Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO#4200000866.exe

Overview

General Information

Sample Name:PO#4200000866.exe
Analysis ID:624323
MD5:5d0444b70ff5caa4ec3b2ca2e563e724
SHA1:27309fdae9005f71dcde3501f023819ae6dba6cb
SHA256:fd620fd2a9d5ca1dea1e11013eb4ec486f2f5cb340cd28bcbe39e78271fc5d26
Tags:exeguloader
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Initial sample is a PE file and has a suspicious name
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • PO#4200000866.exe (PID: 5108 cmdline: "C:\Users\user\Desktop\PO#4200000866.exe" MD5: 5D0444B70FF5CAA4EC3B2CA2E563E724)
  • cleanup
{"Payload URL": "http://finseb.com/qwer/COrg_ZBOJvB194.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.777573204.0000000003AA0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.777573204.0000000003AA0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://finseb.com/qwer/COrg_ZBOJvB194.bin"}
    Source: PO#4200000866.exeVirustotal: Detection: 10%Perma Link
    Source: PO#4200000866.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: PO#4200000866.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: D:\SourceCode\DevicePlugin\production_V4.2\Service\ServiceSDK\Release\DeviceServicePlugin\DeviceServicePlugin.pdb source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.dr
    Source: Binary string: D:\SourceCode\DevicePlugin\production_V4.2\Service\ServiceSDK\Release\DeviceServicePlugin\DeviceServicePlugin.pdb22 source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.dr
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://finseb.com/qwer/COrg_ZBOJvB194.bin
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: PO#4200000866.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
    Source: PO#4200000866.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
    Source: PO#4200000866.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: PO#4200000866.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: PO#4200000866.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
    Source: PO#4200000866.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
    Source: PO#4200000866.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
    Source: PO#4200000866.exeString found in binary or memory: http://subca.ocsp-certum.com01
    Source: PO#4200000866.exeString found in binary or memory: http://subca.ocsp-certum.com02
    Source: PO#4200000866.exeString found in binary or memory: http://subca.ocsp-certum.com05
    Source: PO#4200000866.exeString found in binary or memory: http://www.certum.pl/CPS0
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, iso_3166.xml.0.drString found in binary or memory: http://www.iso.org/iso/country_codes
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: https://www.asus.com/campaign/aura/global/download.php
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

    System Summary

    barindex
    Source: initial sampleStatic PE information: Filename: PO#4200000866.exe
    Source: PO#4200000866.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: library.dll.0.drStatic PE information: No import functions for PE file found
    Source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDeviceServicePlugin.dllL vs PO#4200000866.exe
    Source: PO#4200000866.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_00406D5F
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_72E51BFF
    Source: PO#4200000866.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\PO#4200000866.exeProcess Stats: CPU usage > 98%
    Source: library.dll.0.drStatic PE information: Section .rsrc
    Source: PO#4200000866.exeVirustotal: Detection: 10%
    Source: C:\Users\user\Desktop\PO#4200000866.exeFile read: C:\Users\user\Desktop\PO#4200000866.exeJump to behavior
    Source: PO#4200000866.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\PO#4200000866.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\PO#4200000866.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\PO#4200000866.exeFile created: C:\Users\user\AppData\Local\Temp\nshE67.tmpJump to behavior
    Source: classification engineClassification label: mal76.troj.evad.winEXE@1/11@0/0
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\PO#4200000866.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: PO#4200000866.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: D:\SourceCode\DevicePlugin\production_V4.2\Service\ServiceSDK\Release\DeviceServicePlugin\DeviceServicePlugin.pdb source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.dr
    Source: Binary string: D:\SourceCode\DevicePlugin\production_V4.2\Service\ServiceSDK\Release\DeviceServicePlugin\DeviceServicePlugin.pdb22 source: PO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.777573204.0000000003AA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_72E530C0 push eax; ret
