Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Siggen17.57062.9420.1434

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.Siggen17.57062.9420.1434 (renamed file extension from 1434 to exe)
Analysis ID:634670
MD5:67a4759a7b2fcb1a7e5b368fc150b974
SHA1:592934bd8f6606f80a890008008a621f7abda152
SHA256:19762fa9a397bf711cb2aa16f78915d4beaf49e9b67ffccfa3e3b01e35c7289a
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Payload URL": "https://drive.google.com/uc?export=download&id=1c-6Y7E6EFCnEfeUqjiCzqb4bjj7oMV7b"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.769554916.0000000002A30000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.769554916.0000000002A30000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1c-6Y7E6EFCnEfeUqjiCzqb4bjj7oMV7b"}
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeVirustotal: Detection: 30%Perma Link
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeReversingLabs: Detection: 22%
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\dadoJump to behavior
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: lgpllibs.pdb source: lgpllibs.dll.0.dr
    Source: Binary string: d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\devapi\Win8Beta\x64\bin\vm3ddevapi64-debug.pdb source: vm3ddevapi64-debug.dll.0.dr
    Source: Binary string: C:\dev\UCDE\hallasan_gothamjarvis_4\ThirdParty\POG\HP.SmartApp.UCDE.Win32.Lib\HP.SmartApp.UCDE.Win32.Exe\obj\x64\Release\HPSUPD-Win32Exe.pdb source: HPSUPD-Win32Exe.exe.0.dr
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1c-6Y7E6EFCnEfeUqjiCzqb4bjj7oMV7b
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: lgpllibs.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: lgpllibs.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
    Source: lgpllibs.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
    Source: lgpllibs.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://ocsp.digicert.com0L
    Source: lgpllibs.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://s2.symcb.com0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://sv.symcd.com0&
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
    Source: iso_639-3.xml.0.drString found in binary or memory: http://www.sil.org/iso639-3/
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.vmware.com/0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.vmware.com/0/
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
    Source: lgpllibs.dll.0.drString found in binary or memory: https://mozilla.org0
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: HPSUPD-Win32Exe.exe.0.drStatic PE information: No import functions for PE file found
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamevm3ddevapi64-release.dll> vs SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_0040755C
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_00406D85
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_73131BFF
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeProcess Stats: CPU usage > 98%
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeVirustotal: Detection: 30%
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeReversingLabs: Detection: 22%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeJump to behavior
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeFile created: C:\Users\user\AppData\Local\Temp\nsi51E6.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/11@0/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\dadoJump to behavior
    Source: SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: lgpllibs.pdb source: lgpllibs.dll.0.dr
    Source: Binary string: d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\devapi\Win8Beta\x64\bin\vm3ddevapi64-debug.pdb source: vm3ddevapi64-debug.dll.0.dr
    Source: Binary string: C:\dev\UCDE\hallasan_gothamjarvis_4\ThirdParty\POG\HP.SmartApp.UCDE.Win32.Lib\HP.SmartApp.UCDE.Win32.Exe\obj\x64\Release\HPSUPD-Win32Exe.pdb source: HPSUPD-Win32Exe.exe.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.769554916.0000000002A30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_731330C0 push eax; ret
    Source: vm3ddevapi64-debug.dll.0.drStatic PE information: section name: .didat
    Source: vm3ddevapi64-debug.dll.0.drStatic PE information: section name: .gehcont
    Source: vm3ddevapi64-debug.dll.0.drStatic PE information: section name: _RDATA
    Source: lgpllibs.dll.0.drStatic PE information: section name: .00cfg
    Source: HPSUPD-Win32Exe.exe.0.drStatic PE information: 0x8CC4634B [Wed Nov 2 06:25:15 2044 UTC]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_73131BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeFile created: C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeFile created: C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeFile created: C:\Users\user\AppData\Local\Temp\nsy52E1.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeFile created: C:\Users\user\AppData\Local\Temp\lgpllibs.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeRDTSC instruction interceptor: First address: 0000000002A326FA second address: 0000000002A326FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FAFD8CEA006h 0x00000004 push eax 0x00000005 jmp 00007FAFD8CE9FF5h 0x00000007 call 00007FAFD8CE9FA5h 0x0000000c pop eax 0x0000000d jmp eax 0x0000000f pop eax 0x00000010 cmp ebx, ecx 0x00000012 jc 00007FAFD8CE9F36h 0x00000018 inc ebp 0x00000019 test ch, dh 0x0000001b inc ebx 0x0000001c rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lgpllibs.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeAPI call chain: ExitProcess graph end node
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: CompanyNameVMware, Inc.j!
