Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
98765434567890.exe

Overview

General Information

Sample Name:98765434567890.exe
Analysis ID:755084
MD5:1c4e3e615e3596572062bca5ec498d41
SHA1:40365b3026ba2fca699462877fc106d58d2406c2
SHA256:622163e09e5ad5324887c02d7834628d7213015fc48d286d69b4a90fa17a772d
Tags:exesigned
Infos:

Detection

GuLoader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Stores files to the Windows start menu directory
PE / OLE file has an invalid certificate
PE file contains more sections than normal
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • 98765434567890.exe (PID: 5852 cmdline: C:\Users\user\Desktop\98765434567890.exe MD5: 1C4E3E615E3596572062BCA5EC498D41)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.765192426.0000000003410000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000002.764218177.0000000000840000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
      Process Memory Space: 98765434567890.exe PID: 5852JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results
        Source: 98765434567890.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: 98765434567890.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_00406555 FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_00405A03 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_0040287E FindFirstFileW,
        Source: 98765434567890.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: 98765434567890.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
        Source: 98765434567890.exeString found in binary or memory: http://s.symcd.com06
        Source: 98765434567890.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
        Source: 98765434567890.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
        Source: 98765434567890.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
        Source: 98765434567890.exeString found in binary or memory: https://d.symcb.com/cps0%
        Source: 98765434567890.exeString found in binary or memory: https://d.symcb.com/rpa0
        Source: 98765434567890.exeString found in binary or memory: https://d.symcb.com/rpa0.
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_004054B0 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
        Source: 98765434567890.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_00404CED
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_004068DA
        Source: 98765434567890.exeStatic PE information: invalid certificate
        Source: libgiognutls.dll.0.drStatic PE information: Number of sections : 11 > 10
        Source: C:\Users\user\Desktop\98765434567890.exeProcess Stats: CPU usage > 98%
        Source: C:\Users\user\Desktop\98765434567890.exeFile read: C:\Users\user\Desktop\98765434567890.exeJump to behavior
        Source: 98765434567890.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\98765434567890.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\98765434567890.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsf214F.tmpJump to behavior
        Source: classification engineClassification label: mal60.troj.evad.winEXE@1/4@0/0
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_00402104 CoCreateInstance,
        Source: C:\Users\user\Desktop\98765434567890.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_00404771 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
        Source: 98765434567890.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000000.00000002.764218177.0000000000840000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: 98765434567890.exe PID: 5852, type: MEMORYSTR
        Source: Yara matchFile source: 00000000.00000002.765192426.0000000003410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_10002DE0 push eax; ret
        Source: libgiognutls.dll.0.drStatic PE information: section name: .xdata
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Local\Temp\nsa22B8.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dllJump to dropped file
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93Jump to behavior
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\antagonizingJump to behavior
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\antagonizing\TrespassageJump to behavior
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\antagonizing\Trespassage\Importprisernes.QuiJump to behavior
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\XJump to behavior
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\UnsaltyJump to behavior
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dllJump to behavior
        Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\Epithem.DreJump to behavior
        Source: C:\Users\user\Desktop\98765434567890.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\98765434567890.exeRDTSC instruction interceptor: First address: 0000000003415088 second address: 0000000003415088 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FB4785ACE05h 0x00000006 cmp dh, ah 0x00000008 inc ebp 0x00000009 cmp ax, cx 0x0000000c inc ebx 0x0000000d rdtsc
        Source: C:\Users\user\Desktop\98765434567890.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dllJump to dropped file
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_00406555 FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_00405A03 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_0040287E FindFirstFileW,
        Source: C:\Users\user\Desktop\98765434567890.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\98765434567890.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
        Source: C:\Users\user\Desktop\98765434567890.exeCode function: 0_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Native API
        1
        Registry Run Keys / Startup Folder
        1
        Access Token Manipulation
        1
        Access Token Manipulation
        OS Credential Dumping1
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
