Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO.exe

Overview

General Information

Sample Name:PO.exe
Analysis ID:756266
MD5:9297126fd9624f7dc2d4f64f072668a2
SHA1:c30b3c8fddd49f7dfba687026daf6293f6d90b1b
SHA256:edd8e1858bcc704fdea75837bb448eceda61317e7f8028e82aa2a0e5559c658a
Tags:exe
Infos:

Detection

GuLoader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Detected potential crypto function
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • PO.exe (PID: 2372 cmdline: C:\Users\user\Desktop\PO.exe MD5: 9297126FD9624F7DC2D4F64F072668A2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.766696218.0000000003190000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: PO.exeReversingLabs: Detection: 26%
    Source: PO.exeVirustotal: Detection: 29%Perma Link
    Source: PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\PO.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneJump to behavior
    Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_0040596F CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004064C1 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004027FB FindFirstFileW,
    Source: PO.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_0040541C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004033B6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\PO.exeFile created: C:\Windows\Handskedukker.iniJump to behavior
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00406846
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00404C59
    Source: C:\Users\user\Desktop\PO.exeProcess Stats: CPU usage > 98%
    Source: PO.exeReversingLabs: Detection: 26%
    Source: PO.exeVirustotal: Detection: 29%
    Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\user\Desktop\PO.exeJump to behavior
    Source: PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004033B6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\DiakonernesJump to behavior
    Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Temp\nsaCD4A.tmpJump to behavior
    Source: classification engineClassification label: mal60.troj.evad.winEXE@1/4@0/0
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00402095 CoCreateInstance,
    Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004046DD GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\user\Desktop\PO.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneJump to behavior
    Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.766696218.0000000003190000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_10002DE0 push eax; ret
    Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Temp\nsaCD4C.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\PO.exeRDTSC instruction interceptor: First address: 0000000003191C3A second address: 0000000003191C3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCDBD1742FAh 0x00000004 test cl, cl 0x00000006 cmp cx, C41Eh 0x0000000b cmp ebx, ecx 0x0000000d jc 00007FCDBD1741F7h 0x00000013 test ch, bh 0x00000015 inc ebp 0x00000016 inc ebx 0x00000017 rdtsc
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_0040596F CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004064C1 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004027FB FindFirstFileW,
    Source: C:\Users\user\Desktop\PO.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\PO.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004061A0 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1
    Windows Service
    1
    Access Token Manipulation
    11
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    1
    Access Token Manipulation
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    PO.exe27%ReversingLabsWin32.Downloader.Nemesis
    PO.exe29%VirustotalBrowse
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsaCD4C.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsaCD4C.tmp\System.dll0%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorPO.exefalse
      high
      No contacted IP infos
      Joe Sandbox Version:36.0.0 Rainbow Opal
      Analysis ID:756266
      Start date and time:2022-11-29 22:38:05 +01:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 6m 49s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:PO.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:11
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal60.troj.evad.winEXE@1/4@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 63% (good quality ratio 61.7%)
      • Quality average: 88.2%
      • Quality standard deviation: 21.9%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\PO.exe
      File Type:data
      Category:dropped
      Size (bytes):169298
      Entropy (8bit):6.993422708563822
      Encrypted:false
