Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.generic.ml.22865.12721

Overview

General Information

Sample Name:SecuriteInfo.com.generic.ml.22865.12721 (renamed file extension from 12721 to exe)
Analysis ID:634596
MD5:deb3e51a2d7d566c86b22046c1058f1a
SHA1:a780f7bbf2255a7dcd963c80fad20ee164ca6b93
SHA256:4b4bb7b5e2fbe3814fca75d1ab132a97c67255ebfe6dc4f3312d64483a181286
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
PE file contains more sections than normal
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Payload URL": "http://www.fides-kenya.com/yem/wam.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.886303775.0000000003200000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.886303775.0000000003200000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://www.fides-kenya.com/yem/wam.bin"}
    Source: SecuriteInfo.com.generic.ml.22865.exeVirustotal: Detection: 8%Perma Link
    Source: SecuriteInfo.com.generic.ml.22865.exeReversingLabs: Detection: 19%
    Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\spndingsfejlenJump to behavior
    Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: MpCommu.pdb source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.dr
    Source: Binary string: MpCommu.pdbUGP source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.dr
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://www.fides-kenya.com/yem/wam.bin
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: network-server.png.0.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.drString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigest
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.drString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
    Source: SecuriteInfo.com.generic.ml.22865.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.drString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, SourceCodePro-Black.otf.0.drString found in binary or memory: http://scripts.sil.org/OFLSource
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://www.avast.com0/
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: lang-1034.dll.0.drStatic PE information: No import functions for PE file found
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: HttpSigUpdate_BaseUrlhttps://go.microsoft.com/fwlink/?LinkID=851034&clcid=0x409&https://go.microsoft.com/fwlink/?LinkID=870379&clcid=0x409&%lsarch=%ls&eng=%ls&avdelta=%ls&asdelta=%ls&prod=%ls&ostype=%u&signaturetype=%u&beta=%u&plat=%lsHttpSigUpdate_UrlSignatureTypeMiscellaneous ConfigurationBddUpdateFailureProductGUIDMpGradualuserReleaseMpuserPreventPlatformUpdateRunAsInvoker__COMPAT_LAYEROfflineTargetOS%ls\temp%ls\mpam-%x.exeFileDescriptionAntiMalware Definition UpdateMicrosoft Malware ProtectionProductNameUpdatePlatform.EXEOriginalFilename%lsMpService_NoLowPriUpdateHttpSigUpdate_StubTimeoutx86ia64armarm64 vs SecuriteInfo.com.generic.ml.22865.exe
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMpCommu.dllj% vs SecuriteInfo.com.generic.ml.22865.exe
    Source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefreetype.libD vs SecuriteInfo.com.generic.ml.22865.exe
    Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_00406D5F
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_732D1BFF
    Source: libpcre-1.dll.0.drStatic PE information: Number of sections : 11 > 10
    Source: libfreetype-6.dll.0.drStatic PE information: Number of sections : 12 > 10
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess Stats: CPU usage > 98%
    Source: SecuriteInfo.com.generic.ml.22865.exeVirustotal: Detection: 8%
    Source: SecuriteInfo.com.generic.ml.22865.exeReversingLabs: Detection: 19%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeJump to behavior
    Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\nsm9E60.tmpJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile written: C:\Users\user\AppData\Local\Temp\analysekapitlet.iniJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/15@0/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\spndingsfejlenJump to behavior
    Source: SecuriteInfo.com.generic.ml.22865.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: MpCommu.pdb source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.dr
    Source: Binary string: MpCommu.pdbUGP source: SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.886303775.0000000003200000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_732D30C0 push eax; ret
    Source: libpcre-1.dll.0.drStatic PE information: section name: .xdata
