Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL04AWB01173903102023PDF.scr.exe

Overview

General Information

Sample Name:DHL04AWB01173903102023PDF.scr.exe
Analysis ID:828071
MD5:1bf124cc783ff47a91ada4e6d4ac9e6b
SHA1:b78f2ffb785071ab785830cdd4cbc5f010b7480b
SHA256:494d5735144af171cc15708b37b491b74be1522494958e605ac348dd4897dcf9
Tags:DHLexeRemcosRATscrsigned
Infos:

Detection

GuLoader
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Found potential ransomware demand text
Uses 32bit PE files
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.832197103.0000000006825000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: DHL04AWB01173903102023PDF.scr.exeVirustotal: Detection: 13%Perma Link
    Source: DHL04AWB01173903102023PDF.scr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Binary string: D:\SCM\P4\depot\esw\projects\azure\Maglev\DesignerBranches\ezheng\newarch\Vista-AddOn\ExtArch\UI\BtTray\libs\x64\ContactsApi.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, ContactsApi.dll.0.dr
    Source: Binary string: D:\Builds\149\N2\HO_MMC_g_2016_r_2016\Sources\AudioPluginMgr\plugins\DefConvertor\Release\DefConvertor.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.000000000299F000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.dr
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_00402706 FindFirstFileW,
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_0040572C CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_004061E0 FindFirstFileW,FindClose,
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: DHL04AWB01173903102023PDF.scr.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://s2.symcb.com0
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://sv.symcd.com0&
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://www.nero.com
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_00405290 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: __m2mep@?__global_unlock@?A0x27fb6efc@@$$FYA_NXZ
    Source: nseEDA7.tmp.0.drString found in binary or memory: __m2mep@?__global_unlock@?A0x27fb6efc@@$$FYA_NXZ
    Source: ContactsApi.dll.0.drString found in binary or memory: __m2mep@?__global_unlock@?A0x27fb6efc@@$$FYA_NXZ
    Source: DHL04AWB01173903102023PDF.scr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: msado25.tlb.0.drStatic PE information: No import functions for PE file found
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831378507.0000000000409000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsado25.tlbj% vs DHL04AWB01173903102023PDF.scr.exe
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831482858.000000000044E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameStoressters.exe` vs DHL04AWB01173903102023PDF.scr.exe
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsado25.tlbj% vs DHL04AWB01173903102023PDF.scr.exe
    Source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.000000000299F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDefConvertor.DLL vs DHL04AWB01173903102023PDF.scr.exe
    Source: DHL04AWB01173903102023PDF.scr.exeBinary or memory string: OriginalFilenameStoressters.exe` vs DHL04AWB01173903102023PDF.scr.exe
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Windows\resources\0409Jump to behavior
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_00404ACD
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_004064F2
    Source: DHL04AWB01173903102023PDF.scr.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess Stats: CPU usage > 98%
    Source: DHL04AWB01173903102023PDF.scr.exeVirustotal: Detection: 13%
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile read: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeJump to behavior
    Source: DHL04AWB01173903102023PDF.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\NonhieraticalJump to behavior
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\AppData\Local\Temp\nseEDA6.tmpJump to behavior
