Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Babar.54324.15185.5956

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Babar.54324.15185.5956 (renamed file extension from 5956 to exe)
Analysis ID:632476
MD5:e38395c6adc5d8246a0e79b0575d72f3
SHA1:5f7492363ed7cec703530144e73b81d727a01d4c
SHA256:13562490d9481fa2846b45c602117c042c7311737f3b8c5fcf0607861a4109de
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
PE / OLE file has an invalid certificate
PE file contains more sections than normal
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Payload URL": "http://185.222.57.79/SALES/NEW%20SERVER_KeqToKFS234.bin"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.957171072.00000000030E1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000002.00000002.957171072.00000000030E1000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://185.222.57.79/SALES/NEW%20SERVER_KeqToKFS234.bin"}
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeVirustotal: Detection: 22%Perma Link
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeReversingLabs: Detection: 19%
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\IntrigeredesJump to behavior
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: hmmapi.pdb source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, hmmapi.dll.2.dr
    Source: Binary string: f:\bluetooth8.0.1.57\sw\src\WIN8_Mainline\ExtArch\Bin\x64\Release\atheros Outlook Addin.pdb source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, atheros Outlook Addin.dll.2.dr
    Source: Binary string: hmmapi.pdbGCTL source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, hmmapi.dll.2.dr
    Source: Binary string: d:\Projects\AirVPN\Repo\eddie-air\src\Lib.Platform.Windows\obj\x64\Release\Lib.Platform.Windows.pdb source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.dr
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_0040699E FindFirstFileW,FindClose,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://185.222.57.79/SALES/NEW%20SERVER_KeqToKFS234.bin
    Source: pan-end-symbolic-rtl.svg.2.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drString found in binary or memory: http://creativecommons.org/ns#
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drString found in binary or memory: http://creativecommons.org/ns#Attribution
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drString found in binary or memory: http://creativecommons.org/ns#DerivativeWorks
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drString found in binary or memory: http://creativecommons.org/ns#Distribution
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drString found in binary or memory: http://creativecommons.org/ns#Notice
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drString found in binary or memory: http://creativecommons.org/ns#Reproduction
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drString found in binary or memory: http://creativecommons.org/ns#ShareAlike
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: http://ocsp.comodoca.com0
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: http://ocsp.sectigo.com0
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: http://s.symcd.com06
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: https://d.symcb.com/cps0%
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: https://d.symcb.com/rpa0
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: https://d.symcb.com/rpa0.
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: https://eddie.website
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: https://eddie.website/windows-runtime/
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: https://eddie.websiteX
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: https://sectigo.com/CPS0
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drString found in binary or memory: https://sectigo.com/CPS0D
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: Lib.Platform.Windows.dll.2.drStatic PE information: No import functions for PE file found
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLib.Platform.Windows.dllP vs SecuriteInfo.com.Variant.Babar.54324.15185.exe
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOutlook Addin.DLLD vs SecuriteInfo.com.Variant.Babar.54324.15185.exe
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHMMAPI.DLLD vs SecuriteInfo.com.Variant.Babar.54324.15185.exe
    Source: hmmapi.dll.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: hmmapi.dll.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: hmmapi.dll.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: atheros Outlook Addin.dll.2.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_00406D5F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_731D1BFF
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeStatic PE information: invalid certificate
    Source: closure.dll.2.drStatic PE information: Number of sections : 19 > 10
    Source: libshishi-0.dll.2.drStatic PE information: Number of sections : 11 > 10
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeProcess Stats: CPU usage > 98%
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeVirustotal: Detection: 22%
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeReversingLabs: Detection: 19%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeJump to behavior
