Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.AIDetect.malware2.5627.14109

Overview

General Information

Sample Name:SecuriteInfo.com.W32.AIDetect.malware2.5627.14109 (renamed file extension from 14109 to exe)
Analysis ID:634994
MD5:7f369d460c84146944c3c12bf83901af
SHA1:29ea3441429d555ddfd0fd8d5973aab0f9ea2663
SHA256:a5e095edbdf743431c5e866c01c3a592fc5a7ddf6bfb617d72f81181743adf3a
Tags:exe
Infos:

Detection

GuLoader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
PE file contains executable resources (Code or Archives)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Payload URL": "https://hustlecreate.com/a1/binned_SsGEV34.bin"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.898389983.0000000002BB7000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000001.00000002.898389983.0000000002BB7000.00000040.00000800.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://hustlecreate.com/a1/binned_SsGEV34.bin"}
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeVirustotal: Detection: 19%Perma Link
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeReversingLabs: Detection: 12%
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Hardheartedly12Jump to behavior
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: System.Runtime.CompilerServices.VisualC.ni.pdb source: System.Runtime.CompilerServices.VisualC.dll.1.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.CompilerServices.VisualC\net6.0-Release\System.Runtime.CompilerServices.VisualC.pdb source: System.Runtime.CompilerServices.VisualC.dll.1.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.CompilerServices.VisualC\net6.0-Release\System.Runtime.CompilerServices.VisualC.pdbRSDS source: System.Runtime.CompilerServices.VisualC.dll.1.dr
    Source: Binary string: d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\coinstaller\Win8Release\x64\bin\vm3dc003.pdb source: vm3dc003.dll.1.dr
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_0040290B FindFirstFileW,

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://hustlecreate.com/a1/binned_SsGEV34.bin
    Source: vm3dc003.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
    Source: vm3dc003.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
    Source: vm3dc003.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: vm3dc003.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: vm3dc003.dll.1.drString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: vm3dc003.dll.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: vm3dc003.dll.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: vm3dc003.dll.1.drString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, uninstalla.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: vm3dc003.dll.1.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: vm3dc003.dll.1.drString found in binary or memory: http://ocsp.digicert.com0L
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://s2.symcb.com0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://sv.symcb.com/sv.crt0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://sv.symcd.com0&
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: vm3dc003.dll.1.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://www.symauth.com/cps0(
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://www.symauth.com/rpa00
    Source: vm3dc003.dll.1.drString found in binary or memory: http://www.vmware.com/0
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: http://www.vmware.com/0/
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: https://d.symcb.com/cps0%
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drString found in binary or memory: https://d.symcb.com/rpa0
    Source: System.Runtime.CompilerServices.VisualC.dll.1.drString found in binary or memory: https://github.com/dotnet/runtime
    Source: System.Runtime.CompilerServices.VisualC.dll.1.drString found in binary or memory: https://github.com/dotnet/runtimeBSJB
    Source: vm3dc003.dll.1.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: vm3dc003.dll.1.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: System.Runtime.CompilerServices.VisualC.dll.1.drStatic PE information: No import functions for PE file found
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamevm3dc003.dll> vs SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: uninstalla.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_0040755C
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_00406D85
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_72D91BFF
