Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SC_TR11670000.exe

Overview

General Information

Sample Name:SC_TR11670000.exe
Analysis ID:828467
MD5:778f9f61191bf812a829edfb93f5b442
SHA1:20f3e834b759252210d047091bc98c47e7e6ffdd
SHA256:47b5e835d443cde52de78c36998cf1e312d391501226238ea00968139790e32d
Tags:exe
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • SC_TR11670000.exe (PID: 4088 cmdline: C:\Users\user\Desktop\SC_TR11670000.exe MD5: 778F9F61191BF812A829EDFB93F5B442)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\Krugerite.FriJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000003.306590893.00000000032DF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
      00000000.00000002.829658896.00000000032D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
        00000000.00000002.829658896.0000000003DCA000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: SC_TR11670000.exe PID: 4088JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SC_TR11670000.exeReversingLabs: Detection: 51%
            Source: SC_TR11670000.exeVirustotal: Detection: 47%Perma Link
            Source: SC_TR11670000.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: SC_TR11670000.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIIRadeonHelper.pdb source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_0040626D FindFirstFileA,FindClose,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_004026FE FindFirstFileA,
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root.crl0G
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: SC_TR11670000.exe, SC_TR11670000.exe, 00000000.00000000.305857214.0000000000409000.00000008.00000001.01000000.00000003.sdmp, SC_TR11670000.exe, 00000000.00000002.829411350.0000000000409000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: SC_TR11670000.exe, 00000000.00000000.305857214.0000000000409000.00000008.00000001.01000000.00000003.sdmp, SC_TR11670000.exe, 00000000.00000002.829411350.0000000000409000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/rootr103
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_004051CF GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,
            Source: SC_TR11670000.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAEGISIIIRadeonHelper< vs SC_TR11670000.exe
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_00404A0E
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_004065F6
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_72EC1A9C
            Source: SC_TR11670000.exeStatic PE information: invalid certificate
            Source: C:\Users\user\Desktop\SC_TR11670000.exeProcess Stats: CPU usage > 98%
            Source: SC_TR11670000.exeReversingLabs: Detection: 51%
            Source: SC_TR11670000.exeVirustotal: Detection: 47%
            Source: C:\Users\user\Desktop\SC_TR11670000.exeFile read: C:\Users\user\Desktop\SC_TR11670000.exeJump to behavior
            Source: SC_TR11670000.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SC_TR11670000.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\Desktop\SC_TR11670000.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeFile created: C:\Users\user\AppData\Roaming\fumigatoriumJump to behavior
            Source: C:\Users\user\Desktop\SC_TR11670000.exeFile created: C:\Users\user\AppData\Local\Temp\nsy243E.tmpJump to behavior
            Source: C:\Users\user\Desktop\SC_TR11670000.exeFile written: C:\Users\user\AppData\Local\Temp\Kontos.iniJump to behavior
            Source: classification engineClassification label: mal76.troj.evad.winEXE@1/17@0/0
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_004020D1 CoCreateInstance,MultiByteToWideChar,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_0040449B GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
            Source: SC_TR11670000.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIIRadeonHelper.pdb source: SC_TR11670000.exe, 00000000.00000003.306725720.0000000002845000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: Process Memory Space: SC_TR11670000.exe PID: 4088, type: MEMORYSTR
            Source: Yara matchFile source: 00000000.00000002.829658896.0000000003DCA000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.306590893.00000000032DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.829658896.00000000032D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\Krugerite.Fri, type: DROPPED
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_72EC2F20 push eax; ret
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_72EC1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeFile created: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\AEGISIIIRadeonHelper.dllJump to dropped file