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_72E51BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\PO#4200000866.exeFile created: C:\Users\user\AppData\Local\Temp\library.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO#4200000866.exeFile created: C:\Users\user\AppData\Local\Temp\nsn105D.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO#4200000866.exeFile created: C:\Users\user\AppData\Local\Temp\DeviceServicePlugin.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO#4200000866.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\PO#4200000866.exeRDTSC instruction interceptor: First address: 0000000003AA29D1 second address: 0000000003AA29D1 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F0A1CC2A5F9h 0x00000006 inc ebp 0x00000007 push ss 0x00000008 pop ss 0x00000009 jmp 00007F0A1CC2A61Fh 0x0000000b inc ebx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\PO#4200000866.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\library.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO#4200000866.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DeviceServicePlugin.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\PO#4200000866.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\PO#4200000866.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_72E51BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\PO#4200000866.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    PO#4200000866.exe10%VirustotalBrowse
    PO#4200000866.exe5%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\DeviceServicePlugin.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\DeviceServicePlugin.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\library.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\library.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsn105D.tmp\System.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsn105D.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://subca.ocsp-certum.com050%Avira URL Cloudsafe
    http://subca.ocsp-certum.com020%Avira URL Cloudsafe
    http://subca.ocsp-certum.com010%URL Reputationsafe
    http://finseb.com/qwer/COrg_ZBOJvB194.bin0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://finseb.com/qwer/COrg_ZBOJvB194.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://www.asus.com/campaign/aura/global/download.phpPO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, DeviceServicePlugin.dll.0.drfalse
      high
      http://crl.certum.pl/ctsca2021.crl0oPO#4200000866.exefalse
        high
        http://repository.certum.pl/ctnca.cer09PO#4200000866.exefalse
          high
          http://repository.certum.pl/ctsca2021.cer0PO#4200000866.exefalse
            high
            http://crl.certum.pl/ctnca.crl0kPO#4200000866.exefalse
              high
              http://subca.ocsp-certum.com05PO#4200000866.exefalse
              • Avira URL Cloud: safe
              unknown
              http://subca.ocsp-certum.com02PO#4200000866.exefalse
              • Avira URL Cloud: safe
              unknown
              http://subca.ocsp-certum.com01PO#4200000866.exefalse
              • URL Reputation: safe
              unknown
              http://crl.certum.pl/ctnca2.crl0lPO#4200000866.exefalse
                high
                http://repository.certum.pl/ctnca2.cer09PO#4200000866.exefalse
                  high
                  http://nsis.sf.net/NSIS_ErrorErrorPO#4200000866.exefalse
                    high
                    http://www.iso.org/iso/country_codesPO#4200000866.exe, 00000000.00000002.777285149.0000000002773000.00000004.00000800.00020000.00000000.sdmp, iso_3166.xml.0.drfalse
                      high
                      http://www.certum.pl/CPS0PO#4200000866.exefalse
                        high
                        No contacted IP infos
                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:624323
                        Start date and time: 11/05/202214:37:072022-05-11 14:37:07 +02:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 9m 47s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:PO#4200000866.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:22
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal76.troj.evad.winEXE@1/11@0/0
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 63% (good quality ratio 62%)
                        • Quality average: 88.5%
                        • Quality standard deviation: 21.8%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Adjust boot time
                        • Enable AMSI
                        • Override analysis time to 240s for sample files taking high CPU consumption
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 40.125.122.176
                        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                        • Not all processes where analyzed, report is missing behavior information
                        No simulations
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Category:dropped
                        Size (bytes):202472
                        Entropy (8bit):6.000052926475626
