Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
72EED30398363-0983BNDJ0398763536.exe

Overview

General Information

Sample Name:72EED30398363-0983BNDJ0398763536.exe
Analysis ID:632155
MD5:511ad0297cd3e268e8d0c53c1207dc95
SHA1:aa466a3c5fb1a4c3ae77835fc3d592e8f7a0679b
SHA256:c527fc06df0bca1fe6ef47ff82e1a858af8b50877d97446c7898e5d1a80146a3
Infos:

Detection

GuLoader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
PE file contains more sections than normal
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.769168280.0000000003060000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 72EED30398363-0983BNDJ0398763536.exeVirustotal: Detection: 10%Perma Link
    Source: 72EED30398363-0983BNDJ0398763536.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\FLOKDYRSJump to behavior
    Source: 72EED30398363-0983BNDJ0398763536.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: MapiProxy.pdb source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, MapiProxy.dll.0.dr
    Source: Binary string: MapiProxy.pdb@ source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, MapiProxy.dll.0.dr
    Source: Binary string: f:\bluetooth8.0.1.57\sw\src\WIN8_Mainline\ExtArch\UI\Win7UI\Prism\ObjectBuilder\obj\x64\Release\Microsoft.Practices.ObjectBuilder2.pdb source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, Microsoft.Practices.ObjectBuilder2.dll.0.dr
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, fzshellext_64.dll.0.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, MapiProxy.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1071.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, fzshellext_64.dll.0.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
    Source: 72EED30398363-0983BNDJ0398763536.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, fzshellext_64.dll.0.drString found in binary or memory: http://ocsp.sectigo.com0
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1071.dll.0.drString found in binary or memory: http://www.avast.com0/
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, MapiProxy.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, MapiProxy.dll.0.drString found in binary or memory: https://mozilla.org0
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, fzshellext_64.dll.0.drString found in binary or memory: https://sectigo.com/CPS0C
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, MapiProxy.dll.0.dr, lang-1071.dll.0.dr, fzshellext_64.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: 72EED30398363-0983BNDJ0398763536.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: Microsoft.Practices.ObjectBuilder2.dll.0.drStatic PE information: No import functions for PE file found
    Source: lang-1071.dll.0.drStatic PE information: No import functions for PE file found
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMapiProxy.dll8 vs 72EED30398363-0983BNDJ0398763536.exe
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Practices.ObjectBuilder2.dllT vs 72EED30398363-0983BNDJ0398763536.exe
    Source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefzshellext.dllb! vs 72EED30398363-0983BNDJ0398763536.exe
    Source: 72EED30398363-0983BNDJ0398763536.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_00406D5F
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_732A1BFF
    Source: fzshellext_64.dll.0.drStatic PE information: Number of sections : 12 > 10
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeProcess Stats: CPU usage > 98%
    Source: 72EED30398363-0983BNDJ0398763536.exeVirustotal: Detection: 10%
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeFile read: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeJump to behavior
    Source: 72EED30398363-0983BNDJ0398763536.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeFile created: C:\Users\user\AppData\Local\Temp\nsa450C.tmpJump to behavior
    Source: classification engineClassification label: mal60.troj.evad.winEXE@1/14@0/0
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: 72EED30398363-0983BNDJ0398763536.exeStatic file information: File size 1141532 > 1048576
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\FLOKDYRSJump to behavior
    Source: 72EED30398363-0983BNDJ0398763536.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: MapiProxy.pdb source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, MapiProxy.dll.0.dr
    Source: Binary string: MapiProxy.pdb@ source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, MapiProxy.dll.0.dr
    Source: Binary string: f:\bluetooth8.0.1.57\sw\src\WIN8_Mainline\ExtArch\UI\Win7UI\Prism\ObjectBuilder\obj\x64\Release\Microsoft.Practices.ObjectBuilder2.pdb source: 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, Microsoft.Practices.ObjectBuilder2.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.769168280.0000000003060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_732A30C0 push eax; ret
    Source: MapiProxy.dll.0.drStatic PE information: section name: .00cfg
    Source: MapiProxy.dll.0.drStatic PE information: section name: .orpc
    Source: fzshellext_64.dll.0.drStatic PE information: section name: .xdata
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_732A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeFile created: C:\Users\user\AppData\Local\Temp\lang-1071.dllJump to dropped file
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeFile created: C:\Users\user\AppData\Local\Temp\Microsoft.Practices.ObjectBuilder2.dllJump to dropped file
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeFile created: C:\Users\user\AppData\Local\Temp\nsw5376.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeFile created: C:\Users\user\AppData\Local\Temp\fzshellext_64.dllJump to dropped file
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeFile created: C:\Users\user\AppData\Local\Temp\MapiProxy.dllJump to dropped file