    Source: libfreetype-6.dll.0.drStatic PE information: section name: .xdata
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_732D1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\nsh9F2D.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\libpcre-1.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\lang-1034.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\libfreetype-6.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeFile created: C:\Users\user\AppData\Local\Temp\MpCommu.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeRDTSC instruction interceptor: First address: 000000000321242B second address: 000000000321242B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F962CD168E6h 0x00000004 test ah, 0000007Bh 0x00000007 cmp ebx, ecx 0x00000009 jc 00007F962CD1686Fh 0x0000000b test dl, bl 0x0000000d inc ebp 0x0000000e inc ebx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libpcre-1.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lang-1034.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libfreetype-6.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MpCommu.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_732D1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    1
    Obfuscated Files or Information
    LSASS Memory1
    Query Registry
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS13
    System Information Discovery
    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.generic.ml.22865.exe9%VirustotalBrowse
    SecuriteInfo.com.generic.ml.22865.exe6%MetadefenderBrowse
    SecuriteInfo.com.generic.ml.22865.exe19%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\MpCommu.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\MpCommu.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\MpCommu.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\lang-1034.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\lang-1034.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\lang-1034.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\libfreetype-6.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\libfreetype-6.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\libpcre-1.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\libpcre-1.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\libpcre-1.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsh9F2D.tmp\System.dll2%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nsh9F2D.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsh9F2D.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.avast.com0/0%URL Reputationsafe
    http://www.fides-kenya.com/yem/wam.bin0%VirustotalBrowse
    http://www.fides-kenya.com/yem/wam.bin0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://www.fides-kenya.com/yem/wam.bintrue
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.avast.com0/SecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, lang-1034.dll.0.drfalse
    • URL Reputation: safe
    unknown
    http://creativecommons.org/licenses/by-sa/4.0/network-server.png.0.drfalse
      high
      http://scripts.sil.org/OFLSourceSecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, SourceCodePro-Black.otf.0.drfalse
        high
        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdSecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.drfalse
          high
          http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.generic.ml.22865.exefalse
            high
            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousSecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.drfalse
              high
              http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigestSecuriteInfo.com.generic.ml.22865.exe, 00000000.00000002.885721867.000000000285C000.00000004.00000800.00020000.00000000.sdmp, MpCommu.dll.0.drfalse
                high
                No contacted IP infos
                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:634596
                Start date and time: 26/05/202214:04:152022-05-26 14:04:15 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 44s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:SecuriteInfo.com.generic.ml.22865.12721 (renamed file extension from 12721 to exe)
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:19
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal72.troj.evad.winEXE@1/15@0/0
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 62.8% (good quality ratio 61.6%)
