Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
recibo.exe

Overview

General Information

Sample Name:recibo.exe
Analysis ID:635097
MD5:4680729edca682d1b6de8cf875bbfdf5
SHA1:debf5126050330ecbfc29582d979101cd557dd42
SHA256:e18032a74c8138c907ab2b6937ce66a4483a85e89b05a25153499efee4e85898
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • recibo.exe (PID: 3224 cmdline: "C:\Users\user\Desktop\recibo.exe" MD5: 4680729EDCA682D1B6DE8CF875BBFDF5)
  • cleanup
{"Payload URL": "https://drive.google.com/uc?export=download&id=1EX-TfU9P_N_SsQAtVtT8-t2zzMXng6WS"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.761876778.0000000002A50000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.761876778.0000000002A50000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1EX-TfU9P_N_SsQAtVtT8-t2zzMXng6WS"}
    Source: recibo.exeVirustotal: Detection: 55%Perma Link
    Source: recibo.exeMetadefender: Detection: 25%Perma Link
    Source: recibo.exeReversingLabs: Detection: 50%
    Source: recibo.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\recibo.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\dadoJump to behavior
    Source: recibo.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: lgpllibs.pdb source: lgpllibs.dll.0.dr
    Source: Binary string: d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\devapi\Win8Beta\x64\bin\vm3ddevapi64-debug.pdb source: vm3ddevapi64-debug.dll.0.dr
    Source: Binary string: C:\dev\UCDE\hallasan_gothamjarvis_4\ThirdParty\POG\HP.SmartApp.UCDE.Win32.Lib\HP.SmartApp.UCDE.Win32.Exe\obj\x64\Release\HPSUPD-Win32Exe.pdb source: HPSUPD-Win32Exe.exe.0.dr
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData\Local\Temp\FLADBARMEDES.tub
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData\Local\Temp\Rekorddage.Res7
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData\Local\Temp
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData\Local

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1EX-TfU9P_N_SsQAtVtT8-t2zzMXng6WS
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: lgpllibs.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: lgpllibs.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
    Source: lgpllibs.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
    Source: lgpllibs.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: recibo.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://ocsp.digicert.com0L
    Source: lgpllibs.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://s2.symcb.com0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://sv.symcd.com0&
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
    Source: iso_639-3.xml.0.drString found in binary or memory: http://www.sil.org/iso639-3/
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.vmware.com/0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: http://www.vmware.com/0/
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
    Source: lgpllibs.dll.0.drString found in binary or memory: https://mozilla.org0
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.dr, lgpllibs.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: recibo.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: HPSUPD-Win32Exe.exe.0.drStatic PE information: No import functions for PE file found
    Source: recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamevm3ddevapi64-release.dll> vs recibo.exe
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_0040755C
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_00406D85
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_732A1BFF
    Source: C:\Users\user\Desktop\recibo.exeProcess Stats: CPU usage > 98%
    Source: recibo.exeVirustotal: Detection: 55%
    Source: recibo.exeMetadefender: Detection: 25%
    Source: recibo.exeReversingLabs: Detection: 50%
    Source: C:\Users\user\Desktop\recibo.exeFile read: C:\Users\user\Desktop\recibo.exeJump to behavior
    Source: recibo.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\recibo.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\recibo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\recibo.exeFile created: C:\Users\user\AppData\Local\Temp\nst55CD.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/11@0/0
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_004021AA CoCreateInstance,
    Source: C:\Users\user\Desktop\recibo.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\user\Desktop\recibo.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\dadoJump to behavior
    Source: recibo.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: lgpllibs.pdb source: lgpllibs.dll.0.dr
    Source: Binary string: d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\devapi\Win8Beta\x64\bin\vm3ddevapi64-debug.pdb source: vm3ddevapi64-debug.dll.0.dr
    Source: Binary string: C:\dev\UCDE\hallasan_gothamjarvis_4\ThirdParty\POG\HP.SmartApp.UCDE.Win32.Lib\HP.SmartApp.UCDE.Win32.Exe\obj\x64\Release\HPSUPD-Win32Exe.pdb source: HPSUPD-Win32Exe.exe.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.761876778.0000000002A50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_732A30C0 push eax; ret
