Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.26603

Overview

General Information

Sample Name:SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.26603 (renamed file extension from 26603 to exe)
Analysis ID:632606
MD5:09d431a8321ec75d7ff057787c319897
SHA1:b709d7968897d774676194b9708f304a6a472086
SHA256:1be03967a615254ca0b3eba8b5aaa6b5f5c91c9f03d4fe2692b3675f93c0b26d
Tags:exesigned
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Binary contains a suspicious time stamp
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Payload URL": "http://2.56.57.22/MY%20AIRTEL%20TELEGRAM%20STUB_iHQdRhQNdR56.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.883009053.0000000003140000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.883009053.0000000003140000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://2.56.57.22/MY%20AIRTEL%20TELEGRAM%20STUB_iHQdRhQNdR56.bin"}
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeReversingLabs: Detection: 21%
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.IO.UnmanagedMemoryStream\net6.0-Release\System.IO.UnmanagedMemoryStream.pdb source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882784474.0000000002862000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882292421.000000000040A000.00000004.00000001.01000000.00000003.sdmp, System.IO.UnmanagedMemoryStream.dll.0.dr
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://2.56.57.22/MY%20AIRTEL%20TELEGRAM%20STUB_iHQdRhQNdR56.bin
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://subca.ocsp-certum.com01
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://subca.ocsp-certum.com02
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://subca.ocsp-certum.com05
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeString found in binary or memory: http://www.certum.pl/CPS0
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882784474.0000000002862000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882292421.000000000040A000.00000004.00000001.01000000.00000003.sdmp, System.IO.UnmanagedMemoryStream.dll.0.drString found in binary or memory: https://github.com/dotnet/runtime
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882784474.0000000002862000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.IO.UnmanagedMemoryStream.dll@ vs SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882292421.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.IO.UnmanagedMemoryStream.dll@ vs SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeSection loaded: riched20.dll
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_00406D5F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_72491BFF
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeProcess Stats: CPU usage > 98%
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeReversingLabs: Detection: 21%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeJump to behavior
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeFile created: C:\Users\user\AppData\Local\Temp\nsdEA1F.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/9@0/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.IO.UnmanagedMemoryStream\net6.0-Release\System.IO.UnmanagedMemoryStream.pdb source: SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882784474.0000000002862000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882292421.000000000040A000.00000004.00000001.01000000.00000003.sdmp, System.IO.UnmanagedMemoryStream.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.883009053.0000000003140000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_724930C0 push eax; ret
    Source: System.IO.UnmanagedMemoryStream.dll.0.drStatic PE information: 0xFD78D1DD [Sat Oct 4 08:54:53 2104 UTC]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_72491BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeFile created: C:\Users\user\AppData\Local\Temp\nsyEAEC.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeFile created: C:\Users\user\AppData\Local\Temp\System.IO.UnmanagedMemoryStream.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeRDTSC instruction interceptor: First address: 0000000003142903 second address: 0000000003142903 instructions: 0x00000000 rdtsc 0x00000002 test dh, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F9C08B788F3h 0x00000008 inc ebp 0x00000009 test ebx, edx 0x0000000b inc ebx 0x0000000c cmp cx, ax 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\System.IO.UnmanagedMemoryStream.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_72491BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Timestomp