            Source: C:\Users\user\Desktop\SC_TR11670000.exeFile created: C:\Users\user\AppData\Local\Temp\nsu27C9.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\SC_TR11670000.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\SC_TR11670000.exeRDTSC instruction interceptor: First address: 00000000040C90AA second address: 00000000040C90AA instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F853CC808DAh 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\SC_TR11670000.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\AEGISIIIRadeonHelper.dllJump to dropped file
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_0040626D FindFirstFileA,FindClose,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_004026FE FindFirstFileA,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\SC_TR11670000.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_72EC1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
            Source: C:\Users\user\Desktop\SC_TR11670000.exeCode function: 0_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Native API
            Path Interception1
            Access Token Manipulation
            1
            Masquerading
            OS Credential Dumping1
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
            System Shutdown/Reboot
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Access Token Manipulation
            LSASS Memory3
            File and Directory Discovery
            Remote Desktop Protocol1
            Clipboard Data
            Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
            Obfuscated Files or Information
            Security Account Manager13
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SC_TR11670000.exe51%ReversingLabsWin32.Trojan.Krynis
            SC_TR11670000.exe48%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsu27C9.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsu27C9.tmp\System.dll1%VirustotalBrowse
            C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\AEGISIIIRadeonHelper.dll0%ReversingLabs
            C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\AEGISIIIRadeonHelper.dll0%VirustotalBrowse
            SourceDetectionScannerLabelLinkDownload
            0.2.SC_TR11670000.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
            0.0.SC_TR11670000.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://nsis.sf.net/NSIS_ErrorSC_TR11670000.exe, SC_TR11670000.exe, 00000000.00000000.305857214.0000000000409000.00000008.00000001.01000000.00000003.sdmp, SC_TR11670000.exe, 00000000.00000002.829411350.0000000000409000.00000004.00000001.01000000.00000003.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErrorErrorSC_TR11670000.exe, 00000000.00000000.305857214.0000000000409000.00000008.00000001.01000000.00000003.sdmp, SC_TR11670000.exe, 00000000.00000002.829411350.0000000000409000.00000004.00000001.01000000.00000003.sdmpfalse
                high
                No contacted IP infos
                Joe Sandbox Version:37.0.0 Beryl
                Analysis ID:828467
                Start date and time:2023-03-17 08:44:14 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 9m 52s
                Hypervisor based Inspection enabled:false
                Report type:light
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:4
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample file name:SC_TR11670000.exe
                Detection:MAL
                Classification:mal76.troj.evad.winEXE@1/17@0/0
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 63.2% (good quality ratio 61.9%)
                • Quality average: 88.9%
                • Quality standard deviation: 21.5%
                HCA Information:
                • Successful, ratio: 98%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240s for sample files taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                • Not all processes where analyzed, report is missing behavior information
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):54
                Entropy (8bit):4.838039816898156
                Encrypted:false
                SSDEEP:3:7KG/LmI/cXQQLQIfLBJXmgxv:OG/LmI/cXQQkIP2I
                MD5:FB5EE2C0CAC332EC8390F50016EF0769
                SHA1:11D9FB52FE5289140B9D52A38B56F99512B3A3A7
                SHA-256:C557AFE51AB22916E3423820A09D3805BF9DCDCECBEC4FE8DE2C67FB023BA631
                SHA-512:87CCEA7B203B8BFC4E21544FE4FE9693AF230E246C450E673410565791DFE8257E30354772FDCC114C7068D9295FDB491E9B52D1A3B490C0756E568B70B95C0A
