Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.6225

Overview

General Information

Sample Name:SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.6225 (renamed file extension from 6225 to exe)
Analysis ID:632533
MD5:c1863e820a135d468e9787f1f78970e2
SHA1:e0846c1117045f4ee73a6493e2207d4f27056b9e
SHA256:feb8a71e0b6bb912ce22c67275eba157fb10f626e18faeb5119789c7e89ecabd
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Payload URL": "https://drive.google.com/uc?export=download&id=16-ZmAFjeTzH9DAbqoP0u2zSq7p2C4wzm"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.545755937.00000000030B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.545755937.00000000030B0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=16-ZmAFjeTzH9DAbqoP0u2zSq7p2C4wzm"}
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeVirustotal: Detection: 13%Perma Link
    Source: 0.2.SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe.410c71.1.unpackAvira: Label: ADWARE/Patched.Ren.Gen7
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: DIFXAPI.pdb source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr
    Source: Binary string: D:\corp\project\swnr\portaudio\build\msvc\x64\Release\portaudio_x64.pdb++ source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.dr
    Source: Binary string: D:\corp\project\swnr\portaudio\build\msvc\x64\Release\portaudio_x64.pdb source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.dr
    Source: Binary string: DIFXAPI.pdbH source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr
    Source: Binary string: d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\devapi\Win8Release\x64\bin\vm3ddevapi64-release.pdb source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.dr
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=16-ZmAFjeTzH9DAbqoP0u2zSq7p2C4wzm
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0B
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://ocsp.digicert.com0H
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: http://ocsp.digicert.com0I
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://ocsp.digicert.com0L
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://s2.symcb.com0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://subca.ocsp-certum.com01
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://subca.ocsp-certum.com02
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://subca.ocsp-certum.com05
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://sv.symcd.com0&
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeString found in binary or memory: http://www.certum.pl/CPS0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://www.vmware.com/0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: http://www.vmware.com/0/
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr, vm3ddevapi64-release.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0~
    Source: portaudio_x64.dll.0.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.drString found in binary or memory: https://www.globalsign.com/repository/06
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamevm3ddevapi64-release.dll> vs SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDIFxAPI.dllp( vs SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameportaudio_x64.dllL vs SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevm3ddevapi64-release.dll> vs SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_00406D5F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_72E61BFF
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeProcess Stats: CPU usage > 98%
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeVirustotal: Detection: 13%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeJump to behavior
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeFile created: C:\Users\user\AppData\Local\Temp\nsf5DEF.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/8@0/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: DIFXAPI.pdb source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr
    Source: Binary string: D:\corp\project\swnr\portaudio\build\msvc\x64\Release\portaudio_x64.pdb++ source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.dr
    Source: Binary string: D:\corp\project\swnr\portaudio\build\msvc\x64\Release\portaudio_x64.pdb source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, portaudio_x64.dll.0.dr
    Source: Binary string: DIFXAPI.pdbH source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, DiFxAPI.dll.0.dr
    Source: Binary string: d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\devapi\Win8Release\x64\bin\vm3ddevapi64-release.pdb source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.545755937.00000000030B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_72E630C0 push eax; ret
    Source: vm3ddevapi64-release.dll.0.drStatic PE information: section name: .didat
    Source: vm3ddevapi64-release.dll.0.drStatic PE information: section name: .gehcont
    Source: vm3ddevapi64-release.dll.0.drStatic PE information: section name: _RDATA
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_72E61BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeFile created: C:\Users\user\AppData\Local\Temp\vm3ddevapi64-release.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeFile created: C:\Users\user\AppData\Local\Temp\nsl5F49.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeFile created: C:\Users\user\AppData\Local\Temp\portaudio_x64.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeFile created: C:\Users\user\AppData\Local\Temp\DiFxAPI.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeRDTSC instruction interceptor: First address: 00000000030B26E3 second address: 00000000030B26E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F3098D27D2Eh 0x00000004 test eax, 8E9E6DB0h 0x00000009 cmp ebx, ecx 0x0000000b jc 00007F3098D27CA7h 0x0000000d inc ebp 0x0000000e inc ebx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\vm3ddevapi64-release.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\portaudio_x64.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\DiFxAPI.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeAPI call chain: ExitProcess graph end node
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: CompanyNameVMware, Inc.j!
