Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SCAN Swift 054545676700000000000000001.exe

Overview

General Information

Sample Name:SCAN Swift 054545676700000000000000001.exe
Analysis ID:634468
MD5:c5cc0d82dd8e1cf55d7fd3b5c067752b
SHA1:cdbb4ff532aefa60d63feb5d0717f28c776ef9ed
SHA256:3e02a6175b6567980d495bc4323d36c137fdc86f80b01a1b0da1d85d105221be
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
PE file contains more sections than normal
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Payload URL": "http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.775728469.00000000028E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.775728469.00000000028E0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bin"}
    Source: SCAN Swift 054545676700000000000000001.exeVirustotal: Detection: 13%Perma Link
    Source: SCAN Swift 054545676700000000000000001.exeReversingLabs: Detection: 12%
    Source: SCAN Swift 054545676700000000000000001.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENEJump to behavior
    Source: SCAN Swift 054545676700000000000000001.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: msvcr100.i386.pdb source: SCAN Swift 054545676700000000000000001.exe, 00000000.00000002.775107663.000000000040D000.00000004.00000001.01000000.00000003.sdmp, msvcr100.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdbSHA2562 source: CDMDataEventHandler.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdb source: CDMDataEventHandler.dll.0.dr
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bin
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: SCAN Swift 054545676700000000000000001.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://pie-us1.api.ws-hp.com/clienttelemetry
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://stage-us1.api.ws-hp.com/clienttelemetry
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://us1.api.ws-hp.com/clienttelemetry
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: SCAN Swift 054545676700000000000000001.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: SCAN Swift 054545676700000000000000001.exe, 00000000.00000002.775107663.000000000040D000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsvcr100_clr0400.dll^ vs SCAN Swift 054545676700000000000000001.exe
    Source: SCAN Swift 054545676700000000000000001.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_0040755C
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_00406D85
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_734E1BFF
    Source: libLerc.dll.0.drStatic PE information: Number of sections : 11 > 10
    Source: libenchant-2.dll.0.drStatic PE information: Number of sections : 12 > 10
    Source: gspawn-win64-helper.exe.0.drStatic PE information: Number of sections : 11 > 10
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeProcess Stats: CPU usage > 98%
    Source: SCAN Swift 054545676700000000000000001.exeVirustotal: Detection: 13%
    Source: SCAN Swift 054545676700000000000000001.exeReversingLabs: Detection: 12%
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeFile read: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeJump to behavior
    Source: SCAN Swift 054545676700000000000000001.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: CDMDataEventHandler.dll.0.dr, Hp.CDMDataEventHandler/Sender/TelemetrySender.csBase64 encoded string: 'uWg5oksEUHoewK5WcwMNmfkglf2HF7AWQAGHYz0VfFMeg1YF2aEU/2OPoeETAl78'
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeFile created: C:\Users\user\AppData\Local\Temp\nsy8FE0.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/11@0/0
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENEJump to behavior
    Source: SCAN Swift 054545676700000000000000001.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: msvcr100.i386.pdb source: SCAN Swift 054545676700000000000000001.exe, 00000000.00000002.775107663.000000000040D000.00000004.00000001.01000000.00000003.sdmp, msvcr100.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdbSHA2562 source: CDMDataEventHandler.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdb source: CDMDataEventHandler.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.775728469.00000000028E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_734E30C0 push eax; ret
    Source: gspawn-win64-helper.exe.0.drStatic PE information: section name: .xdata
    Source: libLerc.dll.0.drStatic PE information: section name: .xdata
    Source: libenchant-2.dll.0.drStatic PE information: section name: .xdata
    Source: CDMDataEventHandler.dll.0.drStatic PE information: 0x9C213F02 [Thu Jan 2 09:55:14 2053 UTC]
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_734E1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: initial sampleStatic PE information: section name: .text entropy: 6.90904492268
