DC980E21E0D964FF2687706568CB9D017D33478AD42DE8AFE5734E7DA29EC267
      SHA-512:23B1A2A1A7BDE408F35412DCE9DD6ADD4E09DE990365C8B517ED073382D686FD90733EB83F4C04668702BD3122347F11E78DDA0524EDFCFD1CE078B39DAC4F8D
      Malicious:false
      Reputation:low
      Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(..........j..>..a.......I.......|A./.E.~..u...4.8...7.#....8P..z....?>..q./.....t...V|A99.......\....f....L.......|...*..4[N1.. s^..Eh....r...7.N?...>u..a..B.u......[......~.O.*?....{.A...g...zx..._..%Y.2..j.....*........&..X.[.I.6uV.<..;._..sW:/.......z...1..(......H..s....5.c
      Process:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      File Type:MS Windows HtmlHelp Data
      Category:dropped
      Size (bytes):45599
      Entropy (8bit):7.437630592326386
      Encrypted:false
      SSDEEP:768:ISQxjGPaR23xDPH/dw1P3MpowGMm9eKVg79y/cTu8wN5WIOmpGKM:IJjGPa2Dw1PWowzm9Wy/78K5rOaGH
      MD5:EE71A8FD316B4EFF843518B31B3D28C2
      SHA1:292A7ABE9EFE502336417EC613FEE0389FAECF1A
      SHA-256:5A82B5B6332F3CC60CE7E831DA08A486E81A9BA0C5477E4A694754F659A3FC9A
      SHA-512:718320C384787EF374A2A20E8058C04248952891973D146A7F88000892BBDD53976C54DC724519A1C5BC812A62677BC720EE3F1453818D478F2F6DDEFABBEDBC
      Malicious:false
      Reputation:low
      Preview:ITSF....`.......&..'.......|.{.......".....|.{......."..`...............x.......T.......................................ITSP....T...........................................j..].!......."..T...............PMGL0................/..../#IDXHDR......./#ITBITS..../#STRINGS...u.a./#SYSTEM..n.S./#TOPICS.....@./#URLSTR...@.5./#URLTBL...P.p./#WINDOWS...a.L./$FIftiMain...v..../$OBJINST...[.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...W../$WWKeywordLinks/..../$WWKeywordLinks/BTree...-.L./$WWKeywordLinks/Data...y4./$WWKeywordLinks/Map...-../$WWKeywordLinks/Property...7 ./Advanced_Phone_Operations.htm..k.l./Audio_Services.htm..W.e./Authorization_Options.htm..<.R$/Bluetooth Win7 Vista Suite help.hhc...W.Z$/Bluetooth Win7 Vista Suite help.hhk...1.../Bluetooth_Devices.htm.....V./Bluetooth_Devices_files/...//Bluetooth_Devices_files/colorschememapping.xml...=.:%/Bluetooth_Devices_files/filelist.xml...B.['/Bluetooth_Devices_files/themedata.thmx..... ./Bluetooth_Settings.htm...d..\./Bluetooth_
      Process:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Category:dropped
      Size (bytes):526456
      Entropy (8bit):6.008806658212827
      Encrypted:false
      SSDEEP:12288:5sxYL+kJmoPdVp6s3EJBjCvuF17+2NdJfh:5sxwSoPdVoBjCvuF17+2NdJfh
      MD5:52672A1E48BC8BE4035D8A4F345DFE44
      SHA1:4F7EB09FF33DFACE6CE24BEB33E51D1DA5A3ABA1
      SHA-256:87BA988A4858079CADCA5EAA760482CC5F1F05830EE62BBC5FDD9BF7B181F0D0
      SHA-512:4F589CE3FC97F1DBDB575510924B5AEA58061B2D95F909456ACDB170414282A081C18CA9945E604FBCE6F17D626B02B178E66294927C5350B91072357DABAEF1
      Malicious:false
      Antivirus:
      • Antivirus: Virustotal, Detection: 0%, Browse
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T1...P.F.P.F.P.F7..F.P.F.P.F#Q.F7..F.P.F7..F.P.F7..F/P.F7..F.P.F7..F.P.F7..F.P.F7..F.P.F7..F.P.FRich.P.F........................PE..d.....IE.........." .....$.....................a.............................0.......x....@..........................................0......P................`..........x.... ......p...................................................(............................text...L".......$.................. ..`.data...0....@.......(..............@....pdata.......`.......0..............@..@.rsrc...............................@..@.reloc..$.... ......................@..B........................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      File Type:PE32+ executable (GUI) x86-64, for MS Windows
