Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aSsc9zh1ex

Overview

General Information

Sample Name:aSsc9zh1ex (renamed file extension from none to exe)
Analysis ID:625008
MD5:d5e55a57372bcad45fbb260105179caf
SHA1:9b1935a927c072dd31017362ff1739bf1ea2aaf7
SHA256:3c27c2aa1bc826faa65ab4038eb385cabd6db50108410e6f674d455aa1dc5532
Tags:32exetrojan
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
PE file contains more sections than normal
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • aSsc9zh1ex.exe (PID: 4152 cmdline: "C:\Users\user\Desktop\aSsc9zh1ex.exe" MD5: D5E55A57372BCAD45FBB260105179CAF)
  • cleanup
{"Payload URL": "http://barsam.com.au/bin_QuCucbUMda229.bin"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.886415142.0000000002D70000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000001.00000002.886415142.0000000002D70000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://barsam.com.au/bin_QuCucbUMda229.bin"}
    Source: aSsc9zh1ex.exeVirustotal: Detection: 37%Perma Link
    Source: aSsc9zh1ex.exeMetadefender: Detection: 14%Perma Link
    Source: aSsc9zh1ex.exeReversingLabs: Detection: 34%
    Source: aSsc9zh1ex.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: aSsc9zh1ex.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: D:\SourceCode\GC3.UserExperienceImprovement\production_V4.2\Service\ServiceSDK\Release\UserExperienceImprovementPlugin\AsSQLHelper.pdb source: AsSQLHelper.dll.1.dr
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIINVHelper.pdb source: AEGISIIINVHelper.dll.1.dr
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_00406850 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_00405C26 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://barsam.com.au/bin_QuCucbUMda229.bin
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: AsSQLHelper.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
    Source: AsSQLHelper.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
    Source: AsSQLHelper.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, wxbase30u_xml_gcc_custom.dll.1.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, wxbase30u_xml_gcc_custom.dll.1.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
    Source: aSsc9zh1ex.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: AsSQLHelper.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, wxbase30u_xml_gcc_custom.dll.1.drString found in binary or memory: http://ocsp.sectigo.com0
    Source: AsSQLHelper.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
    Source: AsSQLHelper.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: AsSQLHelper.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, wxbase30u_xml_gcc_custom.dll.1.drString found in binary or memory: https://sectigo.com/CPS0C
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, AsSQLHelper.dll.1.dr, wxbase30u_xml_gcc_custom.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: AsSQLHelper.dll.1.dr, AEGISIIINVHelper.dll.1.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_004056BB GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: aSsc9zh1ex.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamewxbase30u_xml_gcc_custom.dll4 vs aSsc9zh1ex.exe
    Source: aSsc9zh1ex.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_732D1BFF
    Source: wxbase30u_xml_gcc_custom.dll.1.drStatic PE information: Number of sections : 12 > 10
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeProcess Stats: CPU usage > 98%
    Source: aSsc9zh1ex.exeVirustotal: Detection: 37%
    Source: aSsc9zh1ex.exeMetadefender: Detection: 14%
    Source: aSsc9zh1ex.exeReversingLabs: Detection: 34%
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeFile read: C:\Users\user\Desktop\aSsc9zh1ex.exeJump to behavior
