Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
98765434567890.exe

Overview

General Information

Sample Name:98765434567890.exe
Analysis ID:755084
MD5:1c4e3e615e3596572062bca5ec498d41
SHA1:40365b3026ba2fca699462877fc106d58d2406c2
SHA256:622163e09e5ad5324887c02d7834628d7213015fc48d286d69b4a90fa17a772d
Infos:

Detection

GuLoader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Yara detected GuLoader
Tries to detect Any.run
Uses 32bit PE files
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
PE file contains sections with non-standard names
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality for execution timing, often used to detect debuggers
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Checks if the current process is being debugged
PE / OLE file has an invalid certificate
PE file contains more sections than normal
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • 98765434567890.exe (PID: 9072 cmdline: C:\Users\user\Desktop\98765434567890.exe MD5: 1C4E3E615E3596572062BCA5EC498D41)
    • 98765434567890.exe (PID: 7584 cmdline: C:\Users\user\Desktop\98765434567890.exe MD5: 1C4E3E615E3596572062BCA5EC498D41)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000E.00000000.1131062307.0000000001660000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000002.00000002.1791187834.0000000003490000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: bulungan.go.idVirustotal: Detection: 10%Perma Link
      Source: 98765434567890.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: 98765434567890.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 98765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmp
      Source: Binary string: mshtml.pdbUGP source: 98765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmp
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_00406555 FindFirstFileW,FindClose,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_00405A03 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0040287E FindFirstFileW,
      Source: global trafficTCP traffic: 192.168.11.20:49812 -> 103.131.61.194:80
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: 98765434567890.exe, 0000000E.00000002.5798409385.00000000018C7000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5796006070.000000000187A000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000003.1619247609.00000000018D8000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5799359649.00000000018EB000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5799433414.00000000018ED000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdp
      Source: 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdp$M
      Source: 98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdp.
      Source: 98765434567890.exe, 0000000E.00000002.5796006070.000000000187A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdp32T7
      Source: 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdp3d
      Source: 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdpLJ%
      Source: 98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdpW
      Source: 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdpXJ1
      Source: 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdpZ
      Source: 98765434567890.exe, 0000000E.00000002.5796006070.000000000187A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdp_7d
      Source: 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdpdJ
      Source: 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdphJ
      Source: 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdpoV%
      Source: 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdppJ)
      Source: 98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://bulungan.go.id/jnSMxRfpiTGW30.mdpt
      Source: 98765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
      Source: 98765434567890.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: 98765434567890.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
      Source: 98765434567890.exeString found in binary or memory: http://s.symcd.com06
      Source: 98765434567890.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
      Source: 98765434567890.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
      Source: 98765434567890.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
      Source: 98765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
      Source: 98765434567890.exe, 0000000E.00000001.1133580816.0000000000626000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
      Source: 98765434567890.exe, 0000000E.00000001.1133308325.00000000005F2000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: 98765434567890.exe, 0000000E.00000001.1133308325.00000000005F2000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: 98765434567890.exeString found in binary or memory: https://d.symcb.com/cps0%
      Source: 98765434567890.exeString found in binary or memory: https://d.symcb.com/rpa0
      Source: 98765434567890.exeString found in binary or memory: https://d.symcb.com/rpa0.