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeRDTSC instruction interceptor: First address: 00000000030605BA second address: 00000000030605BA instructions: 0x00000000 rdtsc 0x00000002 cmp edx, eax 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F6550733354h 0x00000008 inc ebp 0x00000009 test bh, bh 0x0000000b inc ebx 0x0000000c test cl, dl 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lang-1071.dllJump to dropped file
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Microsoft.Practices.ObjectBuilder2.dllJump to dropped file
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\fzshellext_64.dllJump to dropped file
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MapiProxy.dllJump to dropped file
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_732A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    1
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    72EED30398363-0983BNDJ0398763536.exe10%VirustotalBrowse
    72EED30398363-0983BNDJ0398763536.exe5%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\MapiProxy.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\MapiProxy.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\MapiProxy.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Microsoft.Practices.ObjectBuilder2.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\Microsoft.Practices.ObjectBuilder2.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\fzshellext_64.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\fzshellext_64.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\fzshellext_64.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\lang-1071.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\lang-1071.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\lang-1071.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsw5376.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsw5376.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
    http://www.avast.com0/0%URL Reputationsafe
    http://ocsp.sectigo.com00%URL Reputationsafe
    http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
    https://mozilla.org00%URL Reputationsafe
    https://sectigo.com/CPS0C0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, fzshellext_64.dll.0.drfalse
    • URL Reputation: safe
    unknown
    http://www.avast.com0/72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, 72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.762548137.000000000040A000.00000004.00000001.01000000.00000003.sdmp, lang-1071.dll.0.drfalse
    • URL Reputation: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorError72EED30398363-0983BNDJ0398763536.exefalse
      high
      http://ocsp.sectigo.com072EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, fzshellext_64.dll.0.drfalse
      • URL Reputation: safe
      unknown
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, fzshellext_64.dll.0.drfalse
      • URL Reputation: safe
      unknown
      https://mozilla.org072EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, MapiProxy.dll.0.drfalse
      • URL Reputation: safe
      unknown
      https://sectigo.com/CPS0C72EED30398363-0983BNDJ0398763536.exe, 00000000.00000002.765958699.000000000278D000.00000004.00000800.00020000.00000000.sdmp, fzshellext_64.dll.0.drfalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:632155
      Start date and time: 23/05/202211:35:562022-05-23 11:35:56 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 33s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:72EED30398363-0983BNDJ0398763536.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:29
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal60.troj.evad.winEXE@1/14@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 62.8% (good quality ratio 61.6%)
      • Quality average: 88.9%
      • Quality standard deviation: 21%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Adjust boot time
      • Enable AMSI
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, www.bing.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, time.windows.com, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      11:37:05API Interceptor1x Sleep call for process: 72EED30398363-0983BNDJ0398763536.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):188
      Entropy (8bit):5.284749695608875
      Encrypted:false
      SSDEEP:3:ejHERMQnFkViJS4RKbuviyiboBz5/Wo0WcL0yEyQEmkQV+Y7aMAUKl+HJDuMBXFQ:ejHyaVic4subiWzFWo1DhkQwY7hAUKms
      MD5:A1D0F1E580E02348560D8D7CB2A5A773
      SHA1:62A3B544C463CD164077BF00CFDDE45A92C8CDFA
      SHA-256:9E99E7F8983E7AFA447808263F0D539092DDCC9BD2D08DEC3955456DE3D82F0B
      SHA-512:69962F2E8201089F25EEC027443AC20DDB7F512ECAF65CC8964F68710FBD8CED2789EA946E30E3EB7ABA8FDD3A9B90842A6861D3F14F8EA96F9BE9D556EAAE9D
      Malicious:false
      Reputation:low
      Preview:<Application xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">..<VisualElements...BackgroundColor="black"...ShowNameOnSquare150x150Logo="on"...ForegroundText="light"/>..</Application>
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
      Category:dropped
      Size (bytes):9184
      Entropy (8bit):7.883950548629578
      Encrypted:false
      SSDEEP:192:oXRe/9ug6TLD7hE6T18DBHuJMlvNGi7aWCndwcKMwVof4aBLodMI:KRe/UfD1E658DFucGi2tdEILodMI
      MD5:8DF53262DD7366ACC7CA948D11197771
      SHA1:3902822B1E93424F83731C8FE0FCC0C6B25E5CA7
      SHA-256:744D858D6C6A7B6E771A5B2D09A0DE81DF56BA28DCC15BA803871A97513C345C
      SHA-512:0BD2C0D7CC5A82EABABA1A9820C4D1905ABD00416B20C995AD26869B3A38246A9808BA879FA90435C559AC574793FB4E79785C6E023CE0A242DD90BA4FE29578
      Malicious:false
      Reputation:low
      Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....Q..?`.......?.g.m...^$....K.K\./.t..F...q#2M<.#.c.U..P0F......1....Z.]....y..kxs...*=.&A.-..........].Z.3...?...6..q.._....z....Q>...].V....E.*.../Pq...F....:u#h7...8.T.NW..'...O.%...&..7.....*.......~...'.~.bo.%G..2.}...8~..S.5...C.r.....<.U..w....o..=.nW.9#.....H....u...om....L....1U.y....<..