    Source: aSsc9zh1ex.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeFile created: C:\Users\user\AppData\Local\Temp\nsw48CC.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/8@0/0
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_00404967 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: aSsc9zh1ex.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: D:\SourceCode\GC3.UserExperienceImprovement\production_V4.2\Service\ServiceSDK\Release\UserExperienceImprovementPlugin\AsSQLHelper.pdb source: AsSQLHelper.dll.1.dr
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIINVHelper.pdb source: AEGISIIINVHelper.dll.1.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000001.00000002.886415142.0000000002D70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_732D30C0 push eax; ret
    Source: wxbase30u_xml_gcc_custom.dll.1.drStatic PE information: section name: .xdata
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_732D1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeFile created: C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dllJump to dropped file
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeFile created: C:\Users\user\AppData\Local\Temp\wxbase30u_xml_gcc_custom.dllJump to dropped file
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeFile created: C:\Users\user\AppData\Local\Temp\nsc4B5D.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeFile created: C:\Users\user\AppData\Local\Temp\AsSQLHelper.dllJump to dropped file
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeRDTSC instruction interceptor: First address: 0000000002D70A78 second address: 0000000002D70A78 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FED00ACE4BAh 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dllJump to dropped file
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wxbase30u_xml_gcc_custom.dllJump to dropped file
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AsSQLHelper.dllJump to dropped file
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_00406850 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_00405C26 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_732D1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\aSsc9zh1ex.exeCode function: 1_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    aSsc9zh1ex.exe38%VirustotalBrowse
    aSsc9zh1ex.exe14%MetadefenderBrowse
    aSsc9zh1ex.exe34%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\AsSQLHelper.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\AsSQLHelper.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\AsSQLHelper.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
    http://barsam.com.au/bin_QuCucbUMda229.bin0%Avira URL Cloudsafe
    http://ocsp.sectigo.com00%URL Reputationsafe
    http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
    https://sectigo.com/CPS0C0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://barsam.com.au/bin_QuCucbUMda229.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0saSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, wxbase30u_xml_gcc_custom.dll.1.drfalse
    • URL Reputation: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErroraSsc9zh1ex.exefalse
      high
      http://ocsp.sectigo.com0aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, wxbase30u_xml_gcc_custom.dll.1.drfalse
      • URL Reputation: safe
      unknown
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#aSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, wxbase30u_xml_gcc_custom.dll.1.drfalse
      • URL Reputation: safe
      unknown
      https://sectigo.com/CPS0CaSsc9zh1ex.exe, 00000001.00000002.886112266.0000000000788000.00000004.00000001.01000000.00000005.sdmp, wxbase30u_xml_gcc_custom.dll.1.drfalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:625008