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: noreply@vmware.com0
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: http://www.vmware.com/0
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: FileDescriptionVMware SVGA 3D Device API Module:
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: VMware, Inc.
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: VMware, Inc.1!0
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: ?d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\lib\raster\bits2pixels.cd:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\lib\umlib\log.cC:\vm3dum_log\vm3dum%s_%d-%d.logwtC:\vm3dum_log\vm3dum*.log%.4d-%.2d-%.2dT%.2d:%.2d:%.2d.%.4d| Thread ID: %d |%s%sDXUM%s: Software\VMware, Inc.\VMware SVGADebugSearchPathEXCEPTION_ACCESS_VIOLATIONEXCEPTION_ARRAY_BOUNDS_EXCEEDEDEXCEPTION_BREAKPOINTEXCEPTION_DATATYPE_MISALIGNMENTEXCEPTION_FLT_DENORMAL_OPERANDEXCEPTION_FLT_DIVIDE_BY_ZEROEXCEPTION_FLT_INEXACT_RESULTEXCEPTION_FLT_INVALID_OPERATIONEXCEPTION_FLT_OVERFLOWEXCEPTION_FLT_STACK_CHECKEXCEPTION_FLT_UNDERFLOWEXCEPTION_INT_DIVIDE_BY_ZEROEXCEPTION_INT_OVERFLOWEXCEPTION_NONCONTINUABLE_EXCEPTIONEXCEPTION_PRIV_INSTRUCTIONEXCEPTION_SINGLE_STEPunknownBacktrace[%2d] rip=%p %s+%#x %s:%d
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: http://www.vmware.com/0/
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: Software\VMware, Inc.\VMware SVGA
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: VMware, Inc.1
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: VMware, Inc.0
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: ProductNameVMware SVGA 3D`
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: LegalCopyrightCopyright (C) 1998-2021 VMware, Inc.Z
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_73131BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    1
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Timestomp
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe31%VirustotalBrowse
    SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe22%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\lgpllibs.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\lgpllibs.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\lgpllibs.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsy52E1.tmp\System.dll2%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nsy52E1.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsy52E1.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://mozilla.org00%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.sil.org/iso639-3/iso_639-3.xml.0.drfalse
      high
      http://www.vmware.com/0/SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drfalse
        high
        http://www.vmware.com/0SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drfalse
          high
          http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Trojan.Siggen17.57062.9420.exefalse
            high
            http://www.symauth.com/cps0(SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drfalse
              high
              http://www.symauth.com/rpa00SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe, 00000000.00000002.769098643.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drfalse
                high
                https://mozilla.org0lgpllibs.dll.0.drfalse
                • URL Reputation: safe
                unknown
                No contacted IP infos
                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:634670
                Start date and time: 26/05/202216:35:072022-05-26 16:35:07 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 59s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:SecuriteInfo.com.Trojan.Siggen17.57062.9420.1434 (renamed file extension from 1434 to exe)
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:28
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal72.troj.evad.winEXE@1/11@0/0
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 85.5% (good quality ratio 84.3%)
                • Quality average: 86.8%
                • Quality standard deviation: 21.4%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Override analysis time to 240s for sample files taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, www.bing.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, time.windows.com, arc.msn.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtSetInformationFile calls found.