                        Encrypted:false
                        SSDEEP:3072:GoFZlM8vbzCukOsa+tGuHBUXph7RZuUq+tZflXOdc+KTq6ZPGiHIxY4am/Vle2gL:GofuMbWukLdYuHBUX9Tcle2gyI
                        MD5:78B266FFCEA0C7FFDF364EFB4D61F623
                        SHA1:ADB3B29F96E70A60969F3CA4896372F303FAC264
                        SHA-256:647BDB2E881AEDB7FB350FB20BE46555F4B8156EC2A7757DC2FA43EA92A2BBB9
                        SHA-512:065F019A570ADED1E21BA9564CA51A1C974FD113663F9CF69AE4BE1472CFDD9649AFEDB65689FD20E6236EA5B58B0B7F3FE764C57540D5FE05E22EFD4026979F
                        Malicious:false
                        Antivirus:
                        • Antivirus: Virustotal, Detection: 0%, Browse
                        • Antivirus: ReversingLabs, Detection: 0%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S..2.2.2.Js..2..Z.2..Z.2..Z.2..Z.2.&[.2..[.2..Z.2..Z.2.2.k2..[.2..[.2..[...2.2w..2..[.2.Rich.2.........PE..d....5.a.........." .........................................................@............`.........................................0...X.......T.... ..p.......8............0..$... g..p....................h..(....g...............................................text............................... ..`.rdata..:...........................@..@.data...............................@....pdata..8...........................@..@.rsrc...p.... ......................@..@.reloc..$....0......................@..B........................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):25002
                        Entropy (8bit):7.991900167248316
                        Encrypted:true
                        SSDEEP:768:Ux8/kU33emF41RQTsWfIZVKJrS+oAZPN1ZE:jOmu4AquVkLZPN1ZE
                        MD5:ADDF085CA091DB730D3B31F40AB8BE09
                        SHA1:8DBF909A5622DA49EAD2DB877D4CF34C2AB4C708
                        SHA-256:3AF396E6C7AA54E6D8AB991196B413EB84363DF7A75DF52474A7DB65CCDF7198
                        SHA-512:BE490EBAA09F7E4781F96E162F0DED2E3ADFB682B8E08AC888D0DE78578878B077085A03E6CDBE87C15523AB245F92F272262BEB57304C5C728A657BC7590174
                        Malicious:false
                        Reputation:low
                        Preview:....l...+Zp"!.\.z.|.f|.o......".x=.&B@...O..U.ad.6....:P....]....E.n......<..e..=....#DCD...=K.h.`....|...:7..m..oy....8vU.....Q.R..}.1...E..J_....i.5p.4.2tYF.l<.A.lt7Z....>..^J...&.z.'.x.....F....h..p....\0..y....v....G[."?..?UPv]..c...0........D.s......).3.....C...2...,,..-.9. y.......0;E.,..bTr4^...(........o.8.i.3...8m..=..A.y.t&s.H.1:..J.U..-.@.{..a.:..4..^;.+.P.....q...$@.^.[.......4...Mx...tH..................R..A.:..Go+[F......{......Ei..k.[....G...0.?4N...Kgg`.....G\..........^..+T......U...3.n.....Lz..vQ4......2{b.....Y.i..:.......F...f...!.n.8.|......V\6..df....\%%.....1..F.0t.d.L.+....E...5....^...qV...9h....X.#.=.[....:.'....qsQ..7......[.G..j...8nK.Ep?;W.....j(.Ln.xU."..M..O..SY.<.o@..S...."Y....`Zc..Yrd.....'.v..b,.......ka..w!T..Q.}p..P#*..z...4..Bgp..+`.*..3wW...d."......0H....ra.u95.I..4`.....I..Lt!.B.>(.YkQ."$...p^.\H.'.......K9D.I.q..>n..._...........+%....<..3n$....H.d.}.".....L).c..b...8.'I..(...T
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):87438
                        Entropy (8bit):6.436902007549056
                        Encrypted:false
                        SSDEEP:1536:omUT7ai9UNcEshv2cA4CAD4bSv0tgxhnriGFyHuvYIpf:oZuiwcEQ2H49LhrZ7YI1
                        MD5:7E187F93F378A4AE3BD099E5A17AE036
                        SHA1:22B04988E767283FFB168FC95DC60446B79C1A31
                        SHA-256:11F2F67A97D28648FB806E7049026DC1FF4E74DC51A158831CEF6FA7AA4DB1F4
                        SHA-512:B63C1B128A2D1E14443E8F6349F809AFDF03C4004C2B07C394CA49A4496FBE32977C26FB65DA2B510A1F690056486A0111AE7C876F1480EE19F38954BA2B73D6
                        Malicious:false
                        Reputation:low
                        Preview:..f.h....&..?A.............................................%..V...............................................4..JH..........................................................f...f......3.<j.wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwf.........f.......H(.)...............................................f.s.....u..a....5-.............................................................f...f.`..0...6............................................D............W..~.........................f!....f.r.#.i.....5..errrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr,.....g.f.s.l.)"Z.>WWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWf....f.r.D........-.j..`````````````````````````````````````````f...f......g....h.f.d..7.U.......................................................4.f....c.....'...!\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\...........b...2E.m...............................................f!.....k.f.s.6......#.!Dr...............................f..f.a....e...f.c..5.8....................................
