Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO64747835 PDF.exe

Overview

General Information

Sample Name:PO64747835 PDF.exe
Analysis ID:634445
MD5:9a548d0455360a501ea392c85ecdb905
SHA1:2d96b448e8a70468c24aa1e9848c350e9fab1696
SHA256:9af1b3d7b095b178c588d19e2d7a9418d5c638b4ac7b94ba3dc9d9223f14a52c
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
PE file contains more sections than normal
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • PO64747835 PDF.exe (PID: 6248 cmdline: "C:\Users\user\Desktop\PO64747835 PDF.exe" MD5: 9A548D0455360A501EA392C85ECDB905)
  • cleanup
{"Payload URL": "http://donaldtrumpverse.com/kOrg_stUoodKu54.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.769947048.0000000002920000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.769947048.0000000002920000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://donaldtrumpverse.com/kOrg_stUoodKu54.bin"}
    Source: PO64747835 PDF.exeReversingLabs: Detection: 14%
    Source: PO64747835 PDF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENEJump to behavior
    Source: PO64747835 PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: msvcr100.i386.pdb source: PO64747835 PDF.exe, 00000000.00000002.769148112.000000000040D000.00000004.00000001.01000000.00000003.sdmp, msvcr100.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdbSHA2562 source: CDMDataEventHandler.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdb source: CDMDataEventHandler.dll.0.dr
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://donaldtrumpverse.com/kOrg_stUoodKu54.bin
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: PO64747835 PDF.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://pie-us1.api.ws-hp.com/clienttelemetry
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://stage-us1.api.ws-hp.com/clienttelemetry
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://us1.api.ws-hp.com/clienttelemetry
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: PO64747835 PDF.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: PO64747835 PDF.exe, 00000000.00000002.769148112.000000000040D000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsvcr100_clr0400.dll^ vs PO64747835 PDF.exe
    Source: PO64747835 PDF.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_0040755C
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_00406D85
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_734B1BFF
    Source: libLerc.dll.0.drStatic PE information: Number of sections : 11 > 10
    Source: libenchant-2.dll.0.drStatic PE information: Number of sections : 12 > 10
    Source: gspawn-win64-helper.exe.0.drStatic PE information: Number of sections : 11 > 10
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeProcess Stats: CPU usage > 98%
    Source: PO64747835 PDF.exeReversingLabs: Detection: 14%
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeFile read: C:\Users\user\Desktop\PO64747835 PDF.exeJump to behavior
    Source: PO64747835 PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: CDMDataEventHandler.dll.0.dr, Hp.CDMDataEventHandler/Sender/TelemetrySender.csBase64 encoded string: 'uWg5oksEUHoewK5WcwMNmfkglf2HF7AWQAGHYz0VfFMeg1YF2aEU/2OPoeETAl78'
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nsjD8DF.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/11@0/1
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENEJump to behavior
    Source: PO64747835 PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: msvcr100.i386.pdb source: PO64747835 PDF.exe, 00000000.00000002.769148112.000000000040D000.00000004.00000001.01000000.00000003.sdmp, msvcr100.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdbSHA2562 source: CDMDataEventHandler.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdb source: CDMDataEventHandler.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.769947048.0000000002920000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_734B30C0 push eax; ret
    Source: gspawn-win64-helper.exe.0.drStatic PE information: section name: .xdata
    Source: libLerc.dll.0.drStatic PE information: section name: .xdata
    Source: libenchant-2.dll.0.drStatic PE information: section name: .xdata
    Source: CDMDataEventHandler.dll.0.drStatic PE information: 0x9C213F02 [Thu Jan 2 09:55:14 2053 UTC]
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_734B1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: initial sampleStatic PE information: section name: .text entropy: 6.90904492268