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:[Bedrock]..Interthing=user32::EnumWindows(i r1 ,i 0)..
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):11776
                Entropy (8bit):5.832316471889005
                Encrypted:false
                SSDEEP:192:4PtkiQJr7jHYT87RfwXQ6YSYtOuVDi7IsFW14Ll8CO:H78TQIgGCDp14LGC
                MD5:B0C77267F13B2F87C084FD86EF51CCFC
                SHA1:F7543F9E9B4F04386DFBF33C38CBED1BF205AFB3
                SHA-256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
                SHA-512:F2B57A2EEA00F52A3C7080F4B5F2BB85A7A9B9F16D12DA8F8FF673824556C62A0F742B72BE0FD82A2612A4B6DBD7E0FDC27065212DA703C2F7E28D199696F66E
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                • Antivirus: Virustotal, Detection: 1%, Browse
                Reputation:moderate, very likely benign file
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....oZ...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:HTML document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1245
                Entropy (8bit):5.462849750105637
                Encrypted:false
                SSDEEP:24:hM0mIAvy4Wvsqs1Ra7JZRGNeHX+AYcvP2wk1RjdEF3qpMk5:lmIAq1UqsziJZ+eHX+AdP2TvpMk5
                MD5:5343C1A8B203C162A3BF3870D9F50FD4
                SHA1:04B5B886C20D88B57EEA6D8FF882624A4AC1E51D
                SHA-256:DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F
                SHA-512:E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>404 - File or directory not found.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="co
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):555
                Entropy (8bit):7.499536740374189
                Encrypted:false
                SSDEEP:12:6v/7anZhFxDEKwjAq0kaO/yvSL6T1pjNngLpzPanwmB9HE4JqSjF:5bDEPxdqKLmpqLdynw29kEqSZ
                MD5:BFF011148B773FA44B9A9BB029E8CC52
                SHA1:F2B838927E320D12649CEFDEA3AFE383C6650D7C
                SHA-256:B21DE7B432A7A67544D007ECC0FDD95F8E8C6129AF558A32102EE04C08635653
                SHA-512:A57C83AEE0E1F4C530D2F5B90589C31FD6E2FF8F62F998963284218FAC5EE164BCA7A619A9597DC3E2ECD0095A2CF04467E89EDF86700E1A90B3DF60B5121C9B
                Malicious:false
                Preview:.PNG........IHDR................a....IDATx......A....v...b.m.A..Q..Q..UD5.F.m.....fs{9.}...V.`....%.kt....R...+%7.}p..@.}:..u466`.6uu.tvv...N6....D"Q......po".;.4....W..g.b..\.~?...<.../.....$..5....................r.+..ah...F;.H.`b ....4.[...k.6.<..Kk.m[h..x`...R...z{.H.......Oax.e..{.........w._...c._>..6..T*HY.1! e.#....G......{.AB..l.K"..P(..j..$.R.}L.5.....@.>.......X...hE....L.."L.....=~..7n.2.,RJ.01.....B.AWW..<q......Ng.,../.Z...+...N].r.5.EB.p$..!,....,......SW.TD+U...K...ee._.N*.[..`..1q..v\#6..?;7..4..3....IEND.B`.
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):680
                Entropy (8bit):5.109191824773878
                Encrypted:false
                SSDEEP:12:t4CP5GEA9xI7jhz4AeW02KdTwWjhz4AeW02KdTPqkoop4p:t4CBGEAgF4AeW0/N4AeW0/Zqg4p
                MD5:379690952AAA576521D51249D404CBCD
                SHA1:61A8A95B0454422AA47379CF983B99FFDD839439
                SHA-256:EAD402FB0B85DB153356EC695016FD4F2C4031367D8ED6D1C1EF5FF4F28A8DE8
                SHA-512:35B6BC866C3D02A2486D3447C82405103DE89D46940F7FE44A7009E714BBA57FBE601EEC939C3206ADB06FB31C4FD1D3822A0ED52A346ACFDE5908643432F928
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g color="#000" fill="#474747"><path d="M13 5v2h1v5H4v2h12V5z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" font-weight="400" font-family="Sans" overflow="visible"/><path d="M0 2v9h12V2zm2 2h8v5H2z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" font-weight="400" font-family="Sans" overflow="visible"/><path d="M3 7c2.32 1 3.045-1.66 6 0v1H3z" style="marker:none" overflow="visible" opacity=".35"/></g></svg>
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):220
                Entropy (8bit):6.546211943247282
                Encrypted:false
                SSDEEP:6:6v/lhPysde0C1jngP3V95D2tOA/RDvhpLUxbVp:6v/7jC1zi3Sr/hW
                MD5:C84EE7522C124892455BB09DEBCF9340
                SHA1:AF87A2A5688346A3902762DD250328B7EF224620
                SHA-256:E0A3BD6FE1A1BAEFFE04BCA2980ADF755F888E31DCE3686B16C5DAC4202A38C8
                SHA-512:3BEED79366F15CD075781F677C0C9E84081D2189D1FB541A34AA25980B48701A3D93DC550E4ABEB550EFBE3167B1CAB8338E22F4603C6A71936876FBA75FAD58
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...=..P.../z.Q..Kx....l.b. )...x........t.......Y~.)......7......W.xk.'A...u.........%..!k.k5.|E=+X..,,a.S.H4p*D8.8(FH.a..5.x...%.....7..8s:.......IEND.B`.