    Source: vm3ddevapi64-debug.dll.0.drStatic PE information: section name: .didat
    Source: vm3ddevapi64-debug.dll.0.drStatic PE information: section name: .gehcont
    Source: vm3ddevapi64-debug.dll.0.drStatic PE information: section name: _RDATA
    Source: lgpllibs.dll.0.drStatic PE information: section name: .00cfg
    Source: HPSUPD-Win32Exe.exe.0.drStatic PE information: 0x8CC4634B [Wed Nov 2 06:25:15 2044 UTC]
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_732A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\recibo.exeFile created: C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exeJump to dropped file
    Source: C:\Users\user\Desktop\recibo.exeFile created: C:\Users\user\AppData\Local\Temp\nso5699.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\recibo.exeFile created: C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dllJump to dropped file
    Source: C:\Users\user\Desktop\recibo.exeFile created: C:\Users\user\AppData\Local\Temp\lgpllibs.dllJump to dropped file
    Source: C:\Users\user\Desktop\recibo.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\recibo.exeRDTSC instruction interceptor: First address: 0000000002A526F8 second address: 0000000002A526F8 instructions: 0x00000000 rdtsc 0x00000002 test ch, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007EFE6051EC00h 0x00000008 cmp ch, dh 0x0000000a cmp edx, eax 0x0000000c inc ebp 0x0000000d test ebx, ecx 0x0000000f inc ebx 0x00000010 test ah, ah 0x00000012 rdtsc
    Source: C:\Users\user\Desktop\recibo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exeJump to dropped file
    Source: C:\Users\user\Desktop\recibo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dllJump to dropped file
    Source: C:\Users\user\Desktop\recibo.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lgpllibs.dllJump to dropped file
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_0040290B FindFirstFileW,
    Source: C:\Users\user\Desktop\recibo.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\recibo.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData\Local\Temp\FLADBARMEDES.tub
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData\Local\Temp\Rekorddage.Res7
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData\Local\Temp
    Source: C:\Users\user\Desktop\recibo.exeFile opened: C:\Users\user\AppData\Local
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: CompanyNameVMware, Inc.j!
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: noreply@vmware.com0
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: http://www.vmware.com/0
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: FileDescriptionVMware SVGA 3D Device API Module:
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: VMware, Inc.
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: VMware, Inc.1!0
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: ?d:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\lib\raster\bits2pixels.cd:\build\ob\bora-18379147\bora-vmsoft\build\release-x64\svga\wddm\src\lib\umlib\log.cC:\vm3dum_log\vm3dum%s_%d-%d.logwtC:\vm3dum_log\vm3dum*.log%.4d-%.2d-%.2dT%.2d:%.2d:%.2d.%.4d| Thread ID: %d |%s%sDXUM%s: Software\VMware, Inc.\VMware SVGADebugSearchPathEXCEPTION_ACCESS_VIOLATIONEXCEPTION_ARRAY_BOUNDS_EXCEEDEDEXCEPTION_BREAKPOINTEXCEPTION_DATATYPE_MISALIGNMENTEXCEPTION_FLT_DENORMAL_OPERANDEXCEPTION_FLT_DIVIDE_BY_ZEROEXCEPTION_FLT_INEXACT_RESULTEXCEPTION_FLT_INVALID_OPERATIONEXCEPTION_FLT_OVERFLOWEXCEPTION_FLT_STACK_CHECKEXCEPTION_FLT_UNDERFLOWEXCEPTION_INT_DIVIDE_BY_ZEROEXCEPTION_INT_OVERFLOWEXCEPTION_NONCONTINUABLE_EXCEPTIONEXCEPTION_PRIV_INSTRUCTIONEXCEPTION_SINGLE_STEPunknownBacktrace[%2d] rip=%p %s+%#x %s:%d
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: http://www.vmware.com/0/
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: Software\VMware, Inc.\VMware SVGA
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: VMware, Inc.1
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: VMware, Inc.0
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: ProductNameVMware SVGA 3D`
    Source: vm3ddevapi64-debug.dll.0.drBinary or memory string: LegalCopyrightCopyright (C) 1998-2021 VMware, Inc.Z
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_732A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\Desktop\recibo.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    1
    Obfuscated Files or Information
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Timestomp
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    recibo.exe55%VirustotalBrowse
    recibo.exe26%MetadefenderBrowse