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile created: C:\Users\user\AppData\Local\Temp\nsi12F4.tmpJump to behavior
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: <?xml version='1.0' encoding='UTF-8' standalone='no'?> <svg xmlns:cc='http://creativecommons.org/ns#' xmlns:dc='http://purl.org/dc/elements/1.1/' sodipodi:docname='pan-start-symbolic.svg' inkscape:export-filename='/home/sam/source-symbolic.png' inkscape:export
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeString found in binary or memory: <?xml version='1.0' encoding='UTF-8' standalone='no'?><svg xmlns:cc='http://creativecommons.org/ns#' xmlns:dc='http://purl.org/dc/elements/1.1/' sodipodi:docname='pan-start-symbolic.svg' inkscape:export-filename='/home/sam/source-symbolic.png' inkscape:export
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile written: C:\Users\user\AppData\Local\Temp\Kartotekiseredes227.iniJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/13@0/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\IntrigeredesJump to behavior
    Source: SecuriteInfo.com.Variant.Babar.54324.15185.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: hmmapi.pdb source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, hmmapi.dll.2.dr
    Source: Binary string: f:\bluetooth8.0.1.57\sw\src\WIN8_Mainline\ExtArch\Bin\x64\Release\atheros Outlook Addin.pdb source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, atheros Outlook Addin.dll.2.dr
    Source: Binary string: hmmapi.pdbGCTL source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, hmmapi.dll.2.dr
    Source: Binary string: d:\Projects\AirVPN\Repo\eddie-air\src\Lib.Platform.Windows\obj\x64\Release\Lib.Platform.Windows.pdb source: SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000002.00000002.957171072.00000000030E1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_731D30C0 push eax; ret
    Source: libshishi-0.dll.2.drStatic PE information: section name: .xdata
    Source: closure.dll.2.drStatic PE information: section name: .xdata
    Source: closure.dll.2.drStatic PE information: section name: /4
    Source: closure.dll.2.drStatic PE information: section name: /19
    Source: closure.dll.2.drStatic PE information: section name: /31
    Source: closure.dll.2.drStatic PE information: section name: /45
    Source: closure.dll.2.drStatic PE information: section name: /57
    Source: closure.dll.2.drStatic PE information: section name: /70
    Source: closure.dll.2.drStatic PE information: section name: /81
    Source: closure.dll.2.drStatic PE information: section name: /92
    Source: hmmapi.dll.2.drStatic PE information: 0xC7629E79 [Wed Jan 1 18:31:21 2076 UTC]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_731D1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile created: C:\Users\user\AppData\Local\Temp\nso144E.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile created: C:\Users\user\AppData\Local\Temp\libshishi-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile created: C:\Users\user\AppData\Local\Temp\hmmapi.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile created: C:\Users\user\AppData\Local\Temp\atheros Outlook Addin.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile created: C:\Users\user\AppData\Local\Temp\Lib.Platform.Windows.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeFile created: C:\Users\user\AppData\Local\Temp\closure.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeRDTSC instruction interceptor: First address: 00000000030E27E1 second address: 00000000030E27E1 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F55ACAA8DCAh 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libshishi-0.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\hmmapi.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\atheros Outlook Addin.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Lib.Platform.Windows.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\closure.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_731D1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exeCode function: 2_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Command and Scripting Interpreter
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default Accounts1
    Native API
    Boot or Logon Initialization Scripts1
    Windows Service
    1
    Obfuscated Files or Information
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Timestomp
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Variant.Babar.54324.15185.exe22%VirustotalBrowse
    SecuriteInfo.com.Variant.Babar.54324.15185.exe20%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\Lib.Platform.Windows.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\Lib.Platform.Windows.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\atheros Outlook Addin.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\atheros Outlook Addin.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\closure.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\closure.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\hmmapi.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\hmmapi.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\libshishi-0.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\libshishi-0.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nso144E.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nso144E.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://185.222.57.79/SALES/NEW%20SERVER_KeqToKFS234.bin0%Avira URL Cloudsafe