      Start date and time: 12/05/202210:30:452022-05-12 10:30:45 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 43s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:aSsc9zh1ex (renamed file extension from none to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:17
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal72.troj.evad.winEXE@1/8@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 85.5% (good quality ratio 84.2%)
      • Quality average: 87%
      • Quality standard deviation: 21.8%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 40.125.122.176
      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, glb.sls.prod.dcat.dsp.trafficmanager.net
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\aSsc9zh1ex.exe
      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Category:dropped
      Size (bytes):60648
      Entropy (8bit):6.273540391388373
      Encrypted:false
      SSDEEP:768:VyIscWONgNnXigWuv3uuCRCF5AElVllzCix92FBo/SlOKsVjiVsRb2X9bhM:VDt5Ngg23TgNElDNeo/8OLjiOR6
      MD5:00B917A158BB5BF0D6BFF7D6B3C81B12
      SHA1:24A9B80C8EC794ADA4C8BAF717CFAB98459AC1DE
      SHA-256:947BE059906893C09F222CB2868631638A219FB905A47E16A311BA5ADEB4B300
      SHA-512:47B8EABDF404E19B2D953933D2D0C922CC538B3876D7664110CBD739605FFD151D24788E60B9935E6E4F7BB463F6BC7CED253CF31ED5C4D210495C301C7E5F45
      Malicious:false
      Antivirus:
      • Antivirus: Virustotal, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........P..K1.K1.K1.BIX.G1..Y.I1....J1..Y.D1..Y.C1..Y.H1.BIO.J1.BIH.J1.8S.N1.K1..1..X.H1..X.J1..X4.J1.K1\.J1..X.J1.RichK1.................PE..d....5;a.........." .........j...............................................0...... .....`.........................................`...................H.................... ..4.......p............................................... ............................text............................... ..`.rdata.. -..........................@..@.data...`'..........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..4.... ......................@..B................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\aSsc9zh1ex.exe
      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Category:dropped
      Size (bytes):36576
      Entropy (8bit):6.18658407883376
      Encrypted:false
      SSDEEP:384:Vw33667/fhcAcwuVQydIDddeypaROhGkXMV3lBhjUK98krmRt8ZrqL1r8/lSNriq:q33oWsUK98vAqL1r8oFiQ7b2X9shHf
      MD5:0B849C073801DCE25301ECA0146D534B
      SHA1:5BB9251CA83FE96C8F52B35637E674A629ED1468
      SHA-256:3F77E9EF8843DE3DA37037F21BCF6D7E990085D2BDC5B3F05E71AB5EBE5288BB
      SHA-512:1C5C99BD93FBACD3BA56ADE806092AB86BA3FEA0BB70DE0FB89775285A71DB47F2400CF29757370CDC69F13FCBCF6513B25F4C8BBED0A15D65A9618BEE733A7F
      Malicious:false
      Antivirus:
      • Antivirus: Virustotal, Detection: 0%, Browse
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_.%.>.v.>.v.>.v.FNv.>.v.\.w.>.v.V.w.>.v.V.w.>.v.V.w.>.v.V.w.>.v.`.w.>.v.>.v.>.v!W.w.>.v!W.w.>.v!W"v.>.v.>Jv.>.v!W.w.>.vRich.>.v........................PE..d......a.........." .....>...\.......@.................................................... .........................................pd..l....d.......................p..........H....T..p...........................`U...............P...............................text....<.......>.................. ..`.rdata.......P.......B..............@..@.data...0....p.......`..............@....pdata...............b..............@..@.rsrc................h..............@..@.reloc..H............n..............@..B........................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\aSsc9zh1ex.exe
      File Type:XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):1070