    Source: System.Runtime.CompilerServices.VisualC.dll.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeProcess Stats: CPU usage > 98%
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeVirustotal: Detection: 19%
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeReversingLabs: Detection: 12%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeJump to behavior
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeFile created: C:\Users\user\AppData\Local\Temp\nse22A8.tmpJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeFile written: C:\Users\user\AppData\Local\Temp\Exolve.iniJump to behavior
    Source: classification engineClassification label: mal80.troj.evad.winEXE@1/11@0/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Hardheartedly12Jump to behavior
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: System.Runtime.CompilerServices.VisualC.ni.pdb source: System.Runtime.CompilerServices.VisualC.dll.1.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.CompilerServices.VisualC\net6.0-Release\System.Runtime.CompilerServices.VisualC.pdb source: System.Runtime.CompilerServices.VisualC.dll.1.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Runtime.CompilerServices.VisualC\net6.0-Release\System.Runtime.CompilerServices.VisualC.pdbRSDS source: System.Runtime.CompilerServices.VisualC.dll.1.dr
    Source: Binary string: d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\coinstaller\Win8Release\x64\bin\vm3dc003.pdb source: vm3dc003.dll.1.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000001.00000002.898389983.0000000002BB7000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: SecuriteInfo.com.W32.AIDetect.malware2.5627.exeStatic PE information: real checksum: 0x0 should be: 0xe7640
    Source: System.dll.1.drStatic PE information: real checksum: 0x0 should be: 0x3d68
    Source: uninstalla.exe.1.drStatic PE information: real checksum: 0x3f1bf6 should be: 0x4a8b4
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_72D930C0 push eax; ret
    Source: vm3dc003.dll.1.drStatic PE information: section name: .didat
    Source: vm3dc003.dll.1.drStatic PE information: section name: .gehcont
    Source: vm3dc003.dll.1.drStatic PE information: section name: _RDATA
    Source: System.Runtime.CompilerServices.VisualC.dll.1.drStatic PE information: 0xC22B5F28 [Fri Mar 24 23:05:12 2073 UTC]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_72D91BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeFile created: C:\Users\user\AppData\Local\Temp\vm3dc003.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeFile created: C:\Users\user\AppData\Local\Temp\uninstalla.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeFile created: C:\Users\user\AppData\Local\Temp\System.Runtime.CompilerServices.VisualC.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeFile created: C:\Users\user\AppData\Local\Temp\nse4A46.tmp\System.dllJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (31).png
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeRDTSC instruction interceptor: First address: 0000000002C0515E second address: 0000000002C0515E instructions: 0x00000000 rdtsc 0x00000002 test bl, 00000001h 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F80045A4ED7h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\vm3dc003.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\uninstalla.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\System.Runtime.CompilerServices.VisualC.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeAPI call chain: ExitProcess graph end node
    Source: vm3dc003.dll.1.drBinary or memory string: LegalCopyrightCopyright (C) 1998-2021 VMware, Inc.B
    Source: vm3dc003.dll.1.drBinary or memory string: {4d36e968-e325-11ce-bfc1-08002be10318}SYSTEM\CurrentControlSet\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}CoInstallers32SOFTWARE\Microsoft\Windows\CurrentVersion\RunVMware VM3DService ProcessRegDeleteValue failed (0x%lx).
    Source: vm3dc003.dll.1.drBinary or memory string: noreply@vmware.com0
    Source: vm3dc003.dll.1.drBinary or memory string: http://www.vmware.com/0
    Source: vm3dc003.dll.1.drBinary or memory string: VMware, Inc.
    Source: vm3dc003.dll.1.drBinary or memory string: dbghelp.dllSoftware\VMware, Inc.\VMware SVGADebugSearchPathBacktrace[%2d] rip=%p %s+%#x %s:%d
    Source: vm3dc003.dll.1.drBinary or memory string: VMware, Inc.1!0
    Source: vm3dc003.dll.1.drBinary or memory string: %s: VMToolsRegistry Not set.
