Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order_002376662-579588_Date 24082022.exe

Overview

General Information

Sample Name:Order_002376662-579588_Date 24082022.exe
Analysis ID:694559
MD5:8c2a59bd88b7e2c26045a604ed544288
SHA1:7efb014d57608ff6a2805baf4dd7c150792e6eb4
SHA256:0d4b100e641aad426a916cb326d20f8fe44e32ca38f7a85c505135036c6b44af
Tags:exesigned
Infos:

Detection

GuLoader
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Initial sample is a PE file and has a suspicious name
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Detected potential crypto function
Stores files to the Windows start menu directory
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.829249266.00000000030C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Order_002376662-579588_Date 24082022.exeMetadefender: Detection: 27%Perma Link
    Source: Order_002376662-579588_Date 24082022.exeReversingLabs: Detection: 65%
    Source: Order_002376662-579588_Date 24082022.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Platooned\AnanthropismJump to behavior
    Source: Order_002376662-579588_Date 24082022.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\SourceCode\GC3.GPUPowerSaving\production_V4.2.12.3\Service\ConfigEditorCS\obj\Release\GPUPowerSavingConfigEditor.pdb source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.dr
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_0040639C FindFirstFileA,FindClose,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_004026F8 FindFirstFileA,
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://subca.ocsp-certum.com01
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://subca.ocsp-certum.com02
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://subca.ocsp-certum.com05
    Source: Order_002376662-579588_Date 24082022.exeString found in binary or memory: http://www.certum.pl/CPS0
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_004052FE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

    System Summary

    barindex
    Source: initial sampleStatic PE information: Filename: Order_002376662-579588_Date 24082022.exe
    Source: Order_002376662-579588_Date 24082022.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: GPUPowerSavingConfigEditor.dll.2.drStatic PE information: No import functions for PE file found
    Source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGPUPowerSavingConfigEditor.dll< vs Order_002376662-579588_Date 24082022.exe
    Source: Order_002376662-579588_Date 24082022.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: Order_002376662-579588_Date 24082022.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Windows\resources\0409Jump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_00406725
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_00404B3D
    Source: Order_002376662-579588_Date 24082022.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeProcess Stats: CPU usage > 98%
    Source: Order_002376662-579588_Date 24082022.exeMetadefender: Detection: 27%
    Source: Order_002376662-579588_Date 24082022.exeReversingLabs: Detection: 65%
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile read: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeJump to behavior
    Source: Order_002376662-579588_Date 24082022.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\SigtelinjensJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Local\Temp\nsn2719.tmpJump to behavior
    Source: classification engineClassification label: mal64.troj.evad.winEXE@1/7@0/0
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_004020CB CoCreateInstance,MultiByteToWideChar,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_004045CA GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Platooned\AnanthropismJump to behavior
    Source: Order_002376662-579588_Date 24082022.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\SourceCode\GC3.GPUPowerSaving\production_V4.2.12.3\Service\ConfigEditorCS\obj\Release\GPUPowerSavingConfigEditor.pdb source: Order_002376662-579588_Date 24082022.exe, 00000002.00000002.829004548.000000000277A000.00000004.00000800.00020000.00000000.sdmp, GPUPowerSavingConfigEditor.dll.2.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000002.00000002.829249266.00000000030C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_10002D20 push eax; ret
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Holograph\Towy\Dgnrytmers\GPUPowerSavingConfigEditor.dllJump to dropped file