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
    https://sectigo.com/CPS00%URL Reputationsafe
    http://ocsp.sectigo.com00%URL Reputationsafe
    https://eddie.website0%Avira URL Cloudsafe
    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
    https://sectigo.com/CPS0D0%URL Reputationsafe
    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
    http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
    https://eddie.websiteX0%Avira URL Cloudsafe
    https://eddie.website/windows-runtime/0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://185.222.57.79/SALES/NEW%20SERVER_KeqToKFS234.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://creativecommons.org/ns#DerivativeWorksSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drfalse
      high
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
      • URL Reputation: safe
      unknown
      https://sectigo.com/CPS0SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
      • URL Reputation: safe
      unknown
      http://creativecommons.org/licenses/by-sa/4.0/pan-end-symbolic-rtl.svg.2.drfalse
        high
        http://creativecommons.org/ns#DistributionSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drfalse
          high
          http://ocsp.sectigo.com0SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
          • URL Reputation: safe
          unknown
          https://eddie.websiteSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
          • URL Reputation: safe
          unknown
          http://creativecommons.org/ns#AttributionSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drfalse
            high
            https://sectigo.com/CPS0DSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
            • URL Reputation: safe
            unknown
            http://creativecommons.org/ns#ShareAlikeSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drfalse
              high
              http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
              • URL Reputation: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Variant.Babar.54324.15185.exefalse
                high
                http://creativecommons.org/ns#NoticeSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drfalse
                  high
                  http://creativecommons.org/ns#ReproductionSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drfalse
                    high
                    http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
                    • URL Reputation: safe
                    unknown
                    https://eddie.websiteXSecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://eddie.website/windows-runtime/SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, Lib.Platform.Windows.dll.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://creativecommons.org/ns#SecuriteInfo.com.Variant.Babar.54324.15185.exe, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956635435.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Babar.54324.15185.exe, 00000002.00000002.956875325.00000000027E6000.00000004.00000800.00020000.00000000.sdmp, pan-end-symbolic-rtl.svg.2.drfalse
                      high
                      No contacted IP infos
                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:632476
                      Start date and time: 23/05/202217:49:232022-05-23 17:49:23 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 7m 54s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:SecuriteInfo.com.Variant.Babar.54324.15185.5956 (renamed file extension from 5956 to exe)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:15
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal72.troj.evad.winEXE@1/13@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 62.8% (good quality ratio 61.6%)
                      • Quality average: 88.9%
                      • Quality standard deviation: 21.3%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Override analysis time to 240s for sample files taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                      • Not all processes where analyzed, report is missing behavior information
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
                      Category:dropped
                      Size (bytes):8890
                      Entropy (8bit):7.902794572032304
                      Encrypted:false
                      SSDEEP:192:oXRTwBZ3py0gEFl4QzKkOF37CEGgOCr8DHO2t+MIO0:KR0zM0b4MO57f2HI/
                      MD5:9BF544F8C49DB9355A2BAEDFEF09041B
                      SHA1:C0A48DC2DBE5B5D747DC625D95B7FCA2CC5C18F1
                      SHA-256:45B807565DBDF778C302980D078DDDA68F807BC0CCABE945AD0219AD4EC7EE6F
                      SHA-512:8EA515996139FC54EA32DEBC79B432552F32B11154447F4BB5F15AB3770706A6430C8ACC56ADD66C1C0C15A42855E12D09A730086208C10BBBC0CDB3440CED8A
                      Malicious:false
                      Reputation:low
                      Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(....h..O.....ko..o.H.......b.....C..Z]..4..O.4..a..g.<q.Y%.b........?.~...|a.._.?j..pX...3..[.....[{K.-..l .#.0w`..........?`..r\......~..n..(m.....>.%.H.H..k.2H....U.Q.Z...C[.4={..k....k7./..no...w..@.c..2...x.4D...|-lV3...%....UO...q...9/..o_./|/e........\u3j:../.e....
