Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rJUSTIFICANTEDEPAGO.exe

Overview

General Information

Sample Name:rJUSTIFICANTEDEPAGO.exe
Analysis ID:830400
MD5:e542cf9ce8a67a5b681cc9b0004e0b10
SHA1:40161158f7cab76c57b4d95798c74ebc7d612cfe
SHA256:4e78f6957f4c8c0f56a9b49e139342b1df7b1dc05518d96e776aa687a80f8c58
Tags:exe
Infos:

Detection

GuLoader
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
PE file does not import any functions
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Binary contains a suspicious time stamp
Detected potential crypto function
PE / OLE file has an invalid certificate
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • rJUSTIFICANTEDEPAGO.exe (PID: 5280 cmdline: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe MD5: E542CF9CE8A67A5B681CC9B0004E0B10)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.772608706.0000000004E36000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: rJUSTIFICANTEDEPAGO.exeVirustotal: Detection: 17%Perma Link
    Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\SpisekamrenesJump to behavior
    Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb source: System.Reflection.Primitives.dll.0.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb8+N+ @+_CorDllMainmscoree.dll source: System.Reflection.Primitives.dll.0.dr
    Source: Binary string: System.Reflection.TypeExtensions.ni.pdb source: System.Reflection.TypeExtensions.dll.0.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.TypeExtensions\net6.0-Release\System.Reflection.TypeExtensions.pdb source: System.Reflection.TypeExtensions.dll.0.dr
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_00402862 FindFirstFileW,
    Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
    Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#
    Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Attribution
    Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#DerivativeWorks
    Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Distribution
    Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Notice
    Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Reproduction
    Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#ShareAlike
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://subca.ocsp-certum.com01
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://subca.ocsp-certum.com02
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://subca.ocsp-certum.com05
    Source: rJUSTIFICANTEDEPAGO.exeString found in binary or memory: http://www.certum.pl/CPS0
    Source: rJUSTIFICANTEDEPAGO.exe, 00000000.00000002.771610066.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.Primitives.dll.0.dr, System.Reflection.TypeExtensions.dll.0.drString found in binary or memory: https://github.com/dotnet/runtime
    Source: rJUSTIFICANTEDEPAGO.exe, 00000000.00000002.771610066.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.TypeExtensions.dll.0.drString found in binary or memory: https://github.com/dotnet/runtimeBSJB
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_00405402 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
    Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: System.Reflection.TypeExtensions.dll.0.drStatic PE information: No import functions for PE file found
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_00404C3F
    Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeProcess Stats: CPU usage > 98%
    Source: rJUSTIFICANTEDEPAGO.exeVirustotal: Detection: 17%
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile read: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeJump to behavior
    Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\nsuE902.tmpJump to behavior
    Source: classification engineClassification label: mal60.troj.evad.winEXE@1/14@0/0
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_004020FE CoCreateInstance,
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_004046C3 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\SpisekamrenesJump to behavior
    Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb source: System.Reflection.Primitives.dll.0.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb8+N+ @+_CorDllMainmscoree.dll source: System.Reflection.Primitives.dll.0.dr
    Source: Binary string: System.Reflection.TypeExtensions.ni.pdb source: System.Reflection.TypeExtensions.dll.0.dr
    Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.TypeExtensions\net6.0-Release\System.Reflection.TypeExtensions.pdb source: System.Reflection.TypeExtensions.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.772608706.0000000004E36000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_10002DE0 push eax; ret
    Source: System.Reflection.Primitives.dll.0.drStatic PE information: 0xE40AD0DE [Wed Mar 28 09:54:38 2091 UTC]
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\System.Reflection.TypeExtensions.dllJump to dropped file
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\nspE9CE.tmp\AdvSplash.dllJump to dropped file
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\nspE9CE.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonteachable\Bekmpelsesforanstaltninger\Carcinoid2\Efterplaprer\System.Reflection.Primitives.dllJump to dropped file
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeRDTSC instruction interceptor: First address: 0000000005758FEB second address: 0000000005758FEB instructions: 0x00000000 rdtsc 0x00000002 test dl, bl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F6A94386624h 0x00000008 inc ebp 0x00000009 cmp edx, eax 0x0000000b inc ebx 0x0000000c cmp bh, ah 0x0000000e rdtsc