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):20920
      Entropy (8bit):6.270129738401503
      Encrypted:false
      SSDEEP:384:35kgh9IGJLE8rIYcnuYPBkvDG/Ghu4aX9lw:pkM9IG9EWIYyusqDGehuDXvw
      MD5:22ACDFF46574615C4EBF05E223A15899
      SHA1:45A3ACFE2D98A8AED780F0A323DA8B2BE366D2B6
      SHA-256:3089869E2C5691A16E1CF677BAB0A9148B688FBC6B69BB9AF949DD5AC009B063
      SHA-512:9D689705A5737F557B8FCC84DB49E1B36EE8E527D8150DA5E8766BA50298CA0791224E90C7DADF9D930EFD4D0E113E387496F03F672C865E6A5785D12C7859BE
      Malicious:false
      Antivirus:
      • Antivirus: Virustotal, Detection: 0%, Browse
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:moderate, very likely benign file
      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....#b.........."!................`................................................t....@A.........................'.......(..d....`..x............2.......p.......&..............................H&...............)...............................text...~........................... ..`.rdata..D.... ......................@..@.data........0.......$..............@....00cfg.......@.......&..............@..@.orpc...<....P.......(.............. ..`.rsrc...x....`.......*..............@..@.reloc.......p.......0..............@..B................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):63104
      Entropy (8bit):5.896544515767483
      Encrypted:false
      SSDEEP:1536:gmnKEGwDMO8sr1HmWaCoTcmfN/YYFH0CUYyFB6yhvfQvDYXX:LnKEGMDAcmfUF3Q7YXX
      MD5:BA1836B308145CB718436BDB13AEEE22
      SHA1:DB1058FB7CF495F41DE09EE7B851C6689498AB71
      SHA-256:CCD5DE1DB4C4BAA22EAC952A83CEC144A1038556959255E5EB202E0C8C1C4C66
      SHA-512:3F06969280877BE4828A5070BB43461AE63B9110A6192BAD3A9C9390A12AF47E44024D06A7E5243A5FD5F659910199F8D5157055C15C605EFA8287E9075D1AFF
      Malicious:false
      Antivirus:
      • Antivirus: Virustotal, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...G..S.........." ..................... .....@..... ....................... .......}....@...@......@............... ..................................@............................................................................................ ..H............text...{.... ...................... ..`.rsrc...@...........................@..@.reloc....... ......................@..BH........j..<............`.......................................................0..-........oC...(.......(....%-.&..(......,....(....*.*....0..m........sT.....o.........+O......(..........8...o.......o......o@.....o...+.o@....oC....(d.....oE......X.......i2..*J......(.....o....*.0..s........o....(...+~ ...-....!...s".... ...~ ...o#...o$......i..E............+..*...*(%...(..............o&.....('...s(...z..0..w........o......s)...(...+..i..E............+..*...*...o.....i....o.....i.3/
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x786, frames 3
      Category:dropped
      Size (bytes):782753
      Entropy (8bit):7.972739118836816
      Encrypted:false
      SSDEEP:12288:1xE6g9kiViGNq+W6nQNIDO0tVGb34eaR6fUnMlkTFztQywzV0jyB4Dl9l+qfkwPN:7E6G3VibpHIdebodR6jlKFtQVUv+iP8S
      MD5:E269DECCAC13CF01A0377872E79BC676
      SHA1:54D196FDE9529310F9E5A3EBA6548DAB4F179542
      SHA-256:255874E0A6A5CA862CBAE5C783D582729B343C70C5697062D7F1E587F15F25EC
      SHA-512:08ADAD38BE3472CF8814C40F99D6DCFDA313C2FED765B872AA30C0995B027F2BEDABF75DB625F3C40F003A8EFC3F41169CBA4AF706EC637018DEEF02EC92F6CC
      Malicious:false
      Reputation:low
      Preview:......JFIF.....`.`.....XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch..............................................desc........IEC 61966-2.1 Default RGB colour space - sRGB............IEC 61966-2.1 Default RGB colour space - sRGB......................desc.......,Reference Viewing Condition in IEC61966-2.1...........,Reference Viewing Condition in IEC61966-2.1........
