Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rFACTURA_FAC_2023_1-1000733.PDF.exe

Overview

General Information

Sample Name:rFACTURA_FAC_2023_1-1000733.PDF.exe
Analysis ID:830399
MD5:a6ef5ed777ba7369c2bb28e46b198ba6
SHA1:f707bc0343f41d95f57e776a9f85f6a2c5791aa7
SHA256:878d710875b07ec61bef0b198ba67bf81ad0730a3a483d5762cd18e13fb4b525
Tags:exe
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Initial sample is a PE file and has a suspicious name
Tries to detect virtualization through RDTSC time measurements
Uses an obfuscated file name to hide its real file extension (double extension)
Uses 32bit PE files
PE file does not import any functions
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Binary contains a suspicious time stamp
Detected potential crypto function
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\Talestrmmene.UnrJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.782485165.0000000004480000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
      00000000.00000002.782485165.00000000059F0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeVirustotal: Detection: 20%Perma Link
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\SpisekamrenesJump to behavior
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb source: System.Reflection.Primitives.dll.0.dr
        Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb8+N+ @+_CorDllMainmscoree.dll source: System.Reflection.Primitives.dll.0.dr
        Source: Binary string: System.Reflection.TypeExtensions.ni.pdb source: System.Reflection.TypeExtensions.dll.0.dr
        Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.TypeExtensions\net6.0-Release\System.Reflection.TypeExtensions.pdb source: System.Reflection.TypeExtensions.dll.0.dr
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00402862 FindFirstFileW,
        Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
        Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#
        Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Attribution
        Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#DerivativeWorks
        Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Distribution
        Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Notice
        Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Reproduction
        Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#ShareAlike
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://subca.ocsp-certum.com01
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://subca.ocsp-certum.com02
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://subca.ocsp-certum.com05
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://www.certum.pl/CPS0
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.780766390.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.Primitives.dll.0.dr, System.Reflection.TypeExtensions.dll.0.drString found in binary or memory: https://github.com/dotnet/runtime
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.780766390.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.TypeExtensions.dll.0.drString found in binary or memory: https://github.com/dotnet/runtimeBSJB
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00405402 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

        System Summary

        barindex
        Source: initial sampleStatic PE information: Filename: rFACTURA_FAC_2023_1-1000733.PDF.exe
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: System.Reflection.TypeExtensions.dll.0.drStatic PE information: No import functions for PE file found
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00404C3F
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: invalid certificate
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeProcess Stats: CPU usage > 98%
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeVirustotal: Detection: 20%
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile read: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeJump to behavior
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nsk1412.tmpJump to behavior
        Source: classification engineClassification label: mal76.troj.evad.winEXE@1/14@0/0
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_004020FE CoCreateInstance,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_004046C3 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\SpisekamrenesJump to behavior
        Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb source: System.Reflection.Primitives.dll.0.dr
        Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb8+N+ @+_CorDllMainmscoree.dll source: System.Reflection.Primitives.dll.0.dr
        Source: Binary string: System.Reflection.TypeExtensions.ni.pdb source: System.Reflection.TypeExtensions.dll.0.dr
        Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.TypeExtensions\net6.0-Release\System.Reflection.TypeExtensions.pdb source: System.Reflection.TypeExtensions.dll.0.dr

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000000.00000002.782485165.00000000059F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.782485165.0000000004480000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\Talestrmmene.Unr, type: DROPPED
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_10002DE0 push eax; ret
        Source: System.Reflection.Primitives.dll.0.drStatic PE information: 0xE40AD0DE [Wed Mar 28 09:54:38 2091 UTC]
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nsa150D.tmp\AdvSplash.dllJump to dropped file
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nsa150D.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\System.Reflection.Primitives.dllJump to dropped file
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\System.Reflection.TypeExtensions.dllJump to dropped file