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):144
                Entropy (8bit):5.708279548998072
                Encrypted:false
                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllAoSF1/LvgStjP9f9uvJYUo+/JHt//sup:6v/lhPysKo21/Lvlt7V9+YUouJH1/jp
                MD5:1ED278AD206D6EA33FF787DD326E0FC5
                SHA1:8CFF7AD12FC0E5545E71D05879A0245BEDAF4D46
                SHA-256:CC88E76F7C7D2E5B07E49D1F2AD88F8BAFC0542EB11CEB2B2FFF235C87AB4417
                SHA-512:7291085B6153C02EDBF679CDDB93B97DBB74943F216EB622CE9722E02613269F626F8A7A5BE8DA683153E9AEE22C40ED7264E8A0ED62A99F477E2B96642596BF
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d....GIDAT8.c`..0...O.Z&J]0.. ...&u]..5?......b....Q.E./.....t@..,....)1..,b...#.=....IEND.B`.
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):140
                Entropy (8bit):5.529383944212929
                Encrypted:false
                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllDM9vFW0p/sXm1MMos9DwlTYTbklt/sbp:6v/lhPysx8vFW0pkX4iZlTYTI3Ebp
                MD5:4308BBBAB1DB146494AE5ABB07B8E6DB
                SHA1:58121574EEB070E26DDD75A964F3548E176E58A4
                SHA-256:EFB732049C674EB25BFCB2FA0CBCC45D24190BF1479C054647F424B31E34C828
                SHA-512:41C9B37516F8D6AB7155F890EE36C26FE4161383A93BFBF696AB18292774C3556642E898361D21CECCBFEFFAF5814495CFAC2C74791E02F068B055BD3AD87DE4
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d....CIDAT8.c`.J..R..(...\.`..2.Y3...k.i......b..PN.....J.@6.l.`.Pd..A.....O...D....IEND.B`.
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):147
                Entropy (8bit):5.834297280344084
                Encrypted:false
                SSDEEP:3:yionv//thPl9vt3lAnsrtxBllPhF1MzoQxJrN7djpdXLImeR/mV2kg1p:6v/lhPysx1MzoQxlRZbCRaip
                MD5:38D787F55E22FB591135F9250CD259D4
                SHA1:0E135B0E1CA49A6E43DB4CB7596FAEA022E23924
                SHA-256:1ED839B015A67CAB9948469975411D982A96314CE82851EA2F9F6BB8D733A002
                SHA-512:4E21AB54B7110B4CD2EBC0E2CF6DF3F8C7C988495BCCA76949BC3C5EB669A793FCCDA5CB4DDB7B627A21734BD181FE44670757144CC2A007FCB695405F08EC2B
                Malicious:false
                Preview:.PNG........IHDR................a....sBIT....|.d....JIDAT8.c`..0b..O..&J]@5....tR.>........`.8.(6....-Z....a..&..3 ....4...<.............IEND.B`.
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                Category:dropped
                Size (bytes):34016
                Entropy (8bit):6.1021284380541925
                Encrypted:false
                SSDEEP:384:JP7a6wQdSCVWSdoEdXjYmxzfkfIwuWR7UPMEdxsTStsBdMQJK2wKucYkcuhV3:N7a6eiHdFdr7W5UPMgy+OBG2X90uhV3
                MD5:4FC7FC174E80C178225C2509027DF961
                SHA1:9FF62413EC0DD462F5F016EBC804F1D736D24796
                SHA-256:866B31DD39B97DEDAFD0FBD5672639EE91B47AD319C47816B4F6D01BFF93FF8C
                SHA-512:29261B9ABC4AF2F51C05B61A37721BC737B411530361A4B48A7BFFAB0F8263EA75BFD51B6E6E94E91E1D02DC442B534C3334B05FD8324E7CF307FA08179A1ED9
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                • Antivirus: Virustotal, Detection: 0%, Browse
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Z.oPZ.oPZ.oPS..PR.oP..nQX.oP..jQK.oP..kQR.oP..lQX.oP).nQY.oPZ.nPt.oP..fQY.oP..oQ[.oP..P[.oPZ..P[.oP..mQ[.oPRichZ.oP........PE..d....5;a.........." .....0...:.......................................................F....`..........................................\.......]..........H............f..........H....O..p...........................@P...............@..p............................text............0.................. ..`.rdata...#...@...$...4..............@..@.data...@....p.......X..............@....pdata...............Z..............@..@.rsrc...H............^..............@..@.reloc..H............d..............@..B................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:data
                Category:dropped
                Size (bytes):40788
                Entropy (8bit):4.589793625224697
                Encrypted:false
                SSDEEP:768:DUa4mGn6n+kvKNlpCMP7Llxd7kcrTZ7m3Rpck:QDm1+zHTrTZsP
                MD5:9B6AD96E03564D53EBE96EA4529819D3
                SHA1:74B86EC24C053C083CF85BC1B9B2A33E5C34FC81
                SHA-256:AE83602A47931BA1E9DD2A64C03A314AED410A4C5D100D6A724041C38213CEF2
                SHA-512:A913F2421FAD00A885C022380FE1CFF518D9368E439C355A0A90D6AE6548CFB4EDA1A9C35D19FD4CAA2062F9AA94D44BCBF78A6D43D3CC660B9C86235ACFD592