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeFile created: C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeFile created: C:\Users\user\AppData\Local\Temp\libLerc.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeFile created: C:\Users\user\AppData\Local\Temp\libenchant-2.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeFile created: C:\Users\user\AppData\Local\Temp\msvcr100.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeFile created: C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exeJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nseD9AB.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeRDTSC instruction interceptor: First address: 00000000029228CF second address: 00000000029228CF instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F8FC0BA137Dh 0x00000006 inc ebp 0x00000007 pushad 0x00000008 mov bh, F8h 0x0000000a cmp bh, FFFFFFF8h 0x0000000d jne 00007F8FC0BAA368h 0x00000013 popad 0x00000014 inc ebx 0x00000015 rdtsc
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libenchant-2.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libLerc.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\msvcr100.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exeJump to dropped file
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_734B1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\PO64747835 PDF.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    21
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Software Packing
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Timestomp
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    PO64747835 PDF.exe15%ReversingLabsWin32.Trojan.InjectorX
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\libLerc.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\libenchant-2.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\libenchant-2.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\msvcr100.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\msvcr100.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nseD9AB.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nseD9AB.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
    https://stage-us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
    https://pie-us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
    http://donaldtrumpverse.com/kOrg_stUoodKu54.bin0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://donaldtrumpverse.com/kOrg_stUoodKu54.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.jsonCDMDataEventHandler.dll.0.drfalse
      high
      https://us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      https://stage-us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorPO64747835 PDF.exefalse
        high
        https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.jsonCDMDataEventHandler.dll.0.drfalse
          high
          https://pie-us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
          • Avira URL Cloud: safe
          unknown
          https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.resoCDMDataEventHandler.dll.0.drfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            IP
            192.168.2.1
            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:634445
            Start date and time: 26/05/202206:00:092022-05-26 06:00:09 +02:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 15s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:PO64747835 PDF.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:30
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal72.troj.evad.winEXE@1/11@0/1
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 63.2% (good quality ratio 61.9%)
            • Quality average: 88.3%
            • Quality standard deviation: 21.3%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Adjust boot time
            • Enable AMSI
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, backgroundTaskHost.exe, UsoClient.exe, audiodg.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, go.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtSetInformationFile calls found.
            No simulations
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:MS Windows HtmlHelp Data
            Category:dropped
            Size (bytes):43566
            Entropy (8bit):7.382704049850724
            Encrypted:false
            SSDEEP:768:7gyaYEUz32Q+MLPybLI1GPlnL7ZsruV+P/34RE+OUuiozjd/6W4:7gvFUz32ftIsMuV+PYSU9o3d/94
            MD5:27729CF331D3767DF077F52B262D88F3