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: Possible double extension: pdf.exeStatic PE information: rFACTURA_FAC_2023_1-1000733.PDF.exe
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeRDTSC instruction interceptor: First address: 0000000005A18320 second address: 0000000005A18320 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0590DA5646h 0x00000004 test eax, 32D96DD9h 0x00000009 cmp ebx, ecx 0x0000000b jc 00007F0590DA55ACh 0x0000000d clc 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 test cl, dl 0x00000012 rdtsc
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\System.Reflection.Primitives.dllJump to dropped file
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\System.Reflection.TypeExtensions.dllJump to dropped file
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00402862 FindFirstFileW,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeAPI call chain: ExitProcess graph end node
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
        Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Native API
        1
        Windows Service
        1
        Access Token Manipulation
        1
        Masquerading
        OS Credential Dumping1
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
        System Shutdown/Reboot
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Windows Service
        1
        Access Token Manipulation
        LSASS Memory2
        File and Directory Discovery
        Remote Desktop Protocol1
        Clipboard Data
        Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
        Obfuscated Files or Information
        Security Account Manager13
        System Information Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
        Timestomp
        NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        rFACTURA_FAC_2023_1-1000733.PDF.exe20%VirustotalBrowse
        rFACTURA_FAC_2023_1-1000733.PDF.exe5%ReversingLabsWin32.Trojan.Generic
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\System.Reflection.TypeExtensions.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\System.Reflection.Primitives.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsa150D.tmp\AdvSplash.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsa150D.tmp\System.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://subca.ocsp-certum.com050%URL Reputationsafe
        http://subca.ocsp-certum.com020%URL Reputationsafe
        http://subca.ocsp-certum.com010%URL Reputationsafe
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://creativecommons.org/ns#DerivativeWorksbattery-level-90-charging-symbolic.svg.0.drfalse
          high
          http://crl.certum.pl/ctsca2021.crl0orFACTURA_FAC_2023_1-1000733.PDF.exefalse
            high
            http://creativecommons.org/licenses/by-sa/4.0/battery-level-90-charging-symbolic.svg.0.drfalse
              high
              http://creativecommons.org/ns#Distributionbattery-level-90-charging-symbolic.svg.0.drfalse
                high
                http://repository.certum.pl/ctnca.cer09rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                  high
                  http://repository.certum.pl/ctsca2021.cer0rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                    high
                    http://crl.certum.pl/ctnca.crl0krFACTURA_FAC_2023_1-1000733.PDF.exefalse
                      high
                      http://subca.ocsp-certum.com05rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                      • URL Reputation: safe
                      unknown
                      http://creativecommons.org/ns#Attributionbattery-level-90-charging-symbolic.svg.0.drfalse
                        high
                        http://subca.ocsp-certum.com02rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                        • URL Reputation: safe
                        unknown
                        http://subca.ocsp-certum.com01rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                        • URL Reputation: safe
                        unknown
                        http://crl.certum.pl/ctnca2.crl0lrFACTURA_FAC_2023_1-1000733.PDF.exefalse
                          high
                          http://repository.certum.pl/ctnca2.cer09rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                            high
                            http://creativecommons.org/ns#ShareAlikebattery-level-90-charging-symbolic.svg.0.drfalse
                              high
                              https://github.com/dotnet/runtimeBSJBrFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.780766390.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.TypeExtensions.dll.0.drfalse
                                high
                                http://nsis.sf.net/NSIS_ErrorErrorrFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                  high
                                  http://creativecommons.org/ns#Noticebattery-level-90-charging-symbolic.svg.0.drfalse
                                    high
                                    http://creativecommons.org/ns#Reproductionbattery-level-90-charging-symbolic.svg.0.drfalse
                                      high
                                      http://www.certum.pl/CPS0rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                        high
                                        http://creativecommons.org/ns#battery-level-90-charging-symbolic.svg.0.drfalse
                                          high
                                          https://github.com/dotnet/runtimerFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.780766390.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.Primitives.dll.0.dr, System.Reflection.TypeExtensions.dll.0.drfalse
                                            high