    recibo.exe50%ReversingLabsWin32.Downloader.GuLoader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\HPSUPD-Win32Exe.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\lgpllibs.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\lgpllibs.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\lgpllibs.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nso5699.tmp\System.dll2%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nso5699.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nso5699.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\vm3ddevapi64-debug.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://mozilla.org00%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.sil.org/iso639-3/iso_639-3.xml.0.drfalse
      high
      http://www.vmware.com/0/recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drfalse
        high
        http://www.vmware.com/0recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drfalse
          high
          http://nsis.sf.net/NSIS_ErrorErrorrecibo.exefalse
            high
            http://www.symauth.com/cps0(recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drfalse
              high
              http://www.symauth.com/rpa00recibo.exe, 00000000.00000002.761476867.000000000040A000.00000004.00000001.01000000.00000003.sdmp, vm3ddevapi64-debug.dll.0.drfalse
                high
                https://mozilla.org0lgpllibs.dll.0.drfalse
                • URL Reputation: safe
                unknown
                No contacted IP infos
                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:635097
                Start date and time: 27/05/202213:15:132022-05-27 13:15:13 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 33s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:recibo.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:27
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal72.troj.evad.winEXE@1/11@0/0
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 63.2% (good quality ratio 61.9%)
                • Quality average: 88.1%
                • Quality standard deviation: 21.6%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Adjust boot time
                • Enable AMSI
                • Override analysis time to 240s for sample files taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, time.windows.com, arc.msn.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtSetInformationFile calls found.
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
                Category:dropped
                Size (bytes):10521
                Entropy (8bit):7.888779038440803
                Encrypted:false
                SSDEEP:192:oXRZxdt62XpqRigPYtY0CfKTQlh5NKW6F5oJxfskCjGmXa6Pbpwr4WmKM:KRfdt62X+XoElh/KW6ifskEGeaIpwr4n
                MD5:8D61CCB44C962D7831FB6703B4AF623D
                SHA1:2BFDC667151057B3A42CDD22F9EB0E5AB0B0EF3C
                SHA-256:1EFFB5A4A46B05C024518546D4C8BBB45AD3496590E3E86AF533CF31C61512F4
                SHA-512:FE0C304F73713552ACA3A28D9CCD6BD2C53A45F72052892CC8F94D835A213F2F3C4D8D1656BD8160AE874A63FACC6B79BA763D4A724281E5F0DEDAC87F86375E
                Malicious:false
                Reputation:low
                Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(..9...k....X.....&.2.Z.......k~I.....e...J...}..<..M..8..........".../...O.u...........5.h...71]ZZ......v..Yc...<.i'..m2_..>..#...K...,.qq.^<2|D.V...j..ae.0Mu.^K..#k..3<."FV$HV.)..vmG..H........z.\..#......3_..Wo.g.>.o..........|...V.}.Ho.]...q#..W667Z`..)..l._E'.....+\.w..K....O.o..5......4O..~.
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:data
                Category:dropped
                Size (bytes):95635
                Entropy (8bit):6.715584422233703
                Encrypted:false
                SSDEEP:768:9hlBFBNMGjjT0QwOqKvIRnCkPFG4ouc83ArsfQFaFL03ZLoeZ4YgXplXpyfHqvds:91XNMjjEqnIfsVFIhBQlYG22vAlGI
                MD5:0DBDB94BF9F058978C90852607F98DBD
                SHA1:DCA1907D14891499D855DEB23BF461799C7ED0C4
                SHA-256:11D6302EBD701AD527EC6358E33FC578AE0D88AC9A43AC03F4AD5276B186538E
                SHA-512:0D6C48216172958EFE0E305B81D8B0B5C3606F001969E80220D4EBCF818013416992BC8D0638F4B0F6E337040CCABD607731F1912BA9DCFAA2E69C824CFC2877
                Malicious:false
                Reputation:low
                Preview:.i.....f....q._f....5j..k.................................................<.f...........).Tsc.......................................{Z&n..f.v........!`..}.............................f...Of.....f.......f.v..([...llllllllllllllllllllllllllllllllllll.........f....c..3B..!................................................!,O....n...f...f.e..0...@.....................................................g.......).D.>)))))))))))))))))))))))))))))))))))))...........f.....w?..PPPPPPPPPPPPPPPPPPPPPPPPP......t.........0...e.................................................f.e../..~6.............................................T7.z.......................................f.....f.i.f.t.f......-.j1.33333333333333333333333333333333333333333f..f.....f.q....................................................f.......w.....f....5.G.[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[...f.g.f.q.f.........$.pS.OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOf............f.q. .*..,...................................................