                • Quality average: 88.8%
                • Quality standard deviation: 21.2%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Override analysis time to 240s for sample files taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                14:05:30API Interceptor1x Sleep call for process: SecuriteInfo.com.generic.ml.22865.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
                Category:dropped
                Size (bytes):5273
                Entropy (8bit):7.8459330085163606
                Encrypted:false
                SSDEEP:96:BSTzREvsu6i0msHhj/HJBGZgCCoRPpr0wIqPnKV1+zNdgyJN6zx+f:oXRduqmuH7WTCoZpr0wIKnqtBy
                MD5:87BD29AF594463CC21D67CDC21F5B782
                SHA1:ED6D1F8936D968BE1DDAE4E38C3C38697B9BC038
                SHA-256:4D24FDEE4E7EC7B701C7148481B4EDD0D7941FD3656F4AED722D35F4FC2B9E1D
                SHA-512:80BF149D0246932A1139FC9B7ADD97B73B66BA8DE1C2905381520C535CC712AECBEDDC33B81A0770E73D3C4F6036974CD66B0C26F9CD4F16EF8FADE97E395F73
                Malicious:false
                Reputation:low
                Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(..Q.Y.Y~..$.m.x.Y..>?Muw..+....}x.w.$....$.o.v.....v.........&6....s.......>...~..?.<..m...i.f..?g\{.`..:....& .|...)..9'8........Z.3...."U*s?y..e/.1.\.........0_..'.<..@...3K/.-.]4k$../..\....O....:..q.d.?.>...}.........$o.s...T.l1P.F.0..X.\.c_.v........G .U.H..:......N@u
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                Category:dropped
                Size (bytes):349736
                Entropy (8bit):6.164191441093237
                Encrypted:false
                SSDEEP:6144:kj1LBBf6sKCJIELSHbz0RzFu8xbpr+6vl:GBBwyLAMJFuw
                MD5:DFA10F926778550AB0BB0804629686D2
                SHA1:33CEA03A49A941ADF49BE28F797D8E76E1D83828
                SHA-256:22136256BF7D3D9F96B21C32A5409CF014705C7673787A6ACC8C0CDCACC2F9F5
                SHA-512:7E9C97E2C667EF7C1E35C5C6B777A2A458BB8D42B5355B13E164C4F4F857788EB127651CD1947C87BBECCE9ACDE210DCF9AC186C85769669F0CAE055AD217745
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: Metadefender, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........R{..<(..<(..<(.=)..<(.8)..<(.?)..<(...(..<(..=(..<(.9)..<(.<)..<(.2)..<(..(..<(.>)..<(Rich..<(........................PE..d...r..6.........." .....l..........P..........f.............................`......1.....`A........................................`.......0...h....@..(........2......(<...P......P...T...................x...(...p............... ................................text....j.......l.................. ..`.rdata..$N.......P...p..............@..@.data...l"..........................@....pdata...2.......4..................@..@.rsrc...(....@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:data
                Category:dropped
                Size (bytes):144776
                Entropy (8bit):7.53285913295622
                Encrypted:false
                SSDEEP:1536:uPIMC3CoPO4bEtoxzYk55G6J9reDiy8rdsidRg5PdNdxCNBXl6ZjvhvzIMAzys3E:WIv7OSX269rUmsWXl6ZjvnAzys3OqwL
                MD5:1CA9D8B65434B23BBB1F878FB7E15B45
                SHA1:B08D04A9B064652238DAC280153990D8556AAD9E
                SHA-256:A0631B0E00F3221BC06C36AF0B18D8528603CED8491173AFA9F955C91C9F90E2
                SHA-512:2D94B7E8A9352FE149CD305529A45FFC5099B7E6C2FA55B83A615F216C7C6207373768734C67CE9750A60E18E8A8718EDE1D2CEF194ED3E1746B704B8D15C249
                Malicious:false
                Reputation:low
                Preview:m.7..y......3....y..>,..'h,....Sc........L._z.kM..z......).......@y9...7H.}..`.Li.1.^.@b.G..........M.q.F&.0.h[&......0..^=......Is$.......C*A&..ox.*r.foM...W{fUkR.^...(..W...k....%.o..r....q.Zw..!..........:.TT.vm<..+.y(..],.I.5X'R>.|.#..f,}..|z0.g.....~..N..W+...Y...h...........g...._[1......0.n..I(n.s...>oC..%4+....Jh....f.k..1P..=.a."..W.....-...."q;......%...h....7.`......9..+...@!...G.~2>r.J.\.l.u.x...o...#d....)M.S5X.&...Q.d|93.... |D''...vg..6D.%[.~.....u.o.R.o|*.o.@3.T...,..~./..|.,........j.......LZ....n......QM..._...r]a...JPJ.9j..6.uK.....v2*......z.ZC.qzz.`.......J...4.0c!....Q.I.W...z|.K~T..Z.{.cnG............E=...A..2.t.A..0...c......\}?..JKQ...h..".37.;...jg.U.~d.........<...W.e.x.@@.1..^O.......p.Gj.H.R..B.E...]..n..Z..ot.. ...i..._...AyU.L........./........:y...M.h....M.G...K.w.....~Z.H~.e..`.;.9.!.1*.....O..0..]..........6@.V.g.....F.@A.'K.w?.vGHB...Fgk'[....a1..T.C.....*.wM.4...;+..g3(r...T..&?)...5..../.8._.x1X<y4.!