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile written: C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\Z_Custom2.iniJump to behavior
    Source: classification engineClassification label: mal64.rans.troj.evad.winEXE@1/11@0/0
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_0040206A CoCreateInstance,
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_00404587 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: DHL04AWB01173903102023PDF.scr.exeStatic file information: File size 1211760 > 1048576
    Source: Binary string: D:\SCM\P4\depot\esw\projects\azure\Maglev\DesignerBranches\ezheng\newarch\Vista-AddOn\ExtArch\UI\BtTray\libs\x64\ContactsApi.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, ContactsApi.dll.0.dr
    Source: Binary string: D:\Builds\149\N2\HO_MMC_g_2016_r_2016\Sources\AudioPluginMgr\plugins\DefConvertor\Release\DefConvertor.pdb source: DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.000000000299F000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.832197103.0000000006825000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_10002D50 push eax; ret
    Source: ContactsApi.dll.0.drStatic PE information: section name: .nep
    Source: msado25.tlb.0.drStatic PE information: 0x8DBA1FD3 [Sun May 7 15:54:59 2045 UTC]
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_00406207 GetModuleHandleA,LoadLibraryA,GetProcAddress,
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\Nonhieratical\Extracorpuscular\APM_DefConvertor.dllJump to dropped file
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\msado25.tlbJump to dropped file
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\AppData\Local\Temp\nsoF960.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeFile created: C:\Users\user\Nonhieratical\Thonny\Yderligheders\Samtalernes\Sikkerhedsventilen\ContactsApi.dllJump to dropped file
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeRDTSC instruction interceptor: First address: 0000000006948C31 second address: 0000000006948C31 instructions: 0x00000000 rdtsc 0x00000002 cmp ecx, edx 0x00000004 cmp ecx, edx 0x00000006 cmp ebx, ecx 0x00000008 jc 00007F18C8FF67D2h 0x0000000a test ecx, edx 0x0000000c inc ebp 0x0000000d inc ebx 0x0000000e cmp ebx, eax 0x00000010 rdtsc
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeDropped PE file which has not been started: C:\Users\user\Nonhieratical\Extracorpuscular\APM_DefConvertor.dllJump to dropped file
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeDropped PE file which has not been started: C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\msado25.tlbJump to dropped file
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeDropped PE file which has not been started: C:\Users\user\Nonhieratical\Thonny\Yderligheders\Samtalernes\Sikkerhedsventilen\ContactsApi.dllJump to dropped file
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_00402706 FindFirstFileW,
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_0040572C CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_004061E0 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_00406207 GetModuleHandleA,LoadLibraryA,GetProcAddress,
    Source: C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exeCode function: 0_2_00405EBF GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path InterceptionPath Interception11
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Timestomp
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    DHL04AWB01173903102023PDF.scr.exe8%ReversingLabs
    DHL04AWB01173903102023PDF.scr.exe13%VirustotalBrowse
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsoF960.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsoF960.tmp\System.dll1%VirustotalBrowse
    C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\msado25.tlb0%ReversingLabs
    C:\Users\user\Nonhieratical\Clavichordist\benenders\Actionfilm\Sortsrenheden\msado25.tlb0%VirustotalBrowse