      Source: 98765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: unknownDNS traffic detected: queries for: bulungan.go.id
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_004054B0 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
      Source: 98765434567890.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_00404CED
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_004068DA
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034AF5DD
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490F45
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490344
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349135A
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349375C
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349AB50
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03499774
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493B0E
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349D700
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493F04
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034903CA
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034AF7C2
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034937C2
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03498FC4
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493BDD
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DBFA
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034913F4
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493B86
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490B96
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034907AE
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493FAE
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034A67B8
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349364A
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349324F
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490245
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490A47
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B1E5B
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490E5C
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493A51
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493E56
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DE78
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03491275
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B520C
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349D610
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03499E26
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03499234
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03499634
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034992C8
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490ECA
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034912CD
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490AEB
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034936EB
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034932EF
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349D2E4
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034906F7
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B269F
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03498EAC
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493AAE
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03494140
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03499140
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490542
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493544
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03495146
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349395A
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03499178
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493173
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B150A
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349D50D
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490128
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B2929
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349A92A
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490922
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490D39
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493D35
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03498D34
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493936
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034909CE
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034905DA
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034995DE
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034935D1
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493DE8
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034939EF
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03498D96
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034901B5
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493C4A
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349AC50
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03494057
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490472
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349D80D
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490001
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490C04
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349001C
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493415
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03493CC6
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034904D4
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349D4EF
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034930FC
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034910F4
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03490C98
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03491497
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034934A9
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034900AB
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034AFCBF
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034938B1
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B390B NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B4860 NtResumeThread,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 14_2_01664634 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 14_2_016646E8 NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 14_2_016646DF NtProtectVirtualMemory,