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeFile created: C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dllJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeFile created: C:\Users\user\AppData\Local\Temp\libLerc.dllJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeFile created: C:\Users\user\AppData\Local\Temp\libenchant-2.dllJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeFile created: C:\Users\user\AppData\Local\Temp\msvcr100.dllJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeFile created: C:\Users\user\AppData\Local\Temp\nsy907D.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeFile created: C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exeJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeRDTSC instruction interceptor: First address: 00000000028E27AC second address: 00000000028E27AC instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F7230BC55CAh 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dllJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libenchant-2.dllJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libLerc.dllJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\msvcr100.dllJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exeJump to dropped file
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_734E1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    21
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Software Packing
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Timestomp
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SCAN Swift 054545676700000000000000001.exe13%VirustotalBrowse
    SCAN Swift 054545676700000000000000001.exe12%ReversingLabsWin32.Trojan.InjectorX
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\libLerc.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\libenchant-2.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\libenchant-2.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\msvcr100.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\msvcr100.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsy907D.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsy907D.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bin0%Avira URL Cloudsafe
    https://us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
    https://stage-us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
    https://pie-us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.jsonCDMDataEventHandler.dll.0.drfalse
      high
      https://us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      https://stage-us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorSCAN Swift 054545676700000000000000001.exefalse
        high
        https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.jsonCDMDataEventHandler.dll.0.drfalse
          high
          https://pie-us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
          • Avira URL Cloud: safe
          unknown
          https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.resoCDMDataEventHandler.dll.0.drfalse
            high
            No contacted IP infos
            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:634468
            Start date and time: 26/05/202207:53:252022-05-26 07:53:25 +02:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 7m 17s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:SCAN Swift 054545676700000000000000001.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:30
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal72.troj.evad.winEXE@1/11@0/0
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 85.5% (good quality ratio 84.3%)
            • Quality average: 86.8%
            • Quality standard deviation: 21.3%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Adjust boot time
            • Enable AMSI
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, backgroundTaskHost.exe, UsoClient.exe, audiodg.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, go.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtSetInformationFile calls found.
            No simulations
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:ASCII text, with very long lines, with no line terminators
            Category:dropped
            Size (bytes):48578
            Entropy (8bit):3.9996821982698543
            Encrypted:false
            SSDEEP:768:velWtO1epiSIzDraCsM05UTuEz9YaD/njlRDgEQokquQ7zPfBIjF4dEGBVzb2gxp:veogSIPr570KuEzyaflKEfkquQ7zhIpI
            MD5:1453D96D66FD8909BD69CD2BDDF705FF
            SHA1:4A81D48B9D6804E17F92B26C471251D1BED031DA
            SHA-256:F45191ABD5414B0F069C944290F953D55AD2A24C20F1EA1055F0DDEBEE297C9B
            SHA-512:EBE334EA42422167CFEA68882FF50CA8441F80088A05A5A74A60A9ACA0F1B073FB924A94522039BDB3B688A9A23ECEB40824483E1A14008C652C520673BA0EE8
            Malicious:false
            Reputation:low
            Preview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
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:MS Windows HtmlHelp Data
