Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xKBLVUHoY6.exe

Overview

General Information

Sample Name:xKBLVUHoY6.exe
Analysis ID:679245
MD5:6e0bf5d5220fbe4f7245653a259c7dad
SHA1:f077644ac1eb17aa811f4805e1f5f546b4f6166f
SHA256:2914eb3edbf9dadb98429173fb1c1b5954742b10e49b1f804024e6448028f73e
Infos:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected GuLoader
Hides threads from debuggers
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to dynamically determine API calls
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Checks if the current process is being debugged
PE / OLE file has an invalid certificate
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • xKBLVUHoY6.exe (PID: 8532 cmdline: "C:\Users\user\Desktop\xKBLVUHoY6.exe" MD5: 6E0BF5D5220FBE4F7245653A259C7DAD)
    • CasPol.exe (PID: 8740 cmdline: "C:\Users\user\Desktop\xKBLVUHoY6.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 8764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
{"Payload URL": "http://212.193.0.40/redi_oXifXcNSpB69.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1475620205.0000000003360000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000003.00000000.817511706.0000000001230000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      00000003.00000002.5715131175.0000000001230000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: xKBLVUHoY6.exeVirustotal: Detection: 36%Perma Link
        Source: http://212.193.0.40/redi_oXifXcNSpB69.binnAvira URL Cloud: Label: malware
        Source: http://212.193.0.40/redi_oXifXcNSpB69.bin~Avira URL Cloud: Label: malware
        Source: http://212.193.0.40/redi_oXifXcNSpB69.binAvira URL Cloud: Label: malware
        Source: http://212.193.0.40/redi_oXifXcNSpB69.binsvYAvira URL Cloud: Label: malware
        Source: http://212.193.0.40/redi_oXifXcNSpB69.bingAvira URL Cloud: Label: malware
        Source: http://212.193.0.40/redi_oXifXcNSpB69.binHAvira URL Cloud: Label: malware
        Source: http://212.193.0.40/redi_oXifXcNSpB69.binoeAvira URL Cloud: Label: malware
        Source: http://212.193.0.40/redi_oXifXcNSpB69.binZAvira URL Cloud: Label: malware
        Source: http://212.193.0.40/redi_oXifXcNSpB69.binalmAvira URL Cloud: Label: malware
        Source: http://212.193.0.40/redi_oXifXcNSpB69.binVirustotal: Detection: 15%Perma Link
        Source: 00000000.00000002.1475620205.0000000003360000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://212.193.0.40/redi_oXifXcNSpB69.bin"}
        Source: xKBLVUHoY6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: xKBLVUHoY6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_0040290B FindFirstFileW,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,

        Networking

        barindex
        Source: Malware configuration extractorURLs: http://212.193.0.40/redi_oXifXcNSpB69.bin
        Source: global trafficTCP traffic: 192.168.11.20:49727 -> 212.193.0.40:80
        Source: Joe Sandbox ViewASN Name: ASBAXETNRU ASBAXETNRU
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: unknownTCP traffic detected without corresponding DNS query: 212.193.0.40
        Source: CasPol.exe, 00000003.00000002.5715874012.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000003.00000002.5718024276.0000000001541000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.193.0.40/redi_oXifXcNSpB69.bin
        Source: CasPol.exe, 00000003.00000002.5718024276.0000000001541000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.193.0.40/redi_oXifXcNSpB69.binH
        Source: CasPol.exe, 00000003.00000002.5718024276.0000000001541000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.193.0.40/redi_oXifXcNSpB69.binZ
        Source: CasPol.exe, 00000003.00000002.5717397048.0000000001520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.193.0.40/redi_oXifXcNSpB69.binalm
        Source: CasPol.exe, 00000003.00000002.5715874012.00000000014D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.193.0.40/redi_oXifXcNSpB69.bing
        Source: CasPol.exe, 00000003.00000002.5715874012.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000003.00000002.5718024276.0000000001541000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.193.0.40/redi_oXifXcNSpB69.binn
        Source: CasPol.exe, 00000003.00000002.5715874012.00000000014D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.193.0.40/redi_oXifXcNSpB69.binoe