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:HTML document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1245
                      Entropy (8bit):5.462849750105637
                      Encrypted:false
                      SSDEEP:24:hM0mIAvy4Wvsqs1Ra7JZRGNeHX+AYcvP2wk1RjdEF3qpMk5:lmIAq1UqsziJZ+eHX+AdP2TvpMk5
                      MD5:5343C1A8B203C162A3BF3870D9F50FD4
                      SHA1:04B5B886C20D88B57EEA6D8FF882624A4AC1E51D
                      SHA-256:DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F
                      SHA-512:E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>404 - File or directory not found.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="co
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):43
                      Entropy (8bit):4.711034812791319
                      Encrypted:false
                      SSDEEP:3:tALumaA7DBlg3h2W:9mh7DBlgR2W
                      MD5:D66AEC5883C1C7C90DF865D87C95F29D
                      SHA1:2B49EF4FEA08DA89F8E30FA2FE72044DD80715AC
                      SHA-256:C44D6FA4AE94E1CE29BD31A2B0D3F219291013BAF56926B6984057408F0F4DDA
                      SHA-512:E6BE1AD6B7A210D23E0CFF1A06A75B6AA95094B8243A47D38B35333450A701E6A54586100C70655177528215CED6F0CA8B813EF4478DF25F12506C67D08EC6DC
                      Malicious:false
                      Reputation:low
                      Preview:[phoenicopteroid]..bandwagons=INTERDEVOUR..
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):80104
                      Entropy (8bit):5.793283684559887
                      Encrypted:false
                      SSDEEP:1536:K/5hHa1L4PVIDyCyphcvziBJGqiah1OArUCjLwbioQ+EquK0S:8a4PVZhRnTfhfjOYK0S
                      MD5:8C57E078ADB265F93B35509A2AF887C4
                      SHA1:790D5A94A25BAC71B7DBB991E6FA57675953C47D
                      SHA-256:6E1E391675BF8DE47128F249E2081E110A9D42AC6A215C0966CA33871E5CFF08
                      SHA-512:59674B60AE7E8DF8D693F97EC4EB240268E006FCD4FAAF65FFD5B043B1C895DC96DEF99BDEED6D5E75774E8D28F4A4DBBF2F9455E572B7368193866F2E5AE43E
                      Malicious:false
                      Antivirus:
                      • Antivirus: Metadefender, Detection: 0%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....J`.........." ..0.................. ........... .......................`............`...@......@............... ...............................@..@................$..........8)............................................................... ..H............text...p.... ...................... ..`.rsrc...@....@......................@..@........................................H..........p............................................................0..1........r...p.(....(......,..o.......r...p...&r...p....*...........&&.......0...........r...p.(......(.......&.....*....................0...........r...p.(......(.......&.....*....................0../............(....,..s......o....(........,..o......*.*..........!.......0..O........{p...(......{y...(........{t...~....(....,..{t....{s....[(......{o......s....*..0..........(.....o.....i ....1.r...pr...ps....z
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):134271
                      Entropy (8bit):4.0748524129258925
                      Encrypted:false
                      SSDEEP:768:6tKZn64LTWtvvBHh2ZCa6HdDWe165ZRqxlVed04JlU1UinKAX:iKdZObk4Hx163mid04JlWKAX
                      MD5:9610DEB786445479C35EB297705458C2
                      SHA1:AF97314272125B9269A322EC02E20D7AF526B648
                      SHA-256:6CDFCCD27222EEF295E633718BB38E1A8B7E7B714A271A47B85D7D6321AAF84B
                      SHA-512:467A2139F4EDAD2A3E8533AFF7A06F7BDF564CC0B1125F9F01EC1E96A2BF7F4B82B284058064E23437D044DB7C1BDF8A1C0DC93320CAF8F19310AA69093D7358
                      Malicious:false
                      Reputation:low
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):298624
                      Entropy (8bit):6.269232791084664
                      Encrypted:false
                      SSDEEP:6144:HOesoIkCHhQ0kKIxPqv5Tka7LEAz6i3OmLt805yq:HBsoIkCHJIxSvSQTr
                      MD5:BB7F2EF2B58BBF4D7ECDCD9A48541178