      Source: C:\Users\user\Desktop\98765434567890.exeSection loaded: edgegdi.dll
      Source: C:\Users\user\Desktop\98765434567890.exeSection loaded: edgegdi.dll
      Source: 98765434567890.exeStatic PE information: invalid certificate
      Source: libgiognutls.dll.2.drStatic PE information: Number of sections : 11 > 10
      Source: C:\Users\user\Desktop\98765434567890.exeFile read: C:\Users\user\Desktop\98765434567890.exeJump to behavior
      Source: 98765434567890.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\98765434567890.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\98765434567890.exe C:\Users\user\Desktop\98765434567890.exe
      Source: C:\Users\user\Desktop\98765434567890.exeProcess created: C:\Users\user\Desktop\98765434567890.exe C:\Users\user\Desktop\98765434567890.exe
      Source: C:\Users\user\Desktop\98765434567890.exeProcess created: C:\Users\user\Desktop\98765434567890.exe C:\Users\user\Desktop\98765434567890.exe
      Source: C:\Users\user\Desktop\98765434567890.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Local\Temp\nsyF900.tmpJump to behavior
      Source: classification engineClassification label: mal60.troj.evad.winEXE@3/4@1/1
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_00402104 CoCreateInstance,
      Source: C:\Users\user\Desktop\98765434567890.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_00404771 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
      Source: 98765434567890.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 98765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmp
      Source: Binary string: mshtml.pdbUGP source: 98765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 0000000E.00000000.1131062307.0000000001660000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.1791187834.0000000003490000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_10002DE0 push eax; ret
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03496F4A push eax; ret
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03494B93 push ebp; ret
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034A2FAB push esp; iretd
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03496E6E push eax; ret
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034962A2 pushfd ; ret
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349D161 push ebp; iretd
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03496076 push ebp; iretd
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034974FE push ebp; retf
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 14_2_01660B7B push ebp; ret
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 14_2_01663744 push esp; retf
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 14_2_01663246 push esp; retf
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 14_2_0166144D push esp; retf
      Source: libgiognutls.dll.2.drStatic PE information: section name: .xdata
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Local\Temp\nstFA69.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dllJump to dropped file
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93Jump to behavior
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\antagonizingJump to behavior
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\antagonizing\TrespassageJump to behavior
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\antagonizing\Trespassage\Importprisernes.QuiJump to behavior
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\XJump to behavior
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\UnsaltyJump to behavior
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dllJump to behavior
      Source: C:\Users\user\Desktop\98765434567890.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\Epithem.DreJump to behavior
      Source: C:\Users\user\Desktop\98765434567890.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\98765434567890.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\98765434567890.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\98765434567890.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\98765434567890.exeFile opened: C:\Program Files\qga\qga.exe
      Source: C:\Users\user\Desktop\98765434567890.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\user\Desktop\98765434567890.exeFile opened: C:\Program Files\qga\qga.exe
      Source: C:\Users\user\Desktop\98765434567890.exe TID: 7816Thread sleep count: 87 > 30
      Source: C:\Users\user\Desktop\98765434567890.exe TID: 7816Thread sleep time: -87000s >= -30000s
      Source: C:\Users\user\Desktop\98765434567890.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\98765434567890.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\98765434567890.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dllJump to dropped file
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03494749 rdtsc
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_00406555 FindFirstFileW,FindClose,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_00405A03 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0040287E FindFirstFileW,
      Source: C:\Users\user\Desktop\98765434567890.exeSystem information queried: ModuleInformation
      Source: C:\Users\user\Desktop\98765434567890.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\Desktop\98765434567890.exeAPI call chain: ExitProcess graph end node
      Source: 98765434567890.exe, 00000002.00000002.1792129439.0000000010059000.00000004.00000800.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
      Source: 98765434567890.exe, 00000002.00000002.1792129439.0000000010059000.00000004.00000800.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
      Source: 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
      Source: 98765434567890.exe, 00000002.00000002.1792129439.0000000010059000.00000004.00000800.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
      Source: 98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000003.1619247609.00000000018D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
      Source: 98765434567890.exe, 00000002.00000002.1792129439.0000000010059000.00000004.00000800.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
      Source: 98765434567890.exe, 00000002.00000002.1792129439.0000000010059000.00000004.00000800.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
      Source: 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