            Category:dropped
            Size (bytes):43566
            Entropy (8bit):7.382704049850724
            Encrypted:false
            SSDEEP:768:7gyaYEUz32Q+MLPybLI1GPlnL7ZsruV+P/34RE+OUuiozjd/6W4:7gvFUz32ftIsMuV+PYSU9o3d/94
            MD5:27729CF331D3767DF077F52B262D88F3
            SHA1:EF4B6F74A0608B5A4DC6E3CA465A96137C1CAD74
            SHA-256:CA601E57DD2C1E6E92145A8A19083599261B626A4D26B04D8C3FD5BDDDB2CB0D
            SHA-512:AC7B8D61462538011D20BEC2D2BEAE62AB7DAA16866FC9B1CDBBDCEDF47796D93507E2E706CA9DECF0C26D0F1031285B9268A747755ABCB1E4A161B9D9CF98F2
            Malicious:false
            Reputation:low
            Preview:ITSF....`..................|.{.......".....|.{......."..`...............x.......T.......................................ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR...M.../#ITBITS..../#STRINGS...2.]./#SYSTEM..f.T./#TOPICS...M.@./#URLSTR...}.5./#URLTBL.....p./#WINDOWS...M.L./$FIftiMain......G./$OBJINST...G.?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property...C../$WWKeywordLinks/..../$WWKeywordLinks/BTree.....L./$WWKeywordLinks/Data...e4./$WWKeywordLinks/Map....../$WWKeywordLinks/Property...# ./Advanced_Phone_Operations.htm....../Audio_Services.htm....../Authorization_Options.htm.....$/Bluetooth Win7 Vista Suite help.hhc...Z.k$/Bluetooth Win7 Vista Suite help.hhk...E.../Bluetooth_Devices.htm..0..z./Bluetooth_Devices_files/...//Bluetooth_Devices_files/colorschememapping.xml...\.:%/Bluetooth_Devices_files/filelist.xml...a.['/Bluetooth_Devices_files/themedata.thmx...<. ./Bluetooth_Settings.htm...*..[./Bluetooth_
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
            Category:dropped
            Size (bytes):101480
            Entropy (8bit):5.754479856662274
            Encrypted:false
            SSDEEP:1536:HMrDKbA8xl6y9Oj2FqnawHzDYwVY4quXoYbggnC:HM6dMy9MHBVY4qAolOC
            MD5:25F3ECFD195030F6B1BAD60E5EF97163
            SHA1:749B7E267CDBBC83783DFA4C7BF45134556C13D7
            SHA-256:FCD740746D2B3E01945E6A099AB4CDD06ECE05818E25D08C5DDAFBD333B0DC84
            SHA-512:D91803A022DD9A6EF0E77CB231A5FB5DD1BC275F4CC38D886FD365B7EEAD094712ADC4FA3AAFFB8354DC193BAC3B8697F685631AE3B4D23924387706DB3C0DD9
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?!..........." ..0..h............... ........... ....................................`.....................................O.......|............r..h...............T............................................ ............... ..H............text....g... ...h.................. ..`.rsrc...|............j..............@..@.reloc...............p..............@..B.......................H........u................................................................(....*.0..S........ r...pr3..p..(....(1...........o2.....r...pr...pr3..p. (....... r...pr3..p."(....*..........'.......0..K........ r...pr3..p.'(....(1...o4.....r...pr...pr3..p..(....... r...pr3..p.0(....*..................0..L........ r@..pr3..p.6(..........(......r...pr@..pr3..p.=(....... r@..pr3..p.?(....*......... .......0..u........ r...pr3..p.C(.....(...+..(...+.(....%.o....(.....o....(....o....o.
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:data
            Category:dropped
            Size (bytes):84477
            Entropy (8bit):6.500971395271592
            Encrypted:false
            SSDEEP:1536:u6+sg9V5RKyj+Z9boDGtuyzgqWswoFo9aWimswh2zAs:u8OG9boDwu+jWrslpmfYh
            MD5:693CE9695DDB33CD36AAB6CC3AD30514
            SHA1:22A0C67EC50C76B83990E491C506EEA9B88E2E9D
            SHA-256:63CE59CE7F1A5D2ACF7932B6AD30CA2983398618525371901597BA4A6F2797FD
            SHA-512:84C476F9B0C68CBEC32C9392268B4B2C7C75B3BB357CD4B986F2D421271EB6FC30B8B18172BB59D1F0B0847A9CDC741FAA0DA0FEC62577798D1289B82049DAF5
            Malicious:false
            Reputation:low
            Preview:f..........f.i.f.q...#..Jy..................................f.j..........1~-.|................................................f............f..../..5y..............................................g...f.........)...oFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF....g......r...)=..fuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu....f........`..8#..=....................................................f....k...f......#.z.g.......................................~............5.........................................'.(.e...................................f...............*.K.zpppppppppppppppppppppppppppppppppppppp........f.`..u...f....3t.m'UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU............f.b..7=..a...................................................f!.........f.f....%,..b.....................................s..f...f.g.f...f.r.H...1.S.lZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ..i....h.....'2.R LLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLL...4R....u......-.>.[.............................................