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Local\Temp\nsb3C99.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\SigtelinjensJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\TvtningerneJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Noneffervescently.CreJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\KalligraferendesJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Kalligraferendes\QuantisersJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Kalligraferendes\Quantisers\Aqua_20.bmpJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Forhaanet.NabJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\HolographJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Holograph\TowyJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Holograph\Towy\DgnrytmersJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Holograph\Towy\Dgnrytmers\GPUPowerSavingConfigEditor.dllJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Holograph\Towy\Dgnrytmers\face-cool.pngJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\TilegnelserneJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Tilegnelserne\Suppegrydernes79Jump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Tilegnelserne\Suppegrydernes79\iso_3166-1.jsonJump to behavior
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeRDTSC instruction interceptor: First address: 00000000030C2A2F second address: 00000000030C2A2F instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007EFC0CCA9B97h 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 test dx, dx 0x0000000b rdtsc
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Holograph\Towy\Dgnrytmers\GPUPowerSavingConfigEditor.dllJump to dropped file
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_0040639C FindFirstFileA,FindClose,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_004026F8 FindFirstFileA,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
    Source: C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exeCode function: 2_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    11
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/Job1
    Registry Run Keys / Startup Folder
    1
    Windows Service
    1
    Access Token Manipulation
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)1
    Registry Run Keys / Startup Folder
    1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Order_002376662-579588_Date 24082022.exe28%MetadefenderBrowse
    Order_002376662-579588_Date 24082022.exe65%ReversingLabsWin32.Trojan.Guloader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsb3C99.tmp\System.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsb3C99.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Holograph\Towy\Dgnrytmers\GPUPowerSavingConfigEditor.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Sigtelinjens\Tvtningerne\Holograph\Towy\Dgnrytmers\GPUPowerSavingConfigEditor.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://subca.ocsp-certum.com050%URL Reputationsafe
    http://subca.ocsp-certum.com020%URL Reputationsafe
    http://subca.ocsp-certum.com010%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.certum.pl/ctnca2.crl0lOrder_002376662-579588_Date 24082022.exefalse
      high
      http://repository.certum.pl/ctnca2.cer09Order_002376662-579588_Date 24082022.exefalse
        high
        http://crl.certum.pl/ctsca2021.crl0oOrder_002376662-579588_Date 24082022.exefalse
          high
          http://nsis.sf.net/NSIS_ErrorOrder_002376662-579588_Date 24082022.exefalse
            high
            http://repository.certum.pl/ctnca.cer09Order_002376662-579588_Date 24082022.exefalse
              high
              http://nsis.sf.net/NSIS_ErrorErrorOrder_002376662-579588_Date 24082022.exefalse
                high
                http://repository.certum.pl/ctsca2021.cer0Order_002376662-579588_Date 24082022.exefalse
                  high
                  http://crl.certum.pl/ctnca.crl0kOrder_002376662-579588_Date 24082022.exefalse
                    high
                    http://subca.ocsp-certum.com05Order_002376662-579588_Date 24082022.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.certum.pl/CPS0Order_002376662-579588_Date 24082022.exefalse
                      high
                      http://subca.ocsp-certum.com02Order_002376662-579588_Date 24082022.exefalse
                      • URL Reputation: safe
                      unknown
                      http://subca.ocsp-certum.com01Order_002376662-579588_Date 24082022.exefalse
                      • URL Reputation: safe
                      unknown
                      No contacted IP infos
                      Joe Sandbox Version:35.0.0 Citrine
                      Analysis ID:694559
                      Start date and time:2022-08-31 23:50:13 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 7m 37s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:Order_002376662-579588_Date 24082022.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal64.troj.evad.winEXE@1/7@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 62.6% (good quality ratio 61.3%)
                      • Quality average: 89%
                      • Quality standard deviation: 21.6%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Adjust boot time
                      • Enable AMSI
                      • Override analysis time to 240s for sample files taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: Order_002376662-579588_Date 24082022.exe
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:modified
                      Size (bytes):11264
                      Entropy (8bit):5.767999234165119
                      Encrypted:false