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\System.Reflection.TypeExtensions.dllJump to dropped file
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonteachable\Bekmpelsesforanstaltninger\Carcinoid2\Efterplaprer\System.Reflection.Primitives.dllJump to dropped file
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_00402862 FindFirstFileW,
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1
    Windows Service
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    1
    Timestomp
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    rJUSTIFICANTEDEPAGO.exe8%ReversingLabsWin32.Trojan.Generic
    rJUSTIFICANTEDEPAGO.exe17%VirustotalBrowse
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonteachable\Bekmpelsesforanstaltninger\Carcinoid2\Efterplaprer\System.Reflection.Primitives.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\System.Reflection.TypeExtensions.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nspE9CE.tmp\AdvSplash.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nspE9CE.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://subca.ocsp-certum.com050%URL Reputationsafe
    http://subca.ocsp-certum.com050%URL Reputationsafe
    http://subca.ocsp-certum.com020%URL Reputationsafe
    http://subca.ocsp-certum.com010%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://creativecommons.org/ns#DerivativeWorksbattery-level-90-charging-symbolic.svg.0.drfalse
      high
      http://crl.certum.pl/ctsca2021.crl0orJUSTIFICANTEDEPAGO.exefalse
        high
        http://creativecommons.org/licenses/by-sa/4.0/battery-level-90-charging-symbolic.svg.0.drfalse
          high
          http://creativecommons.org/ns#Distributionbattery-level-90-charging-symbolic.svg.0.drfalse
            high
            http://repository.certum.pl/ctnca.cer09rJUSTIFICANTEDEPAGO.exefalse
              high
              http://repository.certum.pl/ctsca2021.cer0rJUSTIFICANTEDEPAGO.exefalse
                high
                http://crl.certum.pl/ctnca.crl0krJUSTIFICANTEDEPAGO.exefalse
                  high
                  http://subca.ocsp-certum.com05rJUSTIFICANTEDEPAGO.exefalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://creativecommons.org/ns#Attributionbattery-level-90-charging-symbolic.svg.0.drfalse
                    high
                    http://subca.ocsp-certum.com02rJUSTIFICANTEDEPAGO.exefalse
                    • URL Reputation: safe
                    unknown
                    http://subca.ocsp-certum.com01rJUSTIFICANTEDEPAGO.exefalse
                    • URL Reputation: safe
                    unknown
                    http://crl.certum.pl/ctnca2.crl0lrJUSTIFICANTEDEPAGO.exefalse
                      high
                      http://repository.certum.pl/ctnca2.cer09rJUSTIFICANTEDEPAGO.exefalse
                        high
                        http://creativecommons.org/ns#ShareAlikebattery-level-90-charging-symbolic.svg.0.drfalse
                          high
                          https://github.com/dotnet/runtimeBSJBrJUSTIFICANTEDEPAGO.exe, 00000000.00000002.771610066.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.TypeExtensions.dll.0.drfalse
                            high
                            http://nsis.sf.net/NSIS_ErrorErrorrJUSTIFICANTEDEPAGO.exefalse
                              high
                              http://creativecommons.org/ns#Noticebattery-level-90-charging-symbolic.svg.0.drfalse
                                high
                                http://creativecommons.org/ns#Reproductionbattery-level-90-charging-symbolic.svg.0.drfalse
                                  high
                                  http://www.certum.pl/CPS0rJUSTIFICANTEDEPAGO.exefalse
                                    high
                                    http://creativecommons.org/ns#battery-level-90-charging-symbolic.svg.0.drfalse
                                      high
                                      https://github.com/dotnet/runtimerJUSTIFICANTEDEPAGO.exe, 00000000.00000002.771610066.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.Primitives.dll.0.dr, System.Reflection.TypeExtensions.dll.0.drfalse
                                        high
                                        No contacted IP infos
                                        Joe Sandbox Version:37.0.0 Beryl
                                        Analysis ID:830400
                                        Start date and time:2023-03-20 10:47:07 +01:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 9m 38s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:13
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample file name:rJUSTIFICANTEDEPAGO.exe
                                        Detection:MAL
                                        Classification:mal60.troj.evad.winEXE@1/14@0/0
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HDC Information:
                                        • Successful, ratio: 85.7% (good quality ratio 84.2%)
                                        • Quality average: 86.9%
                                        • Quality standard deviation: 21.9%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240s for sample files taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtSetInformationFile calls found.