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
            Category:dropped
            Size (bytes):22479
            Entropy (8bit):5.08095074751023
            Encrypted:false
            SSDEEP:384:PxozhVwKBMySMIKoE/pJf2OG3mcJ7t/CWP9At/H:P6Vf2yS0r/pJf6BEWP9At/H
            MD5:8154B723020AEE70829FFC138C9D1C4C
            SHA1:6F7AF3827B37845F071625458DF1DB8BA9056FD6
            SHA-256:902F9D2A239CCAEBA677DB5838654FB6CE7CF3D21243B8EF122E9D970714B0D3
            SHA-512:D3F59F778AA72D26896AA2C81972F144DAB716DFA8E45E7B3C59F528B2752FE9E8971C86CF927C62E7501D9910E9D1212EFA1A58C29796A92E2D433116E76931
            Malicious:false
            Antivirus:
            • Antivirus: Metadefender, Detection: 0%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........N..E.....&....%. ...J.................@....................................>.....`... ..............................................................P..@............................................@..(...................\................................text...X........ ..................`..`.data........0.......$..............@....rdata.......@.......&..............@..@.pdata..@....P.......2..............@..@.xdata.......`.......6..............@..@.bss.........p...........................idata...............8..............@....CRT....`............B..............@....tls.................D..............@....rsrc................F..............@....reloc...............L..............@..B........................................................................................................................................................................
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
            Category:dropped
            Size (bytes):602739
            Entropy (8bit):6.344393812734055
            Encrypted:false
            SSDEEP:12288:PCaPBchMCFjXEbIaM43VV1oSIG5BY5IikQH/oNguISjFovd:KaaMCeVV1oSIG5BY3/oNuSjFovd
            MD5:58BFEB91921D4882F7EDABAB9C0C1C17
            SHA1:596DB0512A25089EF7CDE48CA3393E4F6878FF90
            SHA-256:5C9DB6D64BAF0250735368825CEC3032EC39999F266125D132157ECC0403EE12
            SHA-512:A86C5F00109267532531366DF07A0187D2FBB80E1628A6E30508AA74098CAB4CDF5CAD54468929604F89CAA656BDBEF6B2F25C462AA1B72898B66F3B8D227AA2
            Malicious:false
            Antivirus:
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........&..V.....&"...%....."......P..........Y....................................P|....`... ......................................`.......p..,...............L...........................................@...(...................$r...............................text...............................`..`.data...............................@....rdata..............................@..@.pdata..L...........................@..@.xdata...#... ...$..................@..@.bss.........P...........................edata.......`......................@..@.idata..,....p......................@....CRT....X............ ..............@....tls................."..............@....reloc...............$..............@..B........................................................................................................................................................................
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
            Category:dropped
            Size (bytes):49851
            Entropy (8bit):5.71925712297816
            Encrypted:false
            SSDEEP:768:59P9Y+clVaXLNcGRmDRC31lRrox5iJXx/gn9VFuKVcXGJMRv7hb8u+DwbMORdiPF:HPe+IkBcAEC31luGCQKKWJa8atRIPNQa
            MD5:6A9928C42EB4375CCEF3A025F3535795
            SHA1:395703F4970B42F55C2BCB2B8CF3F0D12E192CEB
            SHA-256:CAA457EF4BD84476790D215FFFF048DEB162CABC14DB3FF679795CCEA8972411
            SHA-512:27F1E2E3DDF052A05D9F0C48E0936E0D4A7E850E4E835EAED96495E6241167915FCDAD371EA206C5B741846D70FF3AFCBA83269B01ED90B22B3F7F42572F03DB
            Malicious:false
            Antivirus:
            • Antivirus: Metadefender, Detection: 0%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...........~.....&"...%.h..........P..........V.............................P.......O....`... .................................................\....0..8....................@..l...........................@...(....................................................text...hf.......h..................`..`.data................l..............@....rdata..P............n..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..............................@..@.idata..\...........................@....CRT....X...........................@....tls......... ......................@....rsrc...8....0......................@....reloc..l....@......................@..B................................................................................................................................