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
                Category:dropped
                Size (bytes):10521
                Entropy (8bit):7.888779038440803
                Encrypted:false
                SSDEEP:192:oXRZxdt62XpqRigPYtY0CfKTQlh5NKW6F5oJxfskCjGmXa6Pbpwr4WmKM:KRfdt62X+XoElh/KW6ifskEGeaIpwr4n
                MD5:8D61CCB44C962D7831FB6703B4AF623D
                SHA1:2BFDC667151057B3A42CDD22F9EB0E5AB0B0EF3C
                SHA-256:1EFFB5A4A46B05C024518546D4C8BBB45AD3496590E3E86AF533CF31C61512F4
                SHA-512:FE0C304F73713552ACA3A28D9CCD6BD2C53A45F72052892CC8F94D835A213F2F3C4D8D1656BD8160AE874A63FACC6B79BA763D4A724281E5F0DEDAC87F86375E
                Malicious:false
                Reputation:low
                Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(..9...k....X.....&.2.Z.......k~I.....e...J...}..<..M..8..........".../...O.u...........5.h...71]ZZ......v..Yc...<.i'..m2_..>..#...K...,.qq.^<2|D.V...j..ae.0Mu.^K..#k..3<."FV$HV.)..vmG..H........z.\..#......3_..Wo.g.>.o..........|...V.}.Ho.]...q#..W667Z`..)..l._E'.....+\.w..K....O.o..5......4O..~.
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):58368
                Entropy (8bit):5.856484138583398
                Encrypted:false
                SSDEEP:768:t2y20tpnvfSd9bbM9tmRtTkwv9QMdVk1QKVnjphRJy26xG0XFC19Io:J20t1SdN0kvZ9pdW1QKVjzy26opD
                MD5:D600D4F40A2BE641991044EE0814BFA4
                SHA1:3BDEF3488C28D43D285C47F46B82B980A8F41CD8
                SHA-256:B0D12A7AADF51B02D52E9E88295E6E6606F68C1508C8D9323B6549AA20EC82AA
                SHA-512:27B125260AA56FCAD4153A3259ECFB898681C9B096A4A37EB32AC3B722599EA4BFB5BF00F0247136F11F73F280B85844B37F6236331A0EF3B90ED2EC70CEDA55
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: Metadefender, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:moderate, very likely benign file
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...Kc..........."...0.................. .....@..... ....................... ............`...@......@............... ..................................................................8............................................................ ..H............text........ ...................... ..`.rsrc...............................@..@........................................H........W..4...........................................................N.((.....tS...}....*F.{....o....s....*F.{....o....s....*.0...........{....o.....s.......&.....*.................J.{....o.....s....*..((...*~.().....tV...}......s....}....*2.{....o....*2.{....o....*F.{....o....s....*2.{....o....*2.{....o....*F.{....o....,..*.*2.{....o....*2.{....o....*2.{....o....*2.{....o....*2.{....o....*:.s....%.}y...*..(....*:.().....}....*..(*....,...}....+.r...ps+...z.....s4...}....*.0......
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:data
                Category:dropped
                Size (bytes):97029
                Entropy (8bit):6.67352029006038
                Encrypted:false
                SSDEEP:1536:PQ0kJrmEiFGh45tzVKadkb4qe6BGcC44gtRujckzMc:PpkRmEiYh45tzV+NCcQQMX
                MD5:CCE79E361FEFB787AD2911F654EEAEB9
                SHA1:164FE9DCB6455C6842E01C4106E45151F7B1AFE9
                SHA-256:EFC22B0DFEC2B8D339747108AD6EFA9975FD950B73120E98B62B96EDC31BD2D0
                SHA-512:F43D00D16CBDA19B6D9E5A48EB2FFA2E3EC407B17E72892C4266A0DAB79F472F26473C241DFA923C8C92F9B8FC69E0D34DE611626F83BE6FDC460AE62E7F416E
                Malicious:false
                Reputation:low
                Preview:.w.s...s..f...f.f..5=...EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE..f...f.s.~..f....i..*.%n................................................/..r@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@f!...f.c...f.u......$..."vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv...........2i.AE.................................................f....j.......(..Ilkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk.i~.....n..........!.].C+++++++++++++++++++++++++++++........o....5...y.....................................................f..........;84..........................................................9q.6..........................................f.......a..t.......#...w...................................z....f.f......#z..txxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxf..............f.......mY111111111111111111111111111!...f.........'q*%.nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn.........f.k..*..y.............................................e.....v....3..........................................................t.f.........8..e'..............