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:OpenType font data
                Category:dropped
                Size (bytes):134872
                Entropy (8bit):6.990627903031805
                Encrypted:false
                SSDEEP:3072:sz0DOC7z/NU32nX3CC38LWDvzsGgDHKEqnk8X+5s9n5cWY2+o:57z/NU32nkWDvRzBl+5s9mWYvo
                MD5:49776B1F23800D9C82D529FCC027D16D
                SHA1:7BA6D923A0D163CE16DA4DD1105945C47406CADC
                SHA-256:78ADEC30836955EDFB3968D23F79662A64E62B5DE236C64FC9964C7632D83963
                SHA-512:252DEDE5F71BB6736DCFC76D0CBF52B0FA01D92813CF4A74714C9D271C10286336405C15A06778E3617B7485030FC1D9FB314A6BB302446F299162C22C0068BF
                Malicious:false
                Reputation:low
                Preview:OTTO.......`BASEe.]........FCFF .....FL....DSIG............GDEF.......,....GPOS.{.\........GSUB..].......JOS/2.......P...`cmap.spB......3fhead..h<.......6hhea.3.s...$...$hmtx...~.......Bmaxp. P....H....name...7........post...3..F,... ........4.]._.<......................*.:...$.......................X.*.*......................P.. .....X.........X...K...X...^.2.,............ .....8.........ADBO... ............`.............. .....J.~.................................$.............<...........H...........T...........`...........l.........&.~.........&...........*...........6...........D.*.........:.n.....................2...........$.......................D.*.....................*.......................H...........*...........d.X.........&.......................4...........4...........2........... .<.........4.\..........................................................................................................."...........4.........$.F......... .j.........,...........0............
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):38
                Entropy (8bit):4.438588368649811
                Encrypted:false
                SSDEEP:3:9J7KCE/VJOKkJe:9XE/Vwc
                MD5:2904F70F565669B3C2799CD77F98909F
                SHA1:567E83FD531B1530D2476B43AE79114D543B195A
                SHA-256:327226A389956762200BA7198625E1DEB03D036CB218E8F1AFD7C9B727AA32EE
                SHA-512:F0BD8A19527942FE0170E001F36D0A4234A5D049D897A2B7A225C061A9B2B5C0E37E2BFE0B2BB945464B90E6BDD7922E4E8A62EF0686D7A09E2F544FBA2A54A3
                Malicious:false
                Reputation:low
                Preview:[Disfellowship219]..totempl=Forgrown..
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):852
                Entropy (8bit):7.714388915009416
                Encrypted:false
                SSDEEP:24:PUalwngqdk8kgfLRaKT4+vZsnKzajzkPTD+3xc:MWckSLRj4+vZsKzajzkPTWc
                MD5:C007F7CF6900C902101AF7DEEAB1A81D
                SHA1:7A10B42A75F63FB53D5FAB96A9521D91FB639C35
                SHA-256:3237623948F6A90DE7731BC8E50C212DCD356220F84A74615A52820446B22CC9
                SHA-512:0CE9BD720137D084ED622B517F968ADF659C30BD89F04D52B11FC1B16E9BCEC27FDCAF64F24522B4F1818FD9F09AB79ADD18819D0A385D52A390ADD8D3E90A27
                Malicious:false
                Reputation:low
                Preview:.PNG........IHDR................a....IDATx.u..pCg8.m...8...p...X..m.q......2..g..k1W.......\.c8.6..2}nt.:."......e...E.).....f`~ifjniJ....l......Rf.X./,.g....s..K.. . .t:@...P$....4.oh|...............L|.t9........e..Y..\.[..#}...>U.`7........}j|r.....`.......e.D2>.'..J....l.@..m.j5.`.B-.F.tvv..?..X.."d..Y.J..pOff.M.l..Y9...*.\,.....EGW.....y\GW.lht......pw....4'.....YX..~Ee.T..*}..j[".....A.l6+.o....$.[....u.....*.lBumE...b.W.T3S.X..qvQ..T.#.........J.......j........W.....PP .AGO.i]CM.?...^i.h.[........_.{.+......`{ay.,WH./.@K[.Qk{s.:XWfee]....v{W+"...Uj%TV.......x....,..%.E!...k....Ag.....w...7.....a....((.G2......%..G...B.n....K.b......"..y@..<95v.9.p./R3...0..yerr.5.MIK.c..._.........;eHrJ.^Rj.2)9.........ugrj.D*...d.rj"+-#%h...O.D..?...Itt.-..[.......Q..c....cb...!..z.....)..]...&..H....IEND.B`.