        Source: CasPol.exe, 00000003.00000002.5717397048.0000000001520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.193.0.40/redi_oXifXcNSpB69.binsvY
        Source: CasPol.exe, 00000003.00000002.5718024276.0000000001541000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.193.0.40/redi_oXifXcNSpB69.bin~
        Source: xKBLVUHoY6.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
        Source: xKBLVUHoY6.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
        Source: xKBLVUHoY6.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
        Source: xKBLVUHoY6.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: xKBLVUHoY6.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
        Source: xKBLVUHoY6.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
        Source: xKBLVUHoY6.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: xKBLVUHoY6.exeString found in binary or memory: http://ocsp.digicert.com0A
        Source: xKBLVUHoY6.exeString found in binary or memory: http://ocsp.digicert.com0C
        Source: xKBLVUHoY6.exeString found in binary or memory: http://ocsp.digicert.com0X
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_004056A8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
        Source: xKBLVUHoY6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeFile created: C:\Windows\resources\0409Jump to behavior
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_00406BFE
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_6E551BFF
        Source: xKBLVUHoY6.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeSection loaded: edgegdi.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
        Source: xKBLVUHoY6.exeStatic PE information: invalid certificate
        Source: xKBLVUHoY6.exeVirustotal: Detection: 36%
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeFile read: C:\Users\user\Desktop\xKBLVUHoY6.exeJump to behavior
        Source: xKBLVUHoY6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\xKBLVUHoY6.exe "C:\Users\user\Desktop\xKBLVUHoY6.exe"
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\xKBLVUHoY6.exe"
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\xKBLVUHoY6.exe"
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\LansatJump to behavior
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeFile created: C:\Users\user\AppData\Local\Temp\nsp4C13.tmpJump to behavior
        Source: classification engineClassification label: mal88.troj.evad.winEXE@4/4@0/1
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_004021AA CoCreateInstance,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_00404954 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8764:304:WilStaging_02
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8764:120:WilError_03
        Source: xKBLVUHoY6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000000.00000002.1475620205.0000000003360000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000000.817511706.0000000001230000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.5715131175.0000000001230000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_6E5530C0 push eax; ret
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 3_2_0123154E push ds; retf
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 3_2_012311C5 push esp; iretd
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 3_2_012349CC push ebp; ret
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_6E551BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeFile created: C:\Users\user\AppData\Local\Temp\nsx50C8.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeFile opened: C:\Program Files\qga\qga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
        Source: xKBLVUHoY6.exe, 00000000.00000002.1475805085.0000000003461000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: NTDLLUSER32KERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOKERNELBASE.DLLSHELL32ADVAPI32TEMP=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLL
        Source: xKBLVUHoY6.exe, 00000000.00000002.1475805085.0000000003461000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000003.00000002.5718346627.00000000015D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
        Source: CasPol.exe, 00000003.00000002.5718346627.00000000015D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: NTDLLUSER32KERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOKERNELBASE.DLLSHELL32ADVAPI32TEMP=HTTP://212.193.0.40/REDI_OXIFXCNSPB69.BIN
