Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO No. 3200005919.exe

Overview

General Information

Sample Name:PO No. 3200005919.exe
Analysis ID:755357
MD5:9453cdcf8221341d06bac47b8ab3aa19
SHA1:c35a23cdc61eb42594e1a39a23ccae06399263c0
SHA256:7490acc48d1659234d61c1716c0d549880a98375f502502b60dcc71b49f7f14f
Tags:exe
Infos:

Detection

GuLoader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Detected potential crypto function
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • PO No. 3200005919.exe (PID: 3308 cmdline: C:\Users\user\Desktop\PO No. 3200005919.exe MD5: 9453CDCF8221341D06BAC47B8AB3AA19)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.761070766.0000000004020000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: PO No. 3200005919.exeVirustotal: Detection: 47%Perma Link
    Source: PO No. 3200005919.exeReversingLabs: Detection: 61%
    Source: PO No. 3200005919.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: PO No. 3200005919.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\Kelly1076\__HITDisplay__\00_Code\ProArt Code_Git\ProArt\x64\Release\WMIMethod.pdb source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr
    Source: Binary string: qipcap.pdb source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr
    Source: Binary string: qipcap.pdb0 source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00402862 FindFirstFileW,
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_004066F3 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
    Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
    Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0J
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: PO No. 3200005919.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.drString found in binary or memory: http://ocsp.digicert.com0H
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.drString found in binary or memory: http://ocsp.digicert.com0I
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.drString found in binary or memory: https://mozilla.org0
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr, WMIMethod.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00405553 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: PO No. 3200005919.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameqipcap.dll8 vs PO No. 3200005919.exe
    Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWMIMethod.dllL vs PO No. 3200005919.exe
    Source: PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameqipcap.dll8 vs PO No. 3200005919.exe
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Windows\leprousness.lnkJump to behavior
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00404D90
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00406ABA
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess Stats: CPU usage > 98%
    Source: PO No. 3200005919.exeVirustotal: Detection: 47%
    Source: PO No. 3200005919.exeReversingLabs: Detection: 61%
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile read: C:\Users\user\Desktop\PO No. 3200005919.exeJump to behavior
    Source: PO No. 3200005919.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\OverfurnishedJump to behavior
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\nsyEC5C.tmpJump to behavior
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile written: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Afskede\Hitherunto\Sale\Swedish.iniJump to behavior
    Source: classification engineClassification label: mal60.troj.evad.winEXE@1/7@0/0
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_004020FE CoCreateInstance,
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00404814 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: PO No. 3200005919.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\Kelly1076\__HITDisplay__\00_Code\ProArt Code_Git\ProArt\x64\Release\WMIMethod.pdb source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, WMIMethod.dll.0.dr
    Source: Binary string: qipcap.pdb source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr
    Source: Binary string: qipcap.pdb0 source: PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.761070766.0000000004020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_10002DE0 push eax; ret
    Source: WMIMethod.dll.0.drStatic PE information: section name: _RDATA
    Source: qipcap.dll.0.drStatic PE information: section name: .00cfg
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\qipcap.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\AppData\Local\Temp\nskA46.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeFile created: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\WMIMethod.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeRDTSC instruction interceptor: First address: 0000000004021F8B second address: 0000000004021F8B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 97171E49h 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F22E4B28E52h 0x0000000c pushad 0x0000000d mov bl, 19h 0x0000000f cmp bl, 00000019h 0x00000012 jne 00007F22E4B4D606h 0x00000018 popad 0x00000019 test ah, ah 0x0000001b inc ebp 0x0000001c inc ebx 0x0000001d test ax, bx 0x00000020 rdtsc