    C:\Users\user\Nonhieratical\Extracorpuscular\APM_DefConvertor.dll0%ReversingLabs
    C:\Users\user\Nonhieratical\Extracorpuscular\APM_DefConvertor.dll0%VirustotalBrowse
    C:\Users\user\Nonhieratical\Thonny\Yderligheders\Samtalernes\Sikkerhedsventilen\ContactsApi.dll0%ReversingLabs
    C:\Users\user\Nonhieratical\Thonny\Yderligheders\Samtalernes\Sikkerhedsventilen\ContactsApi.dll0%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://ocsp.thawte.com00%URL Reputationsafe
    http://ocsp.thawte.com00%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorDHL04AWB01173903102023PDF.scr.exefalse
      high
      http://crl.thawte.com/ThawteTimestampingCA.crl0DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drfalse
        high
        http://www.symauth.com/cps0(DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drfalse
          high
          http://www.symauth.com/rpa00DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drfalse
            high
            http://ocsp.thawte.com0DHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.nero.comDHL04AWB01173903102023PDF.scr.exe, 00000000.00000002.831811356.00000000029B2000.00000004.00000020.00020000.00000000.sdmp, nseEDA7.tmp.0.dr, APM_DefConvertor.dll.0.drfalse
              high
              No contacted IP infos
              Joe Sandbox Version:37.0.0 Beryl
              Analysis ID:828071
              Start date and time:2023-03-16 18:03:16 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 9m 36s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:DHL04AWB01173903102023PDF.scr.exe
              Detection:MAL
              Classification:mal64.rans.troj.evad.winEXE@1/11@0/0
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 63% (good quality ratio 61.6%)
              • Quality average: 88.1%
              • Quality standard deviation: 22.6%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240s for sample files taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
              • Not all processes where analyzed, report is missing behavior information
              No simulations
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:data
              Category:dropped
              Size (bytes):1831716
              Entropy (8bit):7.308492575684153
              Encrypted:false
              SSDEEP:49152:lf4WAQduqXBweZG32poHRS2tQuWikK9jM3:lJAQlnANE2tQTaM3
              MD5:9B4D8ABA094C64270F7878FAE618AC65
              SHA1:FA3D773625A7FE13C127925856A2B015C986E598
              SHA-256:CB136F81690F426D253696166DE342FF05A1C1F3C0C780BBE800A06396424751
              SHA-512:87EBE9A0C8BD59D98236943710F7A739AEE413FD8B198F1F92479434819423857252B6D160AB42A0EE8B976AAE3972185E2CC467FB9842AFEB9BF3C3D7577B73
              Malicious:false
              Reputation:low
              Preview:.3......,........................!.......2.......3..............................................w...........-.J.............................................................................................................................................................................G...X...............j...............................................................................................................................f.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):11264
              Entropy (8bit):5.774411073650885
              Encrypted:false
              SSDEEP:192:eB2HS+ihg200uWz947Wzvxu6v0MI7JOde+Ij5Z77dslFsE+:3S62Gw947ExuGDI7J8EF7KIE
              MD5:BE2621A78A13A56CF09E00DD98488360
              SHA1:75F0539DC6AF200A07CDB056CDDDDEC595C6CFD2
              SHA-256:852047023BA0CAE91C7A43365878613CFB4E64E36FF98C460E113D5088D68EF5
              SHA-512:B80CF1F678E6885276B9A1BFD9227374B2EB9E38BB20446D52EBE2C3DBA89764AA50CB4D49DF51A974478F3364B5DBCBC5B4A16DC8F1123B40C89C01725BE3D1
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Virustotal, Detection: 1%, Browse