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: FileDescriptionVMware SVGA 3D Device API Module:
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: noreply@vmware.com0
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: http://www.vmware.com/0
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: VMware, Inc.
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: VMware, Inc.1!0
    Source: SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544839658.000000000079C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: http://www.vmware.com/0/
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: Software\VMware, Inc.\VMware SVGA
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: VMware, Inc.1
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: VMware, Inc.0
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: ProductNameVMware SVGA 3D`
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: ?dbghelp.dllSoftware\VMware, Inc.\VMware SVGADebugSearchPathBacktrace[%2d] rip=%p %s+%#x %s:%d
    Source: vm3ddevapi64-release.dll.0.drBinary or memory string: LegalCopyrightCopyright (C) 1998-2021 VMware, Inc.Z
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_72E61BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Software Packing
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe14%VirustotalBrowse
    SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe7%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\DiFxAPI.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\DiFxAPI.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsl5F49.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsl5F49.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\portaudio_x64.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\vm3ddevapi64-release.dll0%ReversingLabs
    SourceDetectionScannerLabelLinkDownload
    0.2.SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe.410c71.1.unpack100%AviraADWARE/Patched.Ren.Gen7Download File
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://subca.ocsp-certum.com050%Avira URL Cloudsafe
    http://subca.ocsp-certum.com020%URL Reputationsafe
    http://subca.ocsp-certum.com010%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.certum.pl/ctsca2021.crl0oSecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
      high
      http://repository.certum.pl/ctnca.cer09SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
        high
        http://www.vmware.com/0SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drfalse
          high
          http://repository.certum.pl/ctsca2021.cer0SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
            high
            http://crl.certum.pl/ctnca.crl0kSecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
              high
              http://subca.ocsp-certum.com05SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
              • Avira URL Cloud: safe
              unknown
              http://www.symauth.com/rpa00SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drfalse
                high
                http://subca.ocsp-certum.com02SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
                • URL Reputation: safe
                unknown
                http://subca.ocsp-certum.com01SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
                • URL Reputation: safe
                unknown
                http://crl.certum.pl/ctnca2.crl0lSecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
                  high
                  http://repository.certum.pl/ctnca2.cer09SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
                    high
                    http://www.vmware.com/0/SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drfalse
                      high
                      http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
                        high
                        http://www.symauth.com/cps0(SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.544470071.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe, 00000000.00000002.545391405.000000000280D000.00000004.00000800.00020000.00000000.sdmp, vm3ddevapi64-release.dll.0.drfalse
                          high
                          http://www.certum.pl/CPS0SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exefalse
                            high
