Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.generic.ml.10062.6710

Overview

General Information

Sample Name:SecuriteInfo.com.generic.ml.10062.6710 (renamed file extension from 6710 to exe)
Analysis ID:634320
MD5:95050a1e0c7d4c57f62e26967b3b0bfd
SHA1:baa57d1bf6d8a41ba89c6d09bfc4ec2bc986830c
SHA256:458597ef6835136826411179f244673d5b2702e906bedb3e470786eb455d98ce
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
PE / OLE file has an invalid certificate
PE file contains more sections than normal
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Payload URL": "http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.761431234.0000000003170000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.761431234.0000000003170000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin"}
    Source: SecuriteInfo.com.generic.ml.10062.exeVirustotal: Detection: 11%Perma Link
    Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: H:\n2\3rdparty\FFmpeg\2.8.2\public\src\ffmpeg\libavutil\avutil-54.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.dr
    Source: Binary string: System.IO.FileSystem.Watcher.ni.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.0.dr
    Source: Binary string: D:\SourceCode\gc3.gpuswitch\production_V4.2\Service\ServiceSDK\Release\GPUSwitchPlugin\ARMOURY CRATE eGPU Product.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr
    Source: Binary string: D:\SourceCode\gc3.gpuswitch\production_V4.2\Service\ServiceSDK\Release\GPUSwitchPlugin\ARMOURY CRATE eGPU Product.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr
    Source: Binary string: H:\n2\3rdparty\FFmpeg\2.8.2\public\src\ffmpeg\libavutil\avutil-54.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.IO.FileSystem.Watcher\net6.0-windows-Release\System.IO.FileSystem.Watcher.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.0.dr
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: folder-publicshare.png.0.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://s2.symcb.com0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://subca.ocsp-certum.com01
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://subca.ocsp-certum.com02
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://subca.ocsp-certum.com05
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://sv.symcd.com0&
    Source: avutil-54.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.0.drString found in binary or memory: http://www.avast.com0/
    Source: SecuriteInfo.com.generic.ml.10062.exeString found in binary or memory: http://www.certum.pl/CPS0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://www.nero.com
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.0.drString found in binary or memory: https://github.com/dotnet/runtime
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr, lang-1045.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: System.IO.FileSystem.Watcher.dll.0.drStatic PE information: No import functions for PE file found
    Source: MsMpLics.dll.0.drStatic PE information: No import functions for PE file found
    Source: lang-1045.dll.0.drStatic PE information: No import functions for PE file found
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameARMOURY CRATE eGPU Product.exe8 vs SecuriteInfo.com.generic.ml.10062.exe
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.generic.ml.10062.exe
    Source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.IO.FileSystem.Watcher.dll@ vs SecuriteInfo.com.generic.ml.10062.exe
    Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_00406D5F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_732A1BFF
    Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: invalid certificate
    Source: p11-kit-trust.dll.0.drStatic PE information: Number of sections : 11 > 10
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess Stats: CPU usage > 98%
    Source: SecuriteInfo.com.generic.ml.10062.exeVirustotal: Detection: 11%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeJump to behavior
    Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\nstEC39.tmpJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile written: C:\Users\user\AppData\Local\Temp\krista.iniJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/14@0/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: SecuriteInfo.com.generic.ml.10062.exeStatic file information: File size 1447056 > 1048576
    Source: SecuriteInfo.com.generic.ml.10062.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: H:\n2\3rdparty\FFmpeg\2.8.2\public\src\ffmpeg\libavutil\avutil-54.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.dr
    Source: Binary string: System.IO.FileSystem.Watcher.ni.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.0.dr
    Source: Binary string: D:\SourceCode\gc3.gpuswitch\production_V4.2\Service\ServiceSDK\Release\GPUSwitchPlugin\ARMOURY CRATE eGPU Product.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr
    Source: Binary string: D:\SourceCode\gc3.gpuswitch\production_V4.2\Service\ServiceSDK\Release\GPUSwitchPlugin\ARMOURY CRATE eGPU Product.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, ARMOURY CRATE eGPU Product.exe.0.dr