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):193
                Entropy (8bit):6.41289035005742
                Encrypted:false
                SSDEEP:6:6v/lhPys693pMeNKrccoz4OtOOFImbTM0t7zlyH//jp:6v/7adpfNWcVkqfTMyUf1
                MD5:F492568998D5783731D50D7CA73AC7A3
                SHA1:E87B96367BDB02176067336A1CCE3B32EBDCB3B2
                SHA-256:7A08D7B1CC724A453A0C3EB2F36369D7FD6AC6BD965CE0B4D075D570ED369A9B
                SHA-512:2C6C726426EA6DD4C7CCC141152E24DD46BDB11D3DB45ED7BA6EAC06DE922F69E5172D5431D63B9ACF96E54B89857317CA0F87880F7B03C43AF9F7416EE95C73
                Malicious:false
                Reputation:low
                Preview:.PNG........IHDR................a....sBIT....|.d....xIDAT8.....0.E..#d.{Gp.k.q.WP....,m..$.BH....s...A<...9..L..Fp.E..7......`......6.n....]b.5...P.....r.W..#....U_....p.P.>.&.1.....IEND.B`.
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
                Category:dropped
                Size (bytes):1063988
                Entropy (8bit):4.881622518734141
                Encrypted:false
                SSDEEP:6144:z6ZdTZZl/WX4fVLcf9MvAadpxr5+ZiVHPZ6TZXjcePr:z6nTZZl/WX4fVLcqvV5+ZiX6TZXJ
                MD5:DCAD3B0F729144CE9EE9A6006D9C3E74
                SHA1:3EEF5F61BEF834B7089A87423D128990A1065E81
                SHA-256:D8AB9C2641481645A8ACF875FFA3E3CB271D2CD946691DD8E0BD48513FFF1370
                SHA-512:BB0ED1F9FBB122728776731B04C54C8FBA57BF2987D04DAD1167FC879FC8A2483093E1A8304A021D6238B408FED826E902386D7DB52B7988CE9DCC89ACB64611
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" ?>.... ....WARNING: THIS FILE IS DEPRECATED.....PLEASE USE THE JSON DATA INSTEAD.....Usually, this data can be found in /usr/share/iso-codes/json.....This file gives a list of all languages in the ISO 639-3..standard, and is used to provide translations via gettext....Copyright . 2005 Alastair McKinstry <mckinstry@computer.org>..Copyright . 2008,2012,2013 Tobias Quathamer <toddy@debian.org>.... This file is free software; you can redistribute it and/or.. modify it under the terms of the GNU Lesser General Public.. License as published by the Free Software Foundation; either.. version 2.1 of the License, or (at your option) any later version..... This file is distributed in the hope that it will be useful,.. but WITHOUT ANY WARRANTY; without even the implied warranty of.. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU.. Lesser General Public License for more details..... You should have received a co
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                Category:dropped
                Size (bytes):37816
                Entropy (8bit):6.374742588554942
                Encrypted:false
                SSDEEP:384:VbijnYW+DZZMwrusWsWQfRl30fP5/A5KFUkYvntA/QcP+ACxw/3MvDG/GhUVgt:dijnQDnzruRNQfv0fP5/oABCDGehHt
                MD5:9B623087B905D8FE157BDB7EC85009A8
                SHA1:4B6DD4C0292558513A840B40A991533735D55E02
                SHA-256:7FA4C9EA4BE0088D6D311BD93FA65BAF8828DA32A2FD4BF8CE0EADE552D46246
                SHA-512:8C06714F93EB05FAD19F1A96C0DB8FF030B1CD3C03D6B17C231CDE5BCE8DD8358014D87A74306C3BABEF7C573D4AF5AE80904AFBB0329D2D83FE3758EF020719
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: Metadefender, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...>..b.........." .....F...*......P.....................................................`A........................................@g.......n..x....................t..............Te...............................`...............o..X............................text...FE.......F.................. ..`.rdata..p....`.......J..............@..@.data...@............d..............@....pdata...............f..............@..@.00cfg...............l..............@..@.rsrc................n..............@..@.reloc...............r..............@..B................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):1401