      Entropy (8bit):4.836891219007383
      Encrypted:false
      SSDEEP:24:JdtGOiNK+bIg4y3QdM/Ai8qTCNzgDQRnKVGaQkl:3U1K+bIg4y3QdaIzgDQh3aQkl
      MD5:9B48061E7B9FC35CD2624F2B9102549E
      SHA1:9DA640A8AF809549031916AB143026FAAF3B1E74
      SHA-256:84839C6E85F9B73AA6B0F331A9EAADF7409B7B36E30BA0B04E31680069103E43
      SHA-512:01CF7B5CBDEB1038E79076CB452AC63B0037C86570C3FE97B6C559823F43D515F34CAC963D3737B9EAF103F0EBDEBC1317B68091D4332C3615E87A3F25DF679E
      Malicious:false
      Reputation:low
      Preview:.<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <dependency>.. <dependentAssembly>.. <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="x86" publicKeyToken="6595b64144ccf1df" language="*" />.. </dependentAssembly>.. </dependency>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">.. <security>.. <requestedPrivileges>.. <requestedExecutionLevel level="asInvoker" uiAccess="false" />.. </requestedPrivileges>.. </security>.. </trustInfo>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity name="NeGACOM" type="win32" version="17.0.0.0" processorArchitecture="x86" />.. </dependentAssembly>.. </dependency>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity name="OnlineServices" version="17.0.0
      Process:C:\Users\user\Desktop\aSsc9zh1ex.exe
      File Type:data
      Category:dropped
      Size (bytes):77432
      Entropy (8bit):6.5191464617024995
      Encrypted:false
      SSDEEP:1536:0ryhqjc8wTqJ39FNvl4UXgmBfCotcEntclFVdwJZp:0ryTk3HdyYgmBfCscEilFVG
      MD5:0CAED7F18389A6CC24391E0400C2BE47
      SHA1:59288CED440D46970090F25983B409BB25F43BBF
      SHA-256:E8C48296D444C8EDBF6169CA9E3C5334B0813BFC684C2E99BFD61C692A3784F1
      SHA-512:AFC59C8EA01D5F96DFAB3CD08F088FF2136542C0F13435EE9D63795CD8BDEF6D746408296883CD9052BF21D6E87388295B4682F06913CC982B21868704277B93
      Malicious:false
      Reputation:low
      Preview:....f.f.....GE.......z.I.J=.yk.....W[...o....6......O-P.j"q..h.r...m.v..X...F.1.BV..p.,....Td...L|c.A.._C......~.7ws...4.Z...$...>..e.YS...&..l..._............}.a;'a..g*Y.DN.Ql.`.(+#;......%3...]..u..\K.8..<f./.)..w.0.l..:n.x..Nt{.....?^..M580H. C...d2@..!..U..R%i.GE.......z.I.J=.yk.....W[...o....6...............O-P.j"q..h.r...m.v..X...F.1.BV..p.,....Td...L|c.A.._C......~.7ws...4.Z...$...>..e.YS...&.....}.a;'a..g*Y.DN.Ql.`.(+#;......1.......k..|3...]..u..\K.8..<f./.)..w.0.l..:n.x..Nt{.....?^..M580H. C...d2@..!..U..R%i.GE.......z.I.J=.yk.....W[...o....6......O-P.......n....."q..h.r...m.v..X...F.1.BV..p.,....Td...L|c.A.._C......~.7ws...4.Z...$...>..e.YS...&.....}.a;'a..g*Y.DN.Ql.`.(+#;......%3...4.*..:.............]..u..\K.8..<f./.)..w.0.l..:n.x..Nt{.....?^..M580H. C...d2@..!..U..R%i.GE.......z.I.J=.yk.....W[...o....6......O-P.j"q..h.r...m.v..X...F.1.BV.......f.........p.,....Td...L|c.A.._C......~.7ws...4.Z...$...>..e.YS.
      Process:C:\Users\user\Desktop\aSsc9zh1ex.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):288
      Entropy (8bit):7.002703251110111
      Encrypted:false
      SSDEEP:6:6v/lhPysDjYOGW78zHS1w9xuIGXdvkFRBp9rXHEb/GY1IX2NYKjp:6v/7jjYOGW7Rw9xu6pxHG/VIX6F
      MD5:A83F8C904AFA9E3F6A50D263747CF6DF
      SHA1:7B9D99B950518FCAF5AC59350823D2B20E82956F
      SHA-256:F57C0B31EC836E26EB609F259CFA68DDA95F09685784423B61075DAE4BBA5BF6
      SHA-512:4B2DC243E86514BDC816B92808C491EF71B72690F25C2372FE909CED3A103F990708C507065169FA5C6F823A8B1ADADB7BF13696E78C807A973789CF14CA3A06
      Malicious:false
      Reputation:low
      Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...N.Q...'.....X.s.^../H.f.....BJ....V[.b..qsvA..d..y.9?...z.`./....'..[.Q..'...M.....mwuN.\....h..(|........p.K..I.%..... ..*..x.t~.kW.`V'.8.W.K.l.4..9.&\..k..3F........4.0.op.rL#.....N:.=.T.[....L.....p...#....IEND.B`.