    Source: Binary string: H:\n2\3rdparty\FFmpeg\2.8.2\public\src\ffmpeg\libavutil\avutil-54.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.IO.FileSystem.Watcher\net6.0-windows-Release\System.IO.FileSystem.Watcher.pdb source: SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.761431234.0000000003170000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_732A30C0 push eax; ret
    Source: p11-kit-trust.dll.0.drStatic PE information: section name: .xdata
    Source: MsMpLics.dll.0.drStatic PE information: 0xE6DA2BE7 [Wed Sep 24 01:22:47 2092 UTC]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_732A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: initial sampleStatic PE information: section name: .text entropy: 6.94282730477
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\nspFBDC.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\lang-1045.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\avutil-54.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\p11-kit-trust.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\MsMpLics.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeFile created: C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeRDTSC instruction interceptor: First address: 00000000031728BE second address: 00000000031728BE instructions: 0x00000000 rdtsc 0x00000002 test dh, ah 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F07E0EDDEFDh 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a jmp 00007F07E0EDDF9Ah 0x0000000c push ss 0x0000000d pop ss 0x0000000e jmp 00007F07E0EDDF7Fh 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lang-1045.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\avutil-54.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\p11-kit-trust.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MsMpLics.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeAPI call chain: ExitProcess graph end node
    Source: avutil-54.dll.0.drBinary or memory string: yuv420pyuyv422rgb24bgr24yuv422pyuv444pyuv410pyuv411pgraygray8,y8monowmonobpal8yuvj420pyuvj422pyuvj444pxvmcmcxvmcidctuyvy422uyyvyy411bgr8bgr4bgr4_bytergb8rgb4rgb4_bytenv12nv21argbrgbaabgrbgragray16bey16begray16ley16leyuv440pyuvj440pyuva420pvdpau_h264vdpau_mpeg1vdpau_mpeg2vdpau_wmv3vdpau_vc1rgb48bergb48lergb565bergb565lergb555bergb555lebgr565bebgr565lebgr555bebgr555levaapi_mocovaapi_idctvaapi_vldyuv420p16leyuv420p16beyuv422p16leyuv422p16beyuv444p16leyuv444p16bevdpau_mpeg4dxva2_vldrgb444lergb444bebgr444lebgr444beya8gray8abgr48bebgr48leyuv420p9beyuv420p9leyuv420p10beyuv420p10leyuv422p10beyuv422p10leyuv444p9beyuv444p9leyuv444p10beyuv444p10leyuv422p9beyuv422p9levda_vldgbrpgbrp9begbrp9legbrp10begbrp10legbrp16begbrp16leyuva420p9beyuva420p9leyuva422p9beyuva422p9leyuva444p9beyuva444p9leyuva420p10beyuva420p10leyuva422p10beyuva422p10leyuva444p10beyuva444p10leyuva420p16beyuva420p16leyuva422p16beyuva422p16leyuva444p16beyuva444p16levdpauxyz12lexyz12benv16nv20lenv20beyvyu422vdaya16beya16leqsvmmald3d11va_vldrgba64bergba64lebgra64bebgra64le0rgbrgb00bgrbgr0yuva444pyuva422pyuv420p12beyuv420p12leyuv420p14beyuv420p14leyuv422p12beyuv422p12leyuv422p14beyuv422p14leyuv444p12beyuv444p12leyuv444p14beyuv444p14legbrp12begbrp12legbrp14begbrp14legbrapgbrap16begbrap16leyuvj411pbayer_bggr8bayer_rggb8bayer_gbrg8bayer_grbg8bayer_bggr16lebayer_bggr16bebayer_rggb16lebayer_rggb16bebayer_gbrg16lebayer_gbrg16bebayer_grbg16lebayer_grbg16beyuv440p10leyuv440p10beyuv440p12leyuv440p12beayuv64leayuv64bevideotoolbox_vldunknowntvpcreservedbt470mbt2020linearlog100log316iec61966-2-4bt1361eiec61966-2-1bt2020-10bt2020-20gbrycgcobt2020ncbt2020cunspecifiedleftcentertoplefttopbottomleftbottomrgb32bgr32le%s%sname nb_components nb_bits%-11s %7d %10dlibavutil/pixdesc.cd->log2_chroma_w <= 3d->log2_chroma_h <= 3d->nb_components <= 4d->name && d->name[0](d->nb_components==4 || d->nb_components==2) == !!(d->flags & (1 << 7))!c->plane && !c->step_minus1 && !c->offset_plus1 && !c->shift && !c->depth_minus1c->step_minus1 >= c->depth_minus18*(c->step_minus1+1) >= c->depth_minus1+1bayer_tmp[0] == 0 && tmp[1] == 0beyuvjpixelutils support is required but libavutil is not compiled with it
    Source: avutil-54.dll.0.drBinary or memory string: xvmcidct
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_732A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Query Registry
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
    Obfuscated Files or Information
    LSASS Memory11
    Security Software Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Software Packing
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Timestomp
    NTDS13
    System Information Discovery
    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.generic.ml.10062.exe12%VirustotalBrowse