                                        No simulations
                                        No context
                                        No context
                                        No context
                                        No context
                                        No context
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:dropped
                                        Size (bytes):6689
                                        Entropy (8bit):5.135211840989561
                                        Encrypted:false
                                        SSDEEP:192:VkjcMIy2+X2I2F2C2G2fH7y8cQaVB2nnuy1FQOcQaVv2q22L2k2s:mjcM7u8xaV8nnL1FQOxaVu6
                                        MD5:C96D0DD361AFC6B812BDDD390B765A26
                                        SHA1:71081F096719CAA70B9BAEF86FE642635D8E2765
                                        SHA-256:6690799E5FA3FB0DD6CCE4BAC5AA1607C8A6BB16507854A87520C7DE53052E1B
                                        SHA-512:7C73BC880A9401C64AB0571957B414180C1B94137C7BC870BA602979E7A990640A37991CB87A40BC7E5942A37FDA25EFC58C759C00F4344BA3D88B9AA64182DA
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>.<svg. xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:cc="http://creativecommons.org/ns#". xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#". xmlns:svg="http://www.w3.org/2000/svg". xmlns="http://www.w3.org/2000/svg". width="16". version="1.1". style="enable-background:new". id="svg7384". height="16.000036">. <metadata. id="metadata90">. <rdf:RDF>. <cc:Work. rdf:about="">. <dc:format>image/svg+xml</dc:format>. <dc:type. rdf:resource="http://purl.org/dc/dcmitype/StillImage" />. <dc:title>Gnome Symbolic Icons</dc:title>. <cc:license. rdf:resource="http://creativecommons.org/licenses/by-sa/4.0/" />. </cc:Work>. <cc:License. rdf:about="http://creativecommons.org/licenses/by-sa/4.0/">. <cc:permits. rdf:resource="http://creativecommons.org/ns#Reproduction" />. <cc:permits. rdf:resource="htt
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                        Category:dropped
                                        Size (bytes):227
                                        Entropy (8bit):6.604776901672149
                                        Encrypted:false
                                        SSDEEP:6:6v/lhPysE9Xj1F/bkqdXujFErL4MImATQZu22F+p:6v/7kR7/bjd8Kgm2Q/2y
                                        MD5:7843C38CC42C6786B3373F166AF10172
                                        SHA1:BA0163109D9B641B1312230B3F62E1E10A61AA5E
                                        SHA-256:E3AF1293F8E8AB5C81300196AF55A7C15D5608291D46A2B86D4255910A7D0E59
                                        SHA-512:B1D3DF6A0A8CACD729CD9A2FD5AB0F74ED611270FA172CDBEB13D46FA71DD5CC5540A2FBFDB6C3004E652D317C8FAD4EC3AE437DF1C082B629870A33CC6BD34F
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...1..P......#.bae....^.^K/fek+........X...........gfw....\.D/..b...a.4..$........H#....o8...}..6.K.....Xc.$ ..'.1.2..vu.../O..>V......CD....<....w........IEND.B`.