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):290
                        Entropy (8bit):6.848704057450045
                        Encrypted:false
                        SSDEEP:6:6v/lhPys1ZJmBXeD3e6gv7ksqwDkgrb2DezQq+lp:6v/7VZJwUuLNLvH2Pr
                        MD5:AFB944CEF06D0CE65E2CB6763EF2472D
                        SHA1:1D340D8BD9B52EDC71C6F06D6F31A9C8F4E566BF
                        SHA-256:CD6FB10C2F3455A8479455B59AB69C176322747AD857AC9C387A7B0C717A21BB
                        SHA-512:7BA8C6D91A068EA257DF44D6571FA9230E3167D0B73DAAA296ED1B94BE9C94CEC9B7C49F21FEE95BB1C06A40C4F5085451426D3863DE381B5E5CE975EC62EA40
                        Malicious:false
                        Reputation:low
                        Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...1K.1....IAZ\.....A''.....Q].<.]\:v.I.. .P.$..I..3>......o...M..a.Ejn..'.a......t..d.p.e.........r@..Z.&mR..Tc.K..i.j.G.....PW.t...].t.fq1.....U..G....."d.o.[.....{x..>..8...Xu.J.q.....'..uO.^@.....p.........IEND.B`.
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:C source, ASCII text
                        Category:dropped
                        Size (bytes):28997
                        Entropy (8bit):4.9868097347943605
                        Encrypted:false
                        SSDEEP:384:ieB8/8fGGqYRUIFFS/uNYd5elGVFg83Sg8hNRKlGnnJWXgg+0lk4m4V/:i/Ef5FLFkuNYd5elGVpqR5Rgb
                        MD5:987A2F0FFB9995CA5AFF8D379FEC14EE
                        SHA1:74DDC3FCD9358898C68D056BA727EEBE78644EFC
                        SHA-256:53A1373C331314E3A17B83A89AAF81766C28E0C55B5A814F85FEC7C04EDDBC0E
                        SHA-512:0B177AA7ABBF9E4345DC0ABD6B982C8971A01ECFB34568B15C9CEF222BC9521199F19F71682D37F61AF8E6608170A119DF68323DAEE7C127B01F3CB977082147
                        Malicious:false
                        Reputation:low
                        Preview:/*.** 2016-05-28.**.** The author disclaims copyright to this source code. In place of.** a legal notice, here is a blessing:.**.** May you do good and not evil..** May you find forgiveness for yourself and forgive others..** May you share freely, never taking more than you give..**.******************************************************************************.**.** This file contains the implementation of an SQLite virtual table for.** reading CSV files..**.** Usage:.**.** .load ./csv.** CREATE VIRTUAL TABLE temp.csv USING csv(filename=FILENAME);.** SELECT * FROM csv;.**.** The columns are named "c1", "c2", "c3", ... by default. Or the.** application can define its own CREATE TABLE statement using the.** schema= parameter, like this:.**.** CREATE VIRTUAL TABLE temp.csv2 USING csv(.** filename = "../http.log",.** schema = "CREATE TABLE x(date,ipaddr,url,referrer,userAgent)".** );.**.** Instead of specifying a file, the text of the CSV can be loaded
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):245
                        Entropy (8bit):6.799965885939206
                        Encrypted:false
                        SSDEEP:6:6v/lhPysTDJwk/rbsobd9vbRyWtQ2DF9+EGbgsup:6v/7z3n9DRyWtrukN
                        MD5:C5152E9074692BE446A7234C15D8168D
                        SHA1:E1550AEFED9917D3ADABCC113318D6FA35F74260
                        SHA-256:65F9B122E0735B5E18188420AFE0E1D49B290636AC6FEB4006DBA1C616B7BD67
                        SHA-512:33FA7E9F48E2B638A292E39489FE67CDE02099BA0B6EDB9B30B20E6C3C9814C2F940EFE896B49437272BD0563BE0AFC0C4EFC6C66C86120487A866BD306F050E
                        Malicious:false
                        Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8......0.......AxQB.(.@7$...x.....p>{.$...I....=...8.>1....U...($.R.K9...c...)aT..a.,[......kl..u.=.%7|..96@..#.!..<dg.f..<...m4..#..w0.f..K...v....../X.~U.%.....=..K.v'dl....IEND.B`.