      Process:C:\Users\user\Desktop\aSsc9zh1ex.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):893
      Entropy (8bit):7.712327619290152
      Encrypted:false
      SSDEEP:12:6v/7M/6CsI5hmePcdiB6BV3h8SkKc47zOTtcC8VErf6qdY94OR/vlNMgmaGe7fb:q65hBcs6L3h6hBcCLrDq42nMDanb
      MD5:473EE416AF2C1AE05AA7D5D004C9B3D2
      SHA1:EEC352E25F562C0386D5C92384A70B3005D40D6F
      SHA-256:2C48F1719BBC825592FB0929E31DCFE66578665D28099087EA98EF261688DC18
      SHA-512:2B05C9920CFDCF378448F35B14AA56078051584CA0DB15F43B5A27272B072DD8A76BBC2829DF4C7C7BAF8339839974A00CA7BFFB8425B7D9494421CCC9EE80C1
      Malicious:false
      Preview:.PNG........IHDR................a...DIDATx.e.C..H.F_..tzl{m.m.m.m..;=F+..j.......r.........hZ...%Sn...Z....|g...o.c..f..k..#.Y.5..2...r44.t...[|.EW....E..3v....o...n...y.V.%.\g.].XY.).PQ..h~.Mu.:I.~.!{dt...-....c........~.ihs..<.23h.q...AA....P.O.d.#....S%....w....~(.Yg.mL.`..r.U?A.D......%.t..~.b..wl...G\r.......,^m.b%..??...?./........O..w\|..t..5...^x....cK..?..b...3^#i.xYp3.>..C<Q.yg^.3.=..;./..!.`.....dq%...`..wB....q.2....W....S`....E....q3.A....9...."..].+.f...-.Z)d*..h..O>......c>...=.P..!...pw}g..t&.=..Dd...i.f......\....-JO0hW....!.ic.%...s.+...iG|..MK...O_..;_.q_....|...F....M...O...o..5.=...y{...]hn..Z..L+..`r.&I...5t._Dz..m.~$n$..|.u}_.n|.53..b.+Zn.bCA.1..x..hv?.{8...!\J......>OukN..{...[#.....7....k..L.#...D.y:K5.|.&..XV.U..rb..T..G..6.I...~.....i.#ike...9/B_&.....^v]..._.l.Et.i..M..l.B1...A.....>._...P.,... ....IEND.B`.
      Process:C:\Users\user\Desktop\aSsc9zh1ex.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):12288
      Entropy (8bit):5.814115788739565
      Encrypted:false
      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
      MD5:CFF85C549D536F651D4FB8387F1976F2
      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
      Malicious:false
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\aSsc9zh1ex.exe
      File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
      Category:dropped
      Size (bytes):214568
      Entropy (8bit):6.30310219025288
      Encrypted:false
      SSDEEP:3072:WSQvJRT4XDaGZcJRQqnKJNuC3d5C/I4ye9P7Vvw/YDQzix+AKp:WDRT4XDpZ0QqnKJNuCwx9PRCixK
      MD5:6D01A897D44DD4D25D7E1264407210FD
      SHA1:332C3ADE84D0C1E5BE298C037F9FE222620343B2
      SHA-256:DD8289A21902F458B861C08A2F54D23F1E214B37BB89E73D4108303B490F7644
      SHA-512:54098533FDC9B4BAB0CD525D652846B5CDCD808089346D0192D7CF9DE6C1E8E329E2071886391D729F3DFED59D2E860E8A811E07E6688E6AA0B55D5D98D1AD8D
      Malicious:false
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...#.B..........P..........d....................................2.....`... ......................................P.......`......................."..($..................................@...(....................c..8............................text....A.......B..................`.P`.data........`.......F..............@.`..rdata..\....p.......H..............@.`@.pdata..............................@.0@.xdata....... ......................@.0@.bss.........@........................`..edata.......P......................@.0@.idata.......`......................@.0..CRT....X...........................@.@..tls................................@.@..rsrc...............................@.0..reloc..............................@.0B................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Entropy (8bit):7.537994904334399
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:aSsc9zh1ex.exe
      File size:326847
      MD5:d5e55a57372bcad45fbb260105179caf
      SHA1:9b1935a927c072dd31017362ff1739bf1ea2aaf7
      SHA256:3c27c2aa1bc826faa65ab4038eb385cabd6db50108410e6f674d455aa1dc5532
      SHA512:088033564668a4fd3e107566387fecf0b6dcbd7a161c9ef3e4adb232520467a64af9eec740fe783d5c62fa3b79bdd910e72f3acc838e5fa155427c83003c407b
      SSDEEP:6144:13yztyL/0/bbdat6J9mOnuuAgo+/sOxCHBs4YIwUrJrnBpKussJ9LQu:13pL0/bbdat6JIO1Ag2TBs4YI3BnB35N
      TLSH:07640144E6684D21FCBA0D3C0533D4A76974CC220879DBBB2BAE751A2BF51D1822FD67
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L...h.Oa.................h....:....