    Source: vm3dc003.dll.1.drBinary or memory string: FileDescriptionVMware SVGA 3D Coinstaller:
    Source: vm3dc003.dll.1.drBinary or memory string: http://www.vmware.com/0/
    Source: vm3dc003.dll.1.drBinary or memory string: Software\VMware, Inc.\VMware SVGA
    Source: vm3dc003.dll.1.drBinary or memory string: VMware, Inc.1
    Source: vm3dc003.dll.1.drBinary or memory string: VMware, Inc.0
    Source: vm3dc003.dll.1.drBinary or memory string: ProductNameVMware SVGA 3D`
    Source: vm3dc003.dll.1.drBinary or memory string: CompanyNameVMware, Inc.^
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_72D91BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exeCode function: 1_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    1
    Access Token Manipulation
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Timestomp
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.W32.AIDetect.malware2.5627.exe19%VirustotalBrowse
    SecuriteInfo.com.W32.AIDetect.malware2.5627.exe12%ReversingLabsWin32.Trojan.Shelsy
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\System.Runtime.CompilerServices.VisualC.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\System.Runtime.CompilerServices.VisualC.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nse4A46.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nse4A46.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\uninstalla.exe0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\uninstalla.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\vm3dc003.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://hustlecreate.com/a1/binned_SsGEV34.bin0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    https://hustlecreate.com/a1/binned_SsGEV34.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.vmware.com/0/SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drfalse
      high
      https://github.com/dotnet/runtimeBSJBSystem.Runtime.CompilerServices.VisualC.dll.1.drfalse
        high
        http://www.vmware.com/0vm3dc003.dll.1.drfalse
          high
          http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.W32.AIDetect.malware2.5627.exe, uninstalla.exe.1.drfalse
            high
            http://www.symauth.com/cps0(SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drfalse
              high
              http://www.symauth.com/rpa00SecuriteInfo.com.W32.AIDetect.malware2.5627.exe, 00000001.00000002.897861144.000000000040A000.00000004.00000001.01000000.00000005.sdmp, vm3dc003.dll.1.drfalse
                high
                https://github.com/dotnet/runtimeSystem.Runtime.CompilerServices.VisualC.dll.1.drfalse
                  high
                  No contacted IP infos
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:634994
                  Start date and time: 27/05/202209:41:132022-05-27 09:41:13 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 8m 30s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:SecuriteInfo.com.W32.AIDetect.malware2.5627.14109 (renamed file extension from 14109 to exe)
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:18
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal80.troj.evad.winEXE@1/11@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 63.2% (good quality ratio 61.9%)
                  • Quality average: 88.2%
                  • Quality standard deviation: 21.2%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Override analysis time to 240s for sample files taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 40.125.122.176, 52.242.101.226, 20.223.24.244, 20.54.89.106, 52.152.110.14
                  • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  09:42:33API Interceptor1x Sleep call for process: SecuriteInfo.com.W32.AIDetect.malware2.5627.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):402254
                  Entropy (8bit):7.791539989948347
                  Encrypted:false
                  SSDEEP:12288:TmJZJW5QhS/VQ40QP6BE4xUARC9LsfQu2aNFtcb:ThQSVQ4SxUARC9LsfQu2aNFtw
                  MD5:F042FA6C1A5A11E1E94F4C7D55F4696F
                  SHA1:3A9C3519A67FD03DC3C97EEA6B04CFFD1AA38715
                  SHA-256:B30D6EBFBD48675A3899E47EA4FEFD63A784CF4D291CE1CE7E805B70BB71D67D
                  SHA-512:775821F4D105DED3FD6294F16640745180A40D2327EA965B325D528E31C3F8C3A1DF7CB8A28AFDA43D383264220E89EF5FAE1CD447FA44478F2C90D8DD37A983