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):58368
                Entropy (8bit):5.856484138583398
                Encrypted:false
                SSDEEP:768:t2y20tpnvfSd9bbM9tmRtTkwv9QMdVk1QKVnjphRJy26xG0XFC19Io:J20t1SdN0kvZ9pdW1QKVjzy26opD
                MD5:D600D4F40A2BE641991044EE0814BFA4
                SHA1:3BDEF3488C28D43D285C47F46B82B980A8F41CD8
                SHA-256:B0D12A7AADF51B02D52E9E88295E6E6606F68C1508C8D9323B6549AA20EC82AA
                SHA-512:27B125260AA56FCAD4153A3259ECFB898681C9B096A4A37EB32AC3B722599EA4BFB5BF00F0247136F11F73F280B85844B37F6236331A0EF3B90ED2EC70CEDA55
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: Metadefender, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Reputation:moderate, very likely benign file
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...Kc..........."...0.................. .....@..... ....................... ............`...@......@............... ..................................................................8............................................................ ..H............text........ ...................... ..`.rsrc...............................@..@........................................H........W..4...........................................................N.((.....tS...}....*F.{....o....s....*F.{....o....s....*.0...........{....o.....s.......&.....*.................J.{....o.....s....*..((...*~.().....tV...}......s....}....*2.{....o....*2.{....o....*F.{....o....s....*2.{....o....*2.{....o....*F.{....o....,..*.*2.{....o....*2.{....o....*2.{....o....*2.{....o....*2.{....o....*:.s....%.}y...*..(....*:.().....}....*..(*....,...}....+.r...ps+...z.....s4...}....*.0......
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:ASCII text, with very long lines, with no line terminators
                Category:dropped
                Size (bytes):37188
                Entropy (8bit):3.999253187571331
                Encrypted:false
                SSDEEP:768:cqLtUhAIasZdPK3ukVO7103q1LjVG0I6Z93rWa1FLXSBhuj3KmuzoAgZ:coUvbkVORtVjVG0I6rbWa1FzSBh0Go9Z
                MD5:6001AAC06A6EB2B760F3DC4BE1B2D3F8
                SHA1:A88A72756DB347DE9507495A9F6D5E521EB5FB42
                SHA-256:0E1AB3CD23AE04019CAEBE185924D859E7017E933F824B1CBEB50FAD08B0CC76
                SHA-512:B400F2609A8E67BD53062E73FE8A0BD3960CD62A0D388F228C1DE4A01627C4A07F42961161CC2195DEA6961BBC43FF25E6E0E67963A55FEA31B42050F3C68424
                Malicious:false
                Reputation:low
                Preview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
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):193
                Entropy (8bit):6.41289035005742
                Encrypted:false
                SSDEEP:6:6v/lhPys693pMeNKrccoz4OtOOFImbTM0t7zlyH//jp:6v/7adpfNWcVkqfTMyUf1
                MD5:F492568998D5783731D50D7CA73AC7A3
                SHA1:E87B96367BDB02176067336A1CCE3B32EBDCB3B2
                SHA-256:7A08D7B1CC724A453A0C3EB2F36369D7FD6AC6BD965CE0B4D075D570ED369A9B
                SHA-512:2C6C726426EA6DD4C7CCC141152E24DD46BDB11D3DB45ED7BA6EAC06DE922F69E5172D5431D63B9ACF96E54B89857317CA0F87880F7B03C43AF9F7416EE95C73
                Malicious:false
                Reputation:low
                Preview:.PNG........IHDR................a....sBIT....|.d....xIDAT8.....0.E..#d.{Gp.k.q.WP....,m..$.BH....s...A<...9..L..Fp.E..7......`......6.n....]b.5...P.....r.W..#....U_....p.P.>.&.1.....IEND.B`.