      Source: 98765434567890.exe, 0000000E.00000002.5796006070.000000000187A000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000003.1619247609.00000000018D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: 98765434567890.exe, 00000002.00000002.1792129439.0000000010059000.00000004.00000800.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
      Source: 98765434567890.exe, 00000002.00000002.1792129439.0000000010059000.00000004.00000800.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
      Source: 98765434567890.exe, 00000002.00000002.1792129439.0000000010059000.00000004.00000800.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
      Source: 98765434567890.exe, 0000000E.00000002.5800306502.00000000034A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03494749 rdtsc
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DF36 mov ebx, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DBFA mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034A1788 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DE78 mov ebx, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DE78 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DE18 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B06CA mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DEC4 mov ebx, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349C686 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B2929 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_03498D96 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DC48 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349D4EF mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0349DCA9 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\98765434567890.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\98765434567890.exeProcess queried: DebugPort
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_034B073D LdrLoadDll,
      Source: C:\Users\user\Desktop\98765434567890.exeProcess created: C:\Users\user\Desktop\98765434567890.exe C:\Users\user\Desktop\98765434567890.exe
      Source: C:\Users\user\Desktop\98765434567890.exeCode function: 2_2_0040344A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Native API
      1
      Registry Run Keys / Startup Folder
      1
      Access Token Manipulation
      12
      Virtualization/Sandbox Evasion
      OS Credential Dumping121
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
      System Shutdown/Reboot
      Default AccountsScheduled Task/Job1
      DLL Side-Loading
      11
      Process Injection
      1
      Access Token Manipulation
      LSASS Memory12
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      Exfiltration Over Bluetooth1
      Non-Application Layer Protocol
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)1
      Registry Run Keys / Startup Folder
      11
      Process Injection
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)1
      DLL Side-Loading
      1
      Obfuscated Files or Information
      NTDS4
      System Information Discovery
      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      98765434567890.exe5%ReversingLabs
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nstFA69.tmp\System.dll2%ReversingLabs
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dll0%ReversingLabs
      No Antivirus matches
      SourceDetectionScannerLabelLink
      bulungan.go.id10%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpZ0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdppJ)0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpW0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdphJ0%Avira URL Cloudsafe
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpt0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdp0%Avira URL Cloudsafe
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%VirustotalBrowse
      https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdp.0%Avira URL Cloudsafe
      http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.0%Avira URL Cloudsafe
      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdp3d0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpoV%0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpXJ10%Avira URL Cloudsafe
      http://www.gopher.ftp://ftp.0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdp$M0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdp_7d0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdp32T70%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpLJ%0%Avira URL Cloudsafe
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpdJ0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      bulungan.go.id
      103.131.61.194
      truefalseunknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpZ98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://bulungan.go.id/jnSMxRfpiTGW30.mdphJ98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpW98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd98765434567890.exe, 0000000E.00000001.1133308325.00000000005F2000.00000008.00000001.01000000.00000006.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://bulungan.go.id/jnSMxRfpiTGW30.mdppJ)98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpt98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://bulungan.go.id/jnSMxRfpiTGW30.mdp98765434567890.exe, 0000000E.00000002.5798409385.00000000018C7000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5796006070.000000000187A000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000003.1619247609.00000000018D8000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5799359649.00000000018EB000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5799433414.00000000018ED000.00000004.00000020.00020000.00000000.sdmp, 98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-21498765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://bulungan.go.id/jnSMxRfpiTGW30.mdp.98765434567890.exe, 0000000E.00000002.5798690471.00000000018CF000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.98765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd98765434567890.exe, 0000000E.00000001.1133308325.00000000005F2000.00000008.00000001.01000000.00000006.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://bulungan.go.id/jnSMxRfpiTGW30.mdp3d98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://bulungan.go.id/jnSMxRfpiTGW30.mdpoV%98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorError98765434567890.exefalse
        high
        http://bulungan.go.id/jnSMxRfpiTGW30.mdpXJ198765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: safe
        unknown
        http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD98765434567890.exe, 0000000E.00000001.1133580816.0000000000626000.00000008.00000001.01000000.00000006.sdmpfalse