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):173064
                Entropy (8bit):3.693018919711273
                Encrypted:false
                SSDEEP:1536:pS8DwEnRUjJhZpn9uf9Zmzv7kLV2B68v+JqL/wX8P66QhaF5tVw:s88LDZpncqzv7orc+JqL/wXhlaF5tO
                MD5:4F18D3455ED4916E37CAE7DC97E4F281
                SHA1:B8C07DD3C97231EBD51A4AA9DB64E32378AAE1E2
                SHA-256:9254A461B08B2CEEC9B70B733DB20D83CED38928BB36CB4AFBBC2CE70EC4A709
                SHA-512:589875F2066D05AD61B1508D2AE69EE5F8648FC0505BD1B6DCD341382CFD87DFE3E12885096B5B506C0D86D8342355AED2320961921CBB5E6E2FBC6A7033181A
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: Metadefender, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.@...R.@.P...R.Rich..R.................PE..L....\)b...........!................................................................."....@.......................................... ...~............... ...........................................................................................rdata..p...........................@..@.rsrc....~... ......................@..@.....\)b........T........................rdata......T....rdata$zzzdbg.... ... ...rsrc$01.....@...^...rsrc$02............................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):740140
                Entropy (8bit):6.445034069568258
                Encrypted:false
                SSDEEP:12288:m5h4fIuyHZyxAW+RHDfi7qmkLpRxNRcldaxSqKfEWmjJthNw:m5Gy+mHL6qXLPv0dax3vZjJthNw
                MD5:0F0A450E617F355FCA577DED02E52EDE
                SHA1:AEB92363E754D5EE6DB1E634C04EB1EFE6E3276B
                SHA-256:161E0693AD4FE7E9EB411411AD72697FCB7BB18BF0BCAE2D884A52875B0CD2F8
                SHA-512:26A05A5B794C56FC2C4B794CE38598F78124B89AE8C815BB0F487EAD639B7039FFFC5067D2A1E22455FDE69BE8E70D97663E9C9B1D7A2CD3753F92303717BDA2
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........8..}.....&"...%.x...4......P..........b....................................Cy....`... ......................................@.......`...................E...........................................x..(...................@d...............................text....v.......x..................`..`.data................|..............@....rdata...............~..............@..@.pdata...E.......F...j..............@..@.xdata..XG.......H..................@..@.bss.........0...........................edata.......@......................@..@.idata.......`......................@....CRT....X............$..............@....tls.................&..............@....rsrc................(..............@....reloc...............,..............@..B................................................................................................................................
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):281695
                Entropy (8bit):6.168605016920544
                Encrypted:false
                SSDEEP:3072:uD/iPx3WGmBoVKxtW0qib30Mj/vYYoGtjGeIGA9R23m6+PiaAtB3NFUQ8:uTUGprc6HfIG86+adX3NFUQ8
                MD5:A4E14B1F3042BFBF0B018561F8611D93
                SHA1:5C4C26F66ADCC1B40D7FF3113701FD9DCA9F74E6
                SHA-256:624E1E55F227897EB6E5852D28F0448F25ADE61A98894789FD45A3F8AE32D0EA
                SHA-512:DA4D86DF061948A37D513132686E91E13960FA28EB427BB841E0DACBF91564B3713DE6CA5EE49D17C0E1B449C0252EF9F4E8C02205BF2169CA7D761DC3872802
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: Metadefender, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:moderate, very likely benign file
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........F../.....&"...$.....B......P..............................................e.....`... .........................................5....................P.............................................. ?..(.......................X............................text...............................`.P`.data...............................@.P..rdata.. z.......|..................@.`@.pdata.......P.......&..............@.0@.xdata.......`.......,..............@.0@.bss.........p........................`..edata..5............2..............@.0@.idata...............:..............@.0..CRT....X............@..............@.@..tls.................B..............@.@..reloc...............D..............@.0B........................................................................................................................................................................