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:data
      Category:dropped
      Size (bytes):96538
      Entropy (8bit):7.127885129617323
      Encrypted:false
      SSDEEP:1536:QLcub+0B+L4nRYjPjhDxPA0Z8sHmIYnlklScwN2hUrVMr01Rt:QXb+U5nRYjLl5A0RHInlpcN2Eo
      MD5:BE404281EAEDF107215373147BD63124
      SHA1:21677AF0A0E1C95E1F5444DB62858E022F7A625F
      SHA-256:676542C7435A8B1D2984027E2B10D47A3403179BA355D6BA2761D056754B4226
      SHA-512:678725B6869F362A85E0000EA7F5669145F1CFE20990CB78E20F3E0BE156FA3C8A315CEE257E765783C3FDCC44B152B944E5FC31F3BF8F7AF8C5363B97DE92BB
      Malicious:false
      Reputation:low
      Preview:...<X..0<:..6......<......&...<..$..-..n.B.....C<.<...}<]...<0<....F...<P..........._<.<...<...N<.<...b......<...`1.<:..`...<]<3...<...<.<...%.....<...<.<y....'<8<..D<....<l<........$.4../8n...<$<`......<S<...4<...(<.<$..............X<8<O..)..l<h<@...<....<.<...........{....u......<t<..!..@<.<...i<....<.<.........h...<n<O......<!<...<...d<x<..............4~9n.~5V........iv......E..=b.m,...S.\...G.F[E.."..|...0C....d._....\..7.P<......a.i4l...Z!U.......Z-.N..M.}r...".2..#.......Y6..............................................................z..GR..V..Q. ../.k..zz.V..+...u........*.x.f.G..g=s.....%..... ...Ckw.....?....~TMw....<]....:A.f..>.e[.+5..6.u4..X.................G"...J......................................^.6...............................................6...................................................T.."..................................................................................................................J.......................
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:SVG Scalable Vector Graphics image
      Category:dropped
      Size (bytes):319
      Entropy (8bit):4.594821675408072
      Encrypted:false
      SSDEEP:6:TMVBd/6o8GUYl/n7S3mc4slLlNkRIhFYV4vtAlaRI1stAlaRIH32tAlBC:TMHdPnnl/nu3tlnTPvWlzyWlzH32WlM
      MD5:494915A7B4C3DFA64D1F4CD789C8CC97
      SHA1:5873C59C31EF784AAE90D8EE0EBCD5BB2FCFB673
      SHA-256:8E229CFBC1B7D593409310662867493B644FA07C68CA60F64018B1CDBC7FAC04
      SHA-512:11BD7CF250A2F45E0FB79906478B3B2AABC8032622A2ED898EDE6E5AB077FDF6ED55DFA1B9EE54BF8E36BB7EC7BD7E533D2F8143DA15E8F7DA9EB9360F4B282B
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8"?>.<svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg">. <g fill="#2e3436">. <path d="m 3 2 h 10 v 2 h -10 z m 0 0"/>. <path d="m 1.003906 7 h 14 v 2 h -14 z m 0 0"/>. <path d="m 5 12 h 6 v 2 h -6 z m 0 0"/>. </g>.</svg>.