                      SHA1:416D7554341A2B6FAF9AF77B70C3C66C80944CE4
                      SHA-256:4A660CC2451541735C0016E8C4EBD25E2B8F72F4716BD538E5A94D31573B59E8
                      SHA-512:54AB3EB3451409B1E5B1ADFA099B1CC12FB0DA960E00FC39C7DE08E69D6F60A35E0829606172CDAE1EE68557FEDE3A55CA289B173FCF6559481C29420E0C878C
                      Malicious:false
                      Antivirus:
                      • Antivirus: Metadefender, Detection: 0%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........w.;...;...;... ...^... ...0.....:.....9... ...?...;.........*...T.>... ....... ...:... ...:... ...:...Rich;...........................PE..d......S.........." .................................................................v....@.................................................P................p.../...................................................................................................text...6........................... ..`.rdata..R...........................@..@.data....I... ...&..................@....pdata.../...p...0..................@..@.rsrc................^..............@..@.reloc...............v..............@..B................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):109361
                      Entropy (8bit):5.19826934240468
                      Encrypted:false
                      SSDEEP:1536:cGRJrHTv6gKgj92h8P0fD29nSW/Gqdf/APrFDl:rzTv6/+ZP0fvW/GywrFDl
                      MD5:040ACF35CB3E35A060E360CAC56E4030
                      SHA1:E30420DD63483A09F2E3AA1ACFF01651EDCCC351
                      SHA-256:085F3B562D7179330F3B0B3F83248C8398285906631128D5C375FE7A92D30044
                      SHA-512:0DBA347F86D8C18C4817AE669F15B781B33F7DC3832A1DD147F5265A15196B135B6E1B35FB08E3518377EA052D662DA3374921BE28848F064ECEF40E7345F14A
                      Malicious:false
                      Antivirus:
                      • Antivirus: Metadefender, Detection: 0%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...pL.`.R........& ...$.....L......P....................................................`... .........................................S....................`..................x............................Q..(...................$................................text....,..........................`.P`.data...@....@.......4..............@.`..rdata.......P.......6..............@.`@.pdata.......`.......>..............@.0@.xdata..p....p.......B..............@.0@.bss..................................`..edata..S............F..............@.0@.idata...............H..............@.0..CRT....X............L..............@.@..tls.................N..............@.@..reloc..x............P..............@.0B/4...................R..............@.PB/19.....C............V..............@..B/31..........p......................@..B/45.............. ..................@..B/57.....
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):702
                      Entropy (8bit):7.640018483476896
                      Encrypted:false
                      SSDEEP:12:6v/7Tdft6A2zLZefK95nckjwEeWiiyooNVCDZJD2woV9p7G6P9:EkfKK95HneWEoO8DDDoRi0
                      MD5:B42041E3558DD9A522AEC500AE792A07
                      SHA1:8419545EE5CC7F4E6F2E175CDAEF9A32699EFB6A
                      SHA-256:422A8BE2374396D7BC1B9D0FF33F04F48BE7A1367F1D72A76533FE88A414E9D4
                      SHA-512:A6BD0AC4D00B351289D3D080DB0DB156397605F65EF716164271140A49D773987B640A0767F92D3DAAB4BA5235DE1D1D130B8FC65E18EA11F092E747BFF9164A
                      Malicious:false
                      Preview:.PNG........IHDR................a....IDATx.e....Q....fm......ul.q..Im.m.X..fw......?.vG..$.]..(J....8..&.+......L#....i.....\?OT...]....I.>.[...3....%......6.k../.}.;....E....?....Y...).8.Q.......9X.j.}..|_..?.._....>.<%...?..n7...*et..$.f!.i>..Z....+W.?. ....l...P..`=..C..Q...K`..!B...Tl..g.`F. ....P..g.$...........,Q......0.U..-Ja.........h.....D`........DJ@....t...I.z..?.0.v.Uc..i.....K..~;/?...l..]._...W..wr."...$.R"n..H......l.V...VmP.{7<.Btho...h..@....$......z.`x...z....i3.m.$.<..R.V.Ij.>..z`..:ub.:u......^V\Q\....K../...i.....V..zpb...k..R..<...Y!xNJ[.v.i...:......-......W/qF...M..|..<^....-..A.*<2.0.w...Q...!..R6'...5..L`......."\.6........IEND.B`.