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                Category:dropped
                Size (bytes):956
                Entropy (8bit):3.058049005002623
                Encrypted:false
                SSDEEP:12:8wl0GsX2lw/tz+7RafgKD4Tb6cNlb6cDQ18/+CNJkKAb4t2Y+xIBjK:8dTaRMgKsTb6kb6fSPHAJ7aB
                MD5:FE7B156B846B0136F2569EA0FD23CDDD
                SHA1:358C6D45DB9A4F969414DFDD14876AB10243027D
                SHA-256:A2A111EA2717C3E0FA8742D00DD7314BF1B0636AC7043173568364869E33B5BE
                SHA-512:7848BDD99C823CE6B242BBA001577957A5F2D4FB50B4B50E182165D36EB64B4FAE470C6910F264F8D8AE91088E28FCAE314DE09E8B8C14837E7E1C294140A862
                Malicious:false
                Preview:L..................F........................................................9....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....Z.1...........user..B............................................e.n.g.i.n.e.e.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....l.2...........TOLVAARIGE.exe..N............................................T.O.L.V.A.A.R.I.G.E...e.x.e...........\.T.O.L.V.A.A.R.I.G.E...e.x.e.$.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):223
                Entropy (8bit):6.55427581037989
                Encrypted:false
                SSDEEP:6:6v/lhPys5+G7Zv9TOdnE/q5KBdsu4TmS/Vp:6v/7ZZBOl9K5e
                MD5:AA3A4757FF50F980EC23D5A65F6FBC0D
                SHA1:ABA35FCE13E7EEC52BDCD1756AB6AC7F3CBE0B17
                SHA-256:3E4429457A1C313920FAFE775494BBA5049BBFA41A4F29789CCC19432FD89348
                SHA-512:C26C744CE5149634D6698A7181F1F08668FEA902004BDDF0EA011097D139A58173ECE62B22DA376608406AA1A1FC65B496EF1373E1C6B532C430240F3AE7CF8F
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...=..1....*.....QY...s.q...`+...Z.TK..+....$.^!..[,.>.g.q.1.a.Q.2L/..R,..*w...Z.3?5.Qu.SE.o(..c..!..h...1....K.B;..3.y.Z..yh7M.N...D......z'.....)....IEND.B`.
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):218
                Entropy (8bit):6.548843212391007
                Encrypted:false
                SSDEEP:6:6v/lhPysNBnmGKjdTJ8K49bFOk7K8ml2up:6v/7tBm5pJ8K8bFYl2c
                MD5:FDD6EA8CAE0923DB4A381DB85A2D1DB8
                SHA1:7906C57D827F884958F72BBD1C67A52D48566F13
                SHA-256:E53F28526B8E67491CD5CB7D1CBC0402F0D6FCB5C8C8E9428BFDD1D46AE1D7F2
                SHA-512:FDC59FA991F2EB0770A6D54B892BE9F635F35A4D5FB258D5D8259C1BD30574B24892E9DC1936CCD012366578EEDB5B0FDD989B2544842B25D45B77653BE157D9
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8.....0...P.h.h..a..{0cr....$'...O.!....;....v....@q..#gu......C._.p.=... ......{G.......X$.......F..7i.....@....3.....$..p..E..LwO'n...F1.[.tn....IEND.B`.