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):41363
                        Entropy (8bit):5.191528382819999
                        Encrypted:false
                        SSDEEP:384:pihUuz2NdAbqF370l+8tWZAmzBJ7vGF+04IUuJRq4e1Z5S:6Uuzl+v8tWZAuuI04Ab8nk
                        MD5:38D25CBB82CF16B9D71DDDED2A7B1016
                        SHA1:838A61D41ECD85FF6F45D305F71C0F92EBA7AD84
                        SHA-256:53AB9D04A1DD23BE7336BB9DF3E1998A5938E2E5696D3BF4DCB367D20D506F0B
                        SHA-512:823D753BA289DEC05C616675D380DBD06B6E77A35AE567902C0A451C766843EB11E7F2838A53F22F6871E2D93CB0ADA957FA0E3EF2CA3869E43BE21A507FF13F
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" ?>.... ....WARNING: THIS FILE IS DEPRECATED.....PLEASE USE THE JSON DATA INSTEAD.....Usually, this data can be found in /usr/share/iso-codes/json.....This file gives a list of all countries in the ISO 3166..standard, and is used to provide translations via gettext....Copyright (C) 2002, 2004, 2006 Alastair McKinstry <mckinstry@computer.org>..Copyright (C) 2004 Andreas Jochens <aj@andaco.de>..Copyright (C) 2004, 2007 Christian Perrier <bubulle@debian.org>..Copyright (C) 2005, 2006, 2007 Tobias Quathamer <toddy@debian.org>.... This file is free software; you can redistribute it and/or.. modify it under the terms of the GNU Lesser General Public.. License as published by the Free Software Foundation; either.. version 2.1 of the License, or (at your option) any later version..... This file is distributed in the hope that it will be useful,.. but WITHOUT ANY WARRANTY; without even the implied warranty of.. MERCHANTABILITY or FITNE
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):528
                        Entropy (8bit):2.454669672012672
                        Encrypted:false
                        SSDEEP:3:WlWUqt/vllXl+YZcFTS9gXeF+X32Zp9XojoW2mnKt3MGHlXml/4XSkVlXllXl/l5:idq2Vg3F+X32RojB5nKKZ4i
                        MD5:56D41F7E91B9DCD5E8AF747A13C6004B
                        SHA1:C59F6AE0DE9D72F3046293E9CEE3A8E5077A3F58
                        SHA-256:9B8494152724313033EE4A2C2112212816F9C11AB5DEF42D3325617ADFF6DE49
                        SHA-512:CB28A005BFE866102538AF218606269018D7B433DA559E3496C21A63815D439A397A1B9281C4DDEB1D575BC0645D4C0F8D6156171611534F9CA8F6124CB21CA5
                        Malicious:false
                        Antivirus:
                        • Antivirus: Metadefender, Detection: 0%, Browse
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.o.m.o.m.o...i.l.o.2.e.l.o.Richm.o.........PE..L......:..........................................@..................................................................................................................................................................................................rsrc...............................@..@................................................................
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):127
                        Entropy (8bit):5.509837934582196
                        Encrypted:false
                        SSDEEP:3:yionv//thPl9vt3lAnsrtxBllnxnF1wQLLts39BBPa9UspcuRjp:6v/lhPysZf19J69PaxcuRjp
                        MD5:B16AB36FAD8BB36B66DCF80B4447AAC5
                        SHA1:020FC710033BB672D59DD3D23DCA5BE9FAD21ED9
                        SHA-256:F41B83B907535EE547881030EE0F138651E711BB5943D7DC9FDBDE4A1B200D33
                        SHA-512:4B45C9A71F0437269881A84C3144AE39DFF741F84516F9FA32863E7AED4F668A766AC550E6C2F9E5EA4238181124E5CF7F3B30458C954599B08E8116AB15B7EB
                        Malicious:false
                        Preview:.PNG........IHDR................a....sBIT....|.d....6IDAT8.c`..0...?.~&J]@..,D.Aq2.]@./.u2.]@./..d..`..@1....."l..$....IEND.B`.