          high
          http://www.gopher.ftp://ftp.98765434567890.exe, 0000000E.00000001.1133762095.0000000000649000.00000008.00000001.01000000.00000006.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://bulungan.go.id/jnSMxRfpiTGW30.mdp$M98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://bulungan.go.id/jnSMxRfpiTGW30.mdp_7d98765434567890.exe, 0000000E.00000002.5796006070.000000000187A000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://bulungan.go.id/jnSMxRfpiTGW30.mdp32T798765434567890.exe, 0000000E.00000002.5796006070.000000000187A000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://bulungan.go.id/jnSMxRfpiTGW30.mdpLJ%98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://bulungan.go.id/jnSMxRfpiTGW30.mdpdJ98765434567890.exe, 0000000E.00000002.5797556527.00000000018AB000.00000004.00000020.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          103.131.61.194
          bulungan.go.idIndonesia
          138126IDNIC-NEWTON-AS-IDPTNEWTONCIPTAINFORMATIKAIDfalse
          Joe Sandbox Version:36.0.0 Rainbow Opal
          Analysis ID:755084
          Start date and time:2022-11-28 10:51:05 +01:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 13m 22s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:98765434567890.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:30
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal60.troj.evad.winEXE@3/4@1/1
          EGA Information:
          • Successful, ratio: 50%
          HDC Information:
          • Successful, ratio: 25.5% (good quality ratio 25.1%)
          • Quality average: 87.8%
          • Quality standard deviation: 21.3%
          HCA Information:
          • Successful, ratio: 96%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, svchost.exe
          • TCP Packets have been reduced to 100
          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, wdcpalt.microsoft.com, client.wns.windows.com, fs.microsoft.com, login.live.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, wdcp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
          • Execution Graph export aborted for target 98765434567890.exe, PID 7584 because there are no executed function
          • Report size getting too big, too many NtDeviceIoControlFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtSetInformationFile calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\98765434567890.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:modified
          Size (bytes):11776
          Entropy (8bit):5.656065698421856
          Encrypted:false
          SSDEEP:192:eY24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol+Sl:E8QIl975eXqlWBrz7YLOl+
          MD5:17ED1C86BD67E78ADE4712BE48A7D2BD
          SHA1:1CC9FE86D6D6030B4DAE45ECDDCE5907991C01A0
          SHA-256:BD046E6497B304E4EA4AB102CAB2B1F94CE09BDE0EEBBA4C59942A732679E4EB
          SHA-512:0CBED521E7D6D1F85977B3F7D3CA7AC34E1B5495B69FD8C7BFA1A846BAF53B0ECD06FE1AD02A3599082FFACAF8C71A3BB4E32DEC05F8E24859D736B828092CD5
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 2%
          Reputation:moderate, very likely benign file
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....MX...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\98765434567890.exe
          File Type:data
          Category:dropped
          Size (bytes):71042
          Entropy (8bit):7.997487610071428
          Encrypted:true
          SSDEEP:1536:LoTgnjw+E7cYT8/O3qCaPdc4MgMHJB5KGSZfV:cww+8YSqnG4MNoGSD
          MD5:B11B64A276E8FEB3D09F2CBCEE1DA91D
          SHA1:AC7191608193A7479C7BE2AD72754D60BB22801B
          SHA-256:5F2966EE48ACB731DCE5B8977D6A61C891059058B76F03F670A75C3B2BDB83EA
          SHA-512:CA023A0D961F3E4886F5345EE9A877B632D017AC2028DEAB0AFD6BBDB86F19AD9E018CD16F1A692764076FD556FB8AD3BA01366B013EC35153C1BC88B9D9B3B4
          Malicious:false
          Reputation:low
          Preview:.M...V.)........q.7Q....8P.@d.E..ls....f..u*..d.]${1##.B*g...I..sf...(.....f..J..7....Q....&..._py.O.?.v...@q..L..nD.o..!o.Y..W*...q.(9.....f..F...>Bl.6....E?..'....{v..5.o>c..r1.....P.......?...,..4........%....C;.`..g9..U.^....b.v.dXC..*.g...^....a..}V"..a..'...&..w....6...,^...z.#g....d..,..M@..{_...Aiu....y~..*#..bW.x...R.Z.....YN..?H....t....>.Im'.Kl...EDT.....&...7L..^...A.....k|....f1.....U.R.y/...X.a...I....g.....+.F..=a...{.C....n..[A....w^.R.d9.]+.......O..{V..e.....&...hl..G...ZF.,.[......4...&5J(}gH...b......CL.H;z0.._}.....q..*..My=.`.7>.F......./|1..}.B_.C..LV.[...o...W....Q#&.......1hkq.1u...'O<.........6U...h....m....}F]D....T..S.B....X.bs..#%...9c.s.k;....o.KL..M,s.l.{.\....eu._Es.+.G.Q..y.p...Bi...^......?.......>...%....!U..N...*.').tZ[&...s...R.^.......%Z..H..3.....TBq'.T:s1..d...]... ...H.46K*....(.^...@.U.7.;......Q....w.....F..}'...L...f}......,o...WJ...(.. ....|!.....B...MZ...^@j.....H.R.]'.v%P.w.e..KBVQ.(.<.g
          Process:C:\Users\user\Desktop\98765434567890.exe
          File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
          Category:dropped
          Size (bytes):131991
          Entropy (8bit):5.8780987492725405
          Encrypted:false
          SSDEEP:1536:v6J1cdTEl2OzvUtevCuoCW9fPr+vo9F5J7YWv3vbRnBycYWOGWSeaGymtYWOGWSS:VdW2OLgNCwXKSH8WPvVBjA+KE8S5
          MD5:10D998CF80B4437C2979B25EBCBE16D1
          SHA1:79C99DD2ABB99253E41C5E40DAB29522F93345BB
          SHA-256:A0A87BC30F4B39D7B642841A10208CE5286C6CA712B28B9D921E1EA6F547AEE6
          SHA-512:44863645B48815C3C248111F86440E3A0C515AF61B5A17D15B5A6C7304277F76056BCEB6C579E7824E11ADCA4DB3E385FA8019D602C40FA527E725C09B6AA523
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................&"...%............P........................................@......g}....`... .................................................lE...........................0.............................. i..(....................................................text...X...........................`..`.data........ ......................@....rdata...A...0...B..................@..@.pdata...............R..............@..@.xdata..X............`..............@..@.bss....p................................edata...............n..............@..@.idata..lE.......F...p..............@....CRT....X...........................@....tls......... ......................@....reloc.......0......................@..B........................................................................................................................................................................