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\qipcap.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeDropped PE file which has not been started: C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\WMIMethod.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00402862 FindFirstFileW,
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_004066F3 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\PO No. 3200005919.exeCode function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath Interception1
    Access Token Manipulation
    11
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Access Token Manipulation
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    PO No. 3200005919.exe47%VirustotalBrowse
    PO No. 3200005919.exe62%ReversingLabsWin32.Trojan.Leonem
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nskA46.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nskA46.tmp\System.dll1%VirustotalBrowse
    C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\WMIMethod.dll0%ReversingLabs
    C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\WMIMethod.dll0%VirustotalBrowse
    C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\qipcap.dll0%ReversingLabs
    C:\Users\user\Overfurnished\Tuberculisation\Woodwose\Circularizations126\Iltningernes\Mellivorous\qipcap.dll0%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://mozilla.org00%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorPO No. 3200005919.exefalse
      high
      https://mozilla.org0PO No. 3200005919.exe, 00000000.00000002.760167646.000000000040A000.00000004.00000001.01000000.00000003.sdmp, PO No. 3200005919.exe, 00000000.00000002.760693342.0000000002859000.00000004.00000800.00020000.00000000.sdmp, qipcap.dll.0.drfalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox Version:36.0.0 Rainbow Opal
      Analysis ID:755357
      Start date and time:2022-11-28 16:13:12 +01:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 14s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:PO No. 3200005919.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:11
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal60.troj.evad.winEXE@1/7@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 86.2% (good quality ratio 85%)
      • Quality average: 88%
      • Quality standard deviation: 21%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtSetInformationFile calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\PO No. 3200005919.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:modified
      Size (bytes):11776
      Entropy (8bit):5.659384359264642
      Encrypted:false
      SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
      MD5:8B3830B9DBF87F84DDD3B26645FED3A0
      SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
      SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
      SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      • Antivirus: Virustotal, Detection: 1%, Browse
      Reputation:moderate, very likely benign file
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\PO No. 3200005919.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):3296
      Entropy (8bit):3.4113461059426067
      Encrypted:false
      SSDEEP:96:rLAi578zFA1TbATYHGzrSCICl2Pih5A9EE9EaiFy:fP57nlATYHyrSV5S5AfZ
      MD5:419178A0AA370FC69EFC1A54202CBFAC
      SHA1:BCACA6EB056D92BF2E4ABACCA16ACD80CA055BE6
      SHA-256:9C5948468DD8ADA15A36D7A1F7F5BC9563B7C7602A9BFB3CDC1B70F40C67DE36
      SHA-512:93FFD54400BBECD18D7EE69116364DDC2075E34294B9769880C53DB6DF3B0837A3E0590B0584EB3B79882BD66D8D9451E9014D33D8AD61C246E1EFDA65971BF8
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:..[.T.r.a.n.s.l.a.t.i.o.n.s.].....R.O.G. .X.G. .M.o.b.i.l.e. .p.l.u.g.g.e.d.-.i.n. .=.R.O.G. .X.G. .M.o.b.i.l.e. ...r. .a.n.s.l.u.t.e.n.....P.u.s.h. .t.h.e. .".U.n.l.o.c.k. .S.w.i.t.c.h.". .o.n. .t.o.p. .o.f. .t.h.e. .p.l.u.g. .t.o. .l.o.c.k. .y.o.u.r. .c.a.b.l.e. .i.n. .p.l.a.c.e...=.T.r.y.c.k. .p... .l...s.k.n.a.p.p.e.n. .o.v.a.n.f...r. .k.o.n.t.a.k.t.e.n. .f...r. .a.t.t. .l...s.a. .f.a.s.t. .k.a.b.e.l.n.......D.o.n.'.t. .s.h.o.w. .t.h.i.s. .m.e.s.s.a.g.e. .a.g.a.i.n.=.V.i.s.a. .i.n.t.e. .d.e.t. .h...r. .m.e.d.d.e.l.a.n.d.e.t. .i.g.e.n.....O.K.=.O.K.....C.a.n.c.e.l.=.A.v.b.r.y.t.....A.c.t.i.v.a.t.e. .t.h.e. .R.O.G. .X.G. .M.o.b.i.l.e.=.A.k.t.i.v.e.r.a. .R.O.G. .X.G. .M.o.b.i.l.e.....D.e.a.c.t.i.v.a.t.e. .t.h.e. .R.O.G. .X.G. .M.o.b.i.l.e.=.I.n.a.k.t.i.v.e.r.a. .R.O.G. .X.G. .M.o.b.i.l.e.....C.l.i.c.k. .O.K. .t.o. .s.w.i.t.c.h. .t.o. .t.h.e. .R.O.G. .X.G. .M.o.b.i.l.e...=.K.l.i.c.k.a. .p... .O.K. .f...r. .a.t.t. .b.y.t.a. .t.i.l.l. .R.O.G. .X.G. .M.o.b.i.l.e.......C.l.i.c.k. .O.K. .t.