                Entropy (8bit):5.11645334711433
                Encrypted:false
                SSDEEP:24:t4Cjlza3LWdwpQiL6Rch3jV81hF3Q59UPFkyKbRAecFhBrN3AGMH:1cL8w6iJjV8jF3894kNtAecFZTMH
                MD5:BAE5EB7B918D568E955B8885EEB5DB5A
                SHA1:FC4421C6A019D0147A13B08CBB2F0720F49E17C3
                SHA-256:273F11F9F8BD84F2A32E0CC857E21050A9A9C7713F33D9A220991DC232C470BA
                SHA-512:8A6AE1E26C9451A241655242D16368D87E23036D03D61FF75F5669D5E2930446D6003D5191622F576060E529EE21DD6E28D3408D28719A4D53BD291E673037B0
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16">. <g fill="#2e3436">. <path d="m 213.531,228.469 -1.061,1.061 14,14 1.062,-1.062 z" transform="translate(-212 -228)"/>. <path d="m 220,228 c -1.662,0 -3,1.338 -3,3 v 1.64453 l 5.2832,5.2832 C 222.72383,237.4058 223,236.73965 223,236 v -5 c 0,-1.662 -1.338,-3 -3,-3 z m -6,6 v 2.00977 c 0,2.96574 2.16538,5.4238 5,5.90039 V 244 h 2 v -2.08984 c 0.64598,-0.10861 1.24984,-0.33194 1.80859,-0.62891 l -1.11132,-1.11133 C 221.17391,240.38 220.60353,240.5 220,240.5 c -2.50669,0 -4.5,-1.99014 -4.5,-4.49023 V 234 Z m 10.5,0 v 2.00977 c 0,1.15729 -0.44099,2.19439 -1.14844,2.98632 l 1.05274,1.05274 C 225.38802,238.9836 226,237.57264 226,236.00977 V 234 Z m -7.5,1.47266 V 236 c 0,1.662 1.338,3 3,3 0.16422,0 0.3216,-0.0237 0.47852,-0.0488 z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-se
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):12288
                Entropy (8bit):5.814115788739565
                Encrypted:false
                SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                MD5:CFF85C549D536F651D4FB8387F1976F2
                SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 2%, Browse
                • Antivirus: Metadefender, Detection: 3%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):213
                Entropy (8bit):4.950492507724413
                Encrypted:false
                SSDEEP:6:tI9mc4slzcpG+xW6UmUuksJtjdU0t/ZME:t4Cp9xW6zUmjW0tOE
                MD5:A4ACDD85E11EA101F3BB4B5BEC3382F0
                SHA1:2DC81694D5D3C403BF696B1796385D2F64C40D77
                SHA-256:AD87999B06B9C8035CCAC8EF29D54C9E00055EE9E2DBDD9B7BA24CCF56C471E6
                SHA-512:6C7C1E913CBF7CD6B91721BD60705B3A87C398B5D69D1FA03D67EDF7C69E23AB410938EC5E0770584E5B6E218443E53A702BD389C2253F05C2D4F48B944D481E
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M2 4c-.5 0-1 .5-1 1v4c0 .5.5 1 1 1h1V8h10v2h1c.5 0 1-.5 1-1V5c0-.5-.5-1-1-1zm2-3v2h8V1z"/><path d="M4 9v5h8V9z"/></g></svg>
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:ASCII text, with very long lines, with no line terminators
                Category:dropped
                Size (bytes):40772
                Entropy (8bit):3.99958578967024
                Encrypted:false
                SSDEEP:768:hh1uZgY2aTsCYEHD/RZpbk9hCagM99A4jloFMSD2l:REsvEHFwOagq9AAo+SCl
                MD5:15B855905F2DE48867E35606D005ACC7
                SHA1:41A4B95539290FBE3F75449D7391F9B10710612C
                SHA-256:40F9C51DAF7AB04475F462927A471E4DA0D80D3F373327992A9464849360BA40
                SHA-512:88A65458C335446084B927EE1E97D38DC3CEF52E87494611D4F47A244AE11EA7B50ABE79813FC6635084E8E32BA99F722760B4B75741E9F7D7BC68B67A8580DA
                Malicious:false