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:dropped
                                        Size (bytes):1329
                                        Entropy (8bit):4.950241534342892
                                        Encrypted:false
                                        SSDEEP:24:t4Cp/YHyKbRAecFxVrGDT/Gfd8hTdyKbRAecFxVrGDT/bNxNxZrGQ:9YHNtAecFmDT/s8hdNtAecFmDT/j3YQ
                                        MD5:021A9F00A28C9D496E490AE951E8EF12
                                        SHA1:F8A6392065D07BAC72E138B0E47A24FFDCCEE74B
                                        SHA-256:B420561770B77FCB47F69B6198B34B11155535F8A2E907BC4A0998CE74AFD340
                                        SHA-512:7F4F2D904EA968BF68E35E0D7F1EAE9718234757D1989879996BFB49D9C447F67544CB0E1C441FD6539D58B5F2C6ACA7E9E0208738C235D9AF0C093511760212
                                        Malicious:false
                                        Reputation:low
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M1.018 7v2H14V7z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;shape-padding:0;isolation:auto;mix-blend-mode:normal;marker:none" color="#bebebe" font-weight="400" font-family="sans-serif" overflow="visible"/><path d="M11.99 4.99a1 1 0 00-.697 1.717L12.586 8l-1.293 1.293a1 1 0 101.414 1.414L15.414 8l-2.707-2.707a1 1 0 00-.717-.303z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decorati
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:SVG Scalable Vector Graphics image
                                        Category:dropped
                                        Size (bytes):1155
                                        Entropy (8bit):5.154592341044034
                                        Encrypted:false
                                        SSDEEP:24:t4CpQyhEXQDWu4AeWrGMyRQJaPahrGDfJcghSvOqlIQX6e4AeWrGMyp:vhjDWu4Ae3M5wSgDDontqe4Ae3MO
                                        MD5:EFB3C780BC44B346B50B1F0DC6CF6D0F
                                        SHA1:472B0EDD1C4C3092BC7C4DF934ABE126885B1780
                                        SHA-256:990859D3B2C830E23EC276BF1D38A38EE1BA3D89BF04CB138107E4CDE31167B5
                                        SHA-512:5B9C96F146C6A065C89172D02BDE8020876DC9C78859AD2B8B9529C615215F88BA85C2789544F5C5A247C148BB52FE4B5FCA325E7EAC4826D31A0365A0B8BCBE
                                        Malicious:false
                                        Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M5 7c-.31 0-.615.09-.812.281L.594 11l3.656 3.719c.198.19.44.281.75.281h1v-1c0-.257-.13-.529-.312-.719L4.406 12H9s1 0 1-1c0 0 0-1-1-1H4.375l1.219-1.281C5.776 8.529 6 8.257 6 8V7z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" color="#000" font-weight="400" font-family="Sans" overflow="visible" opacity=".35"/><path d="M11 11h1.375l1.125 1.094L14.594 11H16v1.469l-1.094 1.062L16 14.594V16h-1.438L13.5 14.937 12.437 16H11v-1.406l1.063-1.063L11 12.47z" style="marker:none" color="#bebebe" overflow="visible"/><path d="M11 9c.31 0 .615-.09.813-.281L15.406 5 11.75 1.281C11.552 1.091 11.31 1 11 1h-1v1c0 .257.13.529.313.719L11.593 4H7c-.528-.007-1 .472-1 1s.472 1.007 1 1h4.625l-1.219 1.281c-.182.19-.406.462-.406.719v1z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:star