      Process:C:\Users\user\Desktop\PO No. 3200005919.exe
      File Type:Java JCE KeyStore
      Category:dropped
      Size (bytes):163026
      Entropy (8bit):6.663116548350503
      Encrypted:false
      SSDEEP:3072:i33VZ54T8JgMEU0pR3e6aahDHuP0IXt0dQ4SUy:OVZ54HMJCRO6RFFNL9y
      MD5:DD964C96ACC8FC51404B2205E7E740BD
      SHA1:81396D8F7BC367620BB127671CC324F63730B05F
      SHA-256:B42CF7F21B859E1C5D2ACE876913738A979DBF5FE9D4F5BAFFDFF60A0577FCE3
      SHA-512:6554D0BB128D204FD434D7E04C23DCEE55DD4DA8EE08433D54B8DF7690C9F3A8FF284A7F7023F889ABA798582BFC665E612958DD2D85374F37D3F82FF73C765E
      Malicious:false
      Reputation:low
      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\PO No. 3200005919.exe
      File Type:data
      Category:dropped
      Size (bytes):100097
      Entropy (8bit):7.998148981940183
      Encrypted:true
      SSDEEP:1536:iHaaOtGX0NzHwQMkIhF5kPtF/c2xo10IKCxvEYiCOw3u3ASAlNs9LHLpKvnO8:pryszHOhbWplCOE0uGLHLcm8
      MD5:115DDC0D007BC8ACA7678133CDF5B024
      SHA1:EED3949E406842152A374530E8971C52CB68ED8A
      SHA-256:17EABBA40E488BE3A65E30F5ABFA82F4C1E119C3EF484C2C39E9C95E993CA248
      SHA-512:622B9CD498B1AE71457CFC3094667077A5281BC1FEAA04789FC8F2B3FE641EF3F205D6DBE900E18C9A555866DD1FD00A6080827653225FA45AE9C1300C66244C
      Malicious:false
      Reputation:low
      Preview:2=..g.e.S......2..H>m........k........)_.q.6.R..B....~:....Eh.7.8q."..CE.5..)e.e"..^.Z..d8#..n0...7....K......)Z.8."..L...9.b.KQ?.)U.8.euF.....&........./...bQ.N...0.t.,.....YT...?0...H..E. .v.po.+....{.U.E..#......@7\.(.[+..K1...#....|.......b.@../I7...S.......X...2.dx.l..:..xtR...h..|9.+e..&....0...l8-..!.....Gw;0l...j.L`..L.^.%..G..U....e.Y..t.7.X...4^k.G......'S..?..7.&.,...j...<r..OU G.A=.`.h.~....)..1..o..|.Y.X...:...A.}...1.[{.]S...y....sE.:....c..~.Z&6V........`...%..)gm.fc.`...8.!.."._.Q....Rmrw*&..V..~.p.:..0......AF...U..%*=>S]{....8..o.9.a.........0_.a.b.X....{....=m....k......._M.......0..JG...r.._+3h....B..ECC.Q..0......e...6.8.....o{!.........P'g..WZx.....2GC!k._..p}:..1l.?mX..iP<=..Z.d..7.3.X...... *`.H.9.....@yY..Q'..|H3..q......-....].....C../..s..|.......h.z.E....IA...URZ.*.=..H.;..+#....g.........$...y..EN}.@...Q.Y#.0GL..U)F6..`.(...+.O......e%....h..V...5..s.D.|p:.....i.W.;.x....?..,.....lv*\.a....|.G..."..K..!P.n..