            SHA1:EF4B6F74A0608B5A4DC6E3CA465A96137C1CAD74
            SHA-256:CA601E57DD2C1E6E92145A8A19083599261B626A4D26B04D8C3FD5BDDDB2CB0D
            SHA-512:AC7B8D61462538011D20BEC2D2BEAE62AB7DAA16866FC9B1CDBBDCEDF47796D93507E2E706CA9DECF0C26D0F1031285B9268A747755ABCB1E4A161B9D9CF98F2
            Malicious:false
            Reputation:low
            Preview:ITSF....`..................|.{.......".....|.{......."..`...............x.......T.......................................ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR...M.../#ITBITS..../#STRINGS...2.]./#SYSTEM..f.T./#TOPICS...M.@./#URLSTR...}.5./#URLTBL.....p./#WINDOWS...M.L./$FIftiMain......G./$OBJINST...G.?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property...C../$WWKeywordLinks/..../$WWKeywordLinks/BTree.....L./$WWKeywordLinks/Data...e4./$WWKeywordLinks/Map....../$WWKeywordLinks/Property...# ./Advanced_Phone_Operations.htm....../Audio_Services.htm....../Authorization_Options.htm.....$/Bluetooth Win7 Vista Suite help.hhc...Z.k$/Bluetooth Win7 Vista Suite help.hhk...E.../Bluetooth_Devices.htm..0..z./Bluetooth_Devices_files/...//Bluetooth_Devices_files/colorschememapping.xml...\.:%/Bluetooth_Devices_files/filelist.xml...a.['/Bluetooth_Devices_files/themedata.thmx...<. ./Bluetooth_Settings.htm...*..[./Bluetooth_
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):101480
            Entropy (8bit):5.754479856662274
            Encrypted:false
            SSDEEP:1536:HMrDKbA8xl6y9Oj2FqnawHzDYwVY4quXoYbggnC:HM6dMy9MHBVY4qAolOC
            MD5:25F3ECFD195030F6B1BAD60E5EF97163
            SHA1:749B7E267CDBBC83783DFA4C7BF45134556C13D7
            SHA-256:FCD740746D2B3E01945E6A099AB4CDD06ECE05818E25D08C5DDAFBD333B0DC84
            SHA-512:D91803A022DD9A6EF0E77CB231A5FB5DD1BC275F4CC38D886FD365B7EEAD094712ADC4FA3AAFFB8354DC193BAC3B8697F685631AE3B4D23924387706DB3C0DD9
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?!..........." ..0..h............... ........... ....................................`.....................................O.......|............r..h...............T............................................ ............... ..H............text....g... ...h.................. ..`.rsrc...|............j..............@..@.reloc...............p..............@..B.......................H........u................................................................(....*.0..S........ r...pr3..p..(....(1...........o2.....r...pr...pr3..p. (....... r...pr3..p."(....*..........'.......0..K........ r...pr3..p.'(....(1...o4.....r...pr...pr3..p..(....... r...pr3..p.0(....*..................0..L........ r@..pr3..p.6(..........(......r...pr@..pr3..p.=(....... r@..pr3..p.?(....*......... .......0..u........ r...pr3..p.C(.....(...+..(...+.(....%.o....(.....o....(....o....o.
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:data
            Category:dropped
            Size (bytes):85684
            Entropy (8bit):6.433546139636705
            Encrypted:false
            SSDEEP:1536:dTTvb32heICeH0brTb9rndDhW7ZMTi2A4l+HIhFkUYN:dTTvbzWH0bdthKZvd4QHIhFkxN
            MD5:E17F742A3B79DF2D21AC403EAFB27574
            SHA1:5A53F28B12C228F77FAF580A54F1E12AC6B93427
            SHA-256:D8A19805B48F85692AB8E6D8090A5151041DC73DD5C07B98171F7AE242250E41
            SHA-512:2CD3EB09F986F838A1C38479035C3B0FB5112A89CC81D24CF60C53C70707A04221196249ABC9C37FD65676A22728817285FC7EE8EFC6585F130A12E44478D1FF
            Malicious:false
            Reputation:low
            Preview:...d..o..a......)..Fu........................................f.h.f.c....4E.G................................................f..........f....1.A.........................................................u....2.L.n7777777777777777777777777777777777777777777777.......~........f.k.....i,]]]]]]]]]]]]]]]]]]]]]]]]]].f..........2E.k......................................................f...f.v..88.q8&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&..z.#f.........f...f.....l4.............................q.xf...f......6..ccAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA........w.....j../.&._.............................................f.u.....u.....7..7$hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh.....t.f.i....-..N\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\.f........f.b..+.>`..........................................[.i.r.......t..-A. ;..............................................s.".....!.p.b............................. .f...f.........f.v..5l.C...............................