                Malicious:false
                Preview:......mmm.................99.EE......^......UU.......#................rr.........yy.....d........._...........}}}..../............ss.T..............U.......................>.CCC..........yyyy........``..c.c.........QQQ.......CC.444....X............Y.......?................--.....WW..V.....].......j...........s.ss....k.......................PPPP.sss.......~~..............-...D......................G.*...........--..............111.....5............ii.......J..................................MM..........9.h.X......V..F.............................OOOOO..............................v.........7....JJJJJJJJ..........CCC...__..@@..................Z......................zz......oooooo..LLL..............................................F.UU............................R../......-.t...^..........))..........BB......9......-...........--.NNN..l........<<<...........................................M.k..........nn...........M....8...JJJJ.yyyyy.......??......VV..........p...............N.C...........
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:data
                Category:dropped
                Size (bytes):291871
                Entropy (8bit):6.780687426184548
                Encrypted:false
                SSDEEP:3072:7YqIuagJ5wYGodW90uakeSjZJgDjhK+jtDTL+pQVrdYM8R4JvUHlFD4gELWSgoJI:uuPko0903YiZxV0QXwjD03LXgALpm
                MD5:2A43E2AF179CD9567C670A702490375F
                SHA1:55B83DDF870907571F22CA6951C6D335520D9B89
                SHA-256:2C3B071D869AC1DBD120A4F0628D1299016EE8C6338A7A3C1A25DB04E00A82A2
                SHA-512:E8EFA4DB3C5669E08C0DCF4E259B9AA04CA3C7977EE4409AF154A6299DC8E31A1C425892E70335274C99BE7B4CA57A1470849E9F8A917EA597EC07848296D299
                Malicious:true
                Yara Hits:
                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\Krugerite.Fri, Author: Joe Security
                Preview:..............>............. ...uu......F.KKK.'..........'''..............O.."............**...@....z.1......F...6..................................<.......E.....555....~~...w...........UU."".........]]....##..T...........M....22...........*....l...........PP.........z....j....................................$.t...........................H.........{.........FF..88........--.BBB.h......yyyy...qq.......................$..................QQQ.i.....)).....................www......888........!!.......................h.y.....]].........d.......K....R.......=.i............{{{{{{{......**......................pp...........K.:::......PPP...d......).....................mm.........................W....../.G.............R.....99999............G.`..U.........Y................rrr...3..........uu....... .lll.......-.............2.X....................<...WW..................?....#...............mmm.HHH...t..........!..iii....e....................."...;;.......}}........................````..........
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):16669
                Entropy (8bit):7.836876926418697
                Encrypted:false
                SSDEEP:384:dg1Ew+1FT+/6trrKWzge5jh2xmalhctpNy:W1E1c6tru1CUYa4tDy
                MD5:F80867A421C85C6E2865CF85FF7C4B02
                SHA1:C3EAB6B7E92646FE3407B2B3C5AFFE13A7873C48
                SHA-256:BCAA3B1333919176137D4DE4B1E3F31126159B12F959D7277BD8537B95139BD3
                SHA-512:06B51E660AEE86FC3BB068C6DEA046920E04F86B8EDD02E640EAC619F0F0D7E87E5CAE5BE1390CEBC5DFE70AA13BAB1710176E88C9D1C859182629D429745D78
                Malicious:false
                Preview:.PNG........IHDR...X...X......f......tEXtSoftware.Adobe ImageReadyq.e<..@.IDATx.....\.}..../...].{`.......D.\..u......#..V.eW.G>"W....V..d..IVU".:.D<$J.....{q/.....`0g./..z....A.`..?..p....M......._.'...L...]~.....;.........,..... ....X.....@`.. ..........@`...,..... ....X.....@`.. ..........@`...,..........X.....@`.. ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X......... ..........@`...,..........X...,..... ..........@`...,..........X...,..... ....~.....N...@...C{..o.?2.....x...?_....sC..O8...n..J.ttbv9...w~...ym..O.......vq"f..qrjt9... ..].S..Hz.gf}.,.Sm!...>..Xh..:S.};d.....2..?.......2...1..ep...K.{.?..@`.7=...7U..C......S...6....|a.}].._..d....,_.........+__..JS.....X.u...;..Q.x.z9...eP5f.H..nnz.&h...4.kz......&....o)..=..x.=...y ....6i...wL.....Y(.2NRP..J...HL/K#^izqpbUp}...q...g.......".....4R..#.VFrR|.LF>w~.Pm..\..4.5t{.-..