      Process:C:\Users\user\Desktop\PO No. 3200005919.exe
      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Category:dropped
      Size (bytes):106536
      Entropy (8bit):6.014036571306393
      Encrypted:false
      SSDEEP:1536:Uu0DxbI1QwdCVQiZSGMwd1v9gL2ZJeIAsW1IEd09dllZ05PD/tbXZJ+NPE1H:URxIawUGiZ7M6VgLMII4JM50PbXiNPMH
      MD5:93FBA0E88958082664890BA74C8463E3
      SHA1:11C4F155494FB93232719AF3BA173EAC6F781CD8
      SHA-256:5C8B1D73B57905CB0024B6B00136363BEEF051ED8E1F0EFC7BC72F565AF06175
      SHA-512:6A13C83F5176FF78E16E98CFD155C5263CD2E1CFD1E00FABF13B8E85D426A4437F92D17559691FE149CDD7376AEF8573E0167B1BDECF999E31FC665412A86B20
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      • Antivirus: Virustotal, Detection: 0%, Browse
      Reputation:low
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........y.k.*.k.*.k.*...+.k.*...+.k.*...+%k.*...+.k.*...+.k.*...+.k.*...+.k.*.k.*.k.*...+.k.*...+.k.*..i*.k.*.k.*.k.*...+.k.*Rich.k.*........PE..d....8.a.........." ......................................................................`..........................................[..|....\..(....... .......4....~..("......X...XF..p............................F..8...............(............................text............................... ..`.rdata..n...........................@..@.data...h....p.......R..............@....pdata..4............^..............@..@_RDATA...............n..............@..@.rsrc... ............p..............@..@.reloc..X............v..............@..B................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\PO No. 3200005919.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):16824
      Entropy (8bit):6.421949257045276
      Encrypted:false
      SSDEEP:192:fvcU3c5wjYguwJba7RXAQV01eSKMP7x0KDWpH4AAANa3JZHSVMyMt:fvVkeYpwJKRn61jKMNvDG/GhqMys
      MD5:2D75C46C8030F312DFC2F56A0E016692
      SHA1:F95F12C987AF20A69BA05088B2F9E4F4BEC445AE
      SHA-256:AADD6DE734D7585D23833BA5C303313ED2273B2BD3D1B4B7BA55ABC1366FD8DD
      SHA-512:C0F0F07E6BA4A6676B753EC3613AC388DE88F32D508CB1B9BD8521FBF192889232B4722756DDC72A46B0AC4A4BFB48F26E06651E64CF3D31EB8F82134A5D3671
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      • Antivirus: Virustotal, Detection: 0%, Browse
      Reputation:moderate, very likely benign file
      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...&.#b.........."!................P........................................p.......g....@A................................(!..P....P...............".......`..4.... ............................... ...............!..h............................text............................... ..`.rdata..$.... ......................@..@.data........0......................@....00cfg.......@......................@..@.rsrc........P......................@..@.reloc..4....`....... ..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\user\Desktop\PO No. 3200005919.exe
      File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
      Category:dropped
      Size (bytes):844
      Entropy (8bit):3.341138906905135
      Encrypted:false
      SSDEEP:12:8wl01Rm/3BVkUnDyXdICRDufdXPu7dI5ST5D0TL6CNbw4t2Y+xIBjK:8S/BTD3YDuiI50B2bI7aB
      MD5:113F0C5E3EE1E38568EDBE3A02B34900
      SHA1:2614DC469A25BB5EE1CD7EF1DCFC5EF3731E6B15
      SHA-256:71FAA8993B5ED93D7C418794BAE50BBA4E1B78F3A2EE74CAEEF07F82561BD4E5
      SHA-512:61672429CDC9CDA7BB6587457B11DD93275EB53898785CE53FAF94BAC2151F078DE4FA55A44C6F6967952E5C44D36EB928DBFA4ADB994CFFFE7EEFBD56282EA1
      Malicious:false
      Preview:L..................F........................................................=....P.O. .:i.....+00.../C:\...................V.1...........Windows.@............................................W.i.n.d.o.w.s.....P.1...........Fonts.<............................................F.o.n.t.s.....h.2...........Tolknings.Fin.L............................................T.o.l.k.n.i.n.g.s...F.i.n...........\.F.o.n.t.s.\.T.o.l.k.n.i.n.g.s...F.i.n.e.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.O.v.e.r.f.u.r.n.i.s.h.e.d.\.T.u.b.e.r.c.u.l.i.s.a.t.i.o.n.\.W.o.o.d.w.o.s.e.\.C.i.r.c.u.l.a.r.i.z.a.t.i.o.n.s.1.2.6.\.I.l.t.n.i.n.g.e.r.n.e.s.\.M.e.l.l.i.v.o.r.o.u.s.........$..................C..B..g..(.#................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Entropy (8bit):7.575298268219731
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:PO No. 3200005919.exe
      File size:373461
      MD5:9453cdcf8221341d06bac47b8ab3aa19
      SHA1:c35a23cdc61eb42594e1a39a23ccae06399263c0
      SHA256:7490acc48d1659234d61c1716c0d549880a98375f502502b60dcc71b49f7f14f
      SHA512:d37774b11400256fb4fe21b1e298f90274b0c83f2b0f90bc7c5d2a6ed3e0edb276bc49df8f65b0099f1d0ce6c4abac277805adf590971e277d1c1e15fd1190cd
      SSDEEP:6144:8Iw37uc96d+riI5FhrmKugnyj/wFW+hy88BSFz0PALceeozAs9k:pld6f5Ftgayj/kW+hyRYBVce3k5
      TLSH:2F84BF2F711D505ED917353266AEF0AA2B597C8B2B71E8164BA37DDF94F07200A0FB02
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....uY.................d...*.....