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                        Category:dropped
                                        Size (bytes):891
                                        Entropy (8bit):7.745720384539504
                                        Encrypted:false
                                        SSDEEP:24:d4qWCHdkXfUZEcO5MkIi416cOQSkye9V+:d4qnHd8MkIi4Dpb6
                                        MD5:5AF147D26AD399F83825377F04FD56A1
                                        SHA1:B378A498B0DB8114C794E21D533E80CEBE5DDE04
                                        SHA-256:6147A091847FCC9D9EDB22E655C4FC9DE6632C76D4252350400FA286F9791109
                                        SHA-512:EEC16DE49A4698FE4F03F841FBCF045FBBDC9D634EB73ED35DB544B6DB4BC0135CD8E1DF102FD1E8BDE9FC75380948B4C0459685EE2C21858D645B7973759EA6
                                        Malicious:false
                                        Preview:.PNG........IHDR................a...BIDATx.m.S.%9...$U.Fkl.y].m.6.m.F..5*g;k}.........P......~u................M......M.q......|OM>....:?>.X7.U..j.v..?...e....>.Jk.&.{.[=......t.d.....4.D...V....b..s.L.....Jg,..=V..@.n......Rqv...._....B.h.;l....A....r.ap....N...1./.O.2.u7#..../.....o..*..O...[..X,<. .....@v........t...H..Rf..C?q..8.HB.!{K..N.....t..5..1d.+......).......pL.5.R..=....jC"....t6.BA.)....xZ..d..^W~yU...ya......U/...VA.r.....r.U....[".D.).8..iO<..[.....t.e9S...K8!....K..&p..Y2l.....".P8:..v..0....zd..''....O?+^.. =..b....t..K../.......?.?5...c.[.f.nP.P.o....7..k..t.?P(..O>.H~...n..jh.'..]..SC.5M.....'.}.n..'...t..9..c*...Ki...t..1z..N.q...w.w..y..W...K7x.^..p....j...%..3.|.....x...G.|~..a.o.N.<.......wK...]..u..........`...(z.B!.?q.b..u..$(.#1..N...b.u...@h...|.w..g....}i....?~......1~...l..]h......IEND.B`.
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):14952
                                        Entropy (8bit):6.599053939997928
                                        Encrypted:false
                                        SSDEEP:192:mrlnC6xxk2R5Ws+Wql73WOL8/pCuPHnhWgN7aoWTF6lI+XqnajlkEv:6nbW2R5Ws+Wql7//uPHRN7SIImlqW
                                        MD5:EDA04E04EBC0EBF7F8BBF30C4DAE6DE3
                                        SHA1:7BC4D50E6EEC7F04A9272BFEE4E4DB6F278DBE63
                                        SHA-256:F3E55CB3ADFA93F563B09114D93062E680AB0864C220491458FBE151798B862F
                                        SHA-512:7027DA3404675596B71394B660E600DA12C0750895F624776362167869760555EE9990699FFC9E4407301FC9437B2F638E2734B8BDEF3C7054990FD5A9C86550
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."!..0.............^+... ........@.. ....................................`..................................+..K....@..................h$...`......T*..8............................................ ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@+......H........ ......................P ......................................H>.s..X.\...3V...?G../..3q..l.L.....qKy6b..u"HO...JmYQ.....J..,.*S..".R..=1RY.....\?.&dM........@'J.j.:.'.A.../..........I.BSJB............v4.0.30319......`.......#~..........#Strings............#GUID...........#Blob......................3......................................3.........@...........Y...................`.................g...?.g.....g...y.g.....g.....g.....g...`.g...m.g.................