                  Malicious:false
                  Reputation:low
                  Preview:.>,...BgMkU..).B...H#....Y...M.6..p..6.$.4...X.*......".3..!Q...S..wE[.(P.DhK_.....i......[.wp>.t....U.P.Ns.Sz{2:.O.b.c.oxK=M].../P.Eqm.z....j\%.z..9.'6;?....`:HB.Od...?.l.Y.8.....n8..0...S.....#.....T.B$....._..@N.0.g.:k:...J%R.3'...Lpg..o..:f.....,.x...s.8.*....q..U..)8.v.......,.en..F:....e...[.......: ]./|:..K}y...1..}..j....)W..]...!..._?d......L.i>..i......gk...Y....A,.......".p.m|..#Ap..y.n.%.r.z..-|..Vh$...T.4Z..o...M.|gH@Jt!.M......'.J.0.....iL..]Og......&H../S......".!{.x...".v8.4.5.|.../.!....._;9.1.gp.i3..l.....Z..>'..7.5R.._.VH=C.:-...]..y.+.:Rb;.._{C.>...4M.DT..../.Yx.!.u.#Y"..-..h..._..8...8..a.s....*l.Y..|..8.55.M..p.M..B...D.3f.!.. ...n.A...B...N.2..H.......mKn_.a.u.9....qD...Z...+....^..[..a...L....(."..S{F\....q.l..R.*.m..@RvP.w.....lHR...z.:.w...........)..S..@..;.C.f...I..=.........R7..D....?k..AF3.1s..n..h..../,8}...^...>..4H.-o..8..Q7...B.*.@M7.<q....<...'.h.B?... .)... .P.....%>B....D#.S,....o..:.).:kN0...^A
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):32
                  Entropy (8bit):4.663909765557392
                  Encrypted:false
                  SSDEEP:3:Ve4KXOHXRWLkmt:LKesLkQ
                  MD5:272BC34712948F6A7132DD80E17DE84E
                  SHA1:461967EA55D874C28BF0999FB66CACE785D9BCA9
                  SHA-256:019D3E92BF00DC7409E188A19F11AB33C31BFBAFE5B2E036632CC69B71207FE9
                  SHA-512:56BE026C1DCA3326CFC165244E9F0AA6278E779D003BBD9405E4A18408B00B3AB3CBC5B779D4A315EEA43278C306AC307121BB007112A70BEC2B6CDFEE06C958
                  Malicious:false
                  Reputation:low
                  Preview:[GORKUN]..Workbags141=REFRACTS..
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
                  Category:dropped
                  Size (bytes):10115
                  Entropy (8bit):7.896422756961018
                  Encrypted:false
                  SSDEEP:192:oXRIG87sv/m1vnKaVSuKRXL55hOuf4dXL9J0LEvJyVVcuJ6Sj7YvKvtOJ:KRIjsW1vKPXBgdiWMEMj7YyvG
                  MD5:2F12A714A50993C090C94EC2672490E1
                  SHA1:4F9A319C412F1B1B251C027B1C2448BBDBB9CA6F
                  SHA-256:E759639DCCA8E96864BC82EDBACFD5BB14FE37412A6F3FCE7C82BF1BB944B6E4
                  SHA-512:2B349EAB24DCCE0DBD36433DE13E0B2A551E88A626D5C9A3F68B79E21ACDE4FC238DD4E280E30ACBB76B0EB0E08CE1ACC233AB1C9E2147E2DD01E0917B3A376B
                  Malicious:false
                  Reputation:low
                  Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(..0..?l...9.l...7.......S.h..5.....!9...[..$M...E'..y.l@Xxg.i...........?..7..3M.........E...L..Z.$....B.b.@...y.y'..}._.|c......5....G..5-{l.-....+._Q....7......D.|....M.Hb..x....._P./o...RJ0{Zr..q+.....1.......X......G.....|1}...}.a.}/J..Gk.[...j.......+.. .n"..X.Q..9..$....o.....8...o.|K....}
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):19056
                  Entropy (8bit):6.442411564417779
                  Encrypted:false
                  SSDEEP:384:8WhLWql40uIrRDTveaVEc2gK/uPHRN7xpJ/AlGseCvy:rfl40uqDTveaVCMxv/xj4y
                  MD5:E3F74999CDB00FCAAA6A40A97B8F199B
                  SHA1:F3A2C8DF8E98F7DCB49CBE5C4A717A6087A656D2
                  SHA-256:6929BC473DF404FCED714F345479216B66B72ACF116061DF1CDD8ACAEE961333
                  SHA-512:3BE3EEAB3304EFEB9594FA516B61528587CFA8453AB7B4AF991137E3A1D7E23270DA600FC341EEF703932CCFF53571ACF3CD00AEEAE47347CC36EE69B71DB37C
                  Malicious:false
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 0%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...(_+..........." ..... ...................................................P............`...@......@............... ...............................................&..p$...@..........T...............................................................H............text...X........ .................. ..`.data...D....0......."..............@....reloc.......@.......$..............@..B............................................0.............................4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...................y.........?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...h.(...C.o.m.m.e.n.t.s...S.y.s.t.e.m...R.u.n.t.i.m.e...C.o.m.p.i.l.e.r.S.e.r.v.i.c.e.s...V.i.s.u.a.l.C...L.....C.o.m.p.a.n.y.N.a.m.e.....M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n...x.(...F.i.l.e.D.