                Preview:27593E14BF48762F251F42C3A0B162B4B932AF6F508F6C5236FD53D9593278373448EBED3E8F7995FDB755B160AC8ED7146290A48D0DAE23B6EFD36FCBE6AFD753ED6D2B3CD983BA7DFC9B4EE151DD47272BE33427DFEA4750F33928D8C7C721F80C5391864ECF3C5AA12CB96F9A14071AE993D3608E24FA5B42AE924AC0E3266E1238BD9B228E4A11CA6E0613634F0F0FE72A38B123888727782AADA70E0B92A3C5CD216016D1CCD48A86C44A4812F8BD719D2F09C4C40C860DA6D34EBE16FFB1176EB131F853DB2F1151441A075B4F90BB5A16EA834D0FC931C1D8D8DDD17F99974955D19FFD8D76AF3E4EA1F220664560A816B6F1C0EDCF0ED396877D1109F96A89AC469C883F3C9FA1E83A6FEA5F049F55E811D9C54E6DC54D98B9A791969B8218AC42C64A788F5DA9EEECD6399ECB4C4A00A7F0ADA7836E7FCD2BE9D3407B3C2B4842D44E61CEC54A6F1121FA7074AD25B115F998C1453447D55053C9CC43CF76811579AE9968C92BCBAA0F18D9F18BFE5BCD4FB4433244AF9A94561C69CA25F54989D680E77C18BA86CD924021075051D3C06915D4059FC8622C90B8485A0B3E4FFC555370308A14E68BABE11715B947CCF32EF583310BF8F49D615FD12C4980406AD24C6A12F84A2457F89395FF61F4BE47B9261B7C2270B0BE93BC9D88BF45FED83D35EBA376F3B4CA09FC66FA76E903
                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                Category:dropped
                Size (bytes):288328
                Entropy (8bit):6.5244639850667605
                Encrypted:false
                SSDEEP:6144:TWMbKY5G780mQB8fkrOX9rn8ndvcA5abagLgandSUbJ:aMbKY5AIvfkSX9rSdkfbanUbJ
                MD5:9ECB2FA510DCDF4BFB06DC80A83294BD
                SHA1:65E0CEC428D010B94D81BA784EA709EBA598A1CD
                SHA-256:865868E3BE461332134EFBBA9F1D8AAA5E29A0C8AD3F5A2AC47311F47D4CFD62
                SHA-512:6F70D42EE2A6CA1F2D85A84947B74EAD03FA4CD00AE5D897FC80832111D88B0D9EEFE81B5FFBC229AE9E1D97467713AF0D385C8C2E96D67B5E9008033C02CB28
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: Metadefender, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......[...............................s.....s.....s..........M...........z.....z.......................G.........Rich..................PE..d......`.........." .........j......................................................N.....`A.........................................................p..........x!......Hb..............8..............................8...................4...@....................text.............................. ..`.rdata..............................@..@.data...0#..........................@....pdata..x!......."..................@..@.didat..`....@......................@....gehcont$....P......................@..@_RDATA.......`......................@..@.rsrc........p......................@..@.reloc..............................@..B........................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.401310327702789
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                File size:609224
                MD5:67a4759a7b2fcb1a7e5b368fc150b974
                SHA1:592934bd8f6606f80a890008008a621f7abda152
                SHA256:19762fa9a397bf711cb2aa16f78915d4beaf49e9b67ffccfa3e3b01e35c7289a
                SHA512:e7540621211cc64faee06b3cf17c69fe45fdb9a39e69e8404c284d44a518a624a812eca1e9f49dd0aead9d717f9bc52cc6c7f4c32535f42baa472884b84ba133
                SSDEEP:12288:5bspFozv47H44s5Q4IDT9jXbgO1xzSs9IKTQWfsmuYUE:5bsLnY4s5k0k9IKTQWkmuZE
                TLSH:9DD4F155BAC8ECABC01691B81475AF626A93FE2518748E03173E7E2FF732153243B91D
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                Icon Hash:38e6d3b1b3a2cc71
                Entrypoint:0x40352d
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                Instruction
                push ebp
                mov ebp, esp
                sub esp, 000003F4h
                push ebx
                push esi
                push edi
                push 00000020h
                pop edi
                xor ebx, ebx
                push 00008001h
                mov dword ptr [ebp-14h], ebx
                mov dword ptr [ebp-04h], 0040A2E0h
                mov dword ptr [ebp-10h], ebx
                call dword ptr [004080CCh]
                mov esi, dword ptr [004080D0h]
                lea eax, dword ptr [ebp-00000140h]
                push eax