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
      Category:dropped
      Size (bytes):28712
      Entropy (8bit):5.958396786343478
      Encrypted:false
      SSDEEP:384:Jw9WI09pPemQKLJO8WwTB4NTRFRz2X9f512mG5dKlLnyrVU9XhGfZyhq:e9WIcGlgJWsZbH3DyiXmyh
      MD5:1438E9F76917193C424B15094683D2EB
      SHA1:85EED842A0F06CBBA53A08A231AF8CBE66BB89DB
      SHA-256:84FFF6EA83E615D85D6BE156A2443AC966A7172A2C5C50727B0D75AE99822EDD
      SHA-512:F8A522814B9277674BDC7B118FE9133CEC3BF521FBD617103565E8EBF5CEF11D66E1C84734000D7DB0441480BD5EEED6AB8D776319D80CE57DCAB46F5D77C44A
      Malicious:false
      Antivirus:
      • Antivirus: Virustotal, Detection: 0%, Browse
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...#."...H......P..........g....................................@^....`... .................................................x............`..T....L..($......|............................R..(....................................................text....!......."..................`.P`.data...`....@.......&..............@.P..rdata.. ....P.......(..............@.`@.pdata..T....`.......0..............@.0@.xdata..0....p.......4..............@.0@.bss..................................`..edata...............8..............@.0@.idata..x............:..............@.0..CRT....X............B..............@.@..tls.................D..............@.@..rsrc................F..............@.0..reloc..|............J..............@.0B................................................................................................................................
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):104272
      Entropy (8bit):4.543275874610095
      Encrypted:false
      SSDEEP:3072:yw4+Ma1g2FYhTaV2NTzgbevXKrmFqYyfZ:y43VqsTT
      MD5:DB49F13C9928754DEAEBBF869638897D
      SHA1:A97B054292DF83EC70697C740955E837B3573653
      SHA-256:B42A530B4DCACA8E43AD71A7E6383273DB29D3660AC0F84FE26AABEC69724EBE
      SHA-512:0CB79A2396A683B8B4CFE634B5CB99F17239CE828174A1B623183A3E1BBB458BD4B77121C019E00444923D97F53ECEC4011AAD86D624BCC6084E64AE7B220B90
      Malicious:false
      Antivirus:
      • Antivirus: Virustotal, Detection: 0%, Browse
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Reputation:moderate, very likely benign file
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.@...R.@.P...R.Rich..R.................PE..L....*j^...........!.........t............................................................@.......................................... ...p...........v..P!...........................................................................................rdata..p...........................@..@.rsrc....p... ...r..................@..@.....*j^........T........................rdata......T....rdata$zzzdbg.... ..P....rsrc$01....P9...W...rsrc$02............................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):244
      Entropy (8bit):6.758520539988057
      Encrypted:false
      SSDEEP:6:6v/lhPys81g2WMTrmv2GxdaTKUWdXhcorhOZXd5bvn0LGp:6v/7c1ZWarYvDa+UWdxcor87bv0g
      MD5:4FD7AA500BD09F4AE3D4D0951D56B095
      SHA1:215730E32EE69DBA4A8CCF190D16903C51803C3C
      SHA-256:B34B352C04C4578B1130C979A3571DBF058BC939CDC45723E479BCE27D80B7A5
      SHA-512:B4EEA2408A0A717EE79DB3BD66DFDA455A67058CF707F5638DF786DADFFEBE0E9DFF508DA6ED235AE5AD73EE82656C1338590910850A046B66ECB82AEE19B036
      Malicious:false
      Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...?jBA......)...!<....y..a.T.H ........g.<X......[|3.3...1.'..oe..(...V.......]~..U.4.....2.\..^....S.....<9.OL.c..K|s.S.Wy.1..|..U..j^i.{(....J..5..E4.V.....2...t.....IEND.B`.
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):195
      Entropy (8bit):6.430880464743636
      Encrypted:false
      SSDEEP:6:6v/lhPysmh8PfdN0KGI78rYLxrXDvSIKyVirp:6v/7G2PX0Xh8xKIlk
      MD5:DA925495872960113430706C4C2EC1D7
      SHA1:4B32A4996BA978F85E59A6F680BD7284FA5CEF25
      SHA-256:6163611AC321BBD145F39CA05A7B55F38C54D22D9A5E0898DA72E6E1200FA26B
      SHA-512:3F9FAC6703682550CC259CD2A2EEEF47CAF2C87A851D08B89C4C0CB4D9829652B9851EB71F62D8B27CD079BDFCC2B683368D14A12A3D94C32290D8C80B71D089
      Malicious:false
      Preview:.PNG........IHDR................a....sBIT....|.d....zIDAT8.....P.E...&.........e.....C$Rh.r.(.?O..m=...<qA...3NXg...]. ......p.&+.&......o..)..F.h....x....>.K.i.Q..3......a..(o:....IEND.B`.