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):264
                  Entropy (8bit):6.7753015109610715
                  Encrypted:false
                  SSDEEP:6:6v/lhPysLQNJ4BgpBly/Gj6e3ba4Dzz8fKtVp:6v/7rQb4BAlyU6mDzzoK9
                  MD5:39182B562FCB2BAD93D58516462708A8
                  SHA1:F9A88E1F1313BD05CDB1E962DE8170CCCFDA9151
                  SHA-256:DEF4215BBA93FAED6FCF7E4687EF89AB828DB10E69171A5E14908F091302C59F
                  SHA-512:ECEC5D0E389293DB2977C7A7DCE8E4FAC10A3ADA7466DBA9CE4FE9712F5725D84E67A5E0ED9BE5091D68BD817186D6CFC89CA650CC5323FB8C038A14BAD3896D
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...1n.1...(.. l...h.1B.E...#\.$h....l.v...F...7.;\.b...B..w"aWq..?.@...L?qr#.F.,p...'.w.....CxV.X.....b.j...S....8v...e...I..|.\4X..f.G....+.-6....3.....{..".D...rz..-.6...nW.:o1._YVz]."N.....IEND.B`.
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):243
                  Entropy (8bit):6.6375398452197
                  Encrypted:false
                  SSDEEP:6:6v/lhPysEFaTw0eY/5b5sap5kGC125kiUP2afunr2W7Vtljp:6v/7kgoY/7shGC1DHP24u6KtlN
                  MD5:433D25AD6818DB00083CD062A16D3479
                  SHA1:D4210D893E965912EA7BD45C80D359FECAB54A98
                  SHA-256:3D06E8FA89BA4FA9D9BCC260F38C72D1A104FE3E6F8923A3EE553563832027CB
                  SHA-512:E5095FE100F811D73196F01C732AA09E2359E5796DF38A0B3E25599F3F99CCD2ED181070463285655521199B7B084A7848E6629CB5CE0AE07FCBC17D5953FA4C
                  Malicious:false
                  Reputation:low
                  Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8..M..0...vQ...BP.vZ./ .+..SD."..c.F.....f^^`....;....9...l..17...0..ML..1.M2....X..90.v......... ....Q...@.m...G.K.-`..\%D.`..B..j\........\.....\.{....g......7..i....\....IEND.B`.