                      SSDEEP:192:cPtkumJX7zBE2kGwfy9S9VkPsFQ1MZ1c:N7O2k5q9wA1MZa
                      MD5:C9473CB90D79A374B2BA6040CA16E45C
                      SHA1:AB95B54F12796DCE57210D65F05124A6ED81234A
                      SHA-256:B80A5CBA69D1853ED5979B0CA0352437BF368A5CFB86CB4528EDADD410E11352
                      SHA-512:EAFE7D5894622BC21F663BCA4DD594392EE0F5B29270B6B56B0187093D6A3A103545464FF6398AD32D2CF15DAB79B1F133218BA9BA337DDC01330B5ADA804D7B
                      Malicious:false
                      Antivirus:
                      • Antivirus: Metadefender, Detection: 0%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L.....uY...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..^....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exe
                      File Type:ASCII text, with very long lines, with no line terminators
                      Category:dropped
                      Size (bytes):29564
                      Entropy (8bit):3.9994965063204706
                      Encrypted:false
                      SSDEEP:768:K3xU0sST74YF3ZeaYDqKjmgtajzKmFGMiElvFoe2:2Tsusm3ODqK/Imlh
                      MD5:61F8A1615921DA63C2609B90984F1D32
                      SHA1:D188A91A6745481BB830704854FE61E2A41E0B9A
                      SHA-256:DF023F32CE51FF8BA14F1147B1D7644D734AC9EF0FB5CF024A88A495E153EFF0
                      SHA-512:9855CCCA3CF01993F04ECC48824FF8AD7084176F8A9411CF8E737FDAB5BB093B3FE19B8098D8206A1DFF546DA59D227D783470A2D1DCE1083C1FBC9661FBB3DC
                      Malicious:false
                      Reputation:low
                      Preview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
                      Process:C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exe
                      File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):31456
                      Entropy (8bit):6.0996914820635295
                      Encrypted:false
                      SSDEEP:384:sQ1QmY/8eFuAYNAx4klQvhI0tUA9wZmjML9S/3oche5ZP2TFn0E0C04Haqk6Olkm:s0YvT4ZbzRj1foHGpzkkF2X9Dh/
                      MD5:6213DFF7A0CE2E52FD61EC4097DF93E7
                      SHA1:4087C8D803EE9E4298AA51EC05E18D020A0A2728
                      SHA-256:D12DC4BBDACDE8FC92DCFB384807D793C67B9B7E88D52EE0240E8A1901B80071
                      SHA-512:85446886691BE56B027519EB2C823399031CE549AA3BF8155A0E3897AAC04E4E8D960716E40E124E0E4980027CB3EB13241A9CF32D9227470F8E0EA45FFBC79D
                      Malicious:false
                      Antivirus:
                      • Antivirus: Metadefender, Detection: 0%, Browse
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d..._p.a.........." ..0..T............... ........... ...............................&....`...@......@............... ..................................`............\...............q............................................................... ..H............text....S... ...T.................. ..`.rsrc...`............V..............@..@........................................H.......x?...0..........Hp................................................(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*V(....re..p~....o....*V(....rs..p~....o....*V(....r...p~....o....*V(....r...p~....o....*.~....*..(....*Vs....(....t.........*.0...........{....o.....{.....3......{.....(....&(.....o .....5...o!...r...p....+A.......~"...(#...,....($....+..r...po%...-..{.....o&...r...p...X....i2...&...{....*....................0...........{....o.....{.....3.......{.
                      Process:C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exe
                      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):845
                      Entropy (8bit):7.722985666159481
                      Encrypted:false
                      SSDEEP:24:47y7zZd6D14lz6mML1mc2TvTl4P5VwbxjoUWBx9:57mD14lz61gTv+P5Vwtj0
                      MD5:EFB6B9E41A0DAAB0088A365317A4F635
                      SHA1:5D5B2C92BB5870B15BFB383A4C749EE1B71E21AB
                      SHA-256:40A5B74A33F7372AC62EC82CA65097B2BF411E6CAF2667C87DA374A06834AD05
                      SHA-512:98BACE38224A53CCDA2039CD6089F704762A5D09D67CE924486800205596671A0BFC9A2BE26D36F77BAB7ECAF57E82C3D16739DBDA9FC1027A8E2B784D784C14
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:.PNG........IHDR................a....IDATx.u..x.[..g]....m.f...m...=..y3...}......V)..&.v.S.}.KYr..<......n.%......q..n.Q.W.j....2....(...N5.....1{......&r/.......dE.1Tg^.!..T..F.C.:T.Ed..<.>.<.r..\.=..OIR.7Q..Ge.|P..`0....*X.......*.>.m.E.p....>...>..M.~........*..*.H4k.7.Z=.d....D.S3..].....f........E.....G.R.....'ND.}.eK...E.....V........ ...........p.g..)&0$...N%dc..n.x:.i..C:...l.Vg^_...r._..9..(....G...$M.....}...u-........}..o..Y.vLA........-Z.K;<.....)...GW.ph..E..c]+.....c.p..#.p[...Q....G.#.....G.......Vu...q....).yl.2.....v.\.0Mz.P/.;B....F..........{.!..T..G.}.._....".2w.m../l.JHs.x..h.....t.....a!.M.....qk. ....IX/@...w.\...2U.....u^.&N3.G..t.......8...Z6].6~..`...+......&.5&.*....ZO...$..Y..%...XF...^s[4...&.nw....?-./..T&.IS.H&.cX"...7..$c........T.9....IEND.B`.