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe22%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\System.IO.UnmanagedMemoryStream.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\System.IO.UnmanagedMemoryStream.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\System.IO.UnmanagedMemoryStream.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsyEAEC.tmp\System.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nsyEAEC.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsyEAEC.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://subca.ocsp-certum.com050%Avira URL Cloudsafe
    http://2.56.57.22/MY%20AIRTEL%20TELEGRAM%20STUB_iHQdRhQNdR56.bin0%Avira URL Cloudsafe
    http://subca.ocsp-certum.com020%URL Reputationsafe
    http://subca.ocsp-certum.com010%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://2.56.57.22/MY%20AIRTEL%20TELEGRAM%20STUB_iHQdRhQNdR56.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.certum.pl/ctsca2021.crl0oSecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
      high
      http://repository.certum.pl/ctnca.cer09SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
        high
        http://repository.certum.pl/ctsca2021.cer0SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
          high
          http://crl.certum.pl/ctnca.crl0kSecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
            high
            http://subca.ocsp-certum.com05SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
            • Avira URL Cloud: safe
            unknown
            http://subca.ocsp-certum.com02SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
            • URL Reputation: safe
            unknown
            http://subca.ocsp-certum.com01SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
            • URL Reputation: safe
            unknown
            http://crl.certum.pl/ctnca2.crl0lSecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
              high
              http://repository.certum.pl/ctnca2.cer09SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
                high
                http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
                  high
                  http://www.certum.pl/CPS0SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exefalse
                    high
                    https://github.com/dotnet/runtimeSecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882784474.0000000002862000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe, 00000000.00000002.882292421.000000000040A000.00000004.00000001.01000000.00000003.sdmp, System.IO.UnmanagedMemoryStream.dll.0.drfalse
                      high
                      No contacted IP infos
                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:632606
                      Start date and time: 23/05/202220:14:362022-05-23 20:14:36 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 8m 5s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.26603 (renamed file extension from 26603 to exe)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:20
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal72.troj.evad.winEXE@1/9@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 86% (good quality ratio 84.7%)
                      • Quality average: 87.7%
                      • Quality standard deviation: 21.4%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Override analysis time to 240s for sample files taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                      • Excluded IPs from analysis (whitelisted): 23.54.113.53
                      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                      • Not all processes where analyzed, report is missing behavior information
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
                      Category:dropped
                      Size (bytes):9906
                      Entropy (8bit):7.910073068079041
                      Encrypted:false
                      SSDEEP:192:oXRlr7xecYaInXHtyMkC0RmLKZDjCYsPLcIXSZVYLuL:KRVUUIXgMkCSoe7tL
                      MD5:A509568F18F3FF9C50EBFB2ACD499AA5
                      SHA1:624E862D51655A6759151252963354F1520F0097
                      SHA-256:5DDAFCD2247F1945099ECDE40D93F60C55D0B27F83D46B602909D55399BA635B
                      SHA-512:32D090B101DC16D6A464C2D67D7870CD46E334031EE4ADE0F6255952CEB7141118C595FB8ADAF1ED04BFAB88CFAF9856A2AE5C5315AB9A9AF3E299816AEDC822
                      Malicious:false
                      Reputation:low
                      Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....4.........s...*...`..Ki.#........>N....H.).T... .".S5..A..,..../W.3...|.q...1.;O...../.I......2...oT..1...Y..;....be.Y.qE~w..,..w......d.....q{ymo....D...V\K.H...F....,6.....i...9.._.......L....%....I..+.0..C\....bs.R....?....<W.3..+..._.W_...~......f.....3i...F.".z.FkX..DF......R.......?k
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):23181
                      Entropy (8bit):7.990994965748802
                      Encrypted:true
                      SSDEEP:384:84XmU94OtQbjBI9OrBQo6+inPK/smjmMA+9dFkj80lAug7woAR/vZKoF08HQDxFd:bb6jBqPocK/smBAGdFylld79/woCzN8U