    SecuriteInfo.com.generic.ml.10062.exe7%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exe0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exe0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\ARMOURY CRATE eGPU Product.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\MsMpLics.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\MsMpLics.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\MsMpLics.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\System.IO.FileSystem.Watcher.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\avutil-54.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\avutil-54.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\avutil-54.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\lang-1045.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\lang-1045.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\lang-1045.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nspFBDC.tmp\System.dll2%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nspFBDC.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nspFBDC.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\p11-kit-trust.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\p11-kit-trust.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://subca.ocsp-certum.com050%URL Reputationsafe
    http://ocsp.thawte.com00%URL Reputationsafe
    http://subca.ocsp-certum.com020%URL Reputationsafe
    http://subca.ocsp-certum.com010%URL Reputationsafe
    http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin2%VirustotalBrowse
    http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bin0%Avira URL Cloudsafe
    http://www.avast.com0/0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://2.56.57.22/yendexoriginwithoutfilter_rtSDhNF87.bintrue
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.certum.pl/ctsca2021.crl0oSecuriteInfo.com.generic.ml.10062.exefalse
      high
      http://creativecommons.org/licenses/by-sa/4.0/folder-publicshare.png.0.drfalse
        high
        http://repository.certum.pl/ctnca.cer09SecuriteInfo.com.generic.ml.10062.exefalse
          high
          http://crl.thawte.com/ThawteTimestampingCA.crl0SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drfalse
            high
            http://repository.certum.pl/ctsca2021.cer0SecuriteInfo.com.generic.ml.10062.exefalse
              high
              http://crl.certum.pl/ctnca.crl0kSecuriteInfo.com.generic.ml.10062.exefalse
                high
                http://subca.ocsp-certum.com05SecuriteInfo.com.generic.ml.10062.exefalse
                • URL Reputation: safe
                unknown
                http://www.symauth.com/rpa00SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drfalse
                  high
                  http://ocsp.thawte.com0SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drfalse
                  • URL Reputation: safe
                  unknown
                  http://subca.ocsp-certum.com02SecuriteInfo.com.generic.ml.10062.exefalse
                  • URL Reputation: safe
                  unknown
                  http://www.nero.comSecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drfalse
                    high
                    http://subca.ocsp-certum.com01SecuriteInfo.com.generic.ml.10062.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crl.certum.pl/ctnca2.crl0lSecuriteInfo.com.generic.ml.10062.exefalse
                      high
                      http://repository.certum.pl/ctnca2.cer09SecuriteInfo.com.generic.ml.10062.exefalse
                        high
                        http://www.avast.com0/SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, lang-1045.dll.0.drfalse
                        • URL Reputation: safe
                        unknown
                        http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.generic.ml.10062.exefalse
                          high
                          http://www.symauth.com/cps0(SecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.761266919.0000000002AE3000.00000004.00000800.00020000.00000000.sdmp, avutil-54.dll.0.drfalse
                            high
                            http://www.certum.pl/CPS0SecuriteInfo.com.generic.ml.10062.exefalse
                              high
                              https://github.com/dotnet/runtimeSecuriteInfo.com.generic.ml.10062.exe, 00000000.00000002.760785382.0000000002830000.00000004.00000800.00020000.00000000.sdmp, System.IO.FileSystem.Watcher.dll.0.drfalse
                                high
                                No contacted IP infos
                                Joe Sandbox Version:34.0.0 Boulder Opal
                                Analysis ID:634320
                                Start date and time: 25/05/202222:33:092022-05-25 22:33:09 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 7m 36s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:SecuriteInfo.com.generic.ml.10062.6710 (renamed file extension from 6710 to exe)
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:29
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal72.troj.evad.winEXE@1/14@0/0
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:
                                • Successful, ratio: 62.8% (good quality ratio 61.6%)
                                • Quality average: 88.8%
                                • Quality standard deviation: 21.5%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Override analysis time to 240s for sample files taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, www.bing.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, time.windows.com, arc.msn.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                No simulations