        System Shutdown/Reboot
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Registry Run Keys / Startup Folder
        1
        Obfuscated Files or Information
        LSASS Memory2
        File and Directory Discovery
        Remote Desktop Protocol1
        Clipboard Data
        Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager13
        System Information Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        98765434567890.exe5%ReversingLabs
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsa22B8.tmp\System.dll2%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsa22B8.tmp\System.dll1%VirustotalBrowse
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dll0%ReversingLabs
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dll0%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://nsis.sf.net/NSIS_ErrorError98765434567890.exefalse
          high
          No contacted IP infos
          Joe Sandbox Version:36.0.0 Rainbow Opal
          Analysis ID:755084
          Start date and time:2022-11-28 10:12:41 +01:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 8m 5s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:98765434567890.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:11
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal60.troj.evad.winEXE@1/4@0/0
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 85.8% (good quality ratio 84.5%)
          • Quality average: 87.7%
          • Quality standard deviation: 21.3%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240s for sample files taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtSetInformationFile calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\98765434567890.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:modified
          Size (bytes):11776
          Entropy (8bit):5.656065698421856
          Encrypted:false
          SSDEEP:192:eY24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol+Sl:E8QIl975eXqlWBrz7YLOl+
          MD5:17ED1C86BD67E78ADE4712BE48A7D2BD
          SHA1:1CC9FE86D6D6030B4DAE45ECDDCE5907991C01A0
          SHA-256:BD046E6497B304E4EA4AB102CAB2B1F94CE09BDE0EEBBA4C59942A732679E4EB
          SHA-512:0CBED521E7D6D1F85977B3F7D3CA7AC34E1B5495B69FD8C7BFA1A846BAF53B0ECD06FE1AD02A3599082FFACAF8C71A3BB4E32DEC05F8E24859D736B828092CD5
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 2%
          • Antivirus: Virustotal, Detection: 1%, Browse
          Reputation:moderate, very likely benign file
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....MX...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\98765434567890.exe
          File Type:data
          Category:dropped
          Size (bytes):71042
          Entropy (8bit):7.997487610071428
          Encrypted:true
          SSDEEP:1536:LoTgnjw+E7cYT8/O3qCaPdc4MgMHJB5KGSZfV:cww+8YSqnG4MNoGSD
          MD5:B11B64A276E8FEB3D09F2CBCEE1DA91D
          SHA1:AC7191608193A7479C7BE2AD72754D60BB22801B
          SHA-256:5F2966EE48ACB731DCE5B8977D6A61C891059058B76F03F670A75C3B2BDB83EA
          SHA-512:CA023A0D961F3E4886F5345EE9A877B632D017AC2028DEAB0AFD6BBDB86F19AD9E018CD16F1A692764076FD556FB8AD3BA01366B013EC35153C1BC88B9D9B3B4
          Malicious:false
          Reputation:low
          Preview:.M...V.)........q.7Q....8P.@d.E..ls....f..u*..d.]${1##.B*g...I..sf...(.....f..J..7....Q....&..._py.O.?.v...@q..L..nD.o..!o.Y..W*...q.(9.....f..F...>Bl.6....E?..'....{v..5.o>c..r1.....P.......?...,..4........%....C;.`..g9..U.^....b.v.dXC..*.g...^....a..}V"..a..'...&..w....6...,^...z.#g....d..,..M@..{_...Aiu....y~..*#..bW.x...R.Z.....YN..?H....t....>.Im'.Kl...EDT.....&...7L..^...A.....k|....f1.....U.R.y/...X.a...I....g.....+.F..=a...{.C....n..[A....w^.R.d9.]+.......O..{V..e.....&...hl..G...ZF.,.[......4...&5J(}gH...b......CL.H;z0.._}.....q..*..My=.`.7>.F......./|1..}.B_.C..LV.[...o...W....Q#&.......1hkq.1u...'O<.........6U...h....m....}F]D....T..S.B....X.bs..#%...9c.s.k;....o.KL..M,s.l.{.\....eu._Es.+.G.Q..y.p...Bi...^......?.......>...%....!U..N...*.').tZ[&...s...R.^.......%Z..H..3.....TBq'.T:s1..d...]... ...H.46K*....(.^...@.U.7.;......Q....w.....F..}'...L...f}......,o...WJ...(.. ....|!.....B...MZ...^@j.....H.R.]'.v%P.w.e..KBVQ.(.<.g
          Process:C:\Users\user\Desktop\98765434567890.exe
          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
          Category:dropped
          Size (bytes):131991
          Entropy (8bit):5.8780987492725405
          Encrypted:false
          SSDEEP:1536:v6J1cdTEl2OzvUtevCuoCW9fPr+vo9F5J7YWv3vbRnBycYWOGWSeaGymtYWOGWSS:VdW2OLgNCwXKSH8WPvVBjA+KE8S5
          MD5:10D998CF80B4437C2979B25EBCBE16D1
          SHA1:79C99DD2ABB99253E41C5E40DAB29522F93345BB
          SHA-256:A0A87BC30F4B39D7B642841A10208CE5286C6CA712B28B9D921E1EA6F547AEE6
          SHA-512:44863645B48815C3C248111F86440E3A0C515AF61B5A17D15B5A6C7304277F76056BCEB6C579E7824E11ADCA4DB3E385FA8019D602C40FA527E725C09B6AA523
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          • Antivirus: Virustotal, Detection: 0%, Browse
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................&"...%............P........................................@......g}....`... .................................................lE...........................0.............................. i..(....................................................text...X...........................`..`.data........ ......................@....rdata...A...0...B..................@..@.pdata...............R..............@..@.xdata..X............`..............@..@.bss....p................................edata...............n..............@..@.idata..lE.......F...p..............@....CRT....X...........................@....tls......... ......................@....reloc.......0......................@..B........................................................................................................................................................................