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):773968
            Entropy (8bit):6.901559811406837
            Encrypted:false
            SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
            MD5:0E37FBFA79D349D672456923EC5FBBE3
            SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
            SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
            SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
            Malicious:false
            Antivirus:
            • Antivirus: Metadefender, Detection: 0%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):12288
            Entropy (8bit):5.814115788739565
            Encrypted:false
            SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
            MD5:CFF85C549D536F651D4FB8387F1976F2
            SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
            SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
            SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
            Malicious:false
            Antivirus:
            • Antivirus: Metadefender, Detection: 3%, Browse
            • Antivirus: ReversingLabs, Detection: 0%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
            Category:dropped
            Size (bytes):429
            Entropy (8bit):7.2660585571428715
            Encrypted:false
            SSDEEP:12:6v/723xn6PprukRVpsTWuFTEmRpnJGoQ6:9n6P7RvsTWuFTXpnNQ6
            MD5:84D033B14C06568FA57352CCF18D8D35
            SHA1:1D75B42F61842E8B0FA8D811DAC72B313CDDCA74
            SHA-256:3989B93626DC3ED6EF03430AD0B1FF5C6E358DAC76E34ED7C8086579B68E660F
            SHA-512:EAFE07814DF75D019EB39D999325818CE8F2D164A621E713709EE5E1F3D260EB6BCAA726A17588D034F6A6E7733B71A5141CE5B4CFCE267CBFA22B82D6227783
            Malicious:false
            Preview:.PNG........IHDR................a...tIDATx..S.n.P.-.6w7..8;...#.E.].8.....wh.O."......`....^o{...4.R .....4..F{....h..}o.X..d...4M..V.ELH.aA.-.%D<..g.Tj.....x....[E(..J.z..n7...R..X..\..D...!..h5............3.w/... ....K.;c....MO.O.`........h4..d......`~T9::"..I...0p.R..\.....&.....;.F..X.a....;.._%....P.\.B.D..t.D..Y....B.Z..1...5U.U...1...Z..D"R.T..w@:...%.....\...\..-.B......E{....h..;w....p..+....IEND.B`.
            Process:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            File Type:SVG Scalable Vector Graphics image
            Category:dropped
            Size (bytes):335
            Entropy (8bit):4.737555359684875
            Encrypted:false
            SSDEEP:6:TMVBd/6o8GUYl/n7S3mc4slZRI2rjFvRbWHFHUHFvCpifW1IUHFBLJZtSKlNK+:TMHdPnnl/nu3i2FZ484sIBLjdlj
            MD5:C05C42CB3D95BF3BC7F49CCD8DCCA510
            SHA1:20442E344E95508586B1B2A7B4C6272C3F5C86F8
            SHA-256:695554CE5F23A275D3C25C27410D0CFBF8A83156807DAA3A601635E4E5D8AED0
            SHA-512:0EC19BBA7B5032670524965A8C55D8C6401F833000880DE1C0F74A5EAA4E302B0CE3E60218F3DDB95CB3E1EA7374A197CB71682526DFF910D9A6CF35FF971BB6
            Malicious:false
            Preview:<?xml version="1.0" encoding="UTF-8"?>.<svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg">. <path d="m 4 1 c -1.660156 0 -3 1.339844 -3 3 v 8 c 0 1.660156 1.339844 3 3 3 h 8 c 1.660156 0 3 -1.339844 3 -3 v -8 c 0 -1.660156 -1.339844 -3 -3 -3 z m 0 6 h 8 v 2 h -8 z m 0 0" fill="#2e3436"/>.</svg>.