          Process:C:\Users\user\Desktop\98765434567890.exe
          File Type:data
          Category:dropped
          Size (bytes):178390
          Entropy (8bit):6.530973591237936
          Encrypted:false
          SSDEEP:1536:D2+s6BE+9e6acEoJlwBCIQBMvbN+r9dt0ppPn4t2vcCTAgP+48IhsckBtg6:DVur6aRwssypZ4t2kCMgP8cWtg6
          MD5:EE4440124C925FE4F95735EA4568FAE6
          SHA1:C7428FDB29B43C77589FF0C160AEE0C063DD20A1
          SHA-256:08705B17B6DAE5798AD5AE935FC23CFFE929B3EA490C0D0F09EBD6F1CE19E4A2
          SHA-512:C8927169A8395684C24C680498A152D53FCCFD3C5D05E0CB83926565C77BDAE6F9468744FC2A010E45FD6E6860877AA05F6067C3A2484BD1E26BBE780A01E82D
          Malicious:false
          Preview:*....[?E..+ .;..."x.2k...1..`._.i...{.H.?.....+,O.......,.D6#...1^I..&.{&-P#.`..........Q.c....o....Fw-..Ts[....U.w_F....c..?....i...Hk.....>*.mr...Oj...Vz..(..0.RO.I../...t4.(.X.....XD..^.&...9g.D'.>\..8=0T!......B'!.R....d.>\...Ho.....E..m...94..)..s...h.....HI.....T.g5........L(i.Vz.YM.....Z.D../....`....Q$9....c.GDk"...........;..<..............(..?.....Y.7.......[.]O........S36.....&D.....9u.^.a`....5T.I?.I..Ha.ks....[]=..h...2....:....P.'..^.p..@+.s........l4p<...2.-.q.7q...O..w..],.....x(k....v.!Ih3n..il....sa...............Z...5..=.Z1y.P..c7..R.^....B..+..I.NA!x.+Z...:...U.(...E@cqQ.....+..@....]/.A..4......<L8h..gbW...G,.qN<`.17t.P...$#.Y....Y.t.......z."...\..u.q....-..w.....B....].v...".cZ]\..P...f...Iy....2.m../..{.0.B.w....C.&J_..AA.......Y(....R...-....f.B....R...d..w...|..nR..X.2.2..>9%`..f/#OT`W.C.0....=9.g..uBTb..0..2...Q.ir.Aq...LT..IU.c.$xk....??g.{......V.....w......K...\5..b.....[%...`..\....ga.. .Xq.PTS..;<....
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Entropy (8bit):7.422995711933732
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:98765434567890.exe
          File size:428864
          MD5:1c4e3e615e3596572062bca5ec498d41
          SHA1:40365b3026ba2fca699462877fc106d58d2406c2
          SHA256:622163e09e5ad5324887c02d7834628d7213015fc48d286d69b4a90fa17a772d
          SHA512:2e87606c186203ee5018d737721e6de9e5ccfbc3c541f71dc7e836c705d8afa7a41e13b8e70f85223b41117323b9c15cc3301b3438eee5cf26200e48c01ba033
          SSDEEP:6144:0wq3NpnsvZK26XgmwnTi512noHCAibaH+Z23pSzpQl2sCbtORgNbTg:0z772qgvq2njDme2pSzZhtE
          TLSH:D894DF95F78106D9DC75577149BB9D370277BD3E18B10B9F62AD32312F332828A07A2A
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L...8.MX.................b...*......J4............@
          Icon Hash:b8eee6a4c0c8c6c2
          Entrypoint:0x40344a
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x584DCA38 [Sun Dec 11 21:50:48 2016 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:4ea4df5d94204fc550be1874e1b77ea7
          Signature Valid:false
          Signature Issuer:CN=Derobe, OU="Papirspose Dokumentfilens ", E=Drikkelagets@Unaadigt.Sh, O=Derobe, L=Neu Duvenstedt, S=Schleswig-Holstein, C=DE
          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
          Error Number:-2146762487
          Not Before, Not After
          • 03/12/2021 15:47:31 02/12/2024 15:47:31
          Subject Chain
          • CN=Derobe, OU="Papirspose Dokumentfilens ", E=Drikkelagets@Unaadigt.Sh, O=Derobe, L=Neu Duvenstedt, S=Schleswig-Holstein, C=DE
          Version:3
          Thumbprint MD5:13BD13A74F5989BBBF4626613B253C7F
          Thumbprint SHA-1:3FF1D875731FD030D811E21481EF38D2C90E217A
          Thumbprint SHA-256:919DEF4FB98F825B484FBCC82721EDA3F9094E0BAFFBEF15B4BC145160DD6350
          Serial:1254C7D01C8577B0
          Instruction
          sub esp, 000002D4h
          push ebx
          push esi
          push edi
          push 00000020h
          pop edi
          xor ebx, ebx
          push 00008001h
          mov dword ptr [esp+14h], ebx
          mov dword ptr [esp+10h], 0040A230h
          mov dword ptr [esp+1Ch], ebx
          call dword ptr [004080B4h]
          call dword ptr [004080B0h]
          cmp ax, 00000006h
          je 00007F82F8B78203h
          push ebx
          call 00007F82F8B7B35Ch
          cmp eax, ebx
          je 00007F82F8B781F9h
          push 00000C00h
          call eax
          mov esi, 004082B8h
          push esi
          call 00007F82F8B7B2D6h
          push esi
          call dword ptr [0040815Ch]
          lea esi, dword ptr [esi+eax+01h]
          cmp byte ptr [esi], 00000000h
          jne 00007F82F8B781DCh
          push ebp
          push 00000009h
          call 00007F82F8B7B32Eh
          push 00000007h
          call 00007F82F8B7B327h
          mov dword ptr [0042A244h], eax
          call dword ptr [0040803Ch]
          push ebx
          call dword ptr [004082A4h]
          mov dword ptr [0042A2F8h], eax
          push ebx
          lea eax, dword ptr [esp+34h]
          push 000002B4h
          push eax
          push ebx
          push 004216E8h
          call dword ptr [00408188h]
          push 0040A384h
          push 00429240h
          call 00007F82F8B7AF10h
          call dword ptr [004080ACh]
          mov ebp, 00435000h
          push eax
          push ebp
          call 00007F82F8B7AEFEh
          push ebx
          call dword ptr [00408174h]
          add word ptr [eax], 0000h
          Programming Language:
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e0000x28868.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x675d80x1568.ndata
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b4.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x61f10x6200False0.6656967474489796data6.477074763411717IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x80000x13a40x1400False0.4529296875data5.163001655755973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xa0000x203380x600False0.501953125data3.9745558434885093IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .ndata0x2b0000x430000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x6e0000x288680x28a00False0.4693269230769231data6.072692072533226IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_BITMAP0x6e3b80x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