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
                Category:dropped
                Size (bytes):1063988
                Entropy (8bit):4.881622518734141
                Encrypted:false
                SSDEEP:6144:z6ZdTZZl/WX4fVLcf9MvAadpxr5+ZiVHPZ6TZXjcePr:z6nTZZl/WX4fVLcqvV5+ZiX6TZXJ
                MD5:DCAD3B0F729144CE9EE9A6006D9C3E74
                SHA1:3EEF5F61BEF834B7089A87423D128990A1065E81
                SHA-256:D8AB9C2641481645A8ACF875FFA3E3CB271D2CD946691DD8E0BD48513FFF1370
                SHA-512:BB0ED1F9FBB122728776731B04C54C8FBA57BF2987D04DAD1167FC879FC8A2483093E1A8304A021D6238B408FED826E902386D7DB52B7988CE9DCC89ACB64611
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" ?>.... ....WARNING: THIS FILE IS DEPRECATED.....PLEASE USE THE JSON DATA INSTEAD.....Usually, this data can be found in /usr/share/iso-codes/json.....This file gives a list of all languages in the ISO 639-3..standard, and is used to provide translations via gettext....Copyright . 2005 Alastair McKinstry <mckinstry@computer.org>..Copyright . 2008,2012,2013 Tobias Quathamer <toddy@debian.org>.... This file is free software; you can redistribute it and/or.. modify it under the terms of the GNU Lesser General Public.. License as published by the Free Software Foundation; either.. version 2.1 of the License, or (at your option) any later version..... This file is distributed in the hope that it will be useful,.. but WITHOUT ANY WARRANTY; without even the implied warranty of.. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU.. Lesser General Public License for more details..... You should have received a co
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                Category:dropped
                Size (bytes):37816
                Entropy (8bit):6.374742588554942
                Encrypted:false
                SSDEEP:384:VbijnYW+DZZMwrusWsWQfRl30fP5/A5KFUkYvntA/QcP+ACxw/3MvDG/GhUVgt:dijnQDnzruRNQfv0fP5/oABCDGehHt
                MD5:9B623087B905D8FE157BDB7EC85009A8
                SHA1:4B6DD4C0292558513A840B40A991533735D55E02
                SHA-256:7FA4C9EA4BE0088D6D311BD93FA65BAF8828DA32A2FD4BF8CE0EADE552D46246
                SHA-512:8C06714F93EB05FAD19F1A96C0DB8FF030B1CD3C03D6B17C231CDE5BCE8DD8358014D87A74306C3BABEF7C573D4AF5AE80904AFBB0329D2D83FE3758EF020719
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: Metadefender, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...>..b.........." .....F...*......P.....................................................`A........................................@g.......n..x....................t..............Te...............................`...............o..X............................text...FE.......F.................. ..`.rdata..p....`.......J..............@..@.data...@............d..............@....pdata...............f..............@..@.00cfg...............l..............@..@.rsrc................n..............@..@.reloc...............r..............@..B................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):1401
                Entropy (8bit):5.11645334711433
                Encrypted:false
                SSDEEP:24:t4Cjlza3LWdwpQiL6Rch3jV81hF3Q59UPFkyKbRAecFhBrN3AGMH:1cL8w6iJjV8jF3894kNtAecFZTMH
                MD5:BAE5EB7B918D568E955B8885EEB5DB5A
                SHA1:FC4421C6A019D0147A13B08CBB2F0720F49E17C3
                SHA-256:273F11F9F8BD84F2A32E0CC857E21050A9A9C7713F33D9A220991DC232C470BA
                SHA-512:8A6AE1E26C9451A241655242D16368D87E23036D03D61FF75F5669D5E2930446D6003D5191622F576060E529EE21DD6E28D3408D28719A4D53BD291E673037B0
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16">. <g fill="#2e3436">. <path d="m 213.531,228.469 -1.061,1.061 14,14 1.062,-1.062 z" transform="translate(-212 -228)"/>. <path d="m 220,228 c -1.662,0 -3,1.338 -3,3 v 1.64453 l 5.2832,5.2832 C 222.72383,237.4058 223,236.73965 223,236 v -5 c 0,-1.662 -1.338,-3 -3,-3 z m -6,6 v 2.00977 c 0,2.96574 2.16538,5.4238 5,5.90039 V 244 h 2 v -2.08984 c 0.64598,-0.10861 1.24984,-0.33194 1.80859,-0.62891 l -1.11132,-1.11133 C 221.17391,240.38 220.60353,240.5 220,240.5 c -2.50669,0 -4.5,-1.99014 -4.5,-4.49023 V 234 Z m 10.5,0 v 2.00977 c 0,1.15729 -0.44099,2.19439 -1.14844,2.98632 l 1.05274,1.05274 C 225.38802,238.9836 226,237.57264 226,236.00977 V 234 Z m -7.5,1.47266 V 236 c 0,1.662 1.338,3 3,3 0.16422,0 0.3216,-0.0237 0.47852,-0.0488 z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-se