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_0040290B FindFirstFileW,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeSystem information queried: ModuleInformation
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeAPI call chain: ExitProcess graph end node
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
        Source: xKBLVUHoY6.exe, 00000000.00000002.1475805085.0000000003461000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ntdlluser32kernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoKERNELBASE.DLLshell32advapi32TEMP=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dll
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
        Source: CasPol.exe, 00000003.00000002.5718346627.00000000015D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ntdlluser32kernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoKERNELBASE.DLLshell32advapi32TEMP=http://212.193.0.40/redi_oXifXcNSpB69.bin
        Source: CasPol.exe, 00000003.00000002.5715874012.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000003.00000002.5718112034.0000000001545000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: xKBLVUHoY6.exe, 00000000.00000002.1475805085.0000000003461000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000003.00000002.5718346627.00000000015D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
        Source: xKBLVUHoY6.exe, 00000000.00000002.1476265010.0000000004F39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeThread information set: HideFromDebugger
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_6E551BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeProcess queried: DebugPort
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\xKBLVUHoY6.exe"
        Source: C:\Users\user\Desktop\xKBLVUHoY6.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Native API
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        11
        Masquerading
        OS Credential Dumping311
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
        System Shutdown/Reboot
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
        Process Injection
        21
        Virtualization/Sandbox Evasion
        LSASS Memory21
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Clipboard Data
        Exfiltration Over Bluetooth1
        Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)1
        DLL Side-Loading
        1
        Access Token Manipulation
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
        Process Injection
        NTDS4
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Obfuscated Files or Information
        LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common1
        DLL Side-Loading
        Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        xKBLVUHoY6.exe37%VirustotalBrowse
        xKBLVUHoY6.exe6%MetadefenderBrowse
        xKBLVUHoY6.exe12%ReversingLabsWin32.Trojan.Guloader
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsx50C8.tmp\System.dll3%MetadefenderBrowse
        C:\Users\user\AppData\Local\Temp\nsx50C8.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://212.193.0.40/redi_oXifXcNSpB69.binn100%Avira URL Cloudmalware
        http://212.193.0.40/redi_oXifXcNSpB69.bin~100%Avira URL Cloudmalware
        http://212.193.0.40/redi_oXifXcNSpB69.bin16%VirustotalBrowse
        http://212.193.0.40/redi_oXifXcNSpB69.bin100%Avira URL Cloudmalware
        http://212.193.0.40/redi_oXifXcNSpB69.binsvY100%Avira URL Cloudmalware
        http://212.193.0.40/redi_oXifXcNSpB69.bing100%Avira URL Cloudmalware
        http://212.193.0.40/redi_oXifXcNSpB69.binH100%Avira URL Cloudmalware
        http://212.193.0.40/redi_oXifXcNSpB69.binoe100%Avira URL Cloudmalware
        http://212.193.0.40/redi_oXifXcNSpB69.binZ100%Avira URL Cloudmalware
        http://212.193.0.40/redi_oXifXcNSpB69.binalm100%Avira URL Cloudmalware
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        http://212.193.0.40/redi_oXifXcNSpB69.bintrue