                      Process:C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
                      Category:dropped
                      Size (bytes):8419
                      Entropy (8bit):7.8975477212121925
                      Encrypted:false
                      SSDEEP:192:oXRnOJl+MmnEjHXjbDkd914gmMJrq03QVWpen7d:KRHMmn2XjXQ1VqaQVWs7d
                      MD5:EF9954E2C8A46E6F0BB6AAF1E0A7F499
                      SHA1:F1639B6632F6B4B472A4A0AD653B82A48B008F6B
                      SHA-256:6550954EBF87A006EDA7C80EA5EB26CD51753540C159DEA36E506C811D5261DD
                      SHA-512:F00EAD97959335F95B4846A7DA20A51C2B31E255F2C013DB69CF6F595E3C0BCE299C640001E2B265864528B576F161C9105AC237F09A906E74B9AF406D211D6D
                      Malicious:false
                      Reputation:low
                      Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(..'...no./.....j..Z?...7..c....Z.....K.+.d....3....I.#..m@X|S...T.....g.]..eo...#XI...|D6......D......T.*....da<..i5..!.M...I.mC.W.<O.x._...x.......Q..3..<.....4..."...@..p..y..SX.L...v..[....].+_m.k.Y..b.*X.v:..z....A.A.....>......f?..GG....s."..^......=:e@.X.{.- T.........).....g...O......_[.
                      Process:C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):105498
                      Entropy (8bit):6.8469376549161245
                      Encrypted:false
                      SSDEEP:1536:cYUYKcQR5Y+GAjmU8R20KnRFr/ASso1gQa0CozxqDkHHB+Q/vGmHi:cYvuY+1J8R2bFbAYGQa09zxqDk++GmHi
                      MD5:34957562BCFF2DAE97F8009F22642EA5
                      SHA1:F22431D76E12B5E4AC240E96F6856165C70A01EE
                      SHA-256:69823BE330A7C9B93750E25AFB3BC29DC33F7DE4CA7935D787BE29DD80E711D1
                      SHA-512:015BE4CE81774A334761017AA7C0E397B2DE9F91904D87CDBA163CBD4C584FCBFF25A6C787595F31ABD0C24970101671C9444139088161F7C3A4E5B1634808A4
                      Malicious:false
                      Preview:2.1.].F..Q....H........[.Geo.A,S........n...+.|.......]..r.uh.%.Zng.#.;...2.a.>.....b@....f.m..........@u}.e.-..9...\P.2.(.!.z...#@..u.,.k..A9..q)}.....T...D.{.)f@z.,.....[{o.....)..S.p.&.....#SEu.L..F...mc}.......<..}lV.y.:.Z..N...8.........>.W..O...c9Q1@.~./.....6...... [8-..8EB...C.....X"x..`2[.f..P1..c.?.#.{..EvD....<6.D.,..1;p.b.....W#.4....N.G.).u.u...[JL.i.D.......@...W}).".3m...%.<..[....3.3...-7.z...{..$.lI......7~...lV.....................)y.......S......@:.%2;]u.D..z.3..wv..6[......*!..O..zEeT...:.8.../..C.P....H...).&n7-.t.......S...=.8].+..OsD.......v(...K..Ea5.+b.'...?..?.<....'..o.3.`.Zx......3.<..7*...~....*..6.. >z..Z....d.6<..4).+.<...y..A...5.._..M!.$l]9.y.:...7Z.dD....}...C.M!1.Zt.1....0.)q........=..HR....4..Z.&..s.W......q..pRc.Q{........S.X.......@......+..OA.....oyw...b..*.G..d.|..b.)............. ..]YE.$.......$7U..7..P.Zh.2e.f...g...(..u...i..KB.....j.. <Lts..)1...O^.X]|[s...!........._5..$..-t.`#...T