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):266
                Entropy (8bit):4.986245244009802
                Encrypted:false
                SSDEEP:6:tI9mc4slzc8SRIKMNo/aMhFl1OkUjq5eKVrGDVfqKlNK+:t4C8LKMuyMhPobjoprGDRlj
                MD5:8B727826F9D8C0C7C954EDE912CB0DEB
                SHA1:1518AA80747326B5353C22D32E57A33D61285119
                SHA-256:0783A7F518D3879C8F0F50B45FBD779A98652469E9B7C659CE41F14D1629D334
                SHA-512:0ABB243F9D1E0B6EDA0CB25D35C3449AB2B5B83078208F11B876A27FF11FF70B79F8BA97D4DA3AED21A8314C75FB2174D9378AF59B57DCB99DFF681D9AAB8561
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16">. <path d="M8 1a3 3 0 100 6 3 3 0 000-6zM6.5 8A4.49 4.49 0 002 12.5V14c0 1 1 1 1 1h10s1 0 1-1v-1.5A4.49 4.49 0 009.5 8z" style="marker:none" color="#bebebe" overflow="visible" fill="#2e3436"/>.</svg>.
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                Category:dropped
                Size (bytes):12193
                Entropy (8bit):4.4720152705808935
                Encrypted:false
                SSDEEP:192:i2PDEeaNB1PmcptkcDHxbTvPnc67bMxQxGx4ch/JuLQRcg/oN96bPNljYiYr197:ikDFKBFmcPLx3HPnIsqrJuqcgAN96b87
                MD5:3C21135144AC7452E7DB66F0214F9D68
                SHA1:B1EC0589D769EAB5E4E8F0F8C21B157EF5EBB47D
                SHA-256:D095879B8BBC67A1C9875C5E9896942BACF730BD76155C06105544408068C59E
                SHA-512:0446A0E2570A1F360FD8700FD4C869C7E2DBB9476BBDEC2526A53844074C79691542B91455343C50941B8A6D5E02A58EE6AA539CC4C4AE9CF000B4034EF663E2
                Malicious:false
                Preview:.;!@Lang2@!UTF-8!..; : Kirill Gulyakevitch..; 9.07 : 2011-03-15 : Drive DRKA..;..;..;..;..;..;..;..;..;..0..7-Zip..Belarusian..............401..OK................&.....&....&......................&............440..... ... &........ ... .&.......................&.......&.. ....... ......&......... ......... ........ ....... .......... ........?..500..&......&........&........&..........&.......&.........540..&................ &................... .&................&................&.........&......... ......&........... ......&............&..... ..........&.'...... .............&...........&................. ......Diff..&........ .