                                No context
                                No context
                                No context
                                No context
                                No context
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):1955040
                                Entropy (8bit):6.826653374498559
                                Encrypted:false
                                SSDEEP:49152:T3VwASOuGtlq2fIU6iFm7+BSGYsFoXOh5PGP1T/eacB4dPFPxat:vw+FDKXkuLPxS
                                MD5:39981C2A1465413B506246DA3721D9A1
                                SHA1:213C41C908F9A7C62C4D5D8079FC17188066CB3B
                                SHA-256:19AE2C74ECE76F6AE7074AC31B198D6BF201DDE201B5B31EACA023877241F7B9
                                SHA-512:F047681FF16D7C428E39D6A705BDD290B7EA227AC8176E69B989B90297541CD2A596B71673E6DFA0ACB83B201EB815E0518D52169D9FC48C6AEBF78DCB998D7D
                                Malicious:false
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8.}.k.}.k.}.k..Rk.}.k...j.}.k...j.}.k...j.}.k...j.}.k...j.}.k...j.}.k.}.k.|.k.}.k.}.kg..j3|.kf..j.}.kf.>k.}.k.}Vk.}.kf..j.}.kRich.}.k................PE..d....j.`.........."............................@.............................0...........`..................................................c...................................L.....p...........................@................ ...............................text............................... ..`.rdata..*j... ...l..................@..@.data...0e......."...z..............@....pdata..............................@..@.rsrc................b..............@..@.reloc...L.......N...h..............@..B........................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):13978
                                Entropy (8bit):7.983903298012058
                                Encrypted:false
                                SSDEEP:384:g/fHDCOQD/zKzAwhZMiZY79lBpsIyK0Xqv:g/fjdQTzKzBhZMw+lfsIyBW
                                MD5:6CEA9045463D0C5D27E1A89AE139E33F
                                SHA1:64A5497F8D154AEEF22F7CAC3F72F4D2FC5F9D62
                                SHA-256:D532BF8700F1B322DCF738AF6EF2DAB7FE5328DCBA0C4ED04227AF6BA4F1A1BD
                                SHA-512:B20D641DD59247BE2E75EA0F96408949EFE40864058B3D0938E3DBFA2F8AC960CB2F2E52E62FBE42DEC2C93EF4D9B89CF44BA31E102C3BBB7C3B726EDE77BACA
                                Malicious:false
                                Reputation:low
                                Preview:..8S/or.>;.K4C...Z.r7..0Yk.A.>....X\.{....Q...9.2..J|.0.a.8...h.v.m.?X.f.1....F&..y;..3.1../..eH.L.~...@..Fs6H..b..x....AA.q.+.j.z|.....g.&n...9..B.s.........I......R...m.*1...f?........W... ..~}._..M.r.....}}:.......%.7...7....9.........(.$.|r6...~8..3.p!xM2.....m..9..C..Us.8..+.lp+.e'..x.g.....9....x.?.}.q.\...`........0...M'2..}(|.=.uB..k..}..=:.BG\..?.P.a.!.V....v.....?.>.....zG.....d.D.jP..wD.pM..{h....'T.....>Fy.9.K.Q...af....Fq.\...Pe..G.oR.d...a5.|...FPTT{[".;hz`....(....9..r.[]F.$.A+bdz....'&TeQ.G?..7...f.O{.a!!?...[X?.j+.[9 ....QL}!u...1/:>.:6%.6.A....N....#..1.8P.2Q,.QYxk'.2D............C?..g....Y..z3W...h..5..L.i....m..a.5.$.....z...S...'lB..S.....F.e...>.8.....|.6.*.-srN&.]....s.....Lou:z..h..v.-..9.K....^.G.Qc..G.'.s....=U.-...."..ja..7.Oj..[.k,.ti(.-p.|....8..g...y..`......Q`X.....cT.l.*...6.r..$.....&........1J......R.#..-U..h.B..........L../../{Kk.....f....g%......#..["....lj..P..N...F.".0.'..H:U.JowM./L......Q.3
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                Category:modified
                                Size (bytes):960
                                Entropy (8bit):3.032437182506048
                                Encrypted:false
                                SSDEEP:12:8wl0YsXowAOcQ/tz+7RafgKDq9XKNPRKQ18/3NJkKAd4t2Y+xIBjK:8XLDaRMgKsKt9S9HAv7aB
                                MD5:01CA7DE8916567057D034EA4F9D7CF05
                                SHA1:718CA646F335D986482BF4B0F3A4C0DEC38EF5AA
                                SHA-256:BA6C443CEAC015CFEC4589BB445C52AC1DA3411BF3357FE0D55B62081B169361
                                SHA-512:1A1D64966B0B2F85BA663E37F71EB76191A703A3C07F2B827BD109BB3765416D23C9350FD1FDBA5EF0B75B8F5B0E09470811148A17C6C361138ECEB7F3CD3B89
                                Malicious:false
                                Reputation:low
                                Preview:L..................F........................................................;....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....x.2...........Unoppignorated.exe..V............................................U.n.o.p.p.i.g.n.o.r.a.t.e.d...e.x.e...".......\.U.n.o.p.p.i.g.n.o.r.a.t.e.d...e.x.e.!.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20008
                                Entropy (8bit):6.8686823517057265
                                Encrypted:false
                                SSDEEP:384:xWgEHWp1v7S+10QnqiZwtfXbMpBjn0aq8f0DBRJYHClXLRXoS:nEijw8Be1PqspoS
                                MD5:797476E8813090CC62D574BB9B59F2DD
                                SHA1:BDBBBFD1B3B2E8B2CCF368815DCF06247FC08C14