                      Process:C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exe
                      File Type:UTF-8 Unicode text
                      Category:dropped
                      Size (bytes):36718
                      Entropy (8bit):4.260373998588477
                      Encrypted:false
                      SSDEEP:192:OU+NvXvwEXFo+Hco8/+8IXAMaM2LkAAVemLK9f8QayVEJUfYZqAmULr:OU+Eo8ZLMaMWlAVemOZwyyOwMAmUX
                      MD5:062FC6431BF0FF5F8E7E62587FCBD686
                      SHA1:06E2BF1BB06CE408EC2AAE8D9F7A8ABC0371B57D
                      SHA-256:78FB090F4A54C8B5970EC04C7511F17EB767275A8D5358604A1E335440678617
                      SHA-512:8EC9F46A24C2A0B0C54463EF23D14563DDA2F7D65D8B231B994C8DDA2D5212B4DC697C6DF67B477DD245A2A065023383576A6DB48A335FAB9AFB6AAE7F764194
                      Malicious:false
                      Preview:{. "3166-1": [. {. "alpha_2": "AW",. "alpha_3": "ABW",. "name": "Aruba",. "numeric": "533". },. {. "alpha_2": "AF",. "alpha_3": "AFG",. "name": "Afghanistan",. "numeric": "004",. "official_name": "Islamic Republic of Afghanistan". },. {. "alpha_2": "AO",. "alpha_3": "AGO",. "name": "Angola",. "numeric": "024",. "official_name": "Republic of Angola". },. {. "alpha_2": "AI",. "alpha_3": "AIA",. "name": "Anguilla",. "numeric": "660". },. {. "alpha_2": "AX",. "alpha_3": "ALA",. "name": ".land Islands",. "numeric": "248". },. {. "alpha_2": "AL",. "alpha_3": "ALB",. "name": "Albania",. "numeric": "008",. "official_name": "Republic of Albania". },. {. "alpha_2": "AD",. "alpha_3": "AND",. "name": "Andorra",. "numeric": "020",. "official_name": "Principality of Andorra". },. {. "alpha_2
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Entropy (8bit):7.509543109745029
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:Order_002376662-579588_Date 24082022.exe
                      File size:195584
                      MD5:8c2a59bd88b7e2c26045a604ed544288
                      SHA1:7efb014d57608ff6a2805baf4dd7c150792e6eb4
                      SHA256:0d4b100e641aad426a916cb326d20f8fe44e32ca38f7a85c505135036c6b44af
                      SHA512:ca6d126b62418c1c9fe6b6c0b0418a7253b6200a179af844bd80f67c055375c51d9b268242ea9ff3e15b0c3d867d84c19508229580605cbaac8460fa9a9bec17
                      SSDEEP:3072:RNzPHk9MpcDj6OzDjWubsfxAjaWde+mzaOyrxmIW//z7GfvGxkTjk3kfSD:RhRupsfKW7+me6//z7GvQ
                      TLSH:7014F11D2507C7BECA53423049BA6A675EF6BA04FC8156436F637A983CD3170822F5BE
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...*.uY.................b.........