                            No contacted IP infos
                            Joe Sandbox Version:34.0.0 Boulder Opal
                            Analysis ID:632533
                            Start date and time: 23/05/202218:46:502022-05-23 18:46:50 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 6m 1s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.6225 (renamed file extension from 6225 to exe)
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:18
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal72.troj.evad.winEXE@1/8@0/0
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 86% (good quality ratio 84.7%)
                            • Quality average: 87.8%
                            • Quality standard deviation: 21.3%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, store-images.s-microsoft.com, login.live.com, ctldl.windowsupdate.com, arc.msn.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            No simulations
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):526456
                            Entropy (8bit):6.008806658212827
                            Encrypted:false
                            SSDEEP:12288:5sxYL+kJmoPdVp6s3EJBjCvuF17+2NdJfh:5sxwSoPdVoBjCvuF17+2NdJfh
                            MD5:52672A1E48BC8BE4035D8A4F345DFE44
                            SHA1:4F7EB09FF33DFACE6CE24BEB33E51D1DA5A3ABA1
                            SHA-256:87BA988A4858079CADCA5EAA760482CC5F1F05830EE62BBC5FDD9BF7B181F0D0
                            SHA-512:4F589CE3FC97F1DBDB575510924B5AEA58061B2D95F909456ACDB170414282A081C18CA9945E604FBCE6F17D626B02B178E66294927C5350B91072357DABAEF1
                            Malicious:false
                            Antivirus:
                            • Antivirus: Metadefender, Detection: 0%, Browse
                            • Antivirus: ReversingLabs, Detection: 0%
                            Reputation:low
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T1...P.F.P.F.P.F7..F.P.F.P.F#Q.F7..F.P.F7..F.P.F7..F/P.F7..F.P.F7..F.P.F7..F.P.F7..F.P.F7..F.P.FRich.P.F........................PE..d.....IE.........." .....$.....................a.............................0.......x....@..........................................0......P................`..........x.... ......p...................................................(............................text...L".......$.................. ..`.data...0....@.......(..............@....pdata.......`.......0..............@..@.rsrc...............................@..@.reloc..$.... ......................@..B........................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):85376
                            Entropy (8bit):6.4589932976051125
                            Encrypted:false
                            SSDEEP:1536:6ybWiSppvqBzm4gSPbgnNjbZl9IJ9ISQRyQWG:dbbOpGzm4gSPwZK3ISWWG
                            MD5:F0B06E29DCFE977FC30F6CD15CC4962B
                            SHA1:7A3F4FEA84FDE5D28E35915E5D3EDC74D3D7E1A8
                            SHA-256:107B2444699BBD4FB8BAF65EDB23F1AA7B082B8C08F2FDD1F608DEBC43857B6C
                            SHA-512:1C68088B84847545A2CD527FC5EC14F05D5884AFFBC7EC6EAEB5B426DC3079A50A29822790015E8A8C7FC5744A95C4F075BE12BAB108BD5AF9954E3CB4B03B78
                            Malicious:false
                            Reputation:low
                            Preview:.....f........1...fffffffffffffffffffffffffffffffffffffffffffff.f.........`..,.-l.vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv.........f.n..,..X............................................f.h.f.e......../vs.............................................................7'..[................................................... .f...f.b.f.r....3..e;```````````````````````````````````````````````.........c.. ..7nEEEEEEEEEEEEEEEEEEEEEEEEEEEE.&.)i.......$.D7<...................................f.....f.j.....f....5w..-..........................................................J.-@JJJJJJJJJJJJJJJJJJJJJJJJJJ<#..........0M%._<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<f.....f.c..u........!..Z?.............................f...wf.d......3}.LB11111111111111111111111111111111111111111111111.......~.......%*..!555555555555555555555555555555555....................$..!wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww.........f.u........c..e..........................f......f.c........9.}.........................f......