                                SHA-256:85C2314ECAA192D438DEBFAB7490E047C7780EB59A115DFEB68E36BF84CFAC22
                                SHA-512:42A6AC5750DC4F8D533AD03098348732519AE27C0EE002C4B5953205D5108EAE24C09BFFD587874FCB1DA422152A5B71DD778B58BFA760683C0A565B09C7F936
                                Malicious:false
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<..R...R...R......R..P...R.Rich..R.PE..d....+............" .........................................................0.......c....`.......................................................... ..P...............(<..............8............................................................................rdata..............................@..@.rsrc...P.... ......................@..@.....+..........T...8...8........+..........$...................8....rdata..8...x....rdata$zzzdbg.... ..0....rsrc$01....0!.. ....rsrc$02.... ....n->..;..^.....=1.[.$H.m...+..........................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):85509
                                Entropy (8bit):6.463912993297197
                                Encrypted:false
                                SSDEEP:1536:5qygxpRYb3MSYnrlZw4DLqn2l/G9jIJoHNAU4npu:2XAcSYnpZJ22dG9j6ONAUWu
                                MD5:B13B974324F63044A880BC84365A0BD0
                                SHA1:F7DABC096172A0A09C89628D830E067CC97A8E88
                                SHA-256:A34D0845D289E5A64498E4F6BF5A30A17C3F187FB292CCF5B1057D81D467E63D
                                SHA-512:B5B841042500D623161916CAD991A4F5561649BA14E609EF79958CAF4D7A95403190C187330330F10A1426F7AB9AFCA2B2ABEF9F1326580E57480D79408A455E
                                Malicious:false
                                Reputation:low
                                Preview:....f.e.........7.B8C...................................................<....f.k.f.n.f.b..,..K"....................................................%.PO@.................................!..q.b...f...f.s.3.4...\OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!..r.o...........#.1d^..................................f..........!. .R.............................f...f.....f.c....#|.8;..................................f.t....c..b...k.]^.......................................f....3..Z.....................................................f.v..n......P..............................f.......... p.j&...........................................'r.............................d..r.........5...|...................................................&&/.s.M..f.f.......(.x.o.......................................g.......e....4w....................................................f.d.......0.Cs..........................................(.efQ...........................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):71280
                                Entropy (8bit):6.498681502225803
                                Encrypted:false
                                SSDEEP:1536:OOsuxD2ljgTCcxduILBZIdf7lgzd/I0bWBuMp/xj0:OMxyold9lZI7lOpI0bauH
                                MD5:BBA87C141D8F08D86033E05DAAC57D5D
                                SHA1:1EA5B7EE9B5C418FB4B15EE91F7524F5DB0D96D1
                                SHA-256:EFD311B206AB942C188C3F83AEBE13AEF1D475CB5D822CF3B70AB162DCDC6FF7
                                SHA-512:20581E2243E5FE63174EAB6A4424C6F3B06D5582984FBF35707C00813FF662F3232C06160A5365B14F1E7FD7D861CA1702B974B3C2D8DA5C3340D6588CA0C82C
                                Malicious:false
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....\............" ......................................................... ......W.....`...@......@............... ..................................L...d(..........p$......p.......T...........................................................P...H............text............................... ..`.data...............................@....reloc..p...........................@..B............................................0.......................<.....4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...................y.........?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n.........T.....S.t.r.i.n.g.F.i.l.e.I.n.f.o...0.....0.0.0.0.0.4.b.0.....d...C.o.m.m.e.n.t.s...I.n.t.e.r.n.a.l. .i.m.p.l.e.m.e.n.t.a.t.i.o.n. .p.a.c.k.a.g.e. .n.o.t. .m.e.a.n.t. .f.o.r. .d.i.r.e.c.t. .c.o.n.s.u.m.p.t.i.o.n... .P.l.e.a.s.e. .d.o. .n.o.t. .r.e.f.e.r.e.
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):34
                                Entropy (8bit):4.256149238118269
                                Encrypted:false
                                SSDEEP:3:TFXV4ovxEun:Plv5n
                                MD5:CEA246A40ED9A68F27EEC9458A18DEEF
                                SHA1:3E210EBBD8F29926A51BA1074FAD9A22D53659D2
                                SHA-256:2F37518683B8AA7E7C81B0F07A42B2A2692CA32FE4DEEB6618470A5EB245B2EC
                                SHA-512:DD12CD2ECC855C0089E641986318FAF183E48798D5EE6F55BADF652186B8177D719FC2E631EF5C6353290827E96ADB59A715E3B82E956908D15012F01A91F9AB
                                Malicious:false
                                Reputation:low
                                Preview:[Fortovsretter]..Tagged=SNIPPENS..