          RT_ICON0x6e7200x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
          RT_ICON0x7ef480x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
          RT_ICON0x883f00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
          RT_ICON0x8d8780x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
          RT_ICON0x91aa00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
          RT_ICON0x940480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
          RT_ICON0x950f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
          RT_ICON0x95a780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
          RT_DIALOG0x95ee00x144dataEnglishUnited States
          RT_DIALOG0x960280x13cdataEnglishUnited States
          RT_DIALOG0x961680x100dataEnglishUnited States
          RT_DIALOG0x962680x11cdataEnglishUnited States
          RT_DIALOG0x963880xc4dataEnglishUnited States
          RT_DIALOG0x964500x60dataEnglishUnited States
          RT_GROUP_ICON0x964b00x76dataEnglishUnited States
          RT_MANIFEST0x965280x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
          DLLImport
          KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, WaitForSingleObject, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GetDiskFreeSpaceW, lstrlenW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
          USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
          ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
          COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Nov 28, 2022 10:54:30.187997103 CET4981280192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:31.193437099 CET4981280192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:33.208492994 CET4981280192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:35.224991083 CET4982080192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:36.239165068 CET4982080192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:38.254264116 CET4982080192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:40.272130013 CET4982180192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:41.284867048 CET4982180192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:43.300009012 CET4982180192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:45.318454981 CET4982280192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:46.330590010 CET4982280192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:48.330260992 CET4982280192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:50.378714085 CET4982480192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:51.392167091 CET4982480192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:53.407237053 CET4982480192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:55.423963070 CET4982580192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:56.437838078 CET4982580192.168.11.20103.131.61.194
          Nov 28, 2022 10:54:58.453049898 CET4982580192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:00.526283026 CET4982680192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:01.530446053 CET4982680192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:03.545794010 CET4982680192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:05.546643972 CET4982880192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:06.560669899 CET4982880192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:08.575784922 CET4982880192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:10.576622963 CET4983080192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:11.590811968 CET4983080192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:13.605881929 CET4983080192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:15.623647928 CET4983180192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:16.636519909 CET4983180192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:18.651608944 CET4983180192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:20.680504084 CET4983280192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:21.682284117 CET4983280192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:23.697439909 CET4983280192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:25.729513884 CET4983380192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:26.743746042 CET4983380192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:28.758754015 CET4983380192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:30.776875973 CET4983480192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:31.789541006 CET4983480192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:33.804660082 CET4983480192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:35.821508884 CET4984280192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:36.835243940 CET4984280192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:38.850505114 CET4984280192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:40.866740942 CET4984380192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:41.881050110 CET4984380192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:43.896049023 CET4984380192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:45.898655891 CET4984480192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:46.911051035 CET4984480192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:48.926511049 CET4984480192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:50.927023888 CET4984580192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:51.941179991 CET4984580192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:53.956402063 CET4984580192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:55.973335981 CET4984680192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:56.971406937 CET4984680192.168.11.20103.131.61.194