          Process:C:\Users\user\Desktop\98765434567890.exe
          File Type:data
          Category:dropped
          Size (bytes):178390
          Entropy (8bit):6.530973591237936
          Encrypted:false
          SSDEEP:1536:D2+s6BE+9e6acEoJlwBCIQBMvbN+r9dt0ppPn4t2vcCTAgP+48IhsckBtg6:DVur6aRwssypZ4t2kCMgP8cWtg6
          MD5:EE4440124C925FE4F95735EA4568FAE6
          SHA1:C7428FDB29B43C77589FF0C160AEE0C063DD20A1
          SHA-256:08705B17B6DAE5798AD5AE935FC23CFFE929B3EA490C0D0F09EBD6F1CE19E4A2
          SHA-512:C8927169A8395684C24C680498A152D53FCCFD3C5D05E0CB83926565C77BDAE6F9468744FC2A010E45FD6E6860877AA05F6067C3A2484BD1E26BBE780A01E82D
          Malicious:false
          Reputation:low
          Preview:*....[?E..+ .;..."x.2k...1..`._.i...{.H.?.....+,O.......,.D6#...1^I..&.{&-P#.`..........Q.c....o....Fw-..Ts[....U.w_F....c..?....i...Hk.....>*.mr...Oj...Vz..(..0.RO.I../...t4.(.X.....XD..^.&...9g.D'.>\..8=0T!......B'!.R....d.>\...Ho.....E..m...94..)..s...h.....HI.....T.g5........L(i.Vz.YM.....Z.D../....`....Q$9....c.GDk"...........;..<..............(..?.....Y.7.......[.]O........S36.....&D.....9u.^.a`....5T.I?.I..Ha.ks....[]=..h...2....:....P.'..^.p..@+.s........l4p<...2.-.q.7q...O..w..],.....x(k....v.!Ih3n..il....sa...............Z...5..=.Z1y.P..c7..R.^....B..+..I.NA!x.+Z...:...U.(...E@cqQ.....+..@....]/.A..4......<L8h..gbW...G,.qN<`.17t.P...$#.Y....Y.t.......z."...\..u.q....-..w.....B....].v...".cZ]\..P...f...Iy....2.m../..{.0.B.w....C.&J_..AA.......Y(....R...-....f.B....R...d..w...|..nR..X.2.2..>9%`..f/#OT`W.C.0....=9.g..uBTb..0..2...Q.ir.Aq...LT..IU.c.$xk....??g.{......V.....w......K...\5..b.....[%...`..\....ga.. .Xq.PTS..;<....