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                            Category:dropped
                            Size (bytes):912
                            Entropy (8bit):3.0099451499929035
                            Encrypted:false
                            SSDEEP:12:8gl00sXou41w/tz+7RafgKD7A6K5wKNLkwKNeg/3NJkKAd4t2Y+xIBjK:8Df4eaRMgKfAh5JNoJNe49HAv7aB
                            MD5:01DF88835AF6086863EF4F022BD18DF3
                            SHA1:58B994BF0E9D425CB807F5D1FEB258BF6F904D8E
                            SHA-256:2978C4613981F35AE451A7FD20C06854ED7AC5306EBDC77DCDB71A457A65414D
                            SHA-512:4FEF45A8B203F1B425CF180CEBDFAAF128A25A0A1FC5EC10C91D875157282B7F94331B79CE843112946D7007C4F5DA2D8719908350A0A1FF68A43597B17E3FCE
                            Malicious:false
                            Reputation:low
                            Preview:L..................F........................................................G....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................h.a.r.d.z.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.......2...........Prologfortolkernes.exe..^............................................P.r.o.l.o.g.f.o.r.t.o.l.k.e.r.n.e.s...e.x.e...&.......\.P.r.o.l.o.g.f.o.r.t.o.l.k.e.r.n.e.s...e.x.e.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            File Type:ASCII text, with very long lines, with no line terminators
                            Category:dropped
                            Size (bytes):28538
                            Entropy (8bit):3.99969839684347
                            Encrypted:false
                            SSDEEP:384:ack3J1V0v3sPqlYpd5b+QnSp9RSa4k75yUXkv0kE6QlV6uU1KeKQHZ6wlmcM6qTx:acqwxWpbhnyGSEU65KAAwl4aZizuupd
                            MD5:D929AC69DE308581CF1CC35EBBFA488B
                            SHA1:BE7C776F3E7AF782A8B2DD02C34711357A131853
                            SHA-256:B5AA2FA0DA767023E6B44DC3F0EC6746D4F8BDE83A36223055671139F4BE7E38
                            SHA-512:4495A77C13B10DA4DA8C525D6D21BFB0A3EC3245592BA7132519B4547294A3EF9182C8B6E08BE1E1BEA2D366DF8F70D1DE9F0B8842A3910294271C5D9D008305
                            Malicious:false
                            Reputation:low
                            Preview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
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            File Type:SVG Scalable Vector Graphics image
                            Category:dropped
                            Size (bytes):856
                            Entropy (8bit):5.104082637403519
                            Encrypted:false
                            SSDEEP:12:t4CP5GdKdj9xclSaRaUlYzXHnbt1tUg1yU2hz4AeWTjiu+1ITpLhz4AeWK:t4CBGMFklSelln4AeWoI9x4AeWK
                            MD5:93721360A2E739317994A0478117B840
                            SHA1:459A0D7C35526AD3E03BE62E41C2AC1BF2518F6A
                            SHA-256:15322D905A2DA0DFC566C0A17E9CFB303F5EDCCDB97CF30970AAEF6249E3A67A
                            SHA-512:9AEFEB4749652BD968AF4F5FB9009715E913848F8662DF54955B9D0A25AEC10F0FC6701D4E470E4C5DC2CAC3A28073DDA13E1BC57F32319D5ECF83DC588EEC62
                            Malicious:false
                            Reputation:low
                            Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g color="#000" font-weight="400" font-family="Sans" fill="#474747"><path d="M8.487.02A7.492 7.492 0 001 7.507a7.492 7.492 0 007.487 7.486 7.492 7.492 0 007.486-7.486A7.492 7.492 0 008.487.02zm0 1.973A5.508 5.508 0 0114 7.507a5.508 5.508 0 01-5.513 5.513 5.508 5.508 0 01-5.514-5.513 5.508 5.508 0 015.514-5.514z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" overflow="visible"/><path d="M11.393 4.007a.5.5 0 00-.25.156L8.487 6.819 6.83 5.163a.5.5 0 10-.687.687l2 2a.5.5 0 00.687 0l3-3a.5.5 0 00-.437-.843z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" overflow="visible"/></g></svg>
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:modified
                            Size (bytes):12288
                            Entropy (8bit):5.814115788739565
                            Encrypted:false
                            SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                            MD5:CFF85C549D536F651D4FB8387F1976F2
                            SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                            SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                            SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                            Malicious:false
                            Antivirus:
                            • Antivirus: Metadefender, Detection: 3%, Browse
                            • Antivirus: ReversingLabs, Detection: 0%
                            Reputation:moderate, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):210400
                            Entropy (8bit):6.556455859693611
                            Encrypted:false
                            SSDEEP:3072:eNDA0+ExUEe7nocc+HBmLhE8ErHTfxWEvoMhVGNDKE7tjHZYZdH:M+E6fE+ILa8yF3voMVGVKE4H