                                            No contacted IP infos
                                            Joe Sandbox Version:37.0.0 Beryl
                                            Analysis ID:830399
                                            Start date and time:2023-03-20 10:47:06 +01:00
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 9m 37s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:15
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample file name:rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            Detection:MAL
                                            Classification:mal76.troj.evad.winEXE@1/14@0/0
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HDC Information:
                                            • Successful, ratio: 62.6% (good quality ratio 61%)
                                            • Quality average: 88.1%
                                            • Quality standard deviation: 22.1%
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240s for sample files taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                            No simulations
                                            No context
                                            No context
                                            No context
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:ASCII text, with very long lines (22842), with no line terminators
                                            Category:dropped
                                            Size (bytes):22842
                                            Entropy (8bit):2.691165226704503
                                            Encrypted:false
                                            SSDEEP:384:WHfXmxNkvIy6aQ+y57fZOKip2EuiP7Ecw8b:WHfWxNkvIy6axy57fAK82EuiP7Ecw8b
                                            MD5:27DC252D9E7B26BA6BF2C6D437997658
                                            SHA1:F81398F1F6FC24692BA8DF740CA2BF2AB73B27D6
                                            SHA-256:530F4F75B62CB7E1B585671E4F184AC9C667FC4335CDA4120D27136E6F4F0100
                                            SHA-512:473F5FED1BA3F62088A6ABE0D383EE9220DAABCB8524EFE8AC502B7503F4ACBA3DDAC69BBF1E046B5235C51129F2BF55F54C1D75285D7C5EE824C6DCA88D323D
                                            Malicious:false
                                            Reputation:low
                                            Preview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
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):32368
                                            Entropy (8bit):6.393948275188786
                                            Encrypted:false
                                            SSDEEP:384:yWweWqlXnYcLpSfX0lawccfNXLWrdzy+A2jc2EPLNtAf/uPHRN7AJ/AlGseC62c:EqlXYcgEAwcc17Wc+bj+PLHuMU/xjx2c
                                            MD5:F2A123183E106BB1CF19376A8079D171
                                            SHA1:2B96296BE92D5F2EF7C59A70858AF4CAABC99A9D
                                            SHA-256:896D4ED138C35ECF19AE432380096562872EAB103F7E352C15D214FD875B337A
                                            SHA-512:FCA6A89EFB16780A06CD25A55638882970F03E1535180A0E463AF9794184B04EB345CF29B12D4F261094E04A584E9225A7AD36A62631227451059F64A77B3C67
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Reputation:moderate, very likely benign file
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....[............" .....P................................................................`...@......@............... ......................................<........Z..p$...p..........T...............................................................H............text....N.......P.................. ..`.data........`.......R..............@....reloc.......p.......X..............@..B............................................0.............................4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...................y.........?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...Z.!...C.o.m.m.e.n.t.s...S.y.s.t.e.m...R.e.f.l.e.c.t.i.o.n...T.y.p.e.E.x.t.e.n.s.i.o.n.s.....L.....C.o.m.p.a.n.y.N.a.m.e.....M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n...j.!...F.i.l.e.D.e.s.c.r.i.p.
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):14952
                                            Entropy (8bit):6.599053939997928
                                            Encrypted:false
                                            SSDEEP:192:mrlnC6xxk2R5Ws+Wql73WOL8/pCuPHnhWgN7aoWTF6lI+XqnajlkEv:6nbW2R5Ws+Wql7//uPHRN7SIImlqW
                                            MD5:EDA04E04EBC0EBF7F8BBF30C4DAE6DE3
                                            SHA1:7BC4D50E6EEC7F04A9272BFEE4E4DB6F278DBE63
                                            SHA-256:F3E55CB3ADFA93F563B09114D93062E680AB0864C220491458FBE151798B862F
                                            SHA-512:7027DA3404675596B71394B660E600DA12C0750895F624776362167869760555EE9990699FFC9E4407301FC9437B2F638E2734B8BDEF3C7054990FD5A9C86550
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."!..0.............^+... ........@.. ....................................`..................................+..K....@..................h$...`......T*..8............................................ ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@+......H........ ......................P ......................................H>.s..X.\...3V...?G../..3q..l.L.....qKy6b..u"HO...JmYQ.....J..,.*S..".R..=1RY.....\?.&dM........@'J.j.:.'.A.../..........I.BSJB............v4.0.30319......`.......#~..........#Strings............#GUID...........#Blob......................3......................................3.........@...........Y...................`.................g...?.g.....g...y.g.....g.....g.....g...`.g...m.g.................