              Reputation:moderate, very likely benign file
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....e.Q...........!................9'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..@....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:data
              Category:dropped
              Size (bytes):202342
              Entropy (8bit):7.5372236610693095
              Encrypted:false
              SSDEEP:3072:YTz6SobCaMo6ljmx23UrLpvJvOc9CuKjrDee/jKOVox2EcIHuysfzFC64:w6SPaMo6l4XvOZ5rDtKOVoQrF0
              MD5:E2901A2B3EFA6BB00F2AD1D4AD963F52
              SHA1:1F2C771CEAE379DF9FA7FA1FA5E4ABC36638A42E
              SHA-256:FEFA0B1539475BF0ED224A8D9934FD4558DD0B1297FB661DAB776ABC96C333FF
              SHA-512:DA39BCB8E8C2BD79160B33A7767C58CC7CE204B56005B16AF6825DD6E25612D4C08E2C69A2DF288EC6635A24E740C23C5842E5DA3C08BDCCE9FC677D456C9B5E
              Malicious:false
              Reputation:low
              Preview:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):45170
              Entropy (8bit):3.7626877360483184
              Encrypted:false
              SSDEEP:384:wBMdoEQYh/Iq7rwSM+jNyql218nyeEJFFCEeFe73c3+AC+mviFuqOtSS0uK3l/:wadoAr7s1+jNyqr6FFweIT0h0/
              MD5:AC05652AF93A583226FD118E23D3652F
              SHA1:DA5BB4AE245369888D1AF981AF6785FAE21C7BC9
              SHA-256:54E26FC4F586B39C4CCB6655735E8AA03AD31498EFD0119AB8406258D5561627
              SHA-512:2C24F1CBD45D5B06DF0A187793E02DA4F085E6E03CF1A697416F3F0B34FE4E96ECFCFD4E25DA3288383B98E1BC112A2418EFF5EA8E69BFBF153F28A20A687BF2
              Malicious:false
              Reputation:low
              Preview:..[.S.y.s.t.e.m.].....L.a.n.g.I.d. .=. .L.A.N.G._.Y.I.,. .S.U.B.L.A.N.G._.D.E.F.A.U.L.T.....G.u.i.d.P.r.o.f.i.l.e.=.{.4.0.9.C.8.3.7.6.-.0.0.7.B.-.4.3.5.7.-.A.E.8.E.-.2.6.3.1.6.E.E.3.F.B.0.D.}.....D.e.s.c.r.i.p.t.i.o.n.=.".Y.i. .I.n.p.u.t. .M.e.t.h.o.d.".....D.i.s.p.l.a.y. .D.e.s.c.r.i.p.t.i.o.n.=.".@.%.p.r.o.g.r.a.m.F.i.l.e.s.%.\.W.i.n.d.o.w.s. .N.T.\.T.a.b.l.e.T.e.x.t.S.e.r.v.i.c.e.\.T.a.b.l.e.T.e.x.t.S.e.r.v.i.c.e...d.l.l.,.-.1.6.".....I.c.o.n.I.n.d.e.x.=.I.C.O.N._.Y.I.........[.C.o.n.f.i.g.u.r.a.t.i.o.n.].....S.h.o.w.I.n.c.r.e.m.e.n.t.a.l.C.a.n.d.i.d.a.t.e.I.m.m.e.d.i.a.t.e.l.y.=.1.....R.e.a.d.i.n.g.W.i.n.d.o.w...W.i.d.t.h.=.3.....F.o.n.t.F.a.c.e.N.a.m.e.=.M.i.c.r.o.s.o.f.t. .Y.i. .B.a.i.t.i.....F.o.n.t.S.i.z.e.=.1.4.........[.P.r.e.s.e.r.v.e.d.K.e.y.].....G.u.i.d.I.m.e.M.o.d.e.=.{.9.8.2.1.3.4.9.4.-.3.6.7.A.-.4.8.5.5.-.9.0.A.1.-.9.7.D.9.1.7.E.3.E.C.3.D.}.....K.e.y.D.e.f.i.n.e.I.m.e.M.o.d.e.=.V.K._.S.H.I.F.T.,. .T.F._.M.O.D._.O.N._.K.E.Y.U.P._.S.H.I.F.T._.O.N.L.Y.....D.e.s.c.r.i.p.t.
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:Generic INItialization configuration [allData0]
              Category:dropped
              Size (bytes):6221
              Entropy (8bit):4.623864089058378
              Encrypted:false
              SSDEEP:96:KGz5QTZR5ATsj5sjc9sjnljnDQcaufEjnOAvtDAvVY:BzmTZbAojyjnjljspu8jXvtMvVY
              MD5:CA003CF1D99CDF717768E88DD64BB84C
              SHA1:A0326E46EA68C4649DD6645368B43922B6126FF6
              SHA-256:44100D5F41FE4CDDD1D77EF7124FEC4F8071E5A1678339ACE0DA3DD7E826EF2F
              SHA-512:94D1EB659C22A3614F250C79D1C957876A617158BE538E35E906F12E68C6E12CCBE9C364D1F1C18D280F72FD7958D753348C056CAF320B6843EC3873B59C9926
              Malicious:false
              Reputation:low
              Preview:[Config]..modeIndex=1..allIndex=1..wasdIndex=0..qwerIndex=0..fourIndex=0..syncIndex=0....[allData0]..ColorR=255..ColorG=0..ColorB=0..Color2R=0..Color2G=0..Color2B=0..Color3R=0..Color3G=0..Color3B=0..Color4R=0..Color4G=0..Color4B=0..SpeedType=2..DirectType=1..MusicType=0..TemperatureH=0..TemperatureL=0..StrobingRandom=0....[allData1]..ColorR=8..ColorG=255..ColorB=240..Color2R=255..Color2G=0..Color2B=0..Color3R=0..Color3G=0..Color3B=0..Color4R=0..Color4G=0..Color4B=0..SpeedType=2..DirectType=1..MusicType=0..TemperatureH=0..TemperatureL=0..StrobingRandom=0....[allData2]..ColorR=255..ColorG=0..ColorB=0..Color2R=0..Color2G=0..Color2B=0..Color3R=0..Color3G=0..Color3B=0..Color4R=0..Color4G=0..Color4B=0..SpeedType=2..DirectType=1..MusicType=0..TemperatureH=0..TemperatureL=0..StrobingRandom=0....[allData3]..ColorR=0..ColorG=0..ColorB=0..Color2R=0..Color2G=0..Color2B=0..Color3R=0..Color3G=0..Color3B=0..Color4R=0..Color4G=0..Color4B=0..SpeedType=2..DirectType=1..MusicType=3..TemperatureH=0..Tempe