                      MD5:0D972D4681D2BDD6A506A86DA5A1C85E
                      SHA1:84662467F7DA4A541729A3A2174E8373F7B7BBCD
                      SHA-256:6303DF45ACDC13A98D4208F1A56AE86BB051ED3E6F2EEF4650ABCEDB34AEADFA
                      SHA-512:9BEB7191CCF7B75255BA17AD11BF437864EC9471DC5DBE9FC9EAD3A8692A9C8E69246DA9A679F78A426184DDB7850E4875720D20423F2B2B53ACF313626AC8DA
                      Malicious:false
                      Reputation:low
                      Preview:......z.U...U......[.b..BI.n.. H....D.........K:.|7.>43..wII......!..!~Fr^"Q..b:...-.....y).s....e?...:.[.v)iz..G.Q...&.I>.\..O.J...E..C.....X..8.We}R.rH.b.................Q{.I.c..P&Q.;...y..<f".u>.M....u{v+.)..........).9 ......G:.IH.V..0bsk..n.S[&$..Qpo....m.}.0LN.H!..t.(......y!.....>o...P......z{.?.e.=....b.......k$..~l7R@.....9..q_.......P...=..._.v...|..,U6....6....J1.8....$..`[...C...a$....j..f.Y.k.w..+.3:V.Z...Gs.e(.*.F....^...a.....L$,....:V=.\_.^.b/.f..c...X.......d.....i....v=.Sc..t....{8.....P4..M.2.X9...g...{.52..a%y.6..'*|8*.......!3~[.t.w...7w...M...a.j=....$u{...^..)J.J..-.I...)C7..J.p.a....#.IT.s1.0..K..#V.7.L.| .}..Z.Q\;..|.i.4..}H..!.I."?....C~.....%..n.b..E.3..P........,.}. 5{.E....p.r)..L<.*.@zu7j..7h$DV.hO."...1..8U.[....r4.I$W.U.. M.$.i+...[..kEz.t;..<A..*[E..R.}z...a.3..,.,.E...!.5...f..FC...z.........g./..KK.r..(`..'...L.LC........Ntz|..V+....}iK.;X/.},..Lp;-K......~.Ro&40..."L..Zx....X..."-=t.^!...<
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):85536
                      Entropy (8bit):6.450553024590124
                      Encrypted:false
                      SSDEEP:768:qwz+WsmsiZUL3RDSQLefRLp3zFXs98T/ExDNnHBRXKiN9OOWp7wPkomrptIepi+s:qwz+wUjfLeLBXnLw/7gcPMIP+hO
                      MD5:FC18E33AF950762F0854EE273723A9D5
                      SHA1:CF2D571EF653FA35F961587296B26018F6D0C64A
                      SHA-256:3C55B767A8B4E82B4607EF9CDC48C212D7CDAE3830E567F4A9C2C46A34E3BEAD
                      SHA-512:E974480F6E9A96A69D46411A195E75BF8E32528417C7865C7847E9C6CDD4B712CECACC0C26C4800075947088D3617409C5BC3FF57119D819D2D7C0B18F559901
                      Malicious:false
                      Reputation:low
                      Preview:f.u.f.f...f.t......&.U....................................4...f.i.............pJ................................f.........&?ix............................................................:.n.................................f.d.......7..Pv..........................................................f.k.........nz..................................n.....f....43.R][[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[f.....f.........-"..!\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\f..M......f.n..3..:uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuf................6.[ao}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}...f.........3n.5j..................................................:F.........r..f.d..5.o.`.................................................!............(.>.U...............................................f.q.7...4..e9...................................................................`F.............................f.........`......(X.Q,..........................................f.n.
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):14440
                      Entropy (8bit):6.682915152434376
                      Encrypted:false
                      SSDEEP:192:0BzGbXwRxx025WJ+WqlSWOL8/pCuPHnhWgN7aYWsB3gmZdGP2qnaj4FnH+a:oww7+25WJ+Wql+/uPHRN7BB3v3Llqea
                      MD5:4075327E8E558810E05E67CE8E246864
                      SHA1:F136E540C8439548EFF62BE1161F16A01CB0D060
                      SHA-256:25211A075C941DFC9C363547A9EE4442981A4FBCA0C32EA705E94D086D57DAA3
                      SHA-512:B557516E7121DEE78FA4D228FCF1351071D2AD6FC8F27142D4C6FB1B78F70DCB0993F8BE90F7247DBBEC3D3100307329F04F8EA90C9E93F7B618EFC7150D5A6D
                      Malicious:false
                      Antivirus:
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      • Antivirus: Metadefender, Detection: 0%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....x..........."!..0..............)... ........@.. ..............................P.....`.................................|)..O....@..................h$...`.......(..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H........ ......................P ........................................L....c.y.....>(#W..!...h...$...4V.I..4..w..?'....4a\..F..SG..rH.y......zy...:...C'..t$...6.?yrlQ..D..9...OM....<G.k....B.BSJB............v4.0.30319......`.......#~..<.......#Strings....,.......#GUID...<.......#Blob......................3................................................,...........E...........p.......W.................^...+.^.....^...e.^.....^.....^.....^...L.^...Y.^.................