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):714072
                                Entropy (8bit):6.248486521119856
                                Encrypted:false
                                SSDEEP:12288:1nBVHwA0eIjodibcTTMIVNQdqu8JbHfySBpHdiChBA:FBVJVNQoL1
                                MD5:19ED470A232B01BB34B7F85288B017F0
                                SHA1:4AE08D71FB45055FCCB0D86174150082A39881F1
                                SHA-256:CF17BEE0C9479D7AAED9D3399E79FD89ED9535175C9AEEA73C54E48124D6C81A
                                SHA-512:5EBC96C5B13A0D79C0C149C59E30AFC28AECC0FBA543A018551A1F83CEE0111EABAED8400B92694739A3734BDE64F23334BBEAEE28AACBC99358CCA075C82682
                                Malicious:false
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........L,/B-B|B-B|B-B|..|G-B|..|k-B|..|.-B|..|.-B|B-C|(-B|.Z.|G-B|B-B|A-B|a.|.-B|$.|C-B|$.|C-B|RichB-B|................PE..L......V.........."!.....J...........o.......`...............................p............@......................... ...=... ..<.......................X3...0..P0..Pk..8...........................x...@............"..P............................text....I.......J.................. ..`.rdata.......`.......N..............@..@.data...@....`.......L..............@....idata....... .......h..............@....reloc...9...0...:...x..............@..B................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:PNG image data, 16 x 16, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):585
                                Entropy (8bit):6.901794968845596
                                Encrypted:false
                                SSDEEP:12:6v/7X0Z7HBwN1+swFIzRqwnN14BZlEcFCF2BoCaTxT4:C0BqEWqQ8YGCgBoCaT14
                                MD5:1D98E1B2D84D7B9D0927F6B651EDE827
                                SHA1:A1F77FF7EC77865AEF6A4C1B64CC4E3C492090A5
                                SHA-256:A9109F45EFD9920700AAF489167AE647FB0BF88CE12AAF69502AD6D1505CB7B3
                                SHA-512:A13756009BC37481EBA3B8523EC0458A43459E34F8A81CFC924E20F9B7A68936DF4B321376B5C4DFE464E5AE403876EBB3CE96EE394C7BF1B46094CE9BC2E958
                                Malicious:false
                                Preview:.PNG........IHDR.............(-.S....sBIT.....O.....pHYs..........+......tEXtSoftware.www.inkscape.org..<.....tEXtTitle.Adwaita Folder Icons.._.....tEXtAuthor.Lapo Calamandrei..*...RtEXtCopyright.CC Attribution-ShareAlike http://creativecommons.org/licenses/by-sa/4.0/.Tb....~PLTE.........................................~...............................................................................l.....tRNS.@NS.................{IDAT.WU....0..#....9..!B...Aj)..Sv.,.....`....q..h..w..g..u.4X.x~...#S..d)...D..-W.[A4.ea...nf./.....`..|...W.}.e<.:\......~..%....IEND.B`.
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):40
                                Entropy (8bit):4.853055907333276
                                Encrypted:false
                                SSDEEP:3:rqh2mJUKMJjwD:raJ8JjI
                                MD5:6EA2EDF492D8337635DDCD02048BFA32
                                SHA1:3F86F5C6398972128ABD8822B5BD1BFE446C6517
                                SHA-256:35E1C059B4E54107456E898FBED2CFA59289F9272495014B4396C8ED427EBC95
                                SHA-512:56EC3DBDA7B837E26520F90E4D336FDB95D0789BE8A15E034526ED4553683E93F9C116FC57BCAC2C37DAEA516AFAC48CEE39F5BA6363415A4DA68806E1F6BAF9
                                Malicious:false
                                Preview:[ARBEJDSKLIMA]..Sporangia57=SPOTTEFUGL..