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):53760
                      Entropy (8bit):4.92959064709346
                      Encrypted:false
                      SSDEEP:768:q0ud2cqEUqOVwptfCZJMj0O6LvOFKrdjciUw0n:q0jcqEURwptf1
                      MD5:DE3C51584774AD450ED49715BEC1E389
                      SHA1:EA7AE3B2943F330EE25547C9AAF56738F9D8E24E
                      SHA-256:E690864568D17DC5D86ACCA1FDCDB76C878E63C7B4F69E6003F875B99A7CB766
                      SHA-512:E9C8A4389C142C4F185298696BF0A15EB299E4222BAEDBD26F8E74BACDA059E5A713783119AE6FC9BDDE133FE1F4D81EA7C7C05926778889688BCDA42E24A19E
                      Malicious:false
                      Antivirus:
                      • Antivirus: Metadefender, Detection: 0%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............s..s..s.....s...p..s...w..s..r...s...r..s...s..s...z..s.....s...q..s.Rich.s.................PE..d...y.b..........." .....,..........00...............................................;....`A........................................`L......@S..........h|...p.......................G..T............................@...............A..x............................text....+.......,.................. ..`.rdata.......@.......0..............@..@.data........`.......N..............@....pdata.......p.......P..............@..@.rsrc...h|.......~...R..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                      Category:dropped
                      Size (bytes):408643
                      Entropy (8bit):6.39255200129853
                      Encrypted:false
                      SSDEEP:6144:P+XMRtUUc71/08/Rrc4TluekhfqlXvddUeyS1PbgwKlEx70U5i:P+XzUIJBprcZzwSeTkax70U5i
                      MD5:C2122AD7D229A7CD18BFD6CBC8546D97
                      SHA1:E752256DF817734519D83D22FDE988C1DFDF9279
                      SHA-256:BD0E0F07ED394870148CBA08A7A0DCA1F69CD555D8826C6D9053AD1D0AF3A29D
                      SHA-512:0FD9350ADE08B0FB98CFA8D048EEB896C5252E6005B40FB6D7859EA3A730A5E1AC0BBF14EFA64FAA96301BBA9CE6A99FCF8D18C67D738585A2227497214AB738
                      Malicious:false
                      Antivirus:
                      • Antivirus: Metadefender, Detection: 0%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................&"...%.........$..P.........**....................................\,....`... ..........................................^...P...............@...6..............D...............................(....................W...............................text...............................`..`.data...P....0......................@....rdata.......@.......$..............@..@.pdata...6...@...8..."..............@..@.xdata...1.......2...Z..............@..@.bss....`"...............................edata...^.......`..................@..@.idata.......P... ..................@....CRT....X....p......................@....tls................................@....reloc..D...........................@..B........................................................................................................................................................................
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):243
                      Entropy (8bit):6.6375398452197
                      Encrypted:false
                      SSDEEP:6:6v/lhPysEFaTw0eY/5b5sap5kGC125kiUP2afunr2W7Vtljp:6v/7kgoY/7shGC1DHP24u6KtlN
                      MD5:433D25AD6818DB00083CD062A16D3479
                      SHA1:D4210D893E965912EA7BD45C80D359FECAB54A98
                      SHA-256:3D06E8FA89BA4FA9D9BCC260F38C72D1A104FE3E6F8923A3EE553563832027CB
                      SHA-512:E5095FE100F811D73196F01C732AA09E2359E5796DF38A0B3E25599F3F99CCD2ED181070463285655521199B7B084A7848E6629CB5CE0AE07FCBC17D5953FA4C
                      Malicious:false
                      Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8..M..0...vQ...BP.vZ./ .+..SD."..c.F.....f^^`....;....9...l..17...0..ML..1.M2....X..90.v......... ....Q...@.m...G.K.-`..\%D.`..B..j\........\.....\.{....g......7..i....\....IEND.B`.