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):12288
                  Entropy (8bit):5.814115788739565
                  Encrypted:false
                  SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                  MD5:CFF85C549D536F651D4FB8387F1976F2
                  SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                  SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                  SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                  Malicious:false
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 3%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):633
                  Entropy (8bit):7.5766983812463735
                  Encrypted:false
                  SSDEEP:12:6v/7x8QVQCJI+uIidxp+pY5f5Cqxnnu13gYdndacj/Ya+SvGpaNusvrdVJ:PxOI5I0P+2Zu13gIdR/Yla8svrfJ
                  MD5:0CBA7EB7455B0DB79456C5911F12B75E
                  SHA1:DAACA4FE36E4F61016D473A0A1CD4C980906872B
                  SHA-256:50F4DB972320FF30D4FD98B61F58D956678F38FD1D11CA5109E5559D02A986BE
                  SHA-512:D6976DC90DD3B01A7AAFDF67C5360CC75020971473F8689CA73A9931FB36FF4CC6994034664E11B4FF31146767F5B9DB898104BE814A1611C8A02260C66E11D8
                  Malicious:false
                  Preview:.PNG........IHDR................a...@IDATx.....&K..kfz..g..g...;_..'..l.....^{..6._...._/g9.B...r...$..._~..4.7@.4h..UU!.2.$A.E...Q.",2..q.[.nc.........-......4:..C..B .c$.N....s........0.l#..UkP IRO.e...g.D...&<jnQ..k......k..T*.....LS,,D..Q.8.0..<...?(//...A.CCm]....e|..<...#.w..:.\{{....PP__.. .i....?..i..L...8t.(.?.......>..G.W..-.~.A9\m..z.E....L....:.l.... .4....;a...^.P.>......s.86.Hq..c!.e...e..7CA).c....w.%..iZ...|.j3(..$.2.?..w..........O?.M..E..!....=\.a..o....m.+V,.Q...pA..I(.s..S.,..!.R.`t....r(.7..H......".......+.}...A..xM....L..L..cG....L$`.;K.m...h..O.r..3.cb#....IEND.B`.
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):265238
                  Entropy (8bit):6.697651009316531
                  Encrypted:false
                  SSDEEP:6144:FR+xXYSIvF68OZGbpYByPT7lyvIco9KX25G5PGDu6WL1g:DMIvk8OvByPHly5425GDum
                  MD5:1DCEAF980C4D83AE2A13BD0F047E1BD7
                  SHA1:7D97E79EFB047361A8C2A8AC0A26B37127C3C7AC
                  SHA-256:0C340FB13ACAAAE759215AF9C970DC6C167418534C421EB626643E20FD0AC832
                  SHA-512:8FDBBBCAAC2B3188819E7F8E3ADE82E01723F27C151EDD50F4AE090339C680CE685540BCA76018BC5494CEBF5001A5FCF97C07D7FC47479BF11CEB38A3CE9FE4
                  Malicious:false
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 0%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...$..\.................f...*.......4............@...................................?...@..........................................P...a..........@.>..............................................................................................text....d.......f.................. ..`.rdata...............j..............@..@.data...X............~..............@....ndata...................................rsrc....a...P...b..................@..@................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):190624
                  Entropy (8bit):6.481480370859183
                  Encrypted:false
                  SSDEEP:3072:o/qsfTS04VccXuMeXEVmd/AuRV9DKRSeilOA1Fafxc7Kwhbzi+iOh:oysrSDcHbNd7+xmVbP
                  MD5:059BE7432DFAD92F4EA0A2E5941C52A7
                  SHA1:1C1B989D6B9D0FA0808FCA8893ADDC8CD76602D9
                  SHA-256:8E184A514D8716B59B24892CB425752E6D7837735C1E9F1996D66E70BFEC033B
                  SHA-512:EA79397D73840AEA9E9C3AC55F2E4FFA9A10828C2BFD993AB116CC08412E690C3DE10617AC516B944DEA48D7BFCEC201404C9CF0E54A5594A247F5F202F59F57
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........Qvw.Qvw.Qvw.Qvw.Pvw.E.s.Zvw.E.t.Tvw.E.r..vw.=.t.Xvw.=.s.^vw.=.r.Lvw..-r.Pvw...r.Rvw...t.Pvw.4.v.\vw.Qvv..vw...s.Vvw...w.Pvw.....Pvw...u.Pvw.RichQvw.........PE..d......`.........." .....~...........1..............................................].....`A.........................................G..p....G..x...............x....z...n......|....-..8............................,..8....................F..@....................text....}.......~.................. ..`.rdata..............................@..@.data........`.......F..............@....pdata..x............R..............@..@.didat..H............h..............@....gehcont.............j..............@..@_RDATA...............l..............@..@.rsrc................n..............@..@.reloc..|............r..............@..B........................................................................................