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):174600
                                Entropy (8bit):3.9275478025543364
                                Encrypted:false
                                SSDEEP:1536:lkoZp1DEqOBdglkr6myEGXRC5bWgiViQFpETgevYNBVe/d:qoZHq+4UXRC5b0ViQFpNQd
                                MD5:E10F0042C0EE3B2DE59BEC61D3811C6A
                                SHA1:0F75AEEE0338D2E563FD146847E21187C68FD75F
                                SHA-256:20DA8A600117A2ACC6A66AD493390D1DA3F8A9CC7FF13A8185EC02A0E5C93B2B
                                SHA-512:BA174D089A52135E9CEE8704749D9C44C4EC361C34E09C26CCFB4A34EB69590FCA77250E17B1ED68506B4C0EC958A2B17DED25741177D77CA68D05CDB1ED2FBC
                                Malicious:false
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.@...R.@.P...R.Rich..R.................PE..L....\)b...........!......................................................................@.......................................... ..h................ ...........................................................................................rdata..p...........................@..@.rsrc...h.... ......................@..@.....\)b........T........................rdata......T....rdata$zzzdbg.... ... ...rsrc$01.....@...d...rsrc$02............................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):225
                                Entropy (8bit):6.661593260259915
                                Encrypted:false
                                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllE+UwHndZxx3hYB84wXKYAIk9d0LPoBHlNHbEezI:6v/lhPysHUunYBcXKYA59dPFxRbZofp
                                MD5:E91514290CFC6F38580278374D3C6B0F
                                SHA1:068CB1200349717E8D2EE64475F480C850A85099
                                SHA-256:0DE516FC5D5A233BC240F055C70B004160CE4FA2364C93CC12D7D1A60C23420D
                                SHA-512:A6C1523D984857924FDDEFD48741B6FB552CAC220D53619F3E572799DACC0EE06B1FBF75D9CDC127BB685BADB4933FFD4F4923E341492307C55BE4C196510C57
                                Malicious:false
                                Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...?..A...O...V..D.t...8..Y.n....V.$......../..e...of.g.pm..pF(..,..Oq8.xb........~....$.]......y..".(..7.-.._....0...eUS.c..Y....}.J..p...M.....q=.=.B`....IEND.B`.
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):12288
                                Entropy (8bit):5.814115788739565
                                Encrypted:false
                                SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                MD5:CFF85C549D536F651D4FB8387F1976F2
                                SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                Malicious:false
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 2%, Browse
                                • Antivirus: Metadefender, Detection: 3%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):243209
                                Entropy (8bit):5.969458574226536
                                Encrypted:false
                                SSDEEP:6144:RPVByzfb1YfMq48FKMqCQQU7k1TAH1OobTrEPvQvHk8hep:RPKqUjHM/PvQvHk8hep
                                MD5:2510EF915FD96CB0C5D947BA98CB751D
                                SHA1:AE10088DD6EC5BD0607FD5848A746AE57DCDC20E
                                SHA-256:02528C6E3F317B8FA9010BED22383D9BF696CC3DC9B97CC7FF81A445BE470FA1
                                SHA-512:ACA3ED02461EB0D70EF7BF5A74F1E9C7D20446349A02485A49BE3530F9C7CCEEE8F74A412FA8FD9002A815762F240C3C89AEACC97FF84130BE428F8C9ED73E05
                                Malicious:false
                                Antivirus:
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................&"...%............P.........C..............................0............`... .........................................V....................p..p............ ...............................T..(...................8................................text...............................`..`.data........ ......................@....rdata..`9...0...:..................@..@.pdata..p....p.......N..............@..@.xdata..\............f..............@..@.bss....P................................edata..V............~..............@..@.idata..............................@....CRT....X...........................@....tls................................@....reloc....... ......................@..B........................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                Entropy (8bit):7.9195774738294356
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:SecuriteInfo.com.generic.ml.10062.exe
                                File size:1447056
                                MD5:95050a1e0c7d4c57f62e26967b3b0bfd
                                SHA1:baa57d1bf6d8a41ba89c6d09bfc4ec2bc986830c
                                SHA256:458597ef6835136826411179f244673d5b2702e906bedb3e470786eb455d98ce
                                SHA512:a659747a264aa16304d2d246faa277c415011ffd9c7376ac641a1193dc48c9efbbab745d9874a8aae8c4d53f050d32a2973633aab07618a2977e8502c4773549
                                SSDEEP:24576:4Y9Mbnf2fKJdodBzdf1JJNVwYFsTtflc4DJQCXzDt+Y9O1/euTLXwwUBg/:p9Mbnf8yeBzzJJe7FXzDtr0Pfwvq/
                                TLSH:8C65234D7B38D42BD1477B323D66CA3AADB4DA603565D75F728993EA0AE3305CD22230
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                                Icon Hash:38f8cecadad4cca2
                                Entrypoint:0x403640
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:61259b55b8912888e90f516ca08dc514
                                Signature Valid:false
                                Signature Issuer:CN=&#34;Brechernes6 originalbillederne Brazing Jagtdistrikter3 &#34;, O=Gennemloebe, L=Saint-Fr&#195;&#169;zal-d'Albuges, S=Occitanie, C=FR
                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                Error Number:-2146762487
                                Not Before, Not After
                                • 5/25/2022 6:12:28 PM 5/25/2023 6:12:28 PM
                                Subject Chain