        • 16%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://212.193.0.40/redi_oXifXcNSpB69.binnCasPol.exe, 00000003.00000002.5715874012.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000003.00000002.5718024276.0000000001541000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://212.193.0.40/redi_oXifXcNSpB69.bin~CasPol.exe, 00000003.00000002.5718024276.0000000001541000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://212.193.0.40/redi_oXifXcNSpB69.binsvYCasPol.exe, 00000003.00000002.5717397048.0000000001520000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://nsis.sf.net/NSIS_ErrorErrorxKBLVUHoY6.exefalse
          high
          http://212.193.0.40/redi_oXifXcNSpB69.bingCasPol.exe, 00000003.00000002.5715874012.00000000014D7000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          http://212.193.0.40/redi_oXifXcNSpB69.binHCasPol.exe, 00000003.00000002.5718024276.0000000001541000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          http://212.193.0.40/redi_oXifXcNSpB69.binoeCasPol.exe, 00000003.00000002.5715874012.00000000014D7000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          http://212.193.0.40/redi_oXifXcNSpB69.binZCasPol.exe, 00000003.00000002.5718024276.0000000001541000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          http://212.193.0.40/redi_oXifXcNSpB69.binalmCasPol.exe, 00000003.00000002.5717397048.0000000001520000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          212.193.0.40
          unknownRussian Federation
          49392ASBAXETNRUtrue
          Joe Sandbox Version:35.0.0 Citrine
          Analysis ID:679245
          Start date and time: 05/08/202214:04:092022-08-05 14:04:09 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 13m 36s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:xKBLVUHoY6.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:34
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal88.troj.evad.winEXE@4/4@0/1
          EGA Information:
          • Successful, ratio: 50%
          HDC Information:
          • Successful, ratio: 85.8% (good quality ratio 84.6%)
          • Quality average: 87.5%
          • Quality standard deviation: 21.4%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Adjust boot time
          • Enable AMSI
          • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, svchost.exe
          • TCP Packets have been reduced to 100
          • Excluded IPs from analysis (whitelisted): 13.107.5.88, 20.93.58.141, 20.54.122.82
          • Excluded domains from analysis (whitelisted): evoke-windowsservices-tas-msedge-net.e-0009.e-msedge.net, wd-prod-cp-eu-north-3-fe.northeurope.cloudapp.azure.com, client.wns.windows.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, e-0009.e-msedge.net, wdcp.microsoft.com, arc.msn.com, wd-prod-cp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, ris.api.iris.microsoft.com, wd-prod-cp-eu-north-1-fe.northeurope.cloudapp.azure.com, wdcpalt.microsoft.com, login.live.com, evoke-windowsservices-tas.msedge.net, img-prod-cms-rt-microsoft-com.akamaized.net, nexusrules.officeapps.live.com
          • Execution Graph export aborted for target CasPol.exe, PID 8740 because there are no executed function
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          14:07:08API Interceptor1x Sleep call for process: xKBLVUHoY6.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\xKBLVUHoY6.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):12288
          Entropy (8bit):5.814115788739565
          Encrypted:false
          SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
          MD5:CFF85C549D536F651D4FB8387F1976F2
          SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
          SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
          SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
          Malicious:false
          Antivirus:
          • Antivirus: Metadefender, Detection: 3%, Browse
          • Antivirus: ReversingLabs, Detection: 0%
          Reputation:high, very likely benign file
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\xKBLVUHoY6.exe
          File Type:data
          Category:dropped
          Size (bytes):89687
          Entropy (8bit):6.837509507259706
          Encrypted:false
          SSDEEP:1536:QmQLTEOmUbhvyoO0x5tFqfDDsVXK9cUcqU0C6Xi0PzBXbV8Km:NXUbhax0x5t8bDf9Mm3HJb7m
          MD5:D990EEF58440CBD9320E831F2634DA1A
          SHA1:A11659D9AF5DBA78D8255EDE08CF395EA15DDA17
          SHA-256:AB9CAE0313C6B603854407089A2680A956EBD8DDA95841FDAE71DB984FF665ED
          SHA-512:0D98927E56B9EF0C16EBB1BD075E3B3489CBD7AB3D9074B798D18969AEC044DE91663F607D4EB24F9B9789F04BA683BC779ECD6F94D75E09A354801AF4E30E1D