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):224632
                                            Entropy (8bit):7.3469254146259635
                                            Encrypted:false
                                            SSDEEP:3072:WQyWMNv4aM4IqtUHXAxcNxBrQeb8hlosuRUVGiyKrFyPlWUUVkUiXPQW/NhrsPPR:IWEbtUAixGhlo2I+hyEUJXVFm0XQ
                                            MD5:D2BE5DE19D44424CCB3F89510938FB53
                                            SHA1:B98E5FD30E1DE7437187787AFE48AD516223E01F
                                            SHA-256:0796783FC019D2AD4F01FF7AF14C24A9D3CFBAAB2BB9B44945231A46B6774D2B
                                            SHA-512:6E54E8C97F5A10921DAD011AAD9FBBA1D4D622CF78F4C977A366EF6C7C49B35552A6100BFAFCC4464B34B351CC200AD9EE12406DDE37FC96C2614BD24A5D0553
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\Talestrmmene.Unr, Author: Joe Security
                                            Preview:...>........).......OOOO...............###.GG......BB..........T.......#....=...........{{.......++..........V........)._.@...............@@@@...```........*........................................................+..........f.........................7.......9......"..iii....?..88.F..........................P......).........Z...............$.....,......BBB...{{.UU....Q...........@@........''''''.....ttt..................qq........vv..............,............................?..00....W.BB...r.....55........8.9...--......{{.........E.......qqqqq..___.....H.....tt...........0.......WW.............X.55..y........................mm.....................~.D.....(.@@....{{{{{{{{...............oo........SSS..V...]]....33333....7..>.d.????......@@......j.8.TTTT..9......BB.........C..........II...)...........@@.....@@@..&&................z.......ppp.............4.z..........|........++...\\\...."....................).........v.......................2.l.hh..............l................9.......hhhh
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:SVG Scalable Vector Graphics image
                                            Category:dropped
                                            Size (bytes):6689
                                            Entropy (8bit):5.135211840989561
                                            Encrypted:false
                                            SSDEEP:192:VkjcMIy2+X2I2F2C2G2fH7y8cQaVB2nnuy1FQOcQaVv2q22L2k2s:mjcM7u8xaV8nnL1FQOxaVu6
                                            MD5:C96D0DD361AFC6B812BDDD390B765A26
                                            SHA1:71081F096719CAA70B9BAEF86FE642635D8E2765
                                            SHA-256:6690799E5FA3FB0DD6CCE4BAC5AA1607C8A6BB16507854A87520C7DE53052E1B
                                            SHA-512:7C73BC880A9401C64AB0571957B414180C1B94137C7BC870BA602979E7A990640A37991CB87A40BC7E5942A37FDA25EFC58C759C00F4344BA3D88B9AA64182DA
                                            Malicious:false
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>.<svg. xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:cc="http://creativecommons.org/ns#". xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#". xmlns:svg="http://www.w3.org/2000/svg". xmlns="http://www.w3.org/2000/svg". width="16". version="1.1". style="enable-background:new". id="svg7384". height="16.000036">. <metadata. id="metadata90">. <rdf:RDF>. <cc:Work. rdf:about="">. <dc:format>image/svg+xml</dc:format>. <dc:type. rdf:resource="http://purl.org/dc/dcmitype/StillImage" />. <dc:title>Gnome Symbolic Icons</dc:title>. <cc:license. rdf:resource="http://creativecommons.org/licenses/by-sa/4.0/" />. </cc:Work>. <cc:License. rdf:about="http://creativecommons.org/licenses/by-sa/4.0/">. <cc:permits. rdf:resource="http://creativecommons.org/ns#Reproduction" />. <cc:permits. rdf:resource="htt
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                            Category:dropped
                                            Size (bytes):227
                                            Entropy (8bit):6.604776901672149
                                            Encrypted:false
                                            SSDEEP:6:6v/lhPysE9Xj1F/bkqdXujFErL4MImATQZu22F+p:6v/7kR7/bjd8Kgm2Q/2y
                                            MD5:7843C38CC42C6786B3373F166AF10172
                                            SHA1:BA0163109D9B641B1312230B3F62E1E10A61AA5E
                                            SHA-256:E3AF1293F8E8AB5C81300196AF55A7C15D5608291D46A2B86D4255910A7D0E59
                                            SHA-512:B1D3DF6A0A8CACD729CD9A2FD5AB0F74ED611270FA172CDBEB13D46FA71DD5CC5540A2FBFDB6C3004E652D317C8FAD4EC3AE437DF1C082B629870A33CC6BD34F
                                            Malicious:false
                                            Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...1..P......#.bae....^.^K/fek+........X...........gfw....\.D/..b...a.4..$........H#....o8...}..6.K.....Xc.$ ..'.1.2..vu.../O..>V......CD....<....w........IEND.B`.