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):998
                Entropy (8bit):5.186938379246791
                Encrypted:false
                SSDEEP:24:t4CBGD0QNRWLLxo2em0yKbRAecFxV0/wXK:gDrc0NtAecFiH
                MD5:CB1EEE7BDB582B756D0F68EF02D6D96D
                SHA1:9E9B0F25BC472EF1C1C13EEAC12FD11C4CC0D2D9
                SHA-256:20EA767E852A8EBF2C5BA16D56CBAE10BD09D6CBA89B372A57EAA973AD3281B4
                SHA-512:E22FAEAE78D244A0F4E7215B31125D5AA4FD66C0720B0DE61D12084EAB879D7A9E231CCD5CD431417115B0945B450DC348DA400D67DB1898513B7BD6B9C274DB
                Malicious:false
                Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g color="#bebebe" fill="#474747"><path d="M3 9h10c.554 0 1 .446 1 1v3c0 .554-.446 1-1 1H3c-.554 0-1-.446-1-1v-3c0-.554.446-1 1-1z" style="marker:none" overflow="visible"/><path d="M7 0s-.709-.014-1.447.356C4.814.725 4 1.666 4 3v3h2V3c0-.667.186-.725.447-.855C6.71 2.014 7 2 7 2h2s.291.014.553.145c.261.13.447.188.447.855v8h2V3c0-1.333-.814-2.275-1.553-2.644C9.71-.014 9 0 9 0z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;shape-padding:0;isolation:auto;mix-blend-mode:normal;marker:none" font-weight="400" font-family="sans-serif" overflow="visible"/><path d="M2 12h12v4H2z" style="marker:none" overflow="visible"/></g></svg>
                Process:C:\Users\user\Desktop\SC_TR11670000.exe
                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                Category:dropped
                Size (bytes):9515
                Entropy (8bit):5.04214621707661
                Encrypted:false
                SSDEEP:192:icoGT04mzNN8hYivh5gtE/PkjY09fdNQuQ:ibGg4mzNhi4tEHoDfHQuQ
                MD5:7B02E1AE16E2E709D7C97DE560B4DBE9
                SHA1:191A54644417F7D36F5CB4182DCDB3737D74BE51
                SHA-256:DA0B58F52BBC131F967942D1D8E9DE1B5721AE864BC21852A0AD4062332297CB
                SHA-512:4F689F854DB3F766B5E53CE2F19E9F8293C075EE3F9B18098EB05B352F2EC95DF85E49A78540781EB531BCE60C7B1F7890F1FE3C65200DEC3CB908E90FB827A1
                Malicious:false
                Preview:.;!@Lang2@!UTF-8!..; : Francisco Jr..; 4.37 : Fabricio Biazzotto ..; 18.05 : Atualizado por Felipe..;..;..;..;..;..;..;..;..0..7-Zip..Portuguese Brazilian..Portugu.s Brasileiro..401..OK..Cancelar........&Sim..&N.o..&Fechar..Ajuda....&Continuar..440..Sim pra &Todos..N.o pra T&odos..Parar..Reiniciar..&Em 2. plano..&Em 1. plano..&Pausar..Pausado..Voc. tem certeza que voc. quer cancelar?..500..&Arquivo..&Editar..&Visualizar..F&avoritos..&Ferramentas..&Ajuda..540..&Abrir..Abrir &por Dentro..Abrir p&or Fora..&Visualizar..&Editar..Re&nomear..&Copiar Para.....&Mover Para.....&Apagar..&Dividir arquivo.....Com&binar arquivos.....P&ropriedades..Comen&t.rio..Calcular checksum..Diff..Criar Pasta..Criar Arquivo..S&air..Link..&Correntes Alternantes..600..Selecionar &Tudo..Desmarcar Tudo..&Inverter Sele..o..Selecionar.....Desmarcar.....Selecionar por Tipo..Desfazer sele..o por Tipo..700...co&nes Grandes...c&ones Pequenos..&Lista..&Detalhes..730..Desorganizado..Visualiza..o
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.55806590652357
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:SC_TR11670000.exe
                File size:329416
                MD5:778f9f61191bf812a829edfb93f5b442
                SHA1:20f3e834b759252210d047091bc98c47e7e6ffdd
                SHA256:47b5e835d443cde52de78c36998cf1e312d391501226238ea00968139790e32d
                SHA512:77e917288d88cbb90bc7e67f423546d766571d926ab3b0f9b0749735b3d4ef48020fc66a861bc15afc131ec8afca55504a2aeb2c604bd1c36b1591e8e0c4242d
                SSDEEP:6144:VDkBNYb/zy86tyPhzKpqs1z3WRA8ZbO7Sv4Zbf9CbTqGErmroIbvF:O3gUtuzaq+zwjZbrc4Tqxrmrh9
                TLSH:A064F1253AB1C033FD954170CAA5D6F3E229FE48C924C18777A43F6EB9315848549EBB
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...+.oZ.................`.........