                            MD5:B38B3ABD5349D92C63D450DF34C73D4C
                            SHA1:F58BA8CC0D2E9A1F0D5DF7518BB9DE39D35E224E
                            SHA-256:B52F564D867924895D80019267CF3E05F5D945755096ECEBCECB77599AE36B82
                            SHA-512:D35820246E48D72C060A725F792FB61F0BA86D6F0B100EF45B0C960C14D4C8DE788BA061B29A05BC9312ED7977D3B8D593024457C9DA54239ABB40DCA9CDFDEE
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............t...t...t.......t...u...t...q...t...p...t...w...t..p...t..u...t...u.s.t.>.p...t.>.t...t.>.....t.......t.>.v...t.Rich..t.........................PE..d....5`.........." .........N......H........................................P.......H....`.................................................P........0..h................!...@..........T...........................`................................................text............................... ..`.rdata..............................@..@.data...p...........................@....pdata..............................@..@.rsrc...h....0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):272968
                            Entropy (8bit):6.525125544096022
                            Encrypted:false
                            SSDEEP:6144:yGDcBJz3nXgJhw/171Ewc6Jlih+GtOjrLbR8XtVbQ:yGDcnAJC/1pvJXJAtVbQ
                            MD5:31DC360E537F919FC03540C17539E3C1
                            SHA1:33ABED31822A0F8590079C8E20A1DC3EBA7EB334
                            SHA-256:1C2BF2248AC56F213B4888FC756AE26ED3E61B7D5A16C1464E421CFBB3528B03
                            SHA-512:2C1FFB5FE35AD53DF3149E31ABAA32F23DFA3DA920727FEBF39D19FD728408D1C00415E8F863B795EDF37645DD8FB8DE477F2EE4EDA38DCBCD15465A7A93EF20
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$.......[...............................s.....s.....s..........M...........z.....z.......................G.........Rich..........................PE..d......`.........." .........T..............................................@......PJ....`A...............................................t........ ..................Hb...0...... m..8............................k..8.......................@....................text.............................. ..`.rdata..2...........................@..@.data...0#..........................@....pdata..............................@..@.didat..H...........................@....gehcont$...........................@..@_RDATA..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.6857232930420745
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            File size:603464
                            MD5:c1863e820a135d468e9787f1f78970e2
                            SHA1:e0846c1117045f4ee73a6493e2207d4f27056b9e
                            SHA256:feb8a71e0b6bb912ce22c67275eba157fb10f626e18faeb5119789c7e89ecabd
                            SHA512:6607743de9ca76c7d7f6a57f63b196892a510c30afccee0cef9132460eaabe145b418b9bb5c21fa48717e1353f1c91ed2fc8cc86ab42c8b64b3b80acaea92931
                            SSDEEP:12288:RYCEkC0keucJfmGquXqvJStyHzPchra7PZLCyEcz1F:RYCBC04q1AUZGnXz3
                            TLSH:59D4DFB2F7D48A4BFD02677895E192683DFB9CE16223E30B114D3D17BEB67693244182
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                            Icon Hash:f0e8ce9e96cce802
                            Entrypoint:0x403640
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:61259b55b8912888e90f516ca08dc514
                            Signature Valid:false
                            Signature Issuer:CN=&#34;maskindokumentation eringen draperer prisfald &#34;, O=Fysioterapeutskolerne5, L=Saint-Maurice-pr&#195;&#168;s-Crocq, S=Nouvelle-Aquitaine, C=FR
                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                            Error Number:-2146762487
                            Not Before, Not After
                            • 5/23/2022 3:56:10 AM 5/23/2023 3:56:10 AM
                            Subject Chain
                            • CN=&#34;maskindokumentation eringen draperer prisfald &#34;, O=Fysioterapeutskolerne5, L=Saint-Maurice-pr&#195;&#168;s-Crocq, S=Nouvelle-Aquitaine, C=FR
                            Version:3
                            Thumbprint MD5:7735A8EAAFDB10F20731055B3C25398B
                            Thumbprint SHA-1:891C6FE7C7361A0AE542A7DAA25078799E3ADDF5
                            Thumbprint SHA-256:44C99CC90CD9A321BC61E47D59498840554B9C58C770B7BCF0777E7BA2193C09
                            Serial:6132FE7805280AAC
                            Instruction
                            push ebp
                            mov ebp, esp
                            sub esp, 000003F4h
                            push ebx
                            push esi
                            push edi
                            push 00000020h
                            pop edi
                            xor ebx, ebx
                            push 00008001h
                            mov dword ptr [ebp-14h], ebx
                            mov dword ptr [ebp-04h], 0040A230h
                            mov dword ptr [ebp-10h], ebx