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):12288
                        Entropy (8bit):5.814115788739565
                        Encrypted:false
                        SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                        MD5:CFF85C549D536F651D4FB8387F1976F2
                        SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                        SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                        SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                        Malicious:false
                        Antivirus:
                        • Antivirus: Metadefender, Detection: 0%, Browse
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\PO#4200000866.exe
                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                        Category:modified
                        Size (bytes):357
                        Entropy (8bit):7.118113286231142
                        Encrypted:false
                        SSDEEP:6:6v/lhPysrTeNeLussfmVacXJ0NzdkvArQFOs95hpKTFJrl0Cau3mOZK+pbp:6v/7LTwMufeacZ0Zd65yZn0C7ZKy
                        MD5:CACAC26309C82D65E30BCC2CFCA0E51C
                        SHA1:D18566ECAA9A916FCF0D3BF4D856D3DB8D673391
                        SHA-256:4A4A91C24410D8CBB16314AAD56F2F751464CFBF88C3FCB27E92C1110AE34706
                        SHA-512:33E88DC3E45EC413830582544EC31DFDEB270C685DDA51CD6D681B438F1208B6867976D9C382C39ED966ADE22ADC0B8962B6CF6B1C9D78081B26582BE3A5395A
                        Malicious:false
                        Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8....N.Q.E..T..*.@.........`AeBei....../.@~..l.. jhl,..*..(X..x..!..e...ww..<..%0..1...b....a..,...Z...q....V~.4..&p"..b.w*....gPuL..5...........|.oK..H)....g..~.........!.d.....}.b:.....h....gP...w.F...XRl...... ...j./...=.+ng....H.n.[D.........=.._u.5.<2.W...ty..;o[3..t.....IEND.B`.
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):6.3914685624967245
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:PO#4200000866.exe
                        File size:379352
                        MD5:5d0444b70ff5caa4ec3b2ca2e563e724
                        SHA1:27309fdae9005f71dcde3501f023819ae6dba6cb
                        SHA256:fd620fd2a9d5ca1dea1e11013eb4ec486f2f5cb340cd28bcbe39e78271fc5d26
                        SHA512:436da2ee2bad47ef2027fb4a3dfda2e1070cb7c9a888bb594c4f25a15adb103f6c686e35b7d10bccad6f824a503fedebe6c6c5ba404ac8f50398837791d66e05
                        SSDEEP:6144:ZYa6W/pzBlsLyHIlr3SkSHyO5AxPO5khaL6YSsA2gaRD:ZYwxY3pC3Qmeaqspt
                        TLSH:2A84F141BBA8D4A7C5720B300CEA96A55ABDAD502996070B338077ED3FB37D19F1E319
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                        Icon Hash:30b0e969e8dccc00
                        Entrypoint:0x403640
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:61259b55b8912888e90f516ca08dc514
                        Signature Valid:false
                        Signature Issuer:CN="Cunzie3 Brevsamlerens9 ", O=hovedstningers, L="Chemnitz, Sachsen", S=Sachsen, C=DE
                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                        Error Number:-2146762487
                        Not Before, Not After
                        • 5/11/2022 8:49:05 AM 5/11/2023 8:49:05 AM
                        Subject Chain
                        • CN="Cunzie3 Brevsamlerens9 ", O=hovedstningers, L="Chemnitz, Sachsen", S=Sachsen, C=DE
                        Version:3
                        Thumbprint MD5:7EB0C866C3B021249A083B3B2649C8F2
                        Thumbprint SHA-1:16CC515505D981DB017A84FD49AAD119D768FE27
                        Thumbprint SHA-256:674CD0F94F9959B355B9421AE98E15ED7994315E7C5BE0D60BF14B056E24CF52
                        Serial:947ABF3A4FA2102E
                        Instruction
                        push ebp
                        mov ebp, esp
                        sub esp, 000003F4h
                        push ebx
                        push esi
                        push edi
                        push 00000020h
                        pop edi
                        xor ebx, ebx
                        push 00008001h
                        mov dword ptr [ebp-14h], ebx
                        mov dword ptr [ebp-04h], 0040A230h
                        mov dword ptr [ebp-10h], ebx
                        call dword ptr [004080C8h]
                        mov esi, dword ptr [004080CCh]
                        lea eax, dword ptr [ebp-00000140h]
                        push eax
                        mov dword ptr [ebp-0000012Ch], ebx
                        mov dword ptr [ebp-2Ch], ebx
                        mov dword ptr [ebp-28h], ebx
                        mov dword ptr [ebp-00000140h], 0000011Ch