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:SVG Scalable Vector Graphics image
                                            Category:dropped
                                            Size (bytes):1329
                                            Entropy (8bit):4.950241534342892
                                            Encrypted:false
                                            SSDEEP:24:t4Cp/YHyKbRAecFxVrGDT/Gfd8hTdyKbRAecFxVrGDT/bNxNxZrGQ:9YHNtAecFmDT/s8hdNtAecFmDT/j3YQ
                                            MD5:021A9F00A28C9D496E490AE951E8EF12
                                            SHA1:F8A6392065D07BAC72E138B0E47A24FFDCCEE74B
                                            SHA-256:B420561770B77FCB47F69B6198B34B11155535F8A2E907BC4A0998CE74AFD340
                                            SHA-512:7F4F2D904EA968BF68E35E0D7F1EAE9718234757D1989879996BFB49D9C447F67544CB0E1C441FD6539D58B5F2C6ACA7E9E0208738C235D9AF0C093511760212
                                            Malicious:false
                                            Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M1.018 7v2H14V7z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;shape-padding:0;isolation:auto;mix-blend-mode:normal;marker:none" color="#bebebe" font-weight="400" font-family="sans-serif" overflow="visible"/><path d="M11.99 4.99a1 1 0 00-.697 1.717L12.586 8l-1.293 1.293a1 1 0 101.414 1.414L15.414 8l-2.707-2.707a1 1 0 00-.717-.303z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decorati
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:SVG Scalable Vector Graphics image
                                            Category:dropped
                                            Size (bytes):1155
                                            Entropy (8bit):5.154592341044034
                                            Encrypted:false
                                            SSDEEP:24:t4CpQyhEXQDWu4AeWrGMyRQJaPahrGDfJcghSvOqlIQX6e4AeWrGMyp:vhjDWu4Ae3M5wSgDDontqe4Ae3MO
                                            MD5:EFB3C780BC44B346B50B1F0DC6CF6D0F
                                            SHA1:472B0EDD1C4C3092BC7C4DF934ABE126885B1780
                                            SHA-256:990859D3B2C830E23EC276BF1D38A38EE1BA3D89BF04CB138107E4CDE31167B5
                                            SHA-512:5B9C96F146C6A065C89172D02BDE8020876DC9C78859AD2B8B9529C615215F88BA85C2789544F5C5A247C148BB52FE4B5FCA325E7EAC4826D31A0365A0B8BCBE
                                            Malicious:false
                                            Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M5 7c-.31 0-.615.09-.812.281L.594 11l3.656 3.719c.198.19.44.281.75.281h1v-1c0-.257-.13-.529-.312-.719L4.406 12H9s1 0 1-1c0 0 0-1-1-1H4.375l1.219-1.281C5.776 8.529 6 8.257 6 8V7z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" color="#000" font-weight="400" font-family="Sans" overflow="visible" opacity=".35"/><path d="M11 11h1.375l1.125 1.094L14.594 11H16v1.469l-1.094 1.062L16 14.594V16h-1.438L13.5 14.937 12.437 16H11v-1.406l1.063-1.063L11 12.47z" style="marker:none" color="#bebebe" overflow="visible"/><path d="M11 9c.31 0 .615-.09.813-.281L15.406 5 11.75 1.281C11.552 1.091 11.31 1 11 1h-1v1c0 .257.13.529.313.719L11.593 4H7c-.528-.007-1 .472-1 1s.472 1.007 1 1h4.625l-1.219 1.281c-.182.19-.406.462-.406.719v1z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:star
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                            Category:dropped
                                            Size (bytes):891
                                            Entropy (8bit):7.745720384539504
                                            Encrypted:false
                                            SSDEEP:24:d4qWCHdkXfUZEcO5MkIi416cOQSkye9V+:d4qnHd8MkIi4Dpb6