                            call dword ptr [004080C8h]
                            mov esi, dword ptr [004080CCh]
                            lea eax, dword ptr [ebp-00000140h]
                            push eax
                            mov dword ptr [ebp-0000012Ch], ebx
                            mov dword ptr [ebp-2Ch], ebx
                            mov dword ptr [ebp-28h], ebx
                            mov dword ptr [ebp-00000140h], 0000011Ch
                            call esi
                            test eax, eax
                            jne 00007F3098FCC41Ah
                            lea eax, dword ptr [ebp-00000140h]
                            mov dword ptr [ebp-00000140h], 00000114h
                            push eax
                            call esi
                            mov ax, word ptr [ebp-0000012Ch]
                            mov ecx, dword ptr [ebp-00000112h]
                            sub ax, 00000053h
                            add ecx, FFFFFFD0h
                            neg ax
                            sbb eax, eax
                            mov byte ptr [ebp-26h], 00000004h
                            not eax
                            and eax, ecx
                            mov word ptr [ebp-2Ch], ax
                            cmp dword ptr [ebp-0000013Ch], 0Ah
                            jnc 00007F3098FCC3EAh
                            and word ptr [ebp-00000132h], 0000h
                            mov eax, dword ptr [ebp-00000134h]
                            movzx ecx, byte ptr [ebp-00000138h]
                            mov dword ptr [0042A318h], eax
                            xor eax, eax
                            mov ah, byte ptr [ebp-0000013Ch]
                            movzx eax, ax
                            or eax, ecx
                            xor ecx, ecx
                            mov ch, byte ptr [ebp-2Ch]
                            movzx ecx, cx
                            shl eax, 10h
                            or eax, ecx
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x21848.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x916100x1f38
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                            .ndata0x2b0000x370000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x620000x218480x21a00False0.418455216078data5.86806441388IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_ICON0x623280x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 16777216, next used block 16777216EnglishUnited States
                            RT_ICON0x72b500x7d38PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                            RT_ICON0x7a8880x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 128, next used block 16777216EnglishUnited States
                            RT_ICON0x7eab00x25a8dataEnglishUnited States
                            RT_ICON0x810580x10a8dataEnglishUnited States
                            RT_ICON0x821000x988dataEnglishUnited States
                            RT_ICON0x82a880x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                            RT_DIALOG0x82ef00x100dataEnglishUnited States
                            RT_DIALOG0x82ff00x11cdataEnglishUnited States
                            RT_DIALOG0x831100xc4dataEnglishUnited States
                            RT_DIALOG0x831d80x60dataEnglishUnited States
                            RT_GROUP_ICON0x832380x68dataEnglishUnited States
                            RT_VERSION0x832a00x264dataEnglishUnited States
                            RT_MANIFEST0x835080x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                            DLLImport
                            ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                            SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                            ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                            USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                            DescriptionData
                            LegalCopyrightMAALERES
                            FileVersion18.16.25
                            CompanyNameEasterner
                            LegalTrademarksKRONISKESSKLSKR
                            Commentsarcheressbronz
                            ProductNameSuber
                            FileDescriptionSekstifem
                            Translation0x0409 0x04b0
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found
                            No statistics
                            Target ID:0
                            Start time:18:48:06
                            Start date:23/05/2022
                            Path:C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe"
                            Imagebase:0x400000
                            File size:603464 bytes
                            MD5 hash:C1863E820A135D468E9787F1F78970E2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.545755937.00000000030B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low

                            No disassembly