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):12288
                      Entropy (8bit):5.814115788739565
                      Encrypted:false
                      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                      MD5:CFF85C549D536F651D4FB8387F1976F2
                      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                      Malicious:false
                      Antivirus:
                      • Antivirus: Metadefender, Detection: 3%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File Type:XML 1.0 document text
                      Category:modified
                      Size (bytes):4898
                      Entropy (8bit):5.127517501563215
                      Encrypted:false
                      SSDEEP:96:8uT2N2TkxRnWRcHlLxbkVY0Myv2UqM2Ue32Uvi2UG32UA32U/32Ub32UG32UB32u:8uT2N2TgnDHlLxKjv2UN2Ue32Uvi2UGB
                      MD5:E77E46062A3C660033A96E67A6BAC227
                      SHA1:78ADA6433DD6888D80E532BA4335CCF30F88ED3B
                      SHA-256:B1EDD529369B1BBBE992E501BC179008AA5AF8682CD077AF1B3AB2068C9EF933
                      SHA-512:C57CD2B0ECAD45A3FA16CCF8D448F52A21CF76FD8186F95802D484044946C12A75CCF42449D63D70709F4B4CCD8B9D94AA97E6BF276950A69648A7C4FED7617D
                      Malicious:false
                      Preview:<?xml version='1.0' encoding='UTF-8' standalone='no'?>.<svg xmlns:cc='http://creativecommons.org/ns#' xmlns:dc='http://purl.org/dc/elements/1.1/' sodipodi:docname='pan-start-symbolic.svg' inkscape:export-filename='/home/sam/source-symbolic.png' inkscape:export-xdpi='270' inkscape:export-ydpi='270' height='16' id='svg7384' xmlns:inkscape='http://www.inkscape.org/namespaces/inkscape' xmlns:rdf='http://www.w3.org/1999/02/22-rdf-syntax-ns#' xmlns:sodipodi='http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd' style='enable-background:new' xmlns:svg='http://www.w3.org/2000/svg' version='1.1' inkscape:version='1.0 (4035a4fb49, 2020-05-01)' width='16' xmlns='http://www.w3.org/2000/svg'>. <sodipodi:namedview inkscape:bbox-nodes='true' inkscape:bbox-paths='false' bordercolor='#000000' borderlayer='false' borderopacity='0.50196078' inkscape:current-layer='layer10' inkscape:cx='51.147672' inkscape:cy='7.96251' inkscape:document-rotation='0' gridtolerance='10' inkscape:guide-bbox='true' guidetolera
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Entropy (8bit):7.94612050483113
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      File size:437368
                      MD5:e38395c6adc5d8246a0e79b0575d72f3
                      SHA1:5f7492363ed7cec703530144e73b81d727a01d4c
                      SHA256:13562490d9481fa2846b45c602117c042c7311737f3b8c5fcf0607861a4109de
                      SHA512:cbf86b4054be4edeb43894287b47b07ed41eb653425169722e522a1739fb75f8062e78c2eae6f42d75ebce1fdb79e0668712b89c5abc6919edde1079bea37b17
                      SSDEEP:6144:ZYa6CXfus0FHNHoVgWcp0BfzagA0NxhZbKf/3XHI5IWFkHJpvaKCly0sUw2kUJDN:ZYYfus0FDpxIFsvayppSKClxsUffNOK
                      TLSH:069412686238C497E813877559F6176B3FE6B03718B1B2071BE16B583E722428E1E74F
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                      Icon Hash:74e4d4d4e4f4d4d4
                      Entrypoint:0x403640
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:61259b55b8912888e90f516ca08dc514
                      Signature Valid:false
                      Signature Issuer:CN="UNELIGIBLY TVANGSFODRES renholdte Dolkens STRUGGLERIET ", O=Udrettede, L=Newcastle, S=Nebraska, C=US
                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                      Error Number:-2146762487
                      Not Before, Not After
                      • 5/23/2022 3:49:34 AM 5/23/2023 3:49:34 AM
                      Subject Chain
                      • CN="UNELIGIBLY TVANGSFODRES renholdte Dolkens STRUGGLERIET ", O=Udrettede, L=Newcastle, S=Nebraska, C=US
                      Version:3
                      Thumbprint MD5:2104226791AEC921C59FC549EC15731F
                      Thumbprint SHA-1:0DACA6B9A35529CCDE5219CB1E234A0425803777
                      Thumbprint SHA-256:44C03040B498D470E4D66166BDC28A18DCB232EAC19DC20603C548EFA67C18B0
                      Serial:326936CA6C8A9B41
                      Instruction
                      push ebp
                      mov ebp, esp
                      sub esp, 000003F4h
                      push ebx