          Malicious:false
          Reputation:low
          Preview:1...%.y....Je.UP.......(.H..O..6o..j)..*p......8..F..C..2.U.\.S...[ju6...u..h<...o.B.91....;....a..w...q(.o0.y"x...&.......(...Y.$.Dp~....x..L.<.w..4..e.hae.....R...e..xW.2m<.......A(..Ddtm....j.]"%.wy...."A.U.I.`...w..Gu..^=q:.......m..t ...z.-e.P..._clf..W... v.?..#...C. .vMy......../\?.U...z.r.,B6 ...~.......i...@u..T..[...n2zA...)'S..3..P..4..A.n.$...`.>.......1...)5... -'xo..o^.c(........Z....50M.3\...`....`.-...q!.....?.H.'..E.....q..?p{.!.P.......kH,.k.j...!A....X7.^.@.X......sb.6...^.gv.(a..T..rl....Y....M.....RP.a..F.3...._....Q...=.....R...M6.8....r...f.<+..).....wV....1O.L.7iink..u$8....X.e.+..2.%....:..'...@..0....5].~.!...?..>o....~q.B.$..MJ.$H:..r;.......Ty.Z..?.?.E..O~Xh..p..'m..`.w....s..G...6.:...4.....F..~..1w@..M.k...?:)SS.[....s.G.>I,.....|.....m..!M.I.x[.K..p.Q..Z..]N...Qd.......4/...,.%...:.`H.,T.J2...,:....Jg1...3~....!._v.Pa...../.......r.4k.i....vJ!.........Q56..4RU...z.j.x.....b..gDL9.n....o... .H.;F.y!V>..X...
          Process:C:\Users\user\Desktop\xKBLVUHoY6.exe
          File Type:SVG Scalable Vector Graphics image
          Category:dropped
          Size (bytes):1219
          Entropy (8bit):5.18916336052597
          Encrypted:false
          SSDEEP:24:t4CYMqjwbC4KyKbRAecFhBrNxrGDT/alXuprPQ5VIbIrGDRt:ojWCRNtAecFZwDT/AJsD7
          MD5:DE8960A1E15CF658A3FE4A2CAFDAA0D1
          SHA1:7EC7A95E4BC7BA19B3EC19366E87038C3902B430
          SHA-256:DF5925D3EC8C8EDD53FCEC6D7249888D9909B3D245E056028FD668DB4E23CB9B
          SHA-512:91D29A34227DD0DD672519999D32A68F8EB61A2A731495F1A5BCCCF18468BABE9FEA48F1A371A4C6C67D411C29B5ACBDA6430419924F2990DD004FF9564346A9
          Malicious:false
          Reputation:low
          Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><path class="error" d="M5 12v1h2v-1z" fill="#c00"/><path d="M5.469.012c-.49 0-.796.215-1.032.455C4.202.707 4 1.023 4 1.497V2H2v14h5v-2H4V4h2V2.012h4V4h2v3h2V2h-2v-.395l-.002-.027a1.622 1.622 0 00-.416-1.014c-.236-.278-.62-.584-1.2-.552z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;white-space:normal;shape-padding:0;isolation:auto;mix-blend-mode:normal;solid-color:#000;solid-opacity:1;marker:none" color="#bebebe" font-weight="400" font-family="sans-serif" overflow="visible" fill="#2e3436"/><path class="warning" d="M8.875 8A.863.863 0 008 8.875v6.25c0 .492.383.875.875.875h6.25a.863.863 0 00.875-.875v-6.25A.863.863 0 0015.1
          Process:C:\Users\user\Desktop\xKBLVUHoY6.exe
          File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):489
          Entropy (8bit):7.398446007013356
          Encrypted:false
          SSDEEP:12:6v/7Crv9JvDU9+7g+9reUl62vs3FsMjNwAAb88CGFwleELoyrIZLU4:JhY9r+9yr73FsMjqJw8/FwlP04IZLR
          MD5:4A3BBCDA1BE7D1AFEBECAD7904875C44
          SHA1:99273960EF8EFF8CCD701EC42963CAAFB7F87E4D
          SHA-256:B152B10AA3CA6BA1927C946E91FFF1A2FDFD9212D999EC93544F202089A67B48
          SHA-512:7D63ACC041656E77C263FA69D244E9B0DDD499192A3F7CD64F0BE3A8CE0F8A17C1703FA94F0B3D415058893AE9A5DAABA5D9664D3DFE15165FD50A2CB186DC66
          Malicious:false
          Reputation:low
          Preview:.PNG........IHDR................a....IDATx...E..P.E{#.H/ 8l.6333......#..,.C..?f.A.k?....X..fU..{..^....f.F....UD.q.....{.RQ...p...(r.....~T............Z....&IP._.~.dW .GN.9QS*.&K..ppy.d.`f....E.....A.+..?)...}Gr.....6.8....I.X._..Y.......P...{..dj.I...3T..y..Ll...._.h..w..Z*..W....9..b..z.)..OZ~..-.J....h<L..>A .]..3...7..j...$..Q..#.x....x....k.'.5..5....N*@v.6...gO@U....!....v.P..K...h..r.2<~..|.o.h.,.v..~....@c.^..w.j..o4..#....n.E..2..`....B.,\.Qo....IEND.B`.
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Entropy (8bit):6.819560838319919
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:xKBLVUHoY6.exe
          File size:314680
          MD5:6e0bf5d5220fbe4f7245653a259c7dad
          SHA1:f077644ac1eb17aa811f4805e1f5f546b4f6166f
          SHA256:2914eb3edbf9dadb98429173fb1c1b5954742b10e49b1f804024e6448028f73e
          SHA512:23c7a8aac36721080945d99eba09e0eeb29f20ac154ddbeb5b7584c9cb009189a51a7fe1b4effcb2f5dec5ee14faea9a429ca52c4f77d02add3e58871b252ad8
          SSDEEP:6144:nNeZ93O+c5v/vFGdRAiH+uZANZ8dZ4oacNtULM:nN37tyRApQ3dZ4DQZ
          TLSH:B7647D6226A6DC13E38457749165E73D8AA6FE861871C2332BF1ED9BB508F317C1C3A1
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................f...*.....