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):12288
                Entropy (8bit):5.814115788739565
                Encrypted:false
                SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                MD5:CFF85C549D536F651D4FB8387F1976F2
                SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 2%, Browse
                • Antivirus: Metadefender, Detection: 3%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):213
                Entropy (8bit):4.950492507724413
                Encrypted:false
                SSDEEP:6:tI9mc4slzcpG+xW6UmUuksJtjdU0t/ZME:t4Cp9xW6zUmjW0tOE
                MD5:A4ACDD85E11EA101F3BB4B5BEC3382F0
                SHA1:2DC81694D5D3C403BF696B1796385D2F64C40D77
                SHA-256:AD87999B06B9C8035CCAC8EF29D54C9E00055EE9E2DBDD9B7BA24CCF56C471E6
                SHA-512:6C7C1E913CBF7CD6B91721BD60705B3A87C398B5D69D1FA03D67EDF7C69E23AB410938EC5E0770584E5B6E218443E53A702BD389C2253F05C2D4F48B944D481E
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M2 4c-.5 0-1 .5-1 1v4c0 .5.5 1 1 1h1V8h10v2h1c.5 0 1-.5 1-1V5c0-.5-.5-1-1-1zm2-3v2h8V1z"/><path d="M4 9v5h8V9z"/></g></svg>
                Process:C:\Users\user\Desktop\recibo.exe
                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                Category:dropped
                Size (bytes):288328
                Entropy (8bit):6.5244639850667605
                Encrypted:false
                SSDEEP:6144:TWMbKY5G780mQB8fkrOX9rn8ndvcA5abagLgandSUbJ:aMbKY5AIvfkSX9rSdkfbanUbJ
                MD5:9ECB2FA510DCDF4BFB06DC80A83294BD
                SHA1:65E0CEC428D010B94D81BA784EA709EBA598A1CD
                SHA-256:865868E3BE461332134EFBBA9F1D8AAA5E29A0C8AD3F5A2AC47311F47D4CFD62
                SHA-512:6F70D42EE2A6CA1F2D85A84947B74EAD03FA4CD00AE5D897FC80832111D88B0D9EEFE81B5FFBC229AE9E1D97467713AF0D385C8C2E96D67B5E9008033C02CB28
                Malicious:false
                Antivirus:
                • Antivirus: Virustotal, Detection: 0%, Browse
                • Antivirus: Metadefender, Detection: 0%, Browse
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......[...............................s.....s.....s..........M...........z.....z.......................G.........Rich..................PE..d......`.........." .........j......................................................N.....`A.........................................................p..........x!......Hb..............8..............................8...................4...@....................text.............................. ..`.rdata..............................@..@.data...0#..........................@....pdata..x!......."..................@..@.didat..`....@......................@....gehcont$....P......................@..@_RDATA.......`......................@..@.rsrc........p......................@..@.reloc..............................@..B........................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.397735144960236
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:recibo.exe
                File size:606778
                MD5:4680729edca682d1b6de8cf875bbfdf5
                SHA1:debf5126050330ecbfc29582d979101cd557dd42
                SHA256:e18032a74c8138c907ab2b6937ce66a4483a85e89b05a25153499efee4e85898
                SHA512:d1eaca1d1513ea5732f05dff1ad527aa48fbdab35386f73bb08a1e5d85569dd80a84217d78ca55a68688deb82a556f5338f45bccbfa16007014d6df2674624d9
                SSDEEP:12288:5bspFskmgHwg9jXbgO1xzSs9IKTQWfsmuYUD:5bsLskmZc0k9IKTQWkmuZD
                TLSH:4FD4F154BAC8ECABD01691785476AF656AD3EE1218358903173E3E2FF772193343B81E
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                Icon Hash:38e6d3b1b3a2cc71
                Entrypoint:0x40352d
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                Instruction
                push ebp
                mov ebp, esp
                sub esp, 000003F4h
                push ebx
                push esi
                push edi