      Category:dropped
      Size (bytes):68712
      Entropy (8bit):5.747257952291664
      Encrypted:false
      SSDEEP:768:7gR74zF0we+AyurPeX85DoCAb74WhHN9rOzOY4BsPjFjNafDGmhK:7gRMHebrPesdoCAvbhH/mRBjNv
      MD5:0D24B5089C4D15316A65E9250A9069BD
      SHA1:B8213016A9BCF8A3FF79B0CB140D969FC4005AEA
      SHA-256:F90D525CDCF3E3743B7BFC93B5EEA645CFF5CEAE9AF351B8A2B46521ED5B8684
      SHA-512:A8FA53744FEB5CE044FDB6A3311BA5D60DC923E4A2A375955C33C3971161C4CDDA100C66413DDB5AF509AE6AF4E7D9260223BC36288D48452022624D2B2BB339
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A;...Z~..Z~..Z~.W2{..Z~.W2z..Z~.W2}..Z~.W2...Z~..".DZ~..Z...Z~..3w..Z~..3...Z~..Z..Z~..3|..Z~.Rich.Z~.................PE..d...a..`.........."......~...v.......q.........@.............................0......./....`.....................................................X...............4.......h.... ..........p...................0...(...0................... ............................text....|.......~.................. ..`.rdata..6S.......T..................@..@.data...h...........................@....pdata..4...........................@..@.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      File Type:PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):115840
      Entropy (8bit):6.055822744229893
      Encrypted:false
      SSDEEP:1536:aGAyFy2NpZ/wrdGlZuZ/X6HMnsOf5OlWNCA:yrdaAZX6HMnsW5OlqCA
      MD5:3CA31E349771C8E93AE7A7B57C98D7D5
      SHA1:5ABB06F1D6E3269FDFE006F7FB9B820B1253E7B0
      SHA-256:F2C59C276665763086ADD13ACA88FB07BE4C1DE8754145552A8AA88DCC5E403B
      SHA-512:E344F09DFDD80DE93C938E6B5BDB96E257D59F509631B8A3C3A8E75D73567976ED4471EADF8EA8A29F9F8226C8020D7FD2FA46B2B90D5B0DA6FDD179775ADD38
      Malicious:false
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........A.............4........[...............^.......K.......L.......\.......Y.....Rich....................PE..d......N.........." .....j...H.......q..............................................H.....@.....................................................x...............................(......................................................X...............H............text...?c.......d.................. ..`.nep....p............h.............. ..`.rdata..\5.......6...n..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..x...........................@..B................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
      Category:dropped
      Size (bytes):866
      Entropy (8bit):2.9094288868917673
      Encrypted:false
      SSDEEP:12:8gl0IsXowAOcQ/tz+7RafgKD+HBXi8g/3NJkKAd4t2Y+xIBjK:8XLDaRMgK6Hx949HAv7aB
      MD5:055BD989D013AA790C0B5FAFE457AF72
      SHA1:902502F2E1C1988A901CD8643F108F2F69197023
      SHA-256:9DF1F752DA3F94A16C961FC5023C3925C94DEB091B7E309D51791671394C88F4
      SHA-512:9F4A85A396A70E1CFC0D4C524C99AB98A014EAF83B31B08791B645415EFBC8B8F35C669B22E9BF97F5885267A9749CC7515C444BBA772E49D3CAA96CB7600DE2
      Malicious:false
      Preview:L..................F........................................................+....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....h.2...........Bedmte139.exe.L............................................B.e.d.m.t.e.1.3.9...e.x.e...........\.B.e.d.m.t.e.1.3.9...e.x.e.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
      Process:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      File Type:data
      Category:dropped
      Size (bytes):85704
      Entropy (8bit):6.5058103756231835
      Encrypted:false
      SSDEEP:1536:YFq7W01QLwtoPeiWHGekz6uF2+VQdDLFdVvVRjCqrcf:kr01QLwm2fg6t2QdDpdVdM