          Icon Hash:e2aab6e6b696a6d2
          Entrypoint:0x4034f7
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x614F9AE5 [Sat Sep 25 21:55:49 2021 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
          Signature Valid:false
          Signature Issuer:CN="Inexcitable Spawners ", O=Tingibility, L=Hatzenport, S=Rheinland-Pfalz, C=DE
          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
          Error Number:-2146762487
          Not Before, Not After
          • 24/10/2021 22:57:56 23/10/2024 22:57:56
          Subject Chain
          • CN="Inexcitable Spawners ", O=Tingibility, L=Hatzenport, S=Rheinland-Pfalz, C=DE
          Version:3
          Thumbprint MD5:D2B602699036F0C874A4C03B936AC7EF
          Thumbprint SHA-1:6EE012522EF3D0CADB102A8C014FDEE562F62E70
          Thumbprint SHA-256:ADCEA7C19DB10BA76E9CA9342B4AFB6B541167D4F98E6A1795B068A01F32138A
          Serial:56DD4BCCB18528A2
          Instruction
          push ebp
          mov ebp, esp
          sub esp, 000003F4h
          push ebx
          push esi
          push edi
          push 00000020h
          pop edi
          xor ebx, ebx
          push 00008001h
          mov dword ptr [ebp-14h], ebx
          mov dword ptr [ebp-04h], 0040A2E0h
          mov dword ptr [ebp-10h], ebx
          call dword ptr [004080CCh]
          mov esi, dword ptr [004080D0h]
          lea eax, dword ptr [ebp-00000140h]
          push eax
          mov dword ptr [ebp-0000012Ch], ebx
          mov dword ptr [ebp-2Ch], ebx
          mov dword ptr [ebp-28h], ebx
          mov dword ptr [ebp-00000140h], 0000011Ch
          call esi
          test eax, eax
          jne 00007EFF1033089Ah
          lea eax, dword ptr [ebp-00000140h]
          mov dword ptr [ebp-00000140h], 00000114h
          push eax
          call esi
          mov ax, word ptr [ebp-0000012Ch]
          mov ecx, dword ptr [ebp-00000112h]
          sub ax, 00000053h
          add ecx, FFFFFFD0h
          neg ax
          sbb eax, eax
          mov byte ptr [ebp-26h], 00000004h
          not eax
          and eax, ecx
          mov word ptr [ebp-2Ch], ax
          cmp dword ptr [ebp-0000013Ch], 0Ah
          jnc 00007EFF1033086Ah
          and word ptr [ebp-00000132h], 0000h
          mov eax, dword ptr [ebp-00000134h]
          movzx ecx, byte ptr [ebp-00000138h]
          mov dword ptr [0042A2D8h], eax
          xor eax, eax
          mov ah, byte ptr [ebp-0000013Ch]
          movzx eax, ax
          or eax, ecx
          xor ecx, ecx
          mov ch, byte ptr [ebp-2Ch]
          movzx ecx, cx
          shl eax, 10h
          or eax, ecx
          Programming Language:
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x500000x31a50.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x4af680x1dd0.ndata
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x65150x6600False0.6615349264705882data6.439707948554623IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x80000x139a0x1400False0.45data5.145774564074664IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xa0000x203380x600False0.4993489583333333data4.013698650446401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .ndata0x2b0000x250000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x500000x31a500x31c00False0.47981607255025127data6.055190439227351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_ICON0x503400x10a00dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
          RT_ICON0x60d400x9600dataEnglishUnited States
          RT_ICON0x6a3400x8e00PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
          RT_ICON0x731400x5600dataEnglishUnited States
          RT_ICON0x787400x4400dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 252, next used block 1056964608EnglishUnited States
          RT_ICON0x7cb400x2600dataEnglishUnited States
          RT_ICON0x7f1400x1200dataEnglishUnited States
          RT_ICON0x803400xa00dataEnglishUnited States
          RT_ICON0x80d400x600GLS_BINARY_LSB_FIRSTEnglishUnited States
          RT_DIALOG0x813400x100dataEnglishUnited States
          RT_DIALOG0x814400x11cdataEnglishUnited States
          RT_DIALOG0x815600xc4dataEnglishUnited States
          RT_DIALOG0x816280x60dataEnglishUnited States
          RT_GROUP_ICON0x816880x84dataEnglishUnited States
          RT_MANIFEST0x817100x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
          DLLImport
          ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
          SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
          ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
          COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
          USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
          GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
          KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Aug 5, 2022 14:07:32.152435064 CEST4972780192.168.11.20212.193.0.40
          Aug 5, 2022 14:07:33.159872055 CEST4972780192.168.11.20212.193.0.40
          Aug 5, 2022 14:07:35.159363985 CEST4972780192.168.11.20212.193.0.40
          Aug 5, 2022 14:07:39.174120903 CEST4972780192.168.11.20212.193.0.40
          Aug 5, 2022 14:07:47.188000917 CEST4972780192.168.11.20212.193.0.40
          Aug 5, 2022 14:07:54.218904018 CEST4974080192.168.11.20212.193.0.40
          Aug 5, 2022 14:07:55.233010054 CEST4974080192.168.11.20212.193.0.40
          Aug 5, 2022 14:07:57.232618093 CEST4974080192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:01.247330904 CEST4974080192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:09.261444092 CEST4974080192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:16.292191982 CEST4976080192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:17.306272030 CEST4976080192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:19.321695089 CEST4976080192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:23.336309910 CEST4976080192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:31.350100040 CEST4976080192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:38.382898092 CEST4976280192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:39.379566908 CEST4976280192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:41.394762993 CEST4976280192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:45.409439087 CEST4976280192.168.11.20212.193.0.40
          Aug 5, 2022 14:08:53.423372030 CEST4976280192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:00.454098940 CEST4976580192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:01.468534946 CEST4976580192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:03.483611107 CEST4976580192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:07.498469114 CEST4976580192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:15.512239933 CEST4976580192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:22.543256998 CEST4976880192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:23.557393074 CEST4976880192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:25.572673082 CEST4976880192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:29.587294102 CEST4976880192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:37.601310968 CEST4976880192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:44.633246899 CEST4977080192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:45.646311998 CEST4977080192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:47.661587000 CEST4977080192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:51.676271915 CEST4977080192.168.11.20212.193.0.40