                      Icon Hash:90b270f0e260b050
                      Entrypoint:0x40330d
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x5975952A [Mon Jul 24 06:35:22 2017 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:57e98d9a5a72c8d7ad8fb7a6a58b3daf
                      Signature Valid:false
                      Signature Issuer:CN="Fights Fratrkning Unnervingly ", OU="nerver Whitebait ", E=Nekrofili@Umiaq.An, O=Stagy, L=Kendallville, S=Indiana, C=US
                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                      Error Number:-2146762487
                      Not Before, Not After
                      • 2/20/2022 5:26:15 AM 2/19/2025 5:26:15 AM
                      Subject Chain
                      • CN="Fights Fratrkning Unnervingly ", OU="nerver Whitebait ", E=Nekrofili@Umiaq.An, O=Stagy, L=Kendallville, S=Indiana, C=US
                      Version:3
                      Thumbprint MD5:8BFEA38B193C49A0622C53FBF7CAADE9
                      Thumbprint SHA-1:CA863CD76251E5155366225CECEF5915CDC6B279
                      Thumbprint SHA-256:A8B4C4809B973CA3D72051C56C958A1F73702992E831E3DED8796A5C96627D06
                      Serial:2F3B028675A5223C
                      Instruction
                      sub esp, 00000184h
                      push ebx
                      push esi
                      push edi
                      xor ebx, ebx
                      push 00008001h
                      mov dword ptr [esp+18h], ebx
                      mov dword ptr [esp+10h], 0040A130h
                      mov dword ptr [esp+20h], ebx
                      mov byte ptr [esp+14h], 00000020h
                      call dword ptr [004080A8h]
                      call dword ptr [004080A4h]
                      and eax, BFFFFFFFh
                      cmp ax, 00000006h
                      mov dword ptr [0042472Ch], eax
                      je 00007EFC0CD39783h
                      push ebx
                      call 00007EFC0CD3C852h
                      cmp eax, ebx
                      je 00007EFC0CD39779h
                      push 00000C00h
                      call eax
                      mov esi, 00408298h
                      push esi
                      call 00007EFC0CD3C7CEh
                      push esi
                      call dword ptr [004080A0h]
                      lea esi, dword ptr [esi+eax+01h]
                      cmp byte ptr [esi], bl
                      jne 00007EFC0CD3975Dh
                      push 0000000Ah
                      call 00007EFC0CD3C826h
                      push 00000008h
                      call 00007EFC0CD3C81Fh
                      push 00000006h
                      mov dword ptr [00424724h], eax
                      call 00007EFC0CD3C813h
                      cmp eax, ebx
                      je 00007EFC0CD39781h
                      push 0000001Eh
                      call eax
                      test eax, eax
                      je 00007EFC0CD39779h
                      or byte ptr [0042472Fh], 00000040h
                      push ebp
                      call dword ptr [00408044h]
                      push ebx
                      call dword ptr [00408288h]
                      mov dword ptr [004247F8h], eax
                      push ebx
                      lea eax, dword ptr [esp+38h]
                      push 00000160h
                      push eax
                      push ebx
                      push 0041FCF0h
                      call dword ptr [00408178h]
                      push 0040A1ECh
                      Programming Language:
                      • [EXP] VC++ 6.0 SP5 build 8804
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x84280xa0.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x74d0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x2d5a00x2660.ndata
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x603c0x6200False0.6572464923469388data6.39361655287636IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x80000x12480x1400False0.4287109375data5.044261339836676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xa0000x1a8380x400False0.6455078125data5.223134318413766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .ndata0x250000x170000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x3c0000x74d00x7600False0.4656382415254237data4.073204340591157IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_ICON0x3c3580x25a8dataEnglishUnited States
                      RT_ICON0x3e9000x10a8dataEnglishUnited States
                      RT_ICON0x3f9a80xea8dataEnglishUnited States
                      RT_ICON0x408500x988dataEnglishUnited States
                      RT_ICON0x411d80x8a8dataEnglishUnited States
                      RT_ICON0x41a800x6c8dataEnglishUnited States
                      RT_ICON0x421480x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                      RT_ICON0x426b00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                      RT_DIALOG0x42b180x100dataEnglishUnited States
                      RT_DIALOG0x42c180x11cdataEnglishUnited States
                      RT_DIALOG0x42d380xc4dataEnglishUnited States
                      RT_DIALOG0x42e000x60dataEnglishUnited States
                      RT_GROUP_ICON0x42e600x76dataEnglishUnited States
                      RT_VERSION0x42ed80x2b4dataEnglishUnited States
                      RT_MANIFEST0x431900x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                      DLLImport
                      KERNEL32.dllSetEnvironmentVariableA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, Sleep, GetTickCount, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, SetCurrentDirectoryA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, GlobalUnlock, GetDiskFreeSpaceA, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                      USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                      SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                      ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                      COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                      ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found
                      No statistics
                      Target ID:2
                      Start time:23:51:11
                      Start date:31/08/2022
                      Path:C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\Order_002376662-579588_Date 24082022.exe"
                      Imagebase:0x400000
                      File size:195584 bytes
                      MD5 hash:8C2A59BD88B7E2C26045A604ED544288
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.829249266.00000000030C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      No disassembly