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):69632
              Entropy (8bit):4.63717105728589
              Encrypted:false
              SSDEEP:768:5U0SzA63tPY1AcbERQzuahkbzM7hX2O4HvypROPzMiibjUsqK0M49uo:5OU63tPY114RX3M7MvPy/OPz/CF09F
              MD5:299DBB927B6390C6B925757DD5B2B7FF
              SHA1:FFCE563E42AF7B1086CB5AE92014801B2C66DC0C
              SHA-256:D9D2BD64DE6176B31A4E704D7E5D08FA9BB75A6A8AC007A61C4DF38F6FA82262
              SHA-512:E88F9DA34960BC13C27F2B236A28410AC8B71619D8175103D0BD5E7F03F395F773BCDF399E805D2150BECF2EE107147287D6FE0C00BD41AC591F868E62296347
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Virustotal, Detection: 0%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<..R...R...R......R..P...R.Rich..R.PE..d................." .........................................................0.......Z....`.......................................................... ..................................8............................................................................rdata..............................@..@.rsrc........ ......................@..@................T...8...8...................$...................8....rdata..8...x....rdata$zzzdbg.... .......rsrc$01..... .......rsrc$02.... .....A..R...)h.s.V.2..d.v.9...............................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, components 3
              Category:dropped
              Size (bytes):7968
              Entropy (8bit):7.906040167483731
              Encrypted:false
              SSDEEP:192:oXRXorJ1fquj4/Ms9hHCQyTscIhlMN58ZB5oEx5/U8qn8kyx:KRoqu0ksEIhCOjZU8M8kM
              MD5:162F6BB32D6D5AC380A80DA07C13E213
              SHA1:7985EAC367E0B19CC0E30B24399A37663E8436F6
              SHA-256:686310A1A5B8BB4D4EAA316FC0A3970EE878CC39F75E8C68F49ED51A5AD562DF
              SHA-512:F4DC70FB483303906CA8C4D5AE404653C7B761BEB38B3DC88ABDEBED4B28A85F3A02F6E2E1E5D28A1625F09A8EEA7A66F12959AA12E98733023CE5908B9FF199
              Malicious:false
              Preview:......JFIF.....d.d.....:Exif..MM.*......Q...........Q..........aQ..........a.......C....................................................................C.......................................................................n.n.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(..5...l...K.4.....t{.k..........^SD'...g....H.7.......d....=.....RmQ..{.x.. .mj....|Z.m'.|;<l.ykc...j.0X.h...f.O,..M.K.>.xG.......K..sZ...H|U.j.Z...y?,.m.n.[...l...J.(..QUG...(...z_....#....Ys=....?......>....?.}.;.V..@7.*.5..-.O...o.\F.....v.........~)...c}.O.....}b.%.........>a..Z.di.l.cH|.a
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:ASCII text, with very long lines (57606), with no line terminators
              Category:dropped
              Size (bytes):57606
              Entropy (8bit):2.670628012232385
              Encrypted:false
              SSDEEP:768:Ip+EachJRWeyBP/QmazA5Bnh+QuGkvrOYKT2Rrt6UptqyBcerao1CEzSkNu8R2QP:uquzgxiGXNyHlqgdeo1CtNQP
              MD5:1EE3EA9EB5F7142B93FE99689B2038A6
              SHA1:AB0D94BDBDC97EEA61B226010584C12D9AED43EA
              SHA-256:67D1985FCBEB4E6FB84785F6304B3CB63A9326B328921E04CCFD50539825FDB7
              SHA-512:BBC7EAEA47011BB96FD26ADB3B71F981AE20FDACCF1A72BAFE96EC8E3071AD29AE052B279465FA700B3AD327DC2EA97408B52FD5A0D73B716F21FCD500D30B67
              Malicious:false
              Preview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