      MD5:024442982DB5BCEA734C31B2D3D2A25C
      SHA1:F1D5EDB880CE04191E442F5A472081B263809994
      SHA-256:E176A6327774C84E9BB6AD61156A637CBFFAEB7DEABEBBDE01274C2964125A0E
      SHA-512:8AC7AF0B0208226DB8B46D18BAFF949ED3E2B65D9CFEC80BE3CCB5F113B857AC25288A056A17F74C1809469A571F93BF316DC157B02373EE42571C3A58BD09C0
      Malicious:false
      Preview:..)?:tWO......F..........].C. As..i....$..H..f7g.....+.5[.........i...9bmo....G...5.f.W....%lZ.......K*.t..w.o&...........<...).gf7A2O.qV................vZ..o. ...K.f..N.>Q.T.Q..^.........WY;z..U....y10...dd8p....`MC....W]+..4.Ar%..B....x.{O..'...=..p..i..>x#.z..3...ae..?...`.....E..E.fa..B..]9$k.wNb78>o...{OZ.F.2...I[.'....vu...4%..I.B.....[.Nc..J>..,.Z.H..4.N........1....=....g%.v...<.v..!M.\P..8..c...h...wShkR.'.8r..Y.vz....(..r.....Z..(....=.$..d&..3..9/.n&M.hBAs.J~2>.k.G.at...a.x..R.L... .U..:."L..7..O(...{......;....}....~..K.....(I....*).~.Pt.O..#r_z...GQ..%s....i..2P.l.]..[.f^.4..w....#..../T....'.G....._........(.......Q...3p.!E..nz....e...E..H...t...0s+6!..g.`..H. h..as.HL.....Tj..}...U.;...~. f.O4..R.&.0~...Y.E..n'Ri...k..qq..y.WgC....VTw`zW6m.*.XK!..[l:}=.nP....M........YO_.$/2=..V...d.>./...).K6....C.oO+.w.\)+<...~>....&.....)8.J.....P.....i..........a.9....P.6....X..GEYpH...9q8vP@6......v1Wm......ht..z/....0.C2.....9...t4f
      Process:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
      Category:dropped
      Size (bytes):31712
      Entropy (8bit):6.3433279275707894
      Encrypted:false
      SSDEEP:384:eRg4IisNrETyVJqYgYhqRCMKOBQf0vSjcGrnMLWN/bptUkVXrnMQJK2TKrsBvdX9:e1eVC7s0vxGrn8WlbokVXrE2eooW
      MD5:ED2D8072113DC5CBE99A02B268754438
      SHA1:A39CD1298F70D4056835679C8E65A6668251B5DA
      SHA-256:F52203161DBD387CAD34CEA1B6551F238ACBC092D85AB1A58626BF32636D80C0
      SHA-512:B2BE621DAC9F3929C680C2F9BCF0652E1A6F0887A7099A8F74E565DB51246FDA8719049AF8A6F1A0DB811059DD8D979FB95F4D523C375EB154F82942ED26775C
      Malicious:false
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i...`.F.o......o......{......a......j...}...h...}...l...i...V.......k.......h.....*.h...i.B.h.......h...Richi...........PE..d....^a_.........." .....0...,......L3...............................................%....`..........................................O......TP...............p.......Z...!......H....C..p........................... D..0............@...............................text...n/.......0.................. ..`.rdata.......@.......4..............@..@.data........`.......L..............@....pdata.......p.......N..............@..@.rsrc................R..............@..@.reloc..H............X..............@..B........................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):12288
      Entropy (8bit):5.814115788739565
      Encrypted:false
      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
      MD5:CFF85C549D536F651D4FB8387F1976F2
      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
      Malicious:false
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Entropy (8bit):7.853944115448146
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:3GJ6S3Kwnb.exe
      File size:425380
      MD5:6c6a52c18f0ca26d357f2b4430f31568
      SHA1:9b32a592e54100a67d907e2ad039b164961dc042
      SHA256:cbd91a64900eacff9502b5509769b33adb8472efadd2861d99fd95a06c5630be
      SHA512:043a76eb4be6164bbb6da7ed983ac5d37e8707453d18c139ead31eeda239f177b0f332f7cbd32f20cd0fb9329b8481cebd2488c0b23a892b7055f6ba9e16e78d
      SSDEEP:12288:wNX177TWqByR9zSHIrV6vq6q+n+S/1fZ6VG4u9:wNXtvWqfeVAxaSb548
      TLSH:3A94224B3B58C1F1E45A8930DD73AAF157BA6E37C9A62B471340BD9D3E31A41E80D742
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................f...*.....