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:ASCII text, with very long lines (36518), with no line terminators
                                        Category:dropped
                                        Size (bytes):36518
                                        Entropy (8bit):2.6830744752603626
                                        Encrypted:false
                                        SSDEEP:768:xeK/i8OrT1EEEN7NmGmBsb7IxbJhOANjoIi55GP++IssSCDu/2qnSsUHZll:xeKv2n1OAE/EP9Ka/2lHzl
                                        MD5:AE738FA62A77E7AC245E166294F62CF4
                                        SHA1:EB347C2E02E3FBB39D316CEE73ED4B72DCA34C41
                                        SHA-256:4513093A8A81A33B2704FA5C8D168172A4A561188992D2AE1C93E1AF0611C076
                                        SHA-512:5B1241A8702E25C84D64CD7B6790852B46FA0848B16056FCFA0035CEAB1AB3448953D3FDF15DE7BB7D0074C7EC7E94748CFEDA625621E3BA5BFB3C4D813C82E2
                                        Malicious:false
                                        Preview:000000007E0000000F0F00C2007C009494000000C100000000860000000000E1E1E100575757000000000000000D007A7A0000000025252500000000292900000082000017170000FCFC00050505006100000000C500B500AC0077777700D8D8D8000000FE00BC002100000000009300003900787878787800BEBE0000FE0000EE000075757500ACACAC001E1E0000005C000000000000000D0D0D0D0D0D0D0000005200140008000000004F4F000000006000006B6B6B0017001E006000DA0055550000004A4A00000000001400005757575757003B3B00010000E1E1005757575757005A5A000000A9A9009E005A5A00D7D7D700610000C90000000000D0D0D0D000A4A400007F00000000006A6A0000CA00007B7B00E2008E8E8E00B100D30000BBBBBB00E8000000000077770063636300002600DE00E3E3E3000028001212000000000000007A7A0000CE00EC007676760000005757009F9F00AD00A5A5003D004C4C4C0000003131310000ACACAC000054000000000000000000000000F3F300292900000000020074000000BA00000200000000A8000000AB00000000004C4C4C4C4C00007E000000000000000000888800D2D2000202020200A3A3A3000000E70000FE0000970000860000C4000000170000005E0000BC00F9000000AA000000FA00A9000083000000C3C3C300777700
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):32368
                                        Entropy (8bit):6.393948275188786
                                        Encrypted:false
                                        SSDEEP:384:yWweWqlXnYcLpSfX0lawccfNXLWrdzy+A2jc2EPLNtAf/uPHRN7AJ/AlGseC62c:EqlXYcgEAwcc17Wc+bj+PLHuMU/xjx2c
                                        MD5:F2A123183E106BB1CF19376A8079D171
                                        SHA1:2B96296BE92D5F2EF7C59A70858AF4CAABC99A9D
                                        SHA-256:896D4ED138C35ECF19AE432380096562872EAB103F7E352C15D214FD875B337A
                                        SHA-512:FCA6A89EFB16780A06CD25A55638882970F03E1535180A0E463AF9794184B04EB345CF29B12D4F261094E04A584E9225A7AD36A62631227451059F64A77B3C67
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....[............" .....P................................................................`...@......@............... ......................................<........Z..p$...p..........T...............................................................H............text....N.......P.................. ..`.data........`.......R..............@....reloc.......p.......X..............@..B............................................0.............................4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...................y.........?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...Z.!...C.o.m.m.e.n.t.s...S.y.s.t.e.m...R.e.f.l.e.c.t.i.o.n...T.y.p.e.E.x.t.e.n.s.i.o.n.s.....L.....C.o.m.p.a.n.y.N.a.m.e.....M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n...j.!...F.i.l.e.D.e.s.c.r.i.p.
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                        Category:dropped
                                        Size (bytes):225
                                        Entropy (8bit):6.596645802250635
                                        Encrypted:false
                                        SSDEEP:6:6v/lhPysi5NuhsPwRngRfPq/3+phjSfVsup:6v/7thstJACSNsc
                                        MD5:F894266AB6A933B2FDA751E6490C319A
                                        SHA1:2D2D3635198FEEFCB64D1D6B3CDCCDC4EA3DF4B0
                                        SHA-256:95F533585B4C61936C369557B3B7E397E56545A4C9DB9A5BDDD0E9ABB7A7F7E7
                                        SHA-512:977ED04753C3CB2B883D03A2A55001F6FCC8617DC3060B6C25AB7E5C691C3F76049E7DEADC7F6567AB7E8DC8492DE2874E8E632CF3EAD7B39ABC8CC98D331442
                                        Malicious:false
                                        Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8..1..@.E...".u.`..#.v.,r.[..1$..]B.@6.,,.e.....fwg...._)9........y..[n...t.$g..:...P....@k.q......W.. .PY.$z..x....t..(-~!.0$:P.t......`.......Ba..Y.....IEND.B`.