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:SVG Scalable Vector Graphics image
      Category:dropped
      Size (bytes):1260
      Entropy (8bit):4.838834785988535
      Encrypted:false
      SSDEEP:24:t4CpQOpbZmi4vxMgThS3UunhEXJaTAjpw4AeWrGMyWd3vCmLyxmhwLsBBL03PhXB:2yOxMgTihkWAjG4Ae3MZtOmh+4BLtYxH
      MD5:03A35EC7CB5A202A491FB84A5EACE46E
      SHA1:476405E7FAEE6B36C7F955CFA09FE304E50BD6D3
      SHA-256:C5154D6254D127A9DF95CAC18364FE23E124BC9D66A84B59CC269FA51CEC18B9
      SHA-512:7439E4020259B4850F4EC208B0EFB10611479DE4F80619D47DCD4E9F94DF1FCB1BBC2B416DC084D44D06E30ADF30A2A16B3E66C9D374FFBC7B49920EC6F91E1C
      Malicious:false
      Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M10 1v1c0 .257.13.529.313.719L11.593 4H8.23a4.034 4.034 0 013.273 2h.123l-.074.078c.27.495.449 1.047.482 1.647l.002.029v.027c0 .265-.021.516-.052.762L15.406 5 11.75 1.281C11.552 1.091 11.31 1 11 1zM7 4c-.294-.004-.559.15-.746.371.416-.2.871-.321 1.348-.371zM4.068 7.406L.594 11l3.656 3.719c.198.19.44.281.75.281h1v-1c0-.257-.13-.529-.312-.719L4.406 12h1.971a1.723 1.723 0 01-.34-1.04 2.77 2.77 0 01.18-.96H4.375l.98-1.031H4.09l-.053-.944a3.717 3.717 0 01.031-.619z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" color="#000" font-weight="400" font-family="Sans" overflow="visible" opacity=".35"/><path d="M7.848 4.969c1.642-.092 3.096 1.17 3.188 2.812 0 1.402-.378 1.922-1.594 2.844-.191.144-.326.25-.375.313-.05.062-.031.033-.031.03.007.529-.472 1-1 1-.529 0-1.007-.471-1-1 0-.502.224-.943.468-1.25a3.82 3
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:modified
      Size (bytes):12288
      Entropy (8bit):5.814115788739565
      Encrypted:false
      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
      MD5:CFF85C549D536F651D4FB8387F1976F2
      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
      Malicious:false
      Antivirus:
      • Antivirus: Metadefender, Detection: 3%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):327
      Entropy (8bit):7.015504476308313
      Encrypted:false
      SSDEEP:6:6v/lhPyshpTgb5VYwsMgZx9dumoUd+g2n7dbfMdHegZQy2SxpqliJv/Ct5r1qt7p:6v/7Mb52YKdUTgZQlRv5m
      MD5:B23317C72FF4A53029CEBBA876561AE1
      SHA1:5127AF4C76241B78CF253AF98DF35594B0693B2D
      SHA-256:07488F4DCE56A1DE0ED909541581A63B0498663DDF532707BFD01D77224A1D31
      SHA-512:CE4E5C61EBB736688E437330B65192E4A53703128299B067569E5E56281284A8592FD8C0C88B1CE4052CFB8F2C2BD6A129074BAA649D06DBF7F314C4ADB32091
      Malicious:false
      Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...;J.A....j. ...{.x...}.{.=...x...(.... "..gpU.._..M;3+XPt.W5..j.i.K......N.,...c.h..d..p.',..V...8.........@+..........1.....S.M......2......b;.."....#.....M.%.!..?..b}L..X..7U..F.....^.#l6...~.T^..\.....l..8..'V...M.T.3....Y..............OD.,.P....IEND.B`.