                mov dword ptr [ebp-0000012Ch], ebx
                mov dword ptr [ebp-2Ch], ebx
                mov dword ptr [ebp-28h], ebx
                mov dword ptr [ebp-00000140h], 0000011Ch
                call esi
                test eax, eax
                jne 00007FAFD8C58BCAh
                lea eax, dword ptr [ebp-00000140h]
                mov dword ptr [ebp-00000140h], 00000114h
                push eax
                call esi
                mov ax, word ptr [ebp-0000012Ch]
                mov ecx, dword ptr [ebp-00000112h]
                sub ax, 00000053h
                add ecx, FFFFFFD0h
                neg ax
                sbb eax, eax
                mov byte ptr [ebp-26h], 00000004h
                not eax
                and eax, ecx
                mov word ptr [ebp-2Ch], ax
                cmp dword ptr [ebp-0000013Ch], 0Ah
                jnc 00007FAFD8C58B9Ah
                and word ptr [ebp-00000132h], 0000h
                mov eax, dword ptr [ebp-00000134h]
                movzx ecx, byte ptr [ebp-00000138h]
                mov dword ptr [00434FB8h], eax
                xor eax, eax
                mov ah, byte ptr [ebp-0000013Ch]
                movzx eax, ax
                or eax, ecx
                xor ecx, ecx
                mov ch, byte ptr [ebp-2Ch]
                movzx ecx, cx
                shl eax, 10h
                or eax, ecx
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x6b0000x27620.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .ndata0x360000x350000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x6b0000x276200x27800False0.363744808149data4.74589509923IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x6b2f80x10828dBase III DBT, version number 0, next free block index 40EnglishUnited States
                RT_ICON0x7bb200x94a8dataEnglishUnited States
                RT_ICON0x84fc80x5488dataEnglishUnited States
                RT_ICON0x8a4500x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 6356992, next used block 0EnglishUnited States
                RT_ICON0x8e6780x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0EnglishUnited States
                RT_ICON0x90c200x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0EnglishUnited States
                RT_DIALOG0x91cc80x100dataEnglishUnited States
                RT_DIALOG0x91dc80x11cdataEnglishUnited States
                RT_DIALOG0x91ee80xc4dataEnglishUnited States
                RT_DIALOG0x91fb00x60dataEnglishUnited States
                RT_GROUP_ICON0x920100x5adataEnglishUnited States
                RT_VERSION0x920700x270dataEnglishUnited States
                RT_MANIFEST0x922e00x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                DLLImport
                ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                DescriptionData
                LegalCopyrightInsweepi
                FileVersion27.29.17
                CompanyNameCHRYSALIDAH
                LegalTrademarksVrdi24
                Commentsreconnoiterlbni
                ProductNamepetiolispill
                FileDescriptionPratalkoholis
                Translation0x0409 0x04b0
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                No network behavior found
                No statistics
                Target ID:0
                Start time:16:36:41
                Start date:26/05/2022
                Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen17.57062.9420.exe"
                Imagebase:0x400000
                File size:609224 bytes
                MD5 hash:67A4759A7B2FCB1A7E5B368FC150B974
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.769554916.0000000002A30000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                No disassembly