          Aug 5, 2022 14:09:59.690076113 CEST4977080192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:06.721107006 CEST4977180192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:07.735119104 CEST4977180192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:09.750307083 CEST4977180192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:13.765036106 CEST4977180192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:21.778992891 CEST4977180192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:28.810158968 CEST4977280192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:29.824213982 CEST4977280192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:31.839329958 CEST4977280192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:35.853876114 CEST4977280192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:43.867840052 CEST4977280192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:50.899960995 CEST4977380192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:51.912887096 CEST4977380192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:53.928108931 CEST4977380192.168.11.20212.193.0.40
          Aug 5, 2022 14:10:57.942816019 CEST4977380192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:05.956773043 CEST4977380192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:12.987570047 CEST4977580192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:14.001897097 CEST4977580192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:16.017164946 CEST4977580192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:20.031699896 CEST4977580192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:28.045557976 CEST4977580192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:35.076654911 CEST4977680192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:36.090778112 CEST4977680192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:38.106137991 CEST4977680192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:42.120623112 CEST4977680192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:50.134536028 CEST4977680192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:57.166372061 CEST4977780192.168.11.20212.193.0.40
          Aug 5, 2022 14:11:58.164046049 CEST4977780192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:00.179128885 CEST4977780192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:04.194000959 CEST4977780192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:12.207859039 CEST4977780192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:19.240605116 CEST4977880192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:20.252856970 CEST4977880192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:22.268033028 CEST4977880192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:26.282752991 CEST4977880192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:34.296644926 CEST4977880192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:41.328217983 CEST4977980192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:42.341773033 CEST4977980192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:44.357043982 CEST4977980192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:48.371671915 CEST4977980192.168.11.20212.193.0.40
          Aug 5, 2022 14:12:56.385699987 CEST4977980192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:03.417860031 CEST4978080192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:04.430660009 CEST4978080192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:06.445909023 CEST4978080192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:10.460551977 CEST4978080192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:18.474405050 CEST4978080192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:25.508054972 CEST4978880192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:26.519665956 CEST4978880192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:28.534674883 CEST4978880192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:32.549573898 CEST4978880192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:40.563359022 CEST4978880192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:47.595875025 CEST4978980192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:48.608536005 CEST4978980192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:50.623610020 CEST4978980192.168.11.20212.193.0.40
          Aug 5, 2022 14:13:54.638317108 CEST4978980192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:02.652225971 CEST4978980192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:09.687903881 CEST4979680192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:10.697413921 CEST4979680192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:12.712574959 CEST4979680192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:16.727325916 CEST4979680192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:24.741096020 CEST4979680192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:31.774460077 CEST4979780192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:32.786245108 CEST4979780192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:34.801412106 CEST4979780192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:38.816270113 CEST4979780192.168.11.20212.193.0.40
          Aug 5, 2022 14:14:46.830014944 CEST4979780192.168.11.20212.193.0.40

          Click to jump to process

          Target ID:0
          Start time:14:07:07
          Start date:05/08/2022
          Path:C:\Users\user\Desktop\xKBLVUHoY6.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\xKBLVUHoY6.exe"
          Imagebase:0x400000
          File size:314680 bytes
          MD5 hash:6E0BF5D5220FBE4F7245653A259C7DAD
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1475620205.0000000003360000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          Reputation:low

          Target ID:3
          Start time:14:07:21
          Start date:05/08/2022
          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\xKBLVUHoY6.exe"
          Imagebase:0xe50000
          File size:108664 bytes
          MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000000.817511706.0000000001230000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.5715131175.0000000001230000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          Reputation:moderate

          Target ID:4
          Start time:14:07:21
          Start date:05/08/2022
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff750a30000
          File size:875008 bytes
          MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          No disassembly