      SSDEEP:3072:3H36doFRBxbYjEigfKAFBx4klY9HcLYO6P7tbLkXlBDPn4rrHIRqkFjOjz:XHRojYfLqkqFZbSjDKrSnpOH
      MD5:E9CD51B8DF0E079A6D84286C4F8FB583
      SHA1:30BB91305F4BAD22563D16D837405BD105982218
      SHA-256:B1DFFFB8EE9D8CB22BF5C8660D793719ACFEC38A08F2A78E90EE8D4067512159
      SHA-512:D33B5DED1B891A2BEB68B0127FFB8E0B30AE3856877F7BEF93D42440D15FFEF6EADC8007137E0BC1B1257CB09777344B22773CEA9F9FDDC81FBDAC3A66DF65AD
      Malicious:false
      Reputation:low
      Preview:.:.V,:.. E....-^,z..3U.g...v.Q.sY..x.....@...m|..I...V.y...@.....S.....G.+...UQg5...@..:..o8.v.j.5.<../..3..0,E.b.v...._...h..b...J.M..._.E/x24.K...\.R......X.~...._4..%...2\.....:6.5.>E...N&j)yc.F....o....R.tZZ.F.UW....0.........N.,GTMj.......I........[{..0U..4..3..,.l$..}.g.&.u..!.".lstg.5..{..~az..U..J.....j.c[...z.j./...!m.......Cy.U....X.. 9...@..V$...M..*%...O.@..V5......+".}.4.>.....<..e..........;..b9;"D...&E.....A_Q.%..^..t.N&1^....c.....G..h=H.....?.....W.......`.4..,..3.IaaH.B.ZmB....f.J.....a..(p.-X..*...f..W.'.D(O...,..4..cG............/G./..^....6X..x.CD{\g.....{...F:..4...tJ>J..=..#K...-............v...f....J.=7@oM.e.$l..U..m..<..:.O6.,...\.Y|[do.8.w....#]2..f.. ....[...J....g.h`.....Q.f.C_..T...iIR.....A..%t._6fYH.]g.....o.i.c..U.H...h....M...@.n...9.[t.X.....o......t......%PWY.t@..Ce..WG.%.l..b}eF....B.6K.N....Qf.C.P....f....2.>.#...3.5Y.=...d..3......\f.J..9S.16bQ...}..'.g..M.l.B^e\.8...A.L....v.p..u......:....Y~t...i...
      Process:C:\Users\user\Desktop\PO.exe
      File Type:SVG Scalable Vector Graphics image
      Category:dropped
      Size (bytes):314
      Entropy (8bit):4.555782614723155
      Encrypted:false
      SSDEEP:6:TMVBd/6o8GUYl/n7S3mc4slLlNkRI7NtAlaRI7SdtAlaRI7UNtAlBC:TMHdPnnl/nu3tln7NWlz7MWlz7UNWlM
      MD5:53C42FCA9E64A93B4C572D5BA805FD4D
      SHA1:1659423CA8F981CFD2EEB6ADD25C03CA5B37FFBD
      SHA-256:DD3F1C117437A6F5124905DE7212A1A320E76F9B33D8411BF70DBDBEFA8E9BAD
      SHA-512:2852EB784E5090F298259F04516C1413734ECF20EA7D143864FE0312A6410E83FFF49E16DCE3CF7F61177238B4DECEBD540FD839E3721965A5141856908392DD
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:<?xml version="1.0" encoding="UTF-8"?>.<svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg">. <g fill="#2e3436">. <path d="m 1 2 h 14 v 2 h -14 z m 0 0"/>. <path d="m 1 7 h 14 v 2 h -14 z m 0 0"/>. <path d="m 1 12 h 14 v 2 h -14 z m 0 0"/>. </g>.</svg>.
      Process:C:\Users\user\Desktop\PO.exe
      File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
      Category:dropped
      Size (bytes):856
      Entropy (8bit):2.928119175705163
      Encrypted:false
      SSDEEP:12:8gl02sX2lw/tz+7RafgKD7mWH/+CNJkKAb4t2Y+xIBjK:8dTaRMgKhPHAJ7aB
      MD5:B81090D32591EB295A10138D5B0439B3
      SHA1:19285E160280462064A63B6957DA2F3F71DB25F1
      SHA-256:8294B2C9D6BD61D43566B01682100C387EA0D67A72634365D416404EB1377C36
      SHA-512:F7BC33A0A7B7DEF27D495ED9E92C5E2EA4D1A0D5B4B99009CB01F7DBABE79297A8487E2E70A7FBD579EE01E8F27A560EA75B94F5579FE9E451A0F4A294D13DCF
      Malicious:false
      Reputation:low
      Preview:L..................F........................................................)....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....Z.1...........user..B............................................e.n.g.i.n.e.e.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....\.2...........TOBEN.txt.D............................................T.O.B.E.N...t.x.t...........\.T.O.B.E.N...t.x.t.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
      Process:C:\Users\user\Desktop\PO.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:modified
      Size (bytes):11776
      Entropy (8bit):5.6557532861400945
      Encrypted:false
      SSDEEP:192:eK24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlASl:u8QIl975eXqlWBrz7YLOlA
      MD5:0FF2D70CFDC8095EA99CA2DABBEC3CD7
      SHA1:10C51496D37CECD0E8A503A5A9BB2329D9B38116
      SHA-256:982C5FB7ADA7D8C9BC3E419D1C35DA6F05BC5DD845940C179AF3A33D00A36A8B
      SHA-512:CB5FC0B3194F469B833C2C9ABF493FCEC5251E8609881B7F5E095B9BD09ED468168E95DDA0BA415A7D8D6B7F0DEE735467C0ED8E52B223EB5359986891BA6E2E
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      • Antivirus: Virustotal, Detection: 0%, Browse
      Reputation:moderate, very likely benign file
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....z.W...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Entropy (8bit):6.435141913006391
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:PO.exe
      File size:269537
      MD5:9297126fd9624f7dc2d4f64f072668a2
      SHA1:c30b3c8fddd49f7dfba687026daf6293f6d90b1b
      SHA256:edd8e1858bcc704fdea75837bb448eceda61317e7f8028e82aa2a0e5559c658a