      Icon Hash:e0f0f0d0d8c0f81e
      Entrypoint:0x403489
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x5975952E [Mon Jul 24 06:35:26 2017 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
      Instruction
      sub esp, 000002D4h
      push ebx
      push esi
      push edi
      push 00000020h
      pop edi
      xor ebx, ebx
      push 00008001h
      mov dword ptr [esp+14h], ebx
      mov dword ptr [esp+10h], 0040A230h
      mov dword ptr [esp+1Ch], ebx
      call dword ptr [004080ACh]
      call dword ptr [004080A8h]
      and eax, BFFFFFFFh
      cmp ax, 00000006h
      mov dword ptr [0042A24Ch], eax
      je 00007F22E4D5A543h
      push ebx
      call 00007F22E4D5D7F1h
      cmp eax, ebx
      je 00007F22E4D5A539h
      push 00000C00h
      call eax
      mov esi, 004082B0h
      push esi
      call 00007F22E4D5D76Bh
      push esi
      call dword ptr [00408150h]
      lea esi, dword ptr [esi+eax+01h]
      cmp byte ptr [esi], 00000000h
      jne 00007F22E4D5A51Ch
      push 0000000Ah
      call 00007F22E4D5D7C4h
      push 00000008h
      call 00007F22E4D5D7BDh
      push 00000006h
      mov dword ptr [0042A244h], eax
      call 00007F22E4D5D7B1h
      cmp eax, ebx
      je 00007F22E4D5A541h
      push 0000001Eh
      call eax
      test eax, eax
      je 00007F22E4D5A539h
      or byte ptr [0042A24Fh], 00000040h
      push ebp
      call dword ptr [00408044h]
      push ebx
      call dword ptr [004082A0h]
      mov dword ptr [0042A318h], eax
      push ebx
      lea eax, dword ptr [esp+34h]
      push 000002B4h
      push eax
      push ebx
      push 004216E8h
      call dword ptr [00408188h]
      push 0040A384h
      Programming Language:
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x10890.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x63d10x6400False0.66515625data6.479451209065IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x80000x138e0x1400False0.45data5.143831732151552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa0000x203580x600False0.501953125data4.000739070159718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .ndata0x2b0000x350000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x600000x108900x10a00False0.19385867011278196data3.7626047476334135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_BITMAP0x603e80x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
      RT_ICON0x607500x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States
      RT_ICON0x65bd80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States
      RT_ICON0x69e000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States
      RT_ICON0x6c3a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States
      RT_ICON0x6d4500xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States
      RT_ICON0x6e2f80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States
      RT_ICON0x6ec800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States
      RT_ICON0x6f5280x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States
      RT_ICON0x6fa900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States
      RT_DIALOG0x6fef80x144dataEnglishUnited States
      RT_DIALOG0x700400x13cdataEnglishUnited States
      RT_DIALOG0x701800x100dataEnglishUnited States
      RT_DIALOG0x702800x11cdataEnglishUnited States
      RT_DIALOG0x703a00xc4dataEnglishUnited States
      RT_DIALOG0x704680x60dataEnglishUnited States
      RT_GROUP_ICON0x704c80x84dataEnglishUnited States
      RT_MANIFEST0x705500x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
      DLLImport
      KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
      USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
      SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
      ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
      COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
      ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found
      No statistics
      Target ID:0
      Start time:16:14:05
      Start date:28/11/2022
      Path:C:\Users\user\Desktop\PO No. 3200005919.exe
      Wow64 process (32bit):true
      Commandline:C:\Users\user\Desktop\PO No. 3200005919.exe
      Imagebase:0x400000
      File size:373461 bytes
      MD5 hash:9453CDCF8221341D06BAC47B8AB3AA19
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.761070766.0000000004020000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low

      No disassembly