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):251376
              Entropy (8bit):5.684541726348285
              Encrypted:false
              SSDEEP:3072:njOJemjvYiYtrWTovAYYYlDvNYXzMgv9/PuMKISOe1sWQuCyY+2JHfYavRkRYI1N:n+6v671nuMKRv1sHyaJ/YavRkRYIBYA1
              MD5:B44ED270A186763E1DA753AA39553B68
              SHA1:10390F85EA5DB841A8BC70E8ED931A5D34026BE8
              SHA-256:E24E9B9C79199B66B9F847F1E07A2769B82CB7FCCA98E5B53F28B481EEBCABD8
              SHA-512:0BF049851CBD5D29221E7C721F15E58286C030023A9BF66E88A5EE6D4D940F89CBBFB8A4E0376382472940450D631E7E3D0162C871443CA12169DFED4E7C91B5
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Virustotal, Detection: 0%, Browse
              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......43..pR..pR..pR..y*^.qR..y*N.xR....sR....}R....xR..pR..-S....wR......JR..pR..dR......zR......oR......qR......qR..pRJ.qR......qR..RichpR..................PE..L...L..V...........!......................................................................@..........................P.......A...................................+......8...........................@...@............................................text............................... ..`.rdata..=A.......B..................@..@.data...D....`.......F..............@....rsrc............ ...V..............@..@.reloc...G.......H...v..............@..B........................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):384128
              Entropy (8bit):5.921054568677329
              Encrypted:false
              SSDEEP:6144:zJteC/kw/VKk3g6ZK5RoyPAzv2B9NAlYRuKJOllo:zreCsO3g6QRoyPAw6eRh
              MD5:7E49C04017D860D5EE299FFB104203DF
              SHA1:DDF55616BDABC91EB801CE14A45ACDAD2142B78F
              SHA-256:1AC6E64459440B6EFB03FC256E24BCCBBC512CF6E7DCD85DD3C45E1CA7584176
              SHA-512:EC125C3CD1EDE0F4C24915BC39EA641F58F1D78048E0CCB631F249839440218B02706CC8ACA785DA2B3993EDBABEFB433BF19BA29A9F1EDFB6ACACBDDC0A4F50
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Virustotal, Detection: 0%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........p...p...p....j..p...?...p.......p.......p.......p...p...p.......p.......p.......p..Rich.p..........................PE..d....=.N.........." ..... ..........L........................................@............@.......................................................... ..........@............0......`E...............................................@..............|E..H............text............................... ..`.nep......... ...................... ..`.rdata..v....@.......$..............@..@.data....<..........................@....pdata..@...........................@..@.rsrc........ ......................@..@.reloc..`....0......................@..B................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x786, components 3
              Category:dropped
              Size (bytes):782753
              Entropy (8bit):7.972739118836816
              Encrypted:false
              SSDEEP:12288:1xE6g9kiViGNq+W6nQNIDO0tVGb34eaR6fUnMlkTFztQywzV0jyB4Dl9l+qfkwPN:7E6G3VibpHIdebodR6jlKFtQVUv+iP8S
              MD5:E269DECCAC13CF01A0377872E79BC676
              SHA1:54D196FDE9529310F9E5A3EBA6548DAB4F179542
              SHA-256:255874E0A6A5CA862CBAE5C783D582729B343C70C5697062D7F1E587F15F25EC
              SHA-512:08ADAD38BE3472CF8814C40F99D6DCFDA313C2FED765B872AA30C0995B027F2BEDABF75DB625F3C40F003A8EFC3F41169CBA4AF706EC637018DEEF02EC92F6CC
              Malicious:false
              Preview:......JFIF.....`.`.....XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch..............................................desc........IEC 61966-2.1 Default RGB colour space - sRGB............IEC 61966-2.1 Default RGB colour space - sRGB......................desc.......,Reference Viewing Condition in IEC61966-2.1...........,Reference Viewing Condition in IEC61966-2.1........