                      push esi
                      push edi
                      push 00000020h
                      pop edi
                      xor ebx, ebx
                      push 00008001h
                      mov dword ptr [ebp-14h], ebx
                      mov dword ptr [ebp-04h], 0040A230h
                      mov dword ptr [ebp-10h], ebx
                      call dword ptr [004080C8h]
                      mov esi, dword ptr [004080CCh]
                      lea eax, dword ptr [ebp-00000140h]
                      push eax
                      mov dword ptr [ebp-0000012Ch], ebx
                      mov dword ptr [ebp-2Ch], ebx
                      mov dword ptr [ebp-28h], ebx
                      mov dword ptr [ebp-00000140h], 0000011Ch
                      call esi
                      test eax, eax
                      jne 00007F55ACE21D6Ah
                      lea eax, dword ptr [ebp-00000140h]
                      mov dword ptr [ebp-00000140h], 00000114h
                      push eax
                      call esi
                      mov ax, word ptr [ebp-0000012Ch]
                      mov ecx, dword ptr [ebp-00000112h]
                      sub ax, 00000053h
                      add ecx, FFFFFFD0h
                      neg ax
                      sbb eax, eax
                      mov byte ptr [ebp-26h], 00000004h
                      not eax
                      and eax, ecx
                      mov word ptr [ebp-2Ch], ax
                      cmp dword ptr [ebp-0000013Ch], 0Ah
                      jnc 00007F55ACE21D3Ah
                      and word ptr [ebp-00000132h], 0000h
                      mov eax, dword ptr [ebp-00000134h]
                      movzx ecx, byte ptr [ebp-00000138h]
                      mov dword ptr [0042A318h], eax
                      xor eax, eax
                      mov ah, byte ptr [ebp-0000013Ch]
                      movzx eax, ax
                      or eax, ecx
                      xor ecx, ecx
                      mov ch, byte ptr [ebp-2Ch]
                      movzx ecx, cx
                      shl eax, 10h
                      or eax, ecx
                      Programming Language:
                      • [EXP] VC++ 6.0 SP5 build 8804
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x550000x21a8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x690e00x1b98
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .ndata0x2b0000x2a0000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x550000x21a80x2200False0.379021139706data4.96095535389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_BITMAP0x552b00x368dataEnglishUnited States
                      RT_ICON0x556180x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0EnglishUnited States
                      RT_DIALOG0x566c00xb8dataEnglishUnited States
                      RT_DIALOG0x567780x144dataEnglishUnited States
                      RT_DIALOG0x568c00x13cdataEnglishUnited States
                      RT_DIALOG0x56a000x100dataEnglishUnited States
                      RT_DIALOG0x56b000x11cdataEnglishUnited States
                      RT_DIALOG0x56c200x60dataEnglishUnited States
                      RT_GROUP_ICON0x56c800x14dataEnglishUnited States
                      RT_VERSION0x56c980x1d0dataEnglishUnited States
                      RT_MANIFEST0x56e680x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                      DLLImport
                      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                      DescriptionData
                      ProductNameAmerican Express Company
                      FileVersion3.2.4
                      CommentsKaeria SARL
                      CompanyNameW.W. Grainger Inc
                      Translation0x0409 0x04b0
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found
                      No statistics
                      Target ID:2
                      Start time:17:50:34
                      Start date:23/05/2022
                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Babar.54324.15185.exe"
                      Imagebase:0x400000
                      File size:437368 bytes
                      MD5 hash:E38395C6ADC5D8246A0E79B0575D72F3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.957171072.00000000030E1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      No disassembly