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:ASCII text, with very long lines, with no line terminators
            Category:dropped
            Size (bytes):37208
            Entropy (8bit):3.9995207312720225
            Encrypted:false
            SSDEEP:768:Y9RVFQbsrxeETZvAuCk4H9TTMIjf5Ni/0QQSg2hT/ma6d:YTVF47Ep7Ck89EWeM7JZd
            MD5:EEDF996AEE7BE718D4ED650F72298AC4
            SHA1:BC860286D87BA1D7C66A9E3351C14A8C1C230461
            SHA-256:8ACC66E278720D3C67A2295079BB8C9A595C9732A85F361E01B22349246E333E
            SHA-512:DECB271E8E54929DDD94D1EE60B9538E640B200D3B0F27BBA0E4080996E3817033B38AA54A3C2562AB45CD91E05D99209FBE126F572F9EF1B074CEDF0760C3AB
            Malicious:false
            Reputation:low
            Preview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
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
            Category:dropped
            Size (bytes):22479
            Entropy (8bit):5.08095074751023
            Encrypted:false
            SSDEEP:384:PxozhVwKBMySMIKoE/pJf2OG3mcJ7t/CWP9At/H:P6Vf2yS0r/pJf6BEWP9At/H
            MD5:8154B723020AEE70829FFC138C9D1C4C
            SHA1:6F7AF3827B37845F071625458DF1DB8BA9056FD6
            SHA-256:902F9D2A239CCAEBA677DB5838654FB6CE7CF3D21243B8EF122E9D970714B0D3
            SHA-512:D3F59F778AA72D26896AA2C81972F144DAB716DFA8E45E7B3C59F528B2752FE9E8971C86CF927C62E7501D9910E9D1212EFA1A58C29796A92E2D433116E76931
            Malicious:false
            Antivirus:
            • Antivirus: Metadefender, Detection: 0%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........N..E.....&....%. ...J.................@....................................>.....`... ..............................................................P..@............................................@..(...................\................................text...X........ ..................`..`.data........0.......$..............@....rdata.......@.......&..............@..@.pdata..@....P.......2..............@..@.xdata.......`.......6..............@..@.bss.........p...........................idata...............8..............@....CRT....`............B..............@....tls.................D..............@....rsrc................F..............@....reloc...............L..............@..B........................................................................................................................................................................
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
            Category:dropped
            Size (bytes):602739
            Entropy (8bit):6.344393812734055
            Encrypted:false
            SSDEEP:12288:PCaPBchMCFjXEbIaM43VV1oSIG5BY5IikQH/oNguISjFovd:KaaMCeVV1oSIG5BY3/oNuSjFovd
            MD5:58BFEB91921D4882F7EDABAB9C0C1C17
            SHA1:596DB0512A25089EF7CDE48CA3393E4F6878FF90
            SHA-256:5C9DB6D64BAF0250735368825CEC3032EC39999F266125D132157ECC0403EE12
            SHA-512:A86C5F00109267532531366DF07A0187D2FBB80E1628A6E30508AA74098CAB4CDF5CAD54468929604F89CAA656BDBEF6B2F25C462AA1B72898B66F3B8D227AA2
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........&..V.....&"...%....."......P..........Y....................................P|....`... ......................................`.......p..,...............L...........................................@...(...................$r...............................text...............................`..`.data...............................@....rdata..............................@..@.pdata..L...........................@..@.xdata...#... ...$..................@..@.bss.........P...........................edata.......`......................@..@.idata..,....p......................@....CRT....X............ ..............@....tls................."..............@....reloc...............$..............@..B........................................................................................................................................................................
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
            Category:dropped
            Size (bytes):49851
            Entropy (8bit):5.71925712297816
            Encrypted:false
            SSDEEP:768:59P9Y+clVaXLNcGRmDRC31lRrox5iJXx/gn9VFuKVcXGJMRv7hb8u+DwbMORdiPF:HPe+IkBcAEC31luGCQKKWJa8atRIPNQa
            MD5:6A9928C42EB4375CCEF3A025F3535795
            SHA1:395703F4970B42F55C2BCB2B8CF3F0D12E192CEB
            SHA-256:CAA457EF4BD84476790D215FFFF048DEB162CABC14DB3FF679795CCEA8972411
            SHA-512:27F1E2E3DDF052A05D9F0C48E0936E0D4A7E850E4E835EAED96495E6241167915FCDAD371EA206C5B741846D70FF3AFCBA83269B01ED90B22B3F7F42572F03DB
            Malicious:false
            Antivirus:
            • Antivirus: Metadefender, Detection: 0%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...........~.....&"...%.h..........P..........V.............................P.......O....`... .................................................\....0..8....................@..l...........................@...(....................................................text...hf.......h..................`..`.data................l..............@....rdata..P............n..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..............................@..@.idata..\...........................@....CRT....X...........................@....tls......... ......................@....rsrc...8....0......................@....reloc..l....@......................@..B................................................................................................................................