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File Type:C source, ASCII text
                  Category:dropped
                  Size (bytes):15782
                  Entropy (8bit):5.207431068394915
                  Encrypted:false
                  SSDEEP:192:zu0gnPI2Z1Fylkd3cd/e5QJvWUnumPw2QJt+UnumPwhJhbjSjSHXMXzhFwqOzj5w:zYIOyaKl+uybeiHtHai
                  MD5:1B00C31FF20D27F07B299063908311E0
                  SHA1:1976E6DD68DD0D64508C91A6DFAB8E75F8AAF6CD
                  SHA-256:EC872BB1DDC330D3F19F68D033B0706E1B78D4A91A58998674B67EAD58BEA729
                  SHA-512:38B29DB2CDA85380F63C86EAAA5D7DE6657EA4C6A0B074D184F6F3218467C865B3D0B56C2844547897139F5C324792C0D3CB5AE1FB4B593AB6F8889A7C88BB30
                  Malicious:false
                  Preview:/*.** 2013-06-12.**.** The author disclaims copyright to this source code. In place of.** a legal notice, here is a blessing:.**.** May you do good and not evil..** May you find forgiveness for yourself and forgive others..** May you share freely, never taking more than you give..**.*************************************************************************.**.** A shim that sits between the SQLite virtual table interface and.** runtimes with garbage collector based memory management..*/.#include "sqlite3ext.h".SQLITE_EXTENSION_INIT1.#include <assert.h>.#include <string.h>..#ifndef SQLITE_OMIT_VIRTUALTABLE../* Forward references */.typedef struct vtshim_aux vtshim_aux;.typedef struct vtshim_vtab vtshim_vtab;.typedef struct vtshim_cursor vtshim_cursor;.../* The vtshim_aux argument is the auxiliary parameter that is passed.** into sqlite3_create_module_v2()..*/.struct vtshim_aux {. void *pChildAux; /* pAux for child virtual tables */. void (*xChildDestroy)(void*);
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Entropy (8bit):7.518620994648534
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  File size:929272
                  MD5:7f369d460c84146944c3c12bf83901af
                  SHA1:29ea3441429d555ddfd0fd8d5973aab0f9ea2663
                  SHA256:a5e095edbdf743431c5e866c01c3a592fc5a7ddf6bfb617d72f81181743adf3a
                  SHA512:5183cb1c7173fcf8f5d30c9a5842a2e895d50d8a742e7097b7d8862d7e0e6be4a94e166bc4b7175717a18e93c194d1259cb30ed7b649b518f0d9736f66e9f3fc
                  SSDEEP:12288:YbKP7r9r/+ppppppppppppppppppppppppppppp0Y/e4hZJgtQ9STVQ40QPKBut6:YbK1M/e1Q4VQ4muENar+Wav5BK3c
                  TLSH:7C15E0C0E94495A1ED1DAB716A36CD3546237DBDA874A81D25DE3E2B3FFB2D31026023
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                  Icon Hash:c4c4c4c8ccd4d0c4
                  Entrypoint:0x40352d
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                  Instruction
                  push ebp
                  mov ebp, esp
                  sub esp, 000003F4h
                  push ebx
                  push esi
                  push edi
                  push 00000020h
                  pop edi
                  xor ebx, ebx
                  push 00008001h
                  mov dword ptr [ebp-14h], ebx
                  mov dword ptr [ebp-04h], 0040A2E0h
                  mov dword ptr [ebp-10h], ebx
                  call dword ptr [004080CCh]
                  mov esi, dword ptr [004080D0h]
                  lea eax, dword ptr [ebp-00000140h]
                  push eax
                  mov dword ptr [ebp-0000012Ch], ebx
                  mov dword ptr [ebp-2Ch], ebx
                  mov dword ptr [ebp-28h], ebx
                  mov dword ptr [ebp-00000140h], 0000011Ch
                  call esi
                  test eax, eax
                  jne 00007F800518DDFAh
                  lea eax, dword ptr [ebp-00000140h]
                  mov dword ptr [ebp-00000140h], 00000114h
                  push eax
                  call esi
                  mov ax, word ptr [ebp-0000012Ch]
                  mov ecx, dword ptr [ebp-00000112h]
                  sub ax, 00000053h
                  add ecx, FFFFFFD0h
                  neg ax
                  sbb eax, eax
                  mov byte ptr [ebp-26h], 00000004h
                  not eax
                  and eax, ecx
                  mov word ptr [ebp-2Ch], ax
                  cmp dword ptr [ebp-0000013Ch], 0Ah
                  jnc 00007F800518DDCAh