                push 00000020h
                pop edi
                xor ebx, ebx
                push 00008001h
                mov dword ptr [ebp-14h], ebx
                mov dword ptr [ebp-04h], 0040A2E0h
                mov dword ptr [ebp-10h], ebx
                call dword ptr [004080CCh]
                mov esi, dword ptr [004080D0h]
                lea eax, dword ptr [ebp-00000140h]
                push eax
                mov dword ptr [ebp-0000012Ch], ebx
                mov dword ptr [ebp-2Ch], ebx
                mov dword ptr [ebp-28h], ebx
                mov dword ptr [ebp-00000140h], 0000011Ch
                call esi
                test eax, eax
                jne 00007EFE60AA23BAh
                lea eax, dword ptr [ebp-00000140h]
                mov dword ptr [ebp-00000140h], 00000114h
                push eax
                call esi
                mov ax, word ptr [ebp-0000012Ch]
                mov ecx, dword ptr [ebp-00000112h]
                sub ax, 00000053h
                add ecx, FFFFFFD0h
                neg ax
                sbb eax, eax
                mov byte ptr [ebp-26h], 00000004h
                not eax
                and eax, ecx
                mov word ptr [ebp-2Ch], ax
                cmp dword ptr [ebp-0000013Ch], 0Ah
                jnc 00007EFE60AA238Ah
                and word ptr [ebp-00000132h], 0000h
                mov eax, dword ptr [ebp-00000134h]
                movzx ecx, byte ptr [ebp-00000138h]
                mov dword ptr [00434FB8h], eax
                xor eax, eax
                mov ah, byte ptr [ebp-0000013Ch]
                movzx eax, ax
                or eax, ecx
                xor ecx, ecx
                mov ch, byte ptr [ebp-2Ch]
                movzx ecx, cx
                shl eax, 10h
                or eax, ecx
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x6b0000x27620.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .ndata0x360000x350000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x6b0000x276200x27800False0.363744808149data4.74589509923IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x6b2f80x10828dBase III DBT, version number 0, next free block index 40EnglishUnited States
                RT_ICON0x7bb200x94a8dataEnglishUnited States
                RT_ICON0x84fc80x5488dataEnglishUnited States
                RT_ICON0x8a4500x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 6356992, next used block 0EnglishUnited States
                RT_ICON0x8e6780x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0EnglishUnited States
                RT_ICON0x90c200x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0EnglishUnited States
                RT_DIALOG0x91cc80x100dataEnglishUnited States
                RT_DIALOG0x91dc80x11cdataEnglishUnited States
                RT_DIALOG0x91ee80xc4dataEnglishUnited States
                RT_DIALOG0x91fb00x60dataEnglishUnited States
                RT_GROUP_ICON0x920100x5adataEnglishUnited States
                RT_VERSION0x920700x270dataEnglishUnited States
                RT_MANIFEST0x922e00x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                DLLImport
                ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                DescriptionData
                LegalCopyrightInsweepi
                FileVersion27.29.17
                CompanyNameCHRYSALIDAH
                LegalTrademarksVrdi24
                Commentsreconnoiterlbni
                ProductNamepetiolispill
                FileDescriptionPratalkoholis
                Translation0x0409 0x04b0
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                No network behavior found
                No statistics
                Target ID:0
                Start time:13:16:17
                Start date:27/05/2022
                Path:C:\Users\user\Desktop\recibo.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\recibo.exe"
                Imagebase:0x400000
                File size:606778 bytes
                MD5 hash:4680729EDCA682D1B6DE8CF875BBFDF5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.761876778.0000000002A50000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                No disassembly