                                            MD5:5AF147D26AD399F83825377F04FD56A1
                                            SHA1:B378A498B0DB8114C794E21D533E80CEBE5DDE04
                                            SHA-256:6147A091847FCC9D9EDB22E655C4FC9DE6632C76D4252350400FA286F9791109
                                            SHA-512:EEC16DE49A4698FE4F03F841FBCF045FBBDC9D634EB73ED35DB544B6DB4BC0135CD8E1DF102FD1E8BDE9FC75380948B4C0459685EE2C21858D645B7973759EA6
                                            Malicious:false
                                            Preview:.PNG........IHDR................a...BIDATx.m.S.%9...$U.Fkl.y].m.6.m.F..5*g;k}.........P......~u................M......M.q......|OM>....:?>.X7.U..j.v..?...e....>.Jk.&.{.[=......t.d.....4.D...V....b..s.L.....Jg,..=V..@.n......Rqv...._....B.h.;l....A....r.ap....N...1./.O.2.u7#..../.....o..*..O...[..X,<. .....@v........t...H..Rf..C?q..8.HB.!{K..N.....t..5..1d.+......).......pL.5.R..=....jC"....t6.BA.)....xZ..d..^W~yU...ya......U/...VA.r.....r.U....[".D.).8..iO<..[.....t.e9S...K8!....K..&p..Y2l.....".P8:..v..0....zd..''....O?+^.. =..b....t..K../.......?.?5...c.[.f.nP.P.o....7..k..t.?P(..O>.H~...n..jh.'..]..SC.5M.....'.}.n..'...t..9..c*...Ki...t..1z..N.q...w.w..y..W...K7x.^..p....j...%..3.|.....x...G.|~..a.o.N.<.......wK...]..u..........`...(z.B!.?q.b..u..$(.#1..N...b.u...@h...|.w..g....}i....?~......1~...l..]h......IEND.B`.
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                            Category:dropped
                                            Size (bytes):225
                                            Entropy (8bit):6.596645802250635
                                            Encrypted:false
                                            SSDEEP:6:6v/lhPysi5NuhsPwRngRfPq/3+phjSfVsup:6v/7thstJACSNsc
                                            MD5:F894266AB6A933B2FDA751E6490C319A
                                            SHA1:2D2D3635198FEEFCB64D1D6B3CDCCDC4EA3DF4B0
                                            SHA-256:95F533585B4C61936C369557B3B7E397E56545A4C9DB9A5BDDD0E9ABB7A7F7E7
                                            SHA-512:977ED04753C3CB2B883D03A2A55001F6FCC8617DC3060B6C25AB7E5C691C3F76049E7DEADC7F6567AB7E8DC8492DE2874E8E632CF3EAD7B39ABC8CC98D331442
                                            Malicious:false
                                            Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8..1..@.E...".u.`..#.v.,r.[..1$..]B.@6.,,.e.....fwg...._)9........y..[n...t.$g..:...P....@k.q......W.. .PY.$z..x....t..(-~!.0$:P.t......`.......Ba..Y.....IEND.B`.
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                            Category:dropped
                                            Size (bytes):263
                                            Entropy (8bit):6.731374842054556
                                            Encrypted:false
                                            SSDEEP:6:6v/lhPysw9TXm0RZC/8xhbPgfdSwj4vw29OjuAO4+ZvYNVp:6v/7QVXm0a/8xhbPgfdSBvNYn2ZvYd
                                            MD5:003B524806C1CA654CAC6ED2EB883E1B
                                            SHA1:F6F6ACA125DC4DB3B33378404017B5EE7D21D334
                                            SHA-256:2899E53769FA741E2C0675A2C69D2C246A8F34601BEE58DD66B16261005962A9
                                            SHA-512:AA905997F9CE39F039E33C4CCA167C0137775D91B4929D918528BA00B92737C448EC46D91A4221644CCC00D1FCAA403AFF83F07276BAB6FD80D4B9E88E652F87
                                            Malicious:false
                                            Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...K..1.D......g.e=.x......[]....Y$J'..`.@.S)R.4.q.D.K....x..%..0>~.;}..^.X....Lt.f!..K.....D.&,.7,..BM..t@..}N..o.?.....Hv.J...(..r.. ..)L....&..dT<..1y...X..X...............q...p..p.....IEND.B`.