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                        Category:dropped
                                        Size (bytes):263
                                        Entropy (8bit):6.731374842054556
                                        Encrypted:false
                                        SSDEEP:6:6v/lhPysw9TXm0RZC/8xhbPgfdSwj4vw29OjuAO4+ZvYNVp:6v/7QVXm0a/8xhbPgfdSBvNYn2ZvYd
                                        MD5:003B524806C1CA654CAC6ED2EB883E1B
                                        SHA1:F6F6ACA125DC4DB3B33378404017B5EE7D21D334
                                        SHA-256:2899E53769FA741E2C0675A2C69D2C246A8F34601BEE58DD66B16261005962A9
                                        SHA-512:AA905997F9CE39F039E33C4CCA167C0137775D91B4929D918528BA00B92737C448EC46D91A4221644CCC00D1FCAA403AFF83F07276BAB6FD80D4B9E88E652F87
                                        Malicious:false
                                        Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...K..1.D......g.e=.x......[]....Y$J'..`.@.S)R.4.q.D.K....x..%..0>~.;}..^.X....Lt.f!..K.....D.&,.7,..BM..t@..}N..o.?.....Hv.J...(..r.. ..)L....&..dT<..1y...X..X...............q...p..p.....IEND.B`.
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                        Category:dropped
                                        Size (bytes):337
                                        Entropy (8bit):7.143668471552015
                                        Encrypted:false
                                        SSDEEP:6:6v/lhPWFmX9Ckymx8BZhCjO5QO6MsHqd+K/eBDQeU2oG9xqgjp:6v/7K0omx8yOqVtHH1U2oGR
                                        MD5:7FBFE5B0A7AD2A67AACFD8481F8DCA01
                                        SHA1:21BABB6B7EC4746835DB43DC6A69A4AF0EFECA2D
                                        SHA-256:0B4CD789E087F712F131FACCD754DC461774498DF3CA19B346D461D18A0AE622
                                        SHA-512:3A8F0D9653301F789A0588E848C40FFC92394461BF70A3421ABC85647F2C115948134FE9E161D055A11D200536356A15677D9C0E645346D27E122001F67FE22B
                                        Malicious:false
                                        Preview:.PNG........IHDR................a....IDATx..S.r.P..=7.cw.....W.m...=......V....I...K.?#@D.0G......R.rF..^$....p..b..f.<.T.z......... +..3#.v.K...$....pT.j.....[.......r..p....O.2.Y.T.,......==...9{/...T./....Qa...3%....5...xmkI.7.1..P,g.%y..J..#^.e..I(.%jzI..#../..49...*..?#..I. =~..E.,MN@........`...../...=.-...1....IEND.B`.
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):222555
                                        Entropy (8bit):7.344342205951728
                                        Encrypted:false
                                        SSDEEP:3072:pBmSzQUCQ7eiGVj+oHu80OFKzRem/0qaVnuHyAkwbH4A5ICfxHSdjByvg4T:fmioZd+osLdL/0FuVTjAuypPo
                                        MD5:1247D9E48508188AEA42C1860C123BDB
                                        SHA1:B94FAE1C07539802B0D102309BA9B6F2A10C2638
                                        SHA-256:C6FAD708D2D267FA214B467BA745F085BE0F86DE24F1CBD6DB02F9A168359668
                                        SHA-512:C2A18EA7DE077087EF70780D10796F338C7FD9764777E33F6AB6B68F32E370DC063AC463A1AF6299A9A50F8410352E5CC9D90F290389D7531F6B4A5666459BFD
                                        Malicious:false
                                        Preview:...........;;;............................................C.............y................|||.....6..............................................................ppp..........77.........X.......)))......MM.......;;...........................FFFFFF..............RR.................00....;;;;;;...........5........uu.........).......dd................t................L.q.)..y.....++............5.........**...........L....<.!......o..................((..AAA...............VVV..WW...xxx..w.............4444..*.....f...............D.....T.....yyy...............!!..jj..bb.ccccc.B...1...;..........V.............g..q.........v....,..xxxx...Z.{..........................................&...m...........www..$$.....b.M.......$.....YYYY.........bb.....j..iiiii...&........D.gg......~.................)))..000.FFFF.n........._.........---..........................g..............................##.........................))).Y.**.........................c.............bb........9.........T....................