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):718
                Entropy (8bit):7.267310509580342
                Encrypted:false
                SSDEEP:12:6v/7maZB4RO4HE+swFIUyrlxSTWLCMpffTn0589Gug9Beu1qG6Fh1ClN:tak15ypxST1MpffTAjv9R1dujmN
                MD5:151CC83E1B8F2239625A521AD3889884
                SHA1:F6951B61B7BE182EE6493DD7CB02DDF5EBE2BCB3
                SHA-256:B698DFD02677369423FDA9D0A2C499A1B7788A4AA3D500D20E1DFBDC47E64599
                SHA-512:A23168D29CFF32344EEA6C2D2895FD8055C5318074C0EE34DCEEC391630350E98A9D8813736ADB49EE87D8B2F02FE219E08811F569887F846D400D92A66DD085
                Malicious:false
                Preview:.PNG........IHDR................a....pHYs..........o.d....tEXtSoftware.www.inkscape.org..<.....tEXtTitle.Adwaita Icon Template...?....tEXtAuthor.GNOME Design Team`.v~...RtEXtCopyright.CC Attribution-ShareAlike http://creativecommons.org/licenses/by-sa/4.0/.Tb.....IDAT8...Ok.Q...w&.S.V.....`..&P?..].N..R........Eq..Ih.....d..CG.vH'..<.m.M"8xW.w...R(l.V?Vnz.'..)e].6........i...Y)...TTZ..e....&..{..r...h.a...PJ...p..D..A.C|.GX..~E[.v.l....>{.G..#..\.%...u.(.\.`...z=...ss.qw\>mm....@_~...[...L.c.1..*..4..O.q.,^b"5.@..>..+...".F..."9...j....L.G.....J.../.[....TJ..b..X|.....Q*.74M.k..J....pt{A..~.......a.2..z..n.w.M...P..~6s.........l~.m.`...w....?~.2.....WQ...d..e...Yc.-..{._b....K....IEND.B`.
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):12288
                Entropy (8bit):5.814115788739565
                Encrypted:false
                SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                MD5:CFF85C549D536F651D4FB8387F1976F2
                SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 2%, Browse
                • Antivirus: Metadefender, Detection: 3%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):562
                Entropy (8bit):7.483849388462199
                Encrypted:false
                SSDEEP:12:6v/7F9WLE/mpAJyXrrPWBQXhKTclrG/9/8W8OInefodAbctQ2TpmOtaxXc:q9uKIPuQXhKIhrOaefkA4tQ2EQ
                MD5:7A1C7CD0874509E35CA8738D6426EC61
                SHA1:02964393DAD3BB1EAA38C7315E80CA32B1C16B95
                SHA-256:8E1E44F59B17C6BFF086F0B2DD4DD1325DF9CD276629BC7ABDBA6719DD76289F
                SHA-512:74527D173C08228EE551E7BC54460B3E2B8ABA6A2C964C736EB92F3B6AEB576026C96B9DA1C78A72E854D44258E1DD3ABFCD2F01C81D0784559CEC0A2848E1E5
                Malicious:false
                Preview:.PNG........IHDR................a....IDATx......Q.Fk[A....66k.m....m.m.....$93...A.~C".<..?t.....%....=.A!./.?l..x........:<yv...uhmka.......j.?[...+..dE..U/Y....X.j..P.h..o%n....X..G.?....X5..-.e...k.l..L..T..gO"==.U.e.HKK.3'.D"a....`....P.l..B.....|..;wo..W.^....ove..p....I......(--EEE.O.9.......4Jm.!.ttt ,4.:..uuu.AYY.TJ9.r......S....~..8.........B..B..#))I..!......".A..9.+....4Ju..Z....w..x..mu.*...VW...0_|`...Q...H.=.<..?.m....A.`....8:...2........#P..F..1...=@..P..l.........a}./.........x...w.!........"_.w..............IEND.B`.