                                • CN=&#34;Brechernes6 originalbillederne Brazing Jagtdistrikter3 &#34;, O=Gennemloebe, L=Saint-Fr&#195;&#169;zal-d'Albuges, S=Occitanie, C=FR
                                Version:3
                                Thumbprint MD5:8E7DC2F9F1AD6C2CDA6D266EDBD6ABFD
                                Thumbprint SHA-1:E691195416A055DD79B76CC251E1145D615EB842
                                Thumbprint SHA-256:F9208891F5FE35BC2ACD0351EC70F6955E51D254E0E594A885A216DFBEAFB35E
                                Serial:3583CC204911C9D6
                                Instruction
                                push ebp
                                mov ebp, esp
                                sub esp, 000003F4h
                                push ebx
                                push esi
                                push edi
                                push 00000020h
                                pop edi
                                xor ebx, ebx
                                push 00008001h
                                mov dword ptr [ebp-14h], ebx
                                mov dword ptr [ebp-04h], 0040A230h
                                mov dword ptr [ebp-10h], ebx
                                call dword ptr [004080C8h]
                                mov esi, dword ptr [004080CCh]
                                lea eax, dword ptr [ebp-00000140h]
                                push eax
                                mov dword ptr [ebp-0000012Ch], ebx
                                mov dword ptr [ebp-2Ch], ebx
                                mov dword ptr [ebp-28h], ebx
                                mov dword ptr [ebp-00000140h], 0000011Ch
                                call esi
                                test eax, eax
                                jne 00007F07E04849DAh
                                lea eax, dword ptr [ebp-00000140h]
                                mov dword ptr [ebp-00000140h], 00000114h
                                push eax
                                call esi
                                mov ax, word ptr [ebp-0000012Ch]
                                mov ecx, dword ptr [ebp-00000112h]
                                sub ax, 00000053h
                                add ecx, FFFFFFD0h
                                neg ax
                                sbb eax, eax
                                mov byte ptr [ebp-26h], 00000004h
                                not eax
                                and eax, ecx
                                mov word ptr [ebp-2Ch], ax
                                cmp dword ptr [ebp-0000013Ch], 0Ah
                                jnc 00007F07E04849AAh
                                and word ptr [ebp-00000132h], 0000h
                                mov eax, dword ptr [ebp-00000134h]
                                movzx ecx, byte ptr [ebp-00000138h]
                                mov dword ptr [0042A318h], eax
                                xor eax, eax
                                mov ah, byte ptr [ebp-0000013Ch]
                                movzx eax, ax
                                or eax, ecx
                                xor ecx, ecx
                                mov ch, byte ptr [ebp-2Ch]
                                movzx ecx, cx
                                shl eax, 10h
                                or eax, ecx
                                Programming Language:
                                • [EXP] VC++ 6.0 SP5 build 8804
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x5b0000x22d68.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x15f5800x1f10
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                .ndata0x2b0000x300000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0x5b0000x22d680x22e00False0.596998207885data6.16097805989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_ICON0x5b2f80x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0x6bb200xd4b1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                RT_ICON0x78fd80x25a8dataEnglishUnited States
                                RT_ICON0x7b5800x10a8dataEnglishUnited States
                                RT_ICON0x7c6280x988dataEnglishUnited States
                                RT_ICON0x7cfb00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_DIALOG0x7d4180x100dataEnglishUnited States
                                RT_DIALOG0x7d5180x11cdataEnglishUnited States
                                RT_DIALOG0x7d6380xc4dataEnglishUnited States
                                RT_DIALOG0x7d7000x60dataEnglishUnited States
                                RT_GROUP_ICON0x7d7600x5adataEnglishUnited States
                                RT_VERSION0x7d7c00x264dataEnglishUnited States
                                RT_MANIFEST0x7da280x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                                DLLImport
                                ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                DescriptionData
                                LegalCopyrightMyotoniasgrupp96
                                FileVersion0.2.16
                                CompanyNamePARACHROMELI
                                LegalTrademarksbrnesa
                                Commentsansp
                                ProductNametomtersselv
                                FileDescriptionPolstrende
                                Translation0x0409 0x04b0
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                No network behavior found
                                No statistics
                                Target ID:0
                                Start time:22:34:11
                                Start date:25/05/2022
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.10062.exe"
                                Imagebase:0x400000
                                File size:1447056 bytes
                                MD5 hash:95050A1E0C7D4C57F62E26967B3B0BFD
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.761431234.0000000003170000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low

                                No disassembly