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Entropy (8bit):7.422995711933732
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:98765434567890.exe
          File size:428864
          MD5:1c4e3e615e3596572062bca5ec498d41
          SHA1:40365b3026ba2fca699462877fc106d58d2406c2
          SHA256:622163e09e5ad5324887c02d7834628d7213015fc48d286d69b4a90fa17a772d
          SHA512:2e87606c186203ee5018d737721e6de9e5ccfbc3c541f71dc7e836c705d8afa7a41e13b8e70f85223b41117323b9c15cc3301b3438eee5cf26200e48c01ba033
          SSDEEP:6144:0wq3NpnsvZK26XgmwnTi512noHCAibaH+Z23pSzpQl2sCbtORgNbTg:0z772qgvq2njDme2pSzZhtE
          TLSH:D894DF95F78106D9DC75577149BB9D370277BD3E18B10B9F62AD32312F332828A07A2A
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L...8.MX.................b...*......J4............@
          Icon Hash:b8eee6a4c0c8c6c2
          Entrypoint:0x40344a
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x584DCA38 [Sun Dec 11 21:50:48 2016 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:4ea4df5d94204fc550be1874e1b77ea7
          Signature Valid:false
          Signature Issuer:CN=Derobe, OU="Papirspose Dokumentfilens ", E=Drikkelagets@Unaadigt.Sh, O=Derobe, L=Neu Duvenstedt, S=Schleswig-Holstein, C=DE
          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
          Error Number:-2146762487
          Not Before, Not After
          • 12/3/2021 7:47:31 AM 12/2/2024 7:47:31 AM
          Subject Chain
          • CN=Derobe, OU="Papirspose Dokumentfilens ", E=Drikkelagets@Unaadigt.Sh, O=Derobe, L=Neu Duvenstedt, S=Schleswig-Holstein, C=DE
          Version:3
          Thumbprint MD5:13BD13A74F5989BBBF4626613B253C7F
          Thumbprint SHA-1:3FF1D875731FD030D811E21481EF38D2C90E217A
          Thumbprint SHA-256:919DEF4FB98F825B484FBCC82721EDA3F9094E0BAFFBEF15B4BC145160DD6350
          Serial:1254C7D01C8577B0
          Instruction
          sub esp, 000002D4h
          push ebx
          push esi
          push edi
          push 00000020h
          pop edi
          xor ebx, ebx
          push 00008001h
          mov dword ptr [esp+14h], ebx
          mov dword ptr [esp+10h], 0040A230h
          mov dword ptr [esp+1Ch], ebx
          call dword ptr [004080B4h]
          call dword ptr [004080B0h]
          cmp ax, 00000006h
          je 00007FB478C09843h
          push ebx
          call 00007FB478C0C99Ch
          cmp eax, ebx
          je 00007FB478C09839h
          push 00000C00h
          call eax
          mov esi, 004082B8h
          push esi
          call 00007FB478C0C916h
          push esi
          call dword ptr [0040815Ch]
          lea esi, dword ptr [esi+eax+01h]
          cmp byte ptr [esi], 00000000h
          jne 00007FB478C0981Ch
          push ebp
          push 00000009h
          call 00007FB478C0C96Eh
          push 00000007h
          call 00007FB478C0C967h
          mov dword ptr [0042A244h], eax
          call dword ptr [0040803Ch]
          push ebx
          call dword ptr [004082A4h]
          mov dword ptr [0042A2F8h], eax
          push ebx
          lea eax, dword ptr [esp+34h]
          push 000002B4h
          push eax
          push ebx
          push 004216E8h
          call dword ptr [00408188h]
          push 0040A384h
          push 00429240h
          call 00007FB478C0C550h
          call dword ptr [004080ACh]
          mov ebp, 00435000h
          push eax
          push ebp
          call 00007FB478C0C53Eh
          push ebx
          call dword ptr [00408174h]
          add word ptr [eax], 0000h
          Programming Language:
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e0000x28868.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x675d80x1568.ndata
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b4.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x61f10x6200False0.6656967474489796data6.477074763411717IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x80000x13a40x1400False0.4529296875data5.163001655755973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xa0000x203380x600False0.501953125data3.9745558434885093IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .ndata0x2b0000x430000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x6e0000x288680x28a00False0.4693269230769231data6.072692072533226IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_BITMAP0x6e3b80x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
          RT_ICON0x6e7200x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
          RT_ICON0x7ef480x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
          RT_ICON0x883f00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
          RT_ICON0x8d8780x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
          RT_ICON0x91aa00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
          RT_ICON0x940480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
          RT_ICON0x950f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
          RT_ICON0x95a780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
          RT_DIALOG0x95ee00x144dataEnglishUnited States
          RT_DIALOG0x960280x13cdataEnglishUnited States
          RT_DIALOG0x961680x100dataEnglishUnited States
          RT_DIALOG0x962680x11cdataEnglishUnited States
          RT_DIALOG0x963880xc4dataEnglishUnited States
          RT_DIALOG0x964500x60dataEnglishUnited States
          RT_GROUP_ICON0x964b00x76dataEnglishUnited States
          RT_MANIFEST0x965280x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
          DLLImport
          KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, WaitForSingleObject, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GetDiskFreeSpaceW, lstrlenW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
          USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
          ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
          COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found
          No statistics
          Target ID:0
          Start time:10:13:38
          Start date:28/11/2022
          Path:C:\Users\user\Desktop\98765434567890.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\98765434567890.exe
          Imagebase:0x400000
          File size:428864 bytes
          MD5 hash:1C4E3E615E3596572062BCA5EC498D41
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.765192426.0000000003410000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_GuLoader_3, Description: Yara detected GuLoader, Source: 00000000.00000002.764218177.0000000000840000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          Reputation:low

          No disassembly