              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
              Entropy (8bit):7.9924781293877105
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:DHL04AWB01173903102023PDF.scr.exe
              File size:1211760
              MD5:1bf124cc783ff47a91ada4e6d4ac9e6b
              SHA1:b78f2ffb785071ab785830cdd4cbc5f010b7480b
              SHA256:494d5735144af171cc15708b37b491b74be1522494958e605ac348dd4897dcf9
              SHA512:b5e35fda41aedb7c40961098745153efa13470d065ac2cfb343c542011ed58869494770615db8a7e4b64b77ac6dd2de4f1cfd1403efeceee8425993bdf66670b
              SSDEEP:24576:7RNsMRW/uL9M7e36FgHRcMSbA22c91uwozF2KDQcvhNfSf7a09Xe+bUe:c4suGm6SxcD2SczF2aQcffSDb99
              TLSH:214533D212E2B0B3D690D93B5D5D6E7EE173D60014B2274B7340A8AE6F38165AB1F374
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....e.Q.................`...*.......3.......p....@
              Icon Hash:74f0d0c0ccd4f0c4
              Entrypoint:0x40331c
              Entrypoint Section:.text
              Digitally signed:true
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x519965DC [Sun May 19 23:53:00 2013 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:17b7d61bda0f7478e36d9ce3d4170680
              Signature Valid:false
              Signature Issuer:E=inertnesses@Forbetoning20.En, OU="Falskspillere Unrelinquishable ", O=Inalterableness, L=Montague, S=Texas, C=US
              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
              Error Number:-2146762487
              Not Before, Not After
              • 7/10/2022 7:04:55 AM 7/9/2025 7:04:55 AM
              Subject Chain
              • E=inertnesses@Forbetoning20.En, OU="Falskspillere Unrelinquishable ", O=Inalterableness, L=Montague, S=Texas, C=US
              Version:3
              Thumbprint MD5:B6296BD55FD696653A6ECFD645239E12
              Thumbprint SHA-1:7B9D3A3205DB42A6F338C423028B131EDDD4F064
              Thumbprint SHA-256:F7E0D7AFE23FD9E15D7B7C6CB47B4662581AE209B91E9046AE6A7AAFDC37720B
              Serial:04D25D90CEF83AEC304DC1F83B1B5CCF54893695
              Instruction
              sub esp, 000002D4h
              push ebx
              push ebp
              push esi
              push edi
              push 00000020h
              xor ebp, ebp
              pop esi
              mov dword ptr [esp+18h], ebp
              mov dword ptr [esp+10h], 00409230h
              mov dword ptr [esp+14h], ebp
              call dword ptr [00407034h]
              push 00008001h
              call dword ptr [004070BCh]
              push ebp
              call dword ptr [004072ACh]
              push 00000008h
              mov dword ptr [00429298h], eax
              call 00007F18C9476A2Dh
              mov dword ptr [004291E4h], eax
              push ebp
              lea eax, dword ptr [esp+34h]
              push 000002B4h
              push eax
              push ebp
              push 00420690h
              call dword ptr [0040717Ch]
              push 0040937Ch
              push 004281E0h
              call 00007F18C9476698h
              call dword ptr [00407134h]
              mov ebx, 00434000h
              push eax
              push ebx
              call 00007F18C9476686h
              push ebp
              call dword ptr [0040710Ch]
              cmp word ptr [00434000h], 0022h
              mov dword ptr [004291E0h], eax
              mov eax, ebx
              jne 00007F18C9473B8Ah
              push 00000022h
              mov eax, 00434002h
              pop esi
              push esi
              push eax
              call 00007F18C94760F4h
              push eax
              call dword ptr [00407240h]
              mov dword ptr [esp+1Ch], eax
              jmp 00007F18C9473C49h
              push 00000020h
              pop edx
              cmp cx, dx
              jne 00007F18C9473B89h
              inc eax
              inc eax
              cmp word ptr [eax], dx
              je 00007F18C9473B7Bh
              add word ptr [eax], 0000h
              Programming Language:
              • [EXP] VC++ 6.0 SP5 build 8804
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x7fc0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x1273680xa08
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x5e1c0x6000False0.6542561848958334data6.407290112650426IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x70000x13540x1400False0.43046875data5.037834422880877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x90000x202d80x600False0.47265625data3.7587363087821926IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .ndata0x2a0000x240000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x4e0000x7fc00x8000False0.949371337890625data7.7369782578420665IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x4e1d80x7562PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
              RT_DIALOG0x557400x100dataEnglishUnited States
              RT_DIALOG0x558400xf8dataEnglishUnited States
              RT_DIALOG0x559380x60dataEnglishUnited States
              RT_GROUP_ICON0x559980x14dataEnglishUnited States
              RT_VERSION0x559b00x25cdataEnglishUnited States
              RT_MANIFEST0x55c100x3b0XML 1.0 document, ASCII text, with very long lines (944), with no line terminatorsEnglishUnited States
              DLLImport
              KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, MultiByteToWideChar, FindClose, MulDiv, ReadFile, WriteFile, lstrlenA, WideCharToMultiByte
              USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
              SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
              ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
              ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
              VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.
              No statistics
              Target ID:0
              Start time:18:04:13
              Start date:16/03/2023
              Path:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\DHL04AWB01173903102023PDF.scr.exe
              Imagebase:0x400000
              File size:1211760 bytes
              MD5 hash:1BF124CC783FF47A91ADA4E6D4AC9E6B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.832197103.0000000006825000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low

              No disassembly