                        call esi
                        test eax, eax
                        jne 00007F0A1CA0375Ah
                        lea eax, dword ptr [ebp-00000140h]
                        mov dword ptr [ebp-00000140h], 00000114h
                        push eax
                        call esi
                        mov ax, word ptr [ebp-0000012Ch]
                        mov ecx, dword ptr [ebp-00000112h]
                        sub ax, 00000053h
                        add ecx, FFFFFFD0h
                        neg ax
                        sbb eax, eax
                        mov byte ptr [ebp-26h], 00000004h
                        not eax
                        and eax, ecx
                        mov word ptr [ebp-2Ch], ax
                        cmp dword ptr [ebp-0000013Ch], 0Ah
                        jnc 00007F0A1CA0372Ah
                        and word ptr [ebp-00000132h], 0000h
                        mov eax, dword ptr [ebp-00000134h]
                        movzx ecx, byte ptr [ebp-00000138h]
                        mov dword ptr [0042A318h], eax
                        xor eax, eax
                        mov ah, byte ptr [ebp-0000013Ch]
                        movzx eax, ax
                        or eax, ecx
                        xor ecx, ecx
                        mov ch, byte ptr [ebp-2Ch]
                        movzx ecx, cx
                        shl eax, 10h
                        or eax, ecx
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4d0000x284c0.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x5ab380x1ea0.rsrc
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .ndata0x2b0000x220000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x4d0000x284c00x28600False0.253543440402data3.51609274329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_ICON0x4d3580x10828dBase III DBT, version number 0, next free block index 40EnglishUnited States
                        RT_ICON0x5db800x94a8dBase III DBT, version number 0, next free block index 40EnglishUnited States
                        RT_ICON0x670280x5488dataEnglishUnited States
                        RT_ICON0x6c4b00x4228dBase III DBT, version number 0, next free block index 40EnglishUnited States
                        RT_ICON0x706d80x25a8dataEnglishUnited States
                        RT_ICON0x72c800x10a8dataEnglishUnited States
                        RT_ICON0x73d280x988dataEnglishUnited States
                        RT_ICON0x746b00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                        RT_DIALOG0x74b180x120dataEnglishUnited States
                        RT_DIALOG0x74c380xf8dataEnglishUnited States
                        RT_DIALOG0x74d300xa0dataEnglishUnited States
                        RT_DIALOG0x74dd00x60dataEnglishUnited States
                        RT_GROUP_ICON0x74e300x76dataEnglishUnited States
                        RT_VERSION0x74ea80x2d8dataEnglishUnited States
                        RT_MANIFEST0x751800x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                        DLLImport
                        ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                        SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                        ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                        COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                        USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                        GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                        KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                        DescriptionData
                        LegalCopyrightMetaldyne Corporation
                        FileVersion26.10.23
                        CompanyNamePeoples Energy Corp.
                        LegalTrademarksFifth Third Bancorp
                        CommentsWm Wrigley Jr Company
                        ProductNameHome Depot Inc.
                        FileDescriptionMicron Technology Inc.
                        Translation0x0409 0x04b0
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found
                        No statistics
                        Target ID:0
                        Start time:14:38:43
                        Start date:11/05/2022
                        Path:C:\Users\user\Desktop\PO#4200000866.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\PO#4200000866.exe"
                        Imagebase:0x400000
                        File size:379352 bytes
                        MD5 hash:5D0444B70FF5CAA4EC3B2CA2E563E724
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.777573204.0000000003AA0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low

                        No disassembly