      Icon Hash:2333514d312b0c20
      Entrypoint:0x4034f7
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x614F9AE5 [Sat Sep 25 21:55:49 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
      Instruction
      push ebp
      mov ebp, esp
      sub esp, 000003F4h
      push ebx
      push esi
      push edi
      push 00000020h
      pop edi
      xor ebx, ebx
      push 00008001h
      mov dword ptr [ebp-14h], ebx
      mov dword ptr [ebp-04h], 0040A2E0h
      mov dword ptr [ebp-10h], ebx
      call dword ptr [004080CCh]
      mov esi, dword ptr [004080D0h]
      lea eax, dword ptr [ebp-00000140h]
      push eax
      mov dword ptr [ebp-0000012Ch], ebx
      mov dword ptr [ebp-2Ch], ebx
      mov dword ptr [ebp-28h], ebx
      mov dword ptr [ebp-00000140h], 0000011Ch
      call esi
      test eax, eax
      jne 00007F7EF8A6DCFAh
      lea eax, dword ptr [ebp-00000140h]
      mov dword ptr [ebp-00000140h], 00000114h
      push eax
      call esi
      mov ax, word ptr [ebp-0000012Ch]
      mov ecx, dword ptr [ebp-00000112h]
      sub ax, 00000053h
      add ecx, FFFFFFD0h
      neg ax
      sbb eax, eax
      mov byte ptr [ebp-26h], 00000004h
      not eax
      and eax, ecx
      mov word ptr [ebp-2Ch], ax
      cmp dword ptr [ebp-0000013Ch], 0Ah
      jnc 00007F7EF8A6DCCAh
      and word ptr [ebp-00000132h], 0000h
      mov eax, dword ptr [ebp-00000134h]
      movzx ecx, byte ptr [ebp-00000138h]
      mov dword ptr [0042A2D8h], eax
      xor eax, eax
      mov ah, byte ptr [ebp-0000013Ch]
      movzx eax, ax
      or eax, ecx
      xor ecx, ecx
      mov ch, byte ptr [ebp-2Ch]
      movzx ecx, cx
      shl eax, 10h
      or eax, ecx
      Programming Language:
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc10000x10040.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x65150x6600False0.661534926471data6.43970794855IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rdata0x80000x139a0x1400False0.45data5.14577456407IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa0000x203380x600False0.499348958333data4.01369865045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .ndata0x2b0000x960000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0xc10000x100400x10200False0.719098231589data6.8222486252IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_ICON0xc14180x58c8PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
      RT_ICON0xc6ce00x25a8dataEnglishUnited States
      RT_ICON0xc92880x2319PNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States
      RT_ICON0xcb5a80x13d6PNG image data, 256 x 256, 4-bit colormap, non-interlacedEnglishUnited States
      RT_ICON0xcc9800x10a8dataEnglishUnited States
      RT_ICON0xcda280xea8dataEnglishUnited States
      RT_ICON0xce8d00x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 7844557, next used block 4498117EnglishUnited States
      RT_ICON0xcf1780x668dataEnglishUnited States
      RT_ICON0xcf7e00x568GLS_BINARY_LSB_FIRSTEnglishUnited States
      RT_ICON0xcfd480x468GLS_BINARY_LSB_FIRSTEnglishUnited States
      RT_ICON0xd01b00x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 605552896, next used block 8260EnglishUnited States
      RT_ICON0xd04980x128GLS_BINARY_LSB_FIRSTEnglishUnited States
      RT_DIALOG0xd05c00x144dataEnglishUnited States
      RT_DIALOG0xd07080x100dataEnglishUnited States
      RT_DIALOG0xd08080x11cdataEnglishUnited States
      RT_DIALOG0xd09280x60dataEnglishUnited States
      RT_GROUP_ICON0xd09880xaedataEnglishUnited States
      RT_VERSION0xd0a380x2c8dataEnglishUnited States
      RT_MANIFEST0xd0d000x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
      DLLImport
      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
      DescriptionData
      LegalCopyrightMakeMusic Inc.
      FileVersion17.9.5
      CompanyNameFortune Brands Inc.
      LegalTrademarksBMC Software, Inc.
      CommentsBanknorth Group, Inc.
      ProductNameNewmont Mining Corporation
      FileDescriptionHubbell Inc.
      Translation0x0409 0x04b0
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found
      No statistics
      Target ID:0
      Start time:21:03:46
      Start date:10/05/2022
      Path:C:\Users\user\Desktop\3GJ6S3Kwnb.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\3GJ6S3Kwnb.exe"
      Imagebase:0x400000
      File size:425380 bytes
      MD5 hash:6C6A52C18F0CA26D357F2B4430F31568
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.773047400.0000000003300000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low

      No disassembly