          Nov 28, 2022 10:55:58.986800909 CET4984680192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:01.019787073 CET4984780192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:02.032861948 CET4984780192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:04.032371998 CET4984780192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:06.080360889 CET4985080192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:07.094300032 CET4985080192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:09.109371901 CET4985080192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:11.126271963 CET4985180192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:12.139914036 CET4985180192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:14.155178070 CET4985180192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:16.172648907 CET4985280192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:17.185770988 CET4985280192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:19.200824022 CET4985280192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:21.228969097 CET4985380192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:22.231462955 CET4985380192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:24.246814966 CET4985380192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:26.248178959 CET4985480192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:27.246130943 CET4985480192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:29.261281967 CET4985480192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:31.279381990 CET4985580192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:32.291937113 CET4985580192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:34.306965113 CET4985580192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:36.323838949 CET4985880192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:37.337627888 CET4985880192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:39.352720976 CET4985880192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:41.369080067 CET4985980192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:42.383279085 CET4985980192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:44.398480892 CET4985980192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:46.431916952 CET4986080192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:47.444664001 CET4986080192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:49.459991932 CET4986080192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:51.477034092 CET4986180192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:52.490502119 CET4986180192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:54.505712032 CET4986180192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:56.524600983 CET4986280192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:57.536298990 CET4986280192.168.11.20103.131.61.194
          Nov 28, 2022 10:56:59.551567078 CET4986280192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:01.568989038 CET4986380192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:02.581984997 CET4986380192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:04.597390890 CET4986380192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:06.598014116 CET4986580192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:07.596613884 CET4986580192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:09.611804008 CET4986580192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:11.628869057 CET4986680192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:12.642282009 CET4986680192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:14.657557011 CET4986680192.168.11.20103.131.61.194
          Nov 28, 2022 10:57:16.675077915 CET4986780192.168.11.20103.131.61.194
          TimestampSource PortDest PortSource IPDest IP
          Nov 28, 2022 10:54:29.964380026 CET6488953192.168.11.201.1.1.1
          Nov 28, 2022 10:54:30.161679029 CET53648891.1.1.1192.168.11.20
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Nov 28, 2022 10:54:29.964380026 CET192.168.11.201.1.1.10xed43Standard query (0)bulungan.go.idA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Nov 28, 2022 10:54:30.161679029 CET1.1.1.1192.168.11.200xed43No error (0)bulungan.go.id103.131.61.194A (IP address)IN (0x0001)false

          Click to jump to process

          Target ID:2
          Start time:10:53:33
          Start date:28/11/2022
          Path:C:\Users\user\Desktop\98765434567890.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\98765434567890.exe
          Imagebase:0x400000
          File size:428864 bytes
          MD5 hash:1C4E3E615E3596572062BCA5EC498D41
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.1791187834.0000000003490000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          Reputation:low

          Target ID:14
          Start time:10:54:10
          Start date:28/11/2022
          Path:C:\Users\user\Desktop\98765434567890.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\98765434567890.exe
          Imagebase:0x400000
          File size:428864 bytes
          MD5 hash:1C4E3E615E3596572062BCA5EC498D41
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000E.00000000.1131062307.0000000001660000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          Reputation:low

          No disassembly