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File Type:SVG Scalable Vector Graphics image
                      Category:dropped
                      Size (bytes):606
                      Entropy (8bit):4.666157566747791
                      Encrypted:false
                      SSDEEP:12:t4CDqW/ZWcdg+tKAPXUWU4NM0ByWoZLa8jCOopqGEA9A0/:t4CTg+tKA8WDec8YqGEAl/
                      MD5:26B03DAAD39CD54B2343C49AF59F2091
                      SHA1:D2C0728804B143D70A6BC6752A873BBA468C3E1D
                      SHA-256:2EF30F51766DEAA27FECF4ECAF46404D0C37D902E39FE43E2F656CD488041FB2
                      SHA-512:83C528C85B1F7067D134717AEC1638E8FA20E8DAA595E1FBA2F5ECEC747841E36B626C2026ECB61DE9F67A7E3C4D2B0992F71C11F76AA019D36A9E4C4A307CA1
                      Malicious:false
                      Reputation:low
                      Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><path d="M2.934 0h.132C4.692 0 6 1.332 6 2.986v10.028C6 14.668 4.692 16 3.066 16h-.132C1.308 16 0 14.668 0 13.014V2.986C0 1.332 1.308 0 2.934 0zm2.594 0c.878.714 1.469 1.793 1.469 3v1h2.125c-.075-1.092 1.248-2 2-2 .68 0 1 .012 1 1v1h1.218c1.229-.6 1.782-1.969 1.782-2.687 0-.736-2.386-1.312-3.688-1.312zM7 5v4.313c2.766 2.662 6.125 2.406 6.125 2.406s.353-1.52-1.906-4.03L8.844 5H7.063C7.04 5.003 7.02 4.999 7 5zm2.975 2.532L11.66 9.27c-1.8.166-2.151-.856-1.684-1.737z" style="marker:none" overflow="visible" color="#000" fill="#474747"/></svg>
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):226
                      Entropy (8bit):6.609529349840206
                      Encrypted:false
                      SSDEEP:6:6v/lhPysfQu6kkLKgiFG34McOULPqSax5na/p:6v/7FPk9iHMUeSauR
                      MD5:AFE0B10777804AE446C5E4A3F3C2E3B5
                      SHA1:0252C67682C9A5D7260BA70DC03E4091ED9A0923
                      SHA-256:4C42D37B6A5ED6F3230A1506A6BC4687AEF8146174666C0BCCAD8FE2E6DD75B5
                      SHA-512:D76318428038B81D1C29C5812BD22F53DFF53AE93FE86305CD76B750F39BD785EBB9CA69475137CE9A00A4DC588DB4D0C077B723AC847782123C3359E981A9B4
                      Malicious:false
                      Reputation:low
                      Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8..1..P.C_.Aj...............O.A..KY.|...b.VS.7x...../...BG.n.z.Tu......9.........X.V.pD....W...(...e...V...{..0...&...|2.l.+m..3..i..3......?[....u....IEND.B`.
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):12288
                      Entropy (8bit):5.814115788739565
                      Encrypted:false
                      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                      MD5:CFF85C549D536F651D4FB8387F1976F2
                      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                      Malicious:false
                      Antivirus:
                      • Antivirus: Virustotal, Detection: 0%, Browse
                      • Antivirus: Metadefender, Detection: 3%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File Type:HTML document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1245
                      Entropy (8bit):5.462849750105637
                      Encrypted:false
                      SSDEEP:24:hM0mIAvy4Wvsqs1Ra7JZRGNeHX+AYcvP2wk1RjdEF3qpMk5:lmIAq1UqsziJZ+eHX+AdP2TvpMk5
                      MD5:5343C1A8B203C162A3BF3870D9F50FD4
                      SHA1:04B5B886C20D88B57EEA6D8FF882624A4AC1E51D
                      SHA-256:DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F
                      SHA-512:E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949
                      Malicious:false
                      Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>404 - File or directory not found.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="co
                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File Type:HTML document, ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):1245
                      Entropy (8bit):5.462849750105637
                      Encrypted:false
                      SSDEEP:24:hM0mIAvy4Wvsqs1Ra7JZRGNeHX+AYcvP2wk1RjdEF3qpMk5:lmIAq1UqsziJZ+eHX+AdP2TvpMk5
                      MD5:5343C1A8B203C162A3BF3870D9F50FD4
                      SHA1:04B5B886C20D88B57EEA6D8FF882624A4AC1E51D
                      SHA-256:DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F
                      SHA-512:E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949
                      Malicious:false
                      Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>404 - File or directory not found.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="co
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Entropy (8bit):7.737885668413826
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      File size:150224
                      MD5:09d431a8321ec75d7ff057787c319897
                      SHA1:b709d7968897d774676194b9708f304a6a472086
                      SHA256:1be03967a615254ca0b3eba8b5aaa6b5f5c91c9f03d4fe2692b3675f93c0b26d
                      SHA512:da58f66d20a061f973ce18c894d00279a5b47f8e49b09fd08a6f17ac9c42a806d857709c6e89e30ebe8b4d124a11c15df80459579ffe5ac751a7c80f5798c925
                      SSDEEP:3072:AfY/TU9fE9PEtu22bTj/eZsl2JhPa0TeYFv8YARZ/KtWquoJTvJfS:WYa6LTkXPderR9KLLvJ
                      TLSH:CAE3F1147770E8A3F9731B71AE7597A6AFB2EA021875974F13202A9C3D91380DB1D713
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                      Icon Hash:9ad8d87078697939
                      Entrypoint:0x403640
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:61259b55b8912888e90f516ca08dc514
                      Signature Valid:false