                  and word ptr [ebp-00000132h], 0000h
                  mov eax, dword ptr [ebp-00000134h]
                  movzx ecx, byte ptr [ebp-00000138h]
                  mov dword ptr [00434FB8h], eax
                  xor eax, eax
                  mov ah, byte ptr [ebp-0000013Ch]
                  movzx eax, ax
                  or eax, ecx
                  xor ecx, ecx
                  mov ch, byte ptr [ebp-2Ch]
                  movzx ecx, cx
                  shl eax, 10h
                  or eax, ecx
                  Programming Language:
                  • [EXP] VC++ 6.0 SP5 build 8804
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x354c8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .ndata0x360000x220000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0x580000x354c80x35600False0.212867754684data4.44760586334IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x585380x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                  RT_ICON0x68d600x94a8dataEnglishUnited States
                  RT_ICON0x722080x67e8dataEnglishUnited States
                  RT_ICON0x789f00x5488dataEnglishUnited States
                  RT_ICON0x7de780x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 2130706432EnglishUnited States
                  RT_ICON0x820a00x35e0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                  RT_ICON0x856800x25a8dataEnglishUnited States
                  RT_ICON0x87c280x10a8dataEnglishUnited States
                  RT_ICON0x88cd00xea8dataEnglishUnited States
                  RT_ICON0x89b780x988dataEnglishUnited States
                  RT_ICON0x8a5000x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0EnglishUnited States
                  RT_ICON0x8ada80x6c8dataEnglishUnited States
                  RT_ICON0x8b4700x668dataEnglishUnited States
                  RT_ICON0x8bad80x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_ICON0x8c0400x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_ICON0x8c4a80x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 4294965391, next used block 7403512EnglishUnited States
                  RT_ICON0x8c7900x1e8dataEnglishUnited States
                  RT_ICON0x8c9780x128GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_DIALOG0x8caa00x100dataEnglishUnited States
                  RT_DIALOG0x8cba00x11cdataEnglishUnited States
                  RT_DIALOG0x8ccc00xc4dataEnglishUnited States
                  RT_DIALOG0x8cd880x60dataEnglishUnited States
                  RT_GROUP_ICON0x8cde80x102dataEnglishUnited States
                  RT_VERSION0x8cef00x298dataEnglishUnited States
                  RT_MANIFEST0x8d1880x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                  DLLImport
                  ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                  SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                  ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                  COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                  USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                  GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                  KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                  DescriptionData
                  LegalCopyrightSELVFORKL
                  FileVersion14.32.29
                  CompanyNamexanthopicr
                  LegalTrademarksUDSLUTTETGABSTE
                  CommentsSvolvdioxidemiss200
                  ProductNamefrstedirektrenta
                  FileDescriptionSKESSONGLANDSKUM
                  Translation0x0409 0x04b0
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  No network behavior found
                  No statistics
                  Target ID:1
                  Start time:09:42:31
                  Start date:27/05/2022
                  Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.5627.exe"
                  Imagebase:0x400000
                  File size:929272 bytes
                  MD5 hash:7F369D460C84146944C3C12BF83901AF
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.898389983.0000000002BB7000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low

                  No disassembly