            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
            Entropy (8bit):7.76778277944147
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:SCAN Swift 054545676700000000000000001.exe
            File size:1011130
            MD5:c5cc0d82dd8e1cf55d7fd3b5c067752b
            SHA1:cdbb4ff532aefa60d63feb5d0717f28c776ef9ed
            SHA256:3e02a6175b6567980d495bc4323d36c137fdc86f80b01a1b0da1d85d105221be
            SHA512:6b791077475f4cba6958448c3e251ef1a8e9db7d2adc863f01d291305e8e10e3429f2a4b0cf0600bd8247e1fe224d30a6559cef788904724bd8b09c51ebab3ae
            SSDEEP:24576:bbHwlPzVNU7lXzd2+gIsofFiXKU74yNCo:fHouxlMo9i6o
            TLSH:C02512215A54F813F3900A71C5E6F37E46B5FA382E61DA036B687F2D363D75CA828316
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
            Icon Hash:7cbc7e6e78b0e010
            Entrypoint:0x40352d
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
            Instruction
            push ebp
            mov ebp, esp
            sub esp, 000003F4h
            push ebx
            push esi
            push edi
            push 00000020h
            pop edi
            xor ebx, ebx
            push 00008001h
            mov dword ptr [ebp-14h], ebx
            mov dword ptr [ebp-04h], 0040A2E0h
            mov dword ptr [ebp-10h], ebx
            call dword ptr [004080CCh]
            mov esi, dword ptr [004080D0h]
            lea eax, dword ptr [ebp-00000140h]
            push eax
            mov dword ptr [ebp-0000012Ch], ebx
            mov dword ptr [ebp-2Ch], ebx
            mov dword ptr [ebp-28h], ebx
            mov dword ptr [ebp-00000140h], 0000011Ch
            call esi
            test eax, eax
            jne 00007F7230F072BAh
            lea eax, dword ptr [ebp-00000140h]
            mov dword ptr [ebp-00000140h], 00000114h
            push eax
            call esi
            mov ax, word ptr [ebp-0000012Ch]
            mov ecx, dword ptr [ebp-00000112h]
            sub ax, 00000053h
            add ecx, FFFFFFD0h
            neg ax
            sbb eax, eax
            mov byte ptr [ebp-26h], 00000004h
            not eax
            and eax, ecx
            mov word ptr [ebp-2Ch], ax
            cmp dword ptr [ebp-0000013Ch], 0Ah
            jnc 00007F7230F0728Ah
            and word ptr [ebp-00000132h], 0000h
            mov eax, dword ptr [ebp-00000134h]
            movzx ecx, byte ptr [ebp-00000138h]
            mov dword ptr [00434FB8h], eax
            xor eax, eax
            mov ah, byte ptr [ebp-0000013Ch]
            movzx eax, ax
            or eax, ecx
            xor ecx, ecx
            mov ch, byte ptr [ebp-2Ch]
            movzx ecx, cx
            shl eax, 10h
            or eax, ecx
            Programming Language:
            • [EXP] VC++ 6.0 SP5 build 8804
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x28498.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
            .ndata0x360000x360000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x6c0000x284980x28600False0.447235390867data5.43623310188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            RT_ICON0x6c3580x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
            RT_ICON0x7cb800x94a8dataEnglishUnited States
            RT_ICON0x860280x5488dataEnglishUnited States
            RT_ICON0x8b4b00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 65279, next used block 4294967040EnglishUnited States
            RT_ICON0x8f6d80x25a8dataEnglishUnited States
            RT_ICON0x91c800x10a8dataEnglishUnited States
            RT_ICON0x92d280x988dataEnglishUnited States
            RT_ICON0x936b00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
            RT_DIALOG0x93b180x100dataEnglishUnited States
            RT_DIALOG0x93c180x11cdataEnglishUnited States
            RT_DIALOG0x93d380xc4dataEnglishUnited States
            RT_DIALOG0x93e000x60dataEnglishUnited States
            RT_GROUP_ICON0x93e600x76dataEnglishUnited States
            RT_VERSION0x93ed80x27cdataEnglishUnited States
            RT_MANIFEST0x941580x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
            DLLImport
            ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
            SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
            ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
            USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
            DescriptionData
            LegalCopyrightEuthanasiachromo202
            FileVersion24.24.17
            CompanyNameConciliato
            LegalTrademarksLASHINGPREEXPOU
            CommentsSubconceptflovse2
            ProductNameRitha
            FileDescriptionandenk
            Translation0x0409 0x04b0
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            No network behavior found
            No statistics
            Target ID:0
            Start time:07:54:28
            Start date:26/05/2022
            Path:C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
            Imagebase:0x400000
            File size:1011130 bytes
            MD5 hash:C5CC0D82DD8E1CF55D7FD3B5C067752B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.775728469.00000000028E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
            Reputation:low

            No disassembly