                      Signature Issuer:CN="Hovedbundens1 alerters SPORTELLNNEDE Bowenite ", O=neglecting, L=Myrtle, S=Mississippi, C=US
                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                      Error Number:-2146762487
                      Not Before, Not After
                      • 5/23/2022 7:12:19 AM 5/23/2023 7:12:19 AM
                      Subject Chain
                      • CN="Hovedbundens1 alerters SPORTELLNNEDE Bowenite ", O=neglecting, L=Myrtle, S=Mississippi, C=US
                      Version:3
                      Thumbprint MD5:C16E17A3C8D303B21C04B936BB6E0DCB
                      Thumbprint SHA-1:08759A518D93EEE4FA4E210966C67D44DAFF49A8
                      Thumbprint SHA-256:DB0429D568507771A725F6E9BCCA1523C3D67F56B97DB4214D1703A8779161C1
                      Serial:FE464BE9561F856B
                      Instruction
                      push ebp
                      mov ebp, esp
                      sub esp, 000003F4h
                      push ebx
                      push esi
                      push edi
                      push 00000020h
                      pop edi
                      xor ebx, ebx
                      push 00008001h
                      mov dword ptr [ebp-14h], ebx
                      mov dword ptr [ebp-04h], 0040A230h
                      mov dword ptr [ebp-10h], ebx
                      call dword ptr [004080C8h]
                      mov esi, dword ptr [004080CCh]
                      lea eax, dword ptr [ebp-00000140h]
                      push eax
                      mov dword ptr [ebp-0000012Ch], ebx
                      mov dword ptr [ebp-2Ch], ebx
                      mov dword ptr [ebp-28h], ebx
                      mov dword ptr [ebp-00000140h], 0000011Ch
                      call esi
                      test eax, eax
                      jne 00007F9C08D6EB0Ah
                      lea eax, dword ptr [ebp-00000140h]
                      mov dword ptr [ebp-00000140h], 00000114h
                      push eax
                      call esi
                      mov ax, word ptr [ebp-0000012Ch]
                      mov ecx, dword ptr [ebp-00000112h]
                      sub ax, 00000053h
                      add ecx, FFFFFFD0h
                      neg ax
                      sbb eax, eax
                      mov byte ptr [ebp-26h], 00000004h
                      not eax
                      and eax, ecx
                      mov word ptr [ebp-2Ch], ax
                      cmp dword ptr [ebp-0000013Ch], 0Ah
                      jnc 00007F9C08D6EADAh
                      and word ptr [ebp-00000132h], 0000h
                      mov eax, dword ptr [ebp-00000134h]
                      movzx ecx, byte ptr [ebp-00000138h]
                      mov dword ptr [0042A318h], eax
                      xor eax, eax
                      mov ah, byte ptr [ebp-0000013Ch]
                      movzx eax, ax
                      or eax, ecx
                      xor ecx, ecx
                      mov ch, byte ptr [ebp-2Ch]
                      movzx ecx, cx
                      shl eax, 10h
                      or eax, ecx
                      Programming Language:
                      • [EXP] VC++ 6.0 SP5 build 8804
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x530000x14d0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x22c080x1ec8.data
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .ndata0x2b0000x280000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x530000x14d00x1600False0.302734375data3.56713195596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_ICON0x532080x8a8dataEnglishUnited States
                      RT_DIALOG0x53ab00x100dataEnglishUnited States
                      RT_DIALOG0x53bb00x11cdataEnglishUnited States
                      RT_DIALOG0x53cd00xc4dataEnglishUnited States
                      RT_DIALOG0x53d980x60dataEnglishUnited States
                      RT_GROUP_ICON0x53df80x14dataEnglishUnited States
                      RT_VERSION0x53e100x37cdataEnglishUnited States
                      RT_MANIFEST0x541900x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                      DLLImport
                      ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                      SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                      ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                      USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                      DescriptionData
                      LegalCopyrightCopyright 1997-2013, Nullsoft, Inc.
                      FileVersion10.28.31
                      CompanyNameThermo Electron Corporation
                      LegalTrademarksStringFileInfo: U.S. English
                      CommentsVF Corporation
                      ProductNamePrudential Financial Inc.
                      FileDescriptionLegalTrademarks,Nullsoft and Winamp are trademarks of Nullsoft, Inc.
                      Translation0x0409 0x04b0
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found
                      No statistics
                      Target ID:0
                      Start time:20:15:44
                      Start date:23/05/2022
                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe"
                      Imagebase:0x400000
                      File size:150224 bytes
                      MD5 hash:09D431A8321EC75D7FF057787C319897
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.883009053.0000000003140000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      No disassembly