      Icon Hash:c8fbb7a7a7e3f80c
      Entrypoint:0x40350a
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x614F9A68 [Sat Sep 25 21:53:44 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
      Instruction
      push ebp
      mov ebp, esp
      sub esp, 000003F4h
      push ebx
      push esi
      push edi
      push 00000020h
      pop edi
      xor ebx, ebx
      push 00008001h
      mov dword ptr [ebp-14h], ebx
      mov dword ptr [ebp-04h], 0040A2E0h
      mov dword ptr [ebp-10h], ebx
      call dword ptr [004080CCh]
      mov esi, dword ptr [004080D0h]
      lea eax, dword ptr [ebp-00000140h]
      push eax
      mov dword ptr [ebp-0000012Ch], ebx
      mov dword ptr [ebp-2Ch], ebx
      mov dword ptr [ebp-28h], ebx
      mov dword ptr [ebp-00000140h], 0000011Ch
      call esi
      test eax, eax
      jne 00007FED0073078Ah
      lea eax, dword ptr [ebp-00000140h]
      mov dword ptr [ebp-00000140h], 00000114h
      push eax
      call esi
      mov ax, word ptr [ebp-0000012Ch]
      mov ecx, dword ptr [ebp-00000112h]
      sub ax, 00000053h
      add ecx, FFFFFFD0h
      neg ax
      sbb eax, eax
      mov byte ptr [ebp-26h], 00000004h
      not eax
      and eax, ecx
      mov word ptr [ebp-2Ch], ax
      cmp dword ptr [ebp-0000013Ch], 0Ah
      jnc 00007FED0073075Ah
      and word ptr [ebp-00000132h], 0000h
      mov eax, dword ptr [ebp-00000134h]
      movzx ecx, byte ptr [ebp-00000138h]
      mov dword ptr [007A8B18h], eax
      xor eax, eax
      mov ah, byte ptr [ebp-0000013Ch]
      movzx eax, ax
      or eax, ecx
      xor ecx, ecx
      mov ch, byte ptr [ebp-2Ch]
      movzx ecx, cx
      shl eax, 10h
      or eax, ecx
      Programming Language:
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d60000x15908.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x66700x6800False0.667931189904data6.43600264122IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rdata0x80000x139a0x1400False0.45data5.14577456407IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa0000x39eb780x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .ndata0x3a90000x2d0000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x3d60000x159080x15a00False0.471132135116data5.8124427271IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_ICON0x3d62c80x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
      RT_ICON0x3e6af00x25a8dataEnglishUnited States
      RT_ICON0x3e90980x10a8dataEnglishUnited States
      RT_ICON0x3ea1400x988dataEnglishUnited States
      RT_ICON0x3eaac80x468GLS_BINARY_LSB_FIRSTEnglishUnited States
      RT_DIALOG0x3eaf300x100dataEnglishUnited States
      RT_DIALOG0x3eb0300x11cdataEnglishUnited States
      RT_DIALOG0x3eb1500xc4dataEnglishUnited States
      RT_DIALOG0x3eb2180x60dataEnglishUnited States
      RT_GROUP_ICON0x3eb2780x4cdataEnglishUnited States
      RT_VERSION0x3eb2c80x300dataEnglishUnited States
      RT_MANIFEST0x3eb5c80x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
      DLLImport
      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
      DescriptionData
      LegalCopyrightAvnet, Inc.
      FileVersion24.30.26
      CompanyNameStewart Information Services Corp
      LegalTrademarksPacifiCare Health Systems Inc
      CommentsReliance Steel & Aluminum Co.
      ProductNameMariner Health Care Inc.
      FileDescriptionDisc Soft Ltd
      Translation0x0409 0x04b0
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found
      No statistics
      Target ID:1
      Start time:10:31:53
      Start date:12/05/2022
      Path:C:\Users\user\Desktop\aSsc9zh1ex.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\aSsc9zh1ex.exe"
      Imagebase:0x400000
      File size:326847 bytes
      MD5 hash:D5E55A57372BCAD45FBB260105179CAF
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.886415142.0000000002D70000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low

      No disassembly