                Icon Hash:08c2b0d8cc64b046
                Entrypoint:0x4031d6
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x5A6FED2B [Tue Jan 30 03:57:31 2018 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                Signature Valid:false
                Signature Issuer:E=Forureningsraads@Selvbebrejdelser.Bve, OU="nucal bisserups Nigher ", O=Admirer, L=Eastabuchie, S=Mississippi, C=US
                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                Error Number:-2146762487
                Not Before, Not After
                • 7/7/2022 8:08:29 PM 7/6/2025 8:08:29 PM
                Subject Chain
                • E=Forureningsraads@Selvbebrejdelser.Bve, OU="nucal bisserups Nigher ", O=Admirer, L=Eastabuchie, S=Mississippi, C=US
                Version:3
                Thumbprint MD5:F6FF0FF5CCC259F19FAA81DDC8079502
                Thumbprint SHA-1:AC5B272F037D232BD3181F065A062D0D45E91C45
                Thumbprint SHA-256:9D58D97305576E4D1E04A49E8F14AADA686A7693DCBEF30297267F3B724593AD
                Serial:421F24E2B8A1818548F8C8D7DBE6D51C18A183FA
                Instruction
                sub esp, 00000184h
                push ebx
                push esi
                push edi
                xor ebx, ebx
                push 00008001h
                mov dword ptr [esp+18h], ebx
                mov dword ptr [esp+10h], 00409198h
                mov dword ptr [esp+20h], ebx
                mov byte ptr [esp+14h], 00000020h
                call dword ptr [004070A0h]
                call dword ptr [0040709Ch]
                and eax, BFFFFFFFh
                cmp ax, 00000006h
                mov dword ptr [0042370Ch], eax
                je 00007F853CCB89E3h
                push ebx
                call 00007F853CCBBABAh
                cmp eax, ebx
                je 00007F853CCB89D9h
                push 00000C00h
                call eax
                mov esi, 00407298h
                push esi
                call 00007F853CCBBA36h
                push esi
                call dword ptr [00407098h]
                lea esi, dword ptr [esi+eax+01h]
                cmp byte ptr [esi], bl
                jne 00007F853CCB89BDh
                push 0000000Ah
                call 00007F853CCBBA8Eh
                push 00000008h
                call 00007F853CCBBA87h
                push 00000006h
                mov dword ptr [00423704h], eax
                call 00007F853CCBBA7Bh
                cmp eax, ebx
                je 00007F853CCB89E1h
                push 0000001Eh
                call eax
                test eax, eax
                je 00007F853CCB89D9h
                or byte ptr [0042370Fh], 00000040h
                push ebp
                call dword ptr [00407044h]
                push ebx
                call dword ptr [00407288h]
                mov dword ptr [004237D8h], eax
                push ebx
                lea eax, dword ptr [esp+38h]
                push 00000160h
                push eax
                push ebx
                push 0041ECC8h
                call dword ptr [00407178h]
                push 00409188h
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x360000xa3c0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x4fcb80xa10
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x5f0d0x6000False0.6649169921875data6.450520423955375IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x70000x12480x1400False0.4275390625data5.007650149182371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x90000x1a8180x400False0.6376953125data5.129587811765307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .ndata0x240000x120000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x360000xa3c00xa400False0.0760766006097561data1.8822021165260459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_BITMAP0x362680x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
                RT_ICON0x365d00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 0EnglishUnited States
                RT_DIALOG0x3fa780x144dataEnglishUnited States
                RT_DIALOG0x3fbc00x13cdataEnglishUnited States
                RT_DIALOG0x3fd000x120dataEnglishUnited States
                RT_DIALOG0x3fe200x11cdataEnglishUnited States
                RT_DIALOG0x3ff400xc4dataEnglishUnited States
                RT_DIALOG0x400080x60dataEnglishUnited States
                RT_GROUP_ICON0x400680x14dataEnglishUnited States
                RT_MANIFEST0x400800x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
                DLLImport
                KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.
                No statistics
                Target ID:0
                Start time:08:45:12
                Start date:17/03/2023
                Path:C:\Users\user\Desktop\SC_TR11670000.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\SC_TR11670000.exe
                Imagebase:0x400000
                File size:329416 bytes
                MD5 hash:778F9F61191BF812A829EDFB93F5B442
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000000.00000003.306590893.00000000032DF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000000.00000002.829658896.00000000032D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.829658896.0000000003DCA000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                No disassembly