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):773968
            Entropy (8bit):6.901559811406837
            Encrypted:false
            SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
            MD5:0E37FBFA79D349D672456923EC5FBBE3
            SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
            SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
            SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
            Malicious:false
            Antivirus:
            • Antivirus: Metadefender, Detection: 0%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):12288
            Entropy (8bit):5.814115788739565
            Encrypted:false
            SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
            MD5:CFF85C549D536F651D4FB8387F1976F2
            SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
            SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
            SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
            Malicious:false
            Antivirus:
            • Antivirus: Metadefender, Detection: 3%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
            Category:dropped
            Size (bytes):429
            Entropy (8bit):7.2660585571428715
            Encrypted:false
            SSDEEP:12:6v/723xn6PprukRVpsTWuFTEmRpnJGoQ6:9n6P7RvsTWuFTXpnNQ6
            MD5:84D033B14C06568FA57352CCF18D8D35
            SHA1:1D75B42F61842E8B0FA8D811DAC72B313CDDCA74
            SHA-256:3989B93626DC3ED6EF03430AD0B1FF5C6E358DAC76E34ED7C8086579B68E660F
            SHA-512:EAFE07814DF75D019EB39D999325818CE8F2D164A621E713709EE5E1F3D260EB6BCAA726A17588D034F6A6E7733B71A5141CE5B4CFCE267CBFA22B82D6227783
            Malicious:false
            Preview:.PNG........IHDR................a...tIDATx..S.n.P.-.6w7..8;...#.E.].8.....wh.O."......`....^o{...4.R .....4..F{....h..}o.X..d...4M..V.ELH.aA.-.%D<..g.Tj.....x....[E(..J.z..n7...R..X..\..D...!..h5............3.w/... ....K.;c....MO.O.`........h4..d......`~T9::"..I...0p.R..\.....&.....;.F..X.a....;.._%....P.\.B.D..t.D..Y....B.Z..1...5U.U...1...Z..D"R.T..w@:...%.....\...\..-.B......E{....h..;w....p..+....IEND.B`.
            Process:C:\Users\user\Desktop\PO64747835 PDF.exe
            File Type:SVG Scalable Vector Graphics image
            Category:dropped
            Size (bytes):335
            Entropy (8bit):4.737555359684875
            Encrypted:false
            SSDEEP:6:TMVBd/6o8GUYl/n7S3mc4slZRI2rjFvRbWHFHUHFvCpifW1IUHFBLJZtSKlNK+:TMHdPnnl/nu3i2FZ484sIBLjdlj
            MD5:C05C42CB3D95BF3BC7F49CCD8DCCA510
            SHA1:20442E344E95508586B1B2A7B4C6272C3F5C86F8
            SHA-256:695554CE5F23A275D3C25C27410D0CFBF8A83156807DAA3A601635E4E5D8AED0
            SHA-512:0EC19BBA7B5032670524965A8C55D8C6401F833000880DE1C0F74A5EAA4E302B0CE3E60218F3DDB95CB3E1EA7374A197CB71682526DFF910D9A6CF35FF971BB6
            Malicious:false
            Preview:<?xml version="1.0" encoding="UTF-8"?>.<svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg">. <path d="m 4 1 c -1.660156 0 -3 1.339844 -3 3 v 8 c 0 1.660156 1.339844 3 3 3 h 8 c 1.660156 0 3 -1.339844 3 -3 v -8 c 0 -1.660156 -1.339844 -3 -3 -3 z m 0 6 h 8 v 2 h -8 z m 0 0" fill="#2e3436"/>.</svg>.