      SHA512:57fd81274b3f16cb8f0056c9afe2c697649db154c12e63a4ed8bad65ccb6b598845adce9883bd2695335e05e8f3c877fc9f2e32a637c01e170d0b671e32c6d0b
      SSDEEP:6144:DB+pqUiH1YF0tV1R5nqyw8TqwiV6lMATl:DgcHyF+Hqyw83iLATl
      TLSH:39448B147A6CE127F11AC6709B52AD1B7E783F040865D203BEC4FB5E353B14299FA26B
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L....z.W.................b...*.......3............@
      Icon Hash:b474f4c4c4c4c4d4
      Entrypoint:0x4033b6
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x57017AB0 [Sun Apr 3 20:18:56 2016 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:4ea4df5d94204fc550be1874e1b77ea7
      Instruction
      sub esp, 000002D4h
      push ebx
      push esi
      push edi
      push 00000020h
      pop edi
      xor ebx, ebx
      push 00008001h
      mov dword ptr [esp+14h], ebx
      mov dword ptr [esp+10h], 0040A230h
      mov dword ptr [esp+1Ch], ebx
      call dword ptr [004080B4h]
      call dword ptr [004080B0h]
      cmp ax, 00000006h
      je 00007FCDBCE10033h
      push ebx
      call 00007FCDBCE1318Ch
      cmp eax, ebx
      je 00007FCDBCE10029h
      push 00000C00h
      call eax
      mov esi, 004082B8h
      push esi
      call 00007FCDBCE13106h
      push esi
      call dword ptr [0040815Ch]
      lea esi, dword ptr [esi+eax+01h]
      cmp byte ptr [esi], 00000000h
      jne 00007FCDBCE1000Ch
      push ebp
      push 00000009h
      call 00007FCDBCE1315Eh
      push 00000007h
      call 00007FCDBCE13157h
      mov dword ptr [0042A244h], eax
      call dword ptr [0040803Ch]
      push ebx
      call dword ptr [004082A4h]
      mov dword ptr [0042A2F8h], eax
      push ebx
      lea eax, dword ptr [esp+34h]
      push 000002B4h
      push eax
      push ebx
      push 004216E8h
      call dword ptr [00408188h]
      push 0040A384h
      push 00429240h
      call 00007FCDBCE12D40h
      call dword ptr [004080ACh]
      mov ebp, 00435000h
      push eax
      push ebp
      call 00007FCDBCE12D2Eh
      push ebx
      call dword ptr [00408174h]
      add word ptr [eax], 0000h
      Programming Language:
      • [EXP] VC++ 6.0 SP5 build 8804
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x19f28.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b4.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x615d0x6200False0.6616709183673469data6.45041359169741IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x80000x13a40x1400False0.4529296875data5.163001655755973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xa0000x203380x600False0.5026041666666666data3.9824009583068882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .ndata0x2b0000x410000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x6c0000x19f280x1a000False0.062424879807692304data2.7337265494354486IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_BITMAP0x6c3580x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
      RT_ICON0x6c6c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
      RT_ICON0x7cee80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
      RT_ICON0x811100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
      RT_ICON0x836b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
      RT_ICON0x847600x9eePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
      RT_ICON0x851500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
      RT_DIALOG0x855b80x144dataEnglishUnited States
      RT_DIALOG0x857000x13cdataEnglishUnited States
      RT_DIALOG0x858400x100dataEnglishUnited States
      RT_DIALOG0x859400x11cdataEnglishUnited States
      RT_DIALOG0x85a600xc4dataEnglishUnited States
      RT_DIALOG0x85b280x60dataEnglishUnited States
      RT_GROUP_ICON0x85b880x5adataEnglishUnited States
      RT_MANIFEST0x85be80x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States
      DLLImport
      KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, WaitForSingleObject, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GetDiskFreeSpaceW, lstrlenW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
      USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
      SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
      ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
      ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found
      No statistics
      Target ID:0
      Start time:22:38:56
      Start date:29/11/2022
      Path:C:\Users\user\Desktop\PO.exe
      Wow64 process (32bit):true
      Commandline:C:\Users\user\Desktop\PO.exe
      Imagebase:0x400000
      File size:269537 bytes
      MD5 hash:9297126FD9624F7DC2D4F64F072668A2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.766696218.0000000003190000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low

      No disassembly