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.905193911181419
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:SecuriteInfo.com.generic.ml.22865.exe
                File size:912777
                MD5:deb3e51a2d7d566c86b22046c1058f1a
                SHA1:a780f7bbf2255a7dcd963c80fad20ee164ca6b93
                SHA256:4b4bb7b5e2fbe3814fca75d1ab132a97c67255ebfe6dc4f3312d64483a181286
                SHA512:c68bfec94fe42bea3b7c5f088963ff57d07866e8f773b290ca4b04422e5d34938b9c56e17ada69cd5bf0087fcf1f70551132ca0de21949c579615c296b1f3410
                SSDEEP:24576:sYii5KdghcAySSqmCJD8TWNaR87OxF7IziqjGFb:FiMKSjiqZJgTS9AFemb
                TLSH:551512640F9AC417E371C0FAA9B7C6486B76C9083E798481CFF61F75A678BAC5817183
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                Icon Hash:70f8adbcb8bca828
                Entrypoint:0x403640
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:61259b55b8912888e90f516ca08dc514
                Instruction
                push ebp
                mov ebp, esp
                sub esp, 000003F4h
                push ebx
                push esi
                push edi
                push 00000020h
                pop edi
                xor ebx, ebx
                push 00008001h
                mov dword ptr [ebp-14h], ebx
                mov dword ptr [ebp-04h], 0040A230h
                mov dword ptr [ebp-10h], ebx
                call dword ptr [004080C8h]
                mov esi, dword ptr [004080CCh]
                lea eax, dword ptr [ebp-00000140h]
                push eax
                mov dword ptr [ebp-0000012Ch], ebx
                mov dword ptr [ebp-2Ch], ebx
                mov dword ptr [ebp-28h], ebx
                mov dword ptr [ebp-00000140h], 0000011Ch
                call esi
                test eax, eax
                jne 00007F962CBC95AAh
                lea eax, dword ptr [ebp-00000140h]
                mov dword ptr [ebp-00000140h], 00000114h
                push eax
                call esi
                mov ax, word ptr [ebp-0000012Ch]
                mov ecx, dword ptr [ebp-00000112h]
                sub ax, 00000053h
                add ecx, FFFFFFD0h
                neg ax
                sbb eax, eax
                mov byte ptr [ebp-26h], 00000004h
                not eax
                and eax, ecx
                mov word ptr [ebp-2Ch], ax
                cmp dword ptr [ebp-0000013Ch], 0Ah
                jnc 00007F962CBC957Ah
                and word ptr [ebp-00000132h], 0000h
                mov eax, dword ptr [ebp-00000134h]
                movzx ecx, byte ptr [ebp-00000138h]
                mov dword ptr [0042A318h], eax
                xor eax, eax
                mov ah, byte ptr [ebp-0000013Ch]
                movzx eax, ax
                or eax, ecx
                xor ecx, ecx
                mov ch, byte ptr [ebp-2Ch]
                movzx ecx, cx
                shl eax, 10h
                or eax, ecx
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000x14ec0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .ndata0x2b0000x380000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x630000x14ec00x15000False0.326160249256data5.55589914674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x632980x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                RT_ICON0x73ac00x25a8dataEnglishUnited States
                RT_ICON0x760680x10a8dataEnglishUnited States
                RT_ICON0x771100x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                RT_DIALOG0x775780x100dataEnglishUnited States
                RT_DIALOG0x776780x11cdataEnglishUnited States
                RT_DIALOG0x777980xc4dataEnglishUnited States
                RT_DIALOG0x778600x60dataEnglishUnited States
                RT_GROUP_ICON0x778c00x3edataEnglishUnited States
                RT_VERSION0x779000x27cdataEnglishUnited States
                RT_MANIFEST0x77b800x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                DLLImport
                ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                DescriptionData
                LegalCopyrightBademestersnona
                FileVersion14.20.6
                CompanyNamefenolersfagins
                LegalTrademarksIndlststro
                CommentsCARAGUATAUNACHI
                ProductNameSKNSFORRETNI
                FileDescriptionethere
                Translation0x0409 0x04b0
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                No network behavior found
                No statistics
                Target ID:0
                Start time:14:05:23
                Start date:26/05/2022
                Path:C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
                Imagebase:0x400000
                File size:912777 bytes
                MD5 hash:DEB3E51A2D7D566C86B22046C1058F1A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.886303775.0000000003200000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                No disassembly