            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
            Entropy (8bit):7.76537086611817
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:PO64747835 PDF.exe
            File size:1004686
            MD5:9a548d0455360a501ea392c85ecdb905
            SHA1:2d96b448e8a70468c24aa1e9848c350e9fab1696
            SHA256:9af1b3d7b095b178c588d19e2d7a9418d5c638b4ac7b94ba3dc9d9223f14a52c
            SHA512:0160e41e5bb62af676f965e9b958fd552273abb4a5bdf09b90d13507b474519b9dbb252e2b0d57485fb2cd1bb7b406f1a2b27d28a8cff80ab0e63bb5f56db40c
            SSDEEP:24576:bbHwJU6HPz7KU7lXzd2+gIsofFiXKU74yNCj:fHx47NxlMo9i6j
            TLSH:BD2513216614F817F3900972C9E6F77E56B4FA382EA1CA03A6687F2D363D75C5828316
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
            Icon Hash:7cbc7e6e78b0e010
            Entrypoint:0x40352d
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
            Instruction
            push ebp
            mov ebp, esp
            sub esp, 000003F4h
            push ebx
            push esi
            push edi
            push 00000020h
            pop edi
            xor ebx, ebx
            push 00008001h
            mov dword ptr [ebp-14h], ebx
            mov dword ptr [ebp-04h], 0040A2E0h
            mov dword ptr [ebp-10h], ebx
            call dword ptr [004080CCh]
            mov esi, dword ptr [004080D0h]
            lea eax, dword ptr [ebp-00000140h]
            push eax
            mov dword ptr [ebp-0000012Ch], ebx
            mov dword ptr [ebp-2Ch], ebx
            mov dword ptr [ebp-28h], ebx
            mov dword ptr [ebp-00000140h], 0000011Ch
            call esi
            test eax, eax
            jne 00007F8FC0AE458Ah
            lea eax, dword ptr [ebp-00000140h]
            mov dword ptr [ebp-00000140h], 00000114h
            push eax
            call esi
            mov ax, word ptr [ebp-0000012Ch]
            mov ecx, dword ptr [ebp-00000112h]
            sub ax, 00000053h
            add ecx, FFFFFFD0h
            neg ax
            sbb eax, eax
            mov byte ptr [ebp-26h], 00000004h
            not eax
            and eax, ecx
            mov word ptr [ebp-2Ch], ax
            cmp dword ptr [ebp-0000013Ch], 0Ah
            jnc 00007F8FC0AE455Ah
            and word ptr [ebp-00000132h], 0000h
            mov eax, dword ptr [ebp-00000134h]
            movzx ecx, byte ptr [ebp-00000138h]
            mov dword ptr [00434FB8h], eax
            xor eax, eax
            mov ah, byte ptr [ebp-0000013Ch]
            movzx eax, ax
            or eax, ecx
            xor ecx, ecx
            mov ch, byte ptr [ebp-2Ch]
            movzx ecx, cx
            shl eax, 10h
            or eax, ecx
            Programming Language:
            • [EXP] VC++ 6.0 SP5 build 8804
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x28498.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .ndata0x360000x360000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x6c0000x284980x28600False0.447235390867data5.43623310188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            RT_ICON0x6c3580x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
            RT_ICON0x7cb800x94a8dataEnglishUnited States
            RT_ICON0x860280x5488dataEnglishUnited States
            RT_ICON0x8b4b00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 65279, next used block 4294967040EnglishUnited States
            RT_ICON0x8f6d80x25a8dataEnglishUnited States
            RT_ICON0x91c800x10a8dataEnglishUnited States
            RT_ICON0x92d280x988dataEnglishUnited States
            RT_ICON0x936b00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
            RT_DIALOG0x93b180x100dataEnglishUnited States
            RT_DIALOG0x93c180x11cdataEnglishUnited States
            RT_DIALOG0x93d380xc4dataEnglishUnited States
            RT_DIALOG0x93e000x60dataEnglishUnited States
            RT_GROUP_ICON0x93e600x76dataEnglishUnited States
            RT_VERSION0x93ed80x27cdataEnglishUnited States
            RT_MANIFEST0x941580x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
            DLLImport
            ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
            SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
            ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
            USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
            DescriptionData
            LegalCopyrightEuthanasiachromo202
            FileVersion24.24.17
            CompanyNameConciliato
            LegalTrademarksLASHINGPREEXPOU
            CommentsSubconceptflovse2
            ProductNameRitha
            FileDescriptionandenk
            Translation0x0409 0x04b0
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            No network behavior found
            No statistics
            Target ID:0
            Start time:06:01:09
            Start date:26/05/2022
            Path:C:\Users\user\Desktop\PO64747835 PDF.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\PO64747835 PDF.exe"
            Imagebase:0x400000
            File size:1004686 bytes
            MD5 hash:9A548D0455360A501EA392C85ECDB905
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.769947048.0000000002920000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
            Reputation:low

            No disassembly