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                            Category:dropped
                                            Size (bytes):337
                                            Entropy (8bit):7.143668471552015
                                            Encrypted:false
                                            SSDEEP:6:6v/lhPWFmX9Ckymx8BZhCjO5QO6MsHqd+K/eBDQeU2oG9xqgjp:6v/7K0omx8yOqVtHH1U2oGR
                                            MD5:7FBFE5B0A7AD2A67AACFD8481F8DCA01
                                            SHA1:21BABB6B7EC4746835DB43DC6A69A4AF0EFECA2D
                                            SHA-256:0B4CD789E087F712F131FACCD754DC461774498DF3CA19B346D461D18A0AE622
                                            SHA-512:3A8F0D9653301F789A0588E848C40FFC92394461BF70A3421ABC85647F2C115948134FE9E161D055A11D200536356A15677D9C0E645346D27E122001F67FE22B
                                            Malicious:false
                                            Preview:.PNG........IHDR................a....IDATx..S.r.P..=7.cw.....W.m...=......V....I...K.?#@D.0G......R.rF..^$....p..b..f.<.T.z......... +..3#.v.K...$....pT.j.....[.......r..p....O.2.Y.T.,......==...9{/...T./....Qa...3%....5...xmkI.7.1..P,g.%y..J..#^.e..I(.%jzI..#../..49...*..?#..I. =~..E.,MN@........`...../...=.-...1....IEND.B`.
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):6144
                                            Entropy (8bit):4.496995234059773
                                            Encrypted:false
                                            SSDEEP:96:1IUNaXnnXyEIPtXvZhr5RwiULuxDtJ1+wolpE:1Ix3XyEwXvZh1RwnLUDtf+I
                                            MD5:E8B67A37FB41D54A7EDA453309D45D97
                                            SHA1:96BE9BF7A988D9CEA06150D57CD1DE19F1FEC19E
                                            SHA-256:2AD232BCCF4CA06CF13475AF87B510C5788AA790785FD50509BE483AFC0E0BCF
                                            SHA-512:20EFFAE18EEBB2DF90D3186A281FA9233A97998F226F7ADEAD0784FBC787FEEE419973962F8369D8822C1BBCDFB6E7948D9CA6086C9CF90190C8AB3EC97F4C38
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.Y.o.7Eo.7Eo.7Eo.6EF.7E..jEf.7E;..Em.7E..3En.7ERicho.7E........PE..L.....uY...........!................`........ ...............................P......................................`$..E.... ..d............................@..$.................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):11776
                                            Entropy (8bit):5.659384359264642
                                            Encrypted:false
                                            SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                                            MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                                            SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                                            SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                                            SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Entropy (8bit):7.02530526585537
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            File size:431872
                                            MD5:a6ef5ed777ba7369c2bb28e46b198ba6
                                            SHA1:f707bc0343f41d95f57e776a9f85f6a2c5791aa7
                                            SHA256:878d710875b07ec61bef0b198ba67bf81ad0730a3a483d5762cd18e13fb4b525
                                            SHA512:3b0bbbf4199dfc669a75a8fb62cfa55423e2331358f43057219ee2a4099cc9c2b007d85b2cb1b6cd9c64d8d8421575690bed95556ca788cf13d6a53c96b3a2eb
                                            SSDEEP:6144:B6bAcJvkzKmPPzS58G93IuZCBabjYBNwmlJ8kUEe/oqBaH0NxsvLg/nkrIak7r8m:a7ubCHICiwkBySs/vBGwxs0vh7rXN
                                            TLSH:B194F161BFDBE857D02278B4A09ADE1E5E74EF14A249E307F3B139ACE5752513C1B202
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....uY.................d....:....