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):6144
                                        Entropy (8bit):4.496995234059773
                                        Encrypted:false
                                        SSDEEP:96:1IUNaXnnXyEIPtXvZhr5RwiULuxDtJ1+wolpE:1Ix3XyEwXvZh1RwnLUDtf+I
                                        MD5:E8B67A37FB41D54A7EDA453309D45D97
                                        SHA1:96BE9BF7A988D9CEA06150D57CD1DE19F1FEC19E
                                        SHA-256:2AD232BCCF4CA06CF13475AF87B510C5788AA790785FD50509BE483AFC0E0BCF
                                        SHA-512:20EFFAE18EEBB2DF90D3186A281FA9233A97998F226F7ADEAD0784FBC787FEEE419973962F8369D8822C1BBCDFB6E7948D9CA6086C9CF90190C8AB3EC97F4C38
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.Y.o.7Eo.7Eo.7Eo.6EF.7E..jEf.7E;..Em.7E..3En.7ERicho.7E........PE..L.....uY...........!................`........ ...............................P......................................`$..E.... ..d............................@..$.................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):11776
                                        Entropy (8bit):5.659384359264642
                                        Encrypted:false
                                        SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                                        MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                                        SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                                        SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                                        SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                        Entropy (8bit):7.031249628696672
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:rJUSTIFICANTEDEPAGO.exe
                                        File size:433352
                                        MD5:e542cf9ce8a67a5b681cc9b0004e0b10
                                        SHA1:40161158f7cab76c57b4d95798c74ebc7d612cfe
                                        SHA256:4e78f6957f4c8c0f56a9b49e139342b1df7b1dc05518d96e776aa687a80f8c58
                                        SHA512:5cb1f2132c5d85f068ed5fc35229df5f83d711f30748a951bd006569a24df0818aa24effb91d171a895f342b1b9e14ad2df8a2f1124e1ef2c7f8c74a6b9627ce
                                        SSDEEP:6144:c6bAcJvkzKmPPzS58G93IuZjZz5VWY+LWWwseVp4ZLlbXrvAhM8LjbL7rrraAiGl:z7ubCHICV0LfwqZLlXTqMYvi7
                                        TLSH:CA94F1227F97E857E4266D78608AEE19AEB0DF249205D317F37139EDE9B53016C2B103
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....uY.................d....:....
                                        Icon Hash:20c4f8f8e8f0f24c
                                        Entrypoint:0x403350
                                        Entrypoint Section:.text
                                        Digitally signed:true
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x59759518 [Mon Jul 24 06:35:04 2017 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:b34f154ec913d2d2c435cbd644e91687
                                        Signature Valid:false
                                        Signature Issuer:E=Baccheion@Train.Ric, OU="Ukampdygtige Ratteners Fllesskolernes ", O=Amerciament, L=Putnam Valley, S=New York, C=US
                                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                        Error Number:-2146762487
                                        Not Before, Not After
                                        • 12/20/2022 9:52:29 PM 12/19/2025 9:52:29 PM
                                        Subject Chain
                                        • E=Baccheion@Train.Ric, OU="Ukampdygtige Ratteners Fllesskolernes ", O=Amerciament, L=Putnam Valley, S=New York, C=US
                                        Version:3
                                        Thumbprint MD5:9D5FC1EED3EFD5AE85C5FE4E5DE73B01
                                        Thumbprint SHA-1:5C6F3AFCFAAFE00B47463625067078E82ACF72F1
                                        Thumbprint SHA-256:29E893BEBBB82AB1F213286EF68814B75D778BAB740B54B6457C756488BE3856
                                        Serial:53BB1A3E0600B528584