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Entropy (8bit):7.738214112700285
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:72EED30398363-0983BNDJ0398763536.exe
      File size:1141532
      MD5:511ad0297cd3e268e8d0c53c1207dc95
      SHA1:aa466a3c5fb1a4c3ae77835fc3d592e8f7a0679b
      SHA256:c527fc06df0bca1fe6ef47ff82e1a858af8b50877d97446c7898e5d1a80146a3
      SHA512:1667daacf36e47caf1a061fc9725a0692317def2b0c2c0017ebf5ca75046501dc107ec94a0ddd74ac11c7d9bbbe7c5cc16c163ba5aac5879ba6c8469ba079924
      SSDEEP:24576:kY8XnAQGPnlkfWFUK0jqyUEcq7mGLtxSdrHYZ8OI6LG5P4dNg:tHQGNYWFUJuyUA6tdTnO5i5wdu
      TLSH:85351261B336C40FD442E93D1B5FD3994AABAC502F69CDD63210AB8FAE346046F497B4
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
      Icon Hash:78f8a4d9f47eb95a
      Entrypoint:0x403640
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:61259b55b8912888e90f516ca08dc514
      Instruction
      push ebp
      mov ebp, esp
      sub esp, 000003F4h
      push ebx
      push esi
      push edi
      push 00000020h
      pop edi
      xor ebx, ebx
      push 00008001h
      mov dword ptr [ebp-14h], ebx
      mov dword ptr [ebp-04h], 0040A230h
      mov dword ptr [ebp-10h], ebx
      call dword ptr [004080C8h]
      mov esi, dword ptr [004080CCh]
      lea eax, dword ptr [ebp-00000140h]
      push eax
      mov dword ptr [ebp-0000012Ch], ebx
      mov dword ptr [ebp-2Ch], ebx
      mov dword ptr [ebp-28h], ebx
      mov dword ptr [ebp-00000140h], 0000011Ch
      call esi
      test eax, eax
      jne 00007F6550CBC4BAh
      lea eax, dword ptr [ebp-00000140h]
      mov dword ptr [ebp-00000140h], 00000114h
      push eax
      call esi
      mov ax, word ptr [ebp-0000012Ch]
      mov ecx, dword ptr [ebp-00000112h]
      sub ax, 00000053h
      add ecx, FFFFFFD0h
      neg ax
      sbb eax, eax
      mov byte ptr [ebp-26h], 00000004h
      not eax
      and eax, ecx
      mov word ptr [ebp-2Ch], ax
      cmp dword ptr [ebp-0000013Ch], 0Ah
      jnc 00007F6550CBC48Ah
      and word ptr [ebp-00000132h], 0000h
      mov eax, dword ptr [ebp-00000134h]
      movzx ecx, byte ptr [ebp-00000138h]
      mov dword ptr [0042A318h], eax
      xor eax, eax
      mov ah, byte ptr [ebp-0000013Ch]
      movzx eax, ax
      or eax, ecx
      xor ecx, ecx
      mov ch, byte ptr [ebp-2Ch]
      movzx ecx, cx
      shl eax, 10h
      or eax, ecx
      Programming Language:
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x740000x28488.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
      .ndata0x2b0000x490000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x740000x284880x28600False0.342685758514data4.39207892807IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_ICON0x743580x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
      RT_ICON0x84b800x94a8dataEnglishUnited States
      RT_ICON0x8e0280x5488dataEnglishUnited States
      RT_ICON0x934b00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 8454136, next used block 4294967167EnglishUnited States
      RT_ICON0x976d80x25a8dataEnglishUnited States
      RT_ICON0x99c800x10a8dataEnglishUnited States
      RT_ICON0x9ad280x988dataEnglishUnited States
      RT_ICON0x9b6b00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
      RT_DIALOG0x9bb180x100dataEnglishUnited States
      RT_DIALOG0x9bc180x11cdataEnglishUnited States
      RT_DIALOG0x9bd380xc4dataEnglishUnited States
      RT_DIALOG0x9be000x60dataEnglishUnited States
      RT_GROUP_ICON0x9be600x76dataEnglishUnited States
      RT_VERSION0x9bed80x270dataEnglishUnited States
      RT_MANIFEST0x9c1480x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
      DLLImport
      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
      DescriptionData
      LegalCopyrightCopyright 2018 Google LLC
      FileVersion1.3.36
      CompanyNameGoogle LLC
      LegalTrademarks
      Comments
      ProductNameGoogle Update
      FileDescriptionGoogle Update Setup
      Translation0x0409 0x04b0
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found
      No statistics
      Target ID:0
      Start time:11:37:01
      Start date:23/05/2022
      Path:C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe"
      Imagebase:0x400000
      File size:1141532 bytes
      MD5 hash:511AD0297CD3E268E8D0C53C1207DC95
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.769168280.0000000003060000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low

      No disassembly