                                            Icon Hash:20c4f8f8e8f0f24c
                                            Entrypoint:0x403350
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x59759518 [Mon Jul 24 06:35:04 2017 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:b34f154ec913d2d2c435cbd644e91687
                                            Signature Valid:false
                                            Signature Issuer:E=Giordano@Agencies.ano, OU="Desidiose Haarvkstens ", O=Percussion, L=Mccomb, S=Mississippi, C=US
                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                            Error Number:-2146762487
                                            Not Before, Not After
                                            • 1/8/2023 6:53:11 PM 1/7/2026 6:53:11 PM
                                            Subject Chain
                                            • E=Giordano@Agencies.ano, OU="Desidiose Haarvkstens ", O=Percussion, L=Mccomb, S=Mississippi, C=US
                                            Version:3
                                            Thumbprint MD5:B7600E9E947B9005922C17012BBF815F
                                            Thumbprint SHA-1:F61732487D62043541218B18386BFA3513D9C7CF
                                            Thumbprint SHA-256:C6510EBAF8763805CB5E0AAB32A94AEEFD9E39180B9A6D5F85E0272807031574
                                            Serial:1B9B07C3A599FD0DBF3CF80F5B8149857D2F3BA7
                                            Instruction
                                            sub esp, 000002D4h
                                            push ebx
                                            push esi
                                            push edi
                                            push 00000020h
                                            pop edi
                                            xor ebx, ebx
                                            push 00008001h
                                            mov dword ptr [esp+14h], ebx
                                            mov dword ptr [esp+10h], 0040A2E0h
                                            mov dword ptr [esp+1Ch], ebx
                                            call dword ptr [004080A8h]
                                            call dword ptr [004080A4h]
                                            and eax, BFFFFFFFh
                                            cmp ax, 00000006h
                                            mov dword ptr [007A8A2Ch], eax
                                            je 00007F0591104523h
                                            push ebx
                                            call 00007F05911077B9h
                                            cmp eax, ebx
                                            je 00007F0591104519h
                                            push 00000C00h
                                            call eax
                                            mov esi, 004082B0h
                                            push esi
                                            call 00007F0591107733h
                                            push esi
                                            call dword ptr [00408150h]
                                            lea esi, dword ptr [esi+eax+01h]
                                            cmp byte ptr [esi], 00000000h
                                            jne 00007F05911044FCh
                                            push 0000000Ah
                                            call 00007F059110778Ch
                                            push 00000008h
                                            call 00007F0591107785h
                                            push 00000006h
                                            mov dword ptr [007A8A24h], eax
                                            call 00007F0591107779h
                                            cmp eax, ebx
                                            je 00007F0591104521h
                                            push 0000001Eh
                                            call eax
                                            test eax, eax
                                            je 00007F0591104519h
                                            or byte ptr [007A8A2Fh], 00000040h
                                            push ebp
                                            call dword ptr [00408044h]
                                            push ebx
                                            call dword ptr [004082A0h]
                                            mov dword ptr [007A8AF8h], eax
                                            push ebx
                                            lea eax, dword ptr [esp+34h]
                                            push 000002B4h
                                            push eax
                                            push ebx
                                            push 0079FEE0h
                                            call dword ptr [00408188h]
                                            push 0040A2C8h
                                            Programming Language:
                                            • [EXP] VC++ 6.0 SP5 build 8804
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d00000x28268.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x675000x2200.data
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x63c80x6400False0.6766015625data6.504099201068482IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x80000x138e0x1400False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xa0000x39eb380x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .ndata0x3a90000x270000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x3d00000x282680x28400False0.3355129076086957data4.767250735975199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountry
                                            RT_ICON0x3d03100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
                                            RT_ICON0x3e0b380x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
                                            RT_ICON0x3e9fe00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
                                            RT_ICON0x3ef4680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
                                            RT_ICON0x3f36900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
                                            RT_ICON0x3f5c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                                            RT_ICON0x3f6ce00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
                                            RT_ICON0x3f76680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
                                            RT_DIALOG0x3f7ad00x100dataEnglishUnited States
                                            RT_DIALOG0x3f7bd00xf8dataEnglishUnited States
                                            RT_DIALOG0x3f7cc80xa0dataEnglishUnited States
                                            RT_DIALOG0x3f7d680x60dataEnglishUnited States
                                            RT_GROUP_ICON0x3f7dc80x76dataEnglishUnited States
                                            RT_MANIFEST0x3f7e400x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States
                                            DLLImport
                                            KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                            USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                            SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                            ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.
                                            No statistics
                                            Target ID:0
                                            Start time:10:48:04
                                            Start date:20/03/2023
                                            Path:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                            Imagebase:0x400000
                                            File size:431872 bytes
                                            MD5 hash:A6EF5ED777BA7369C2BB28E46B198BA6
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000000.00000002.782485165.0000000004480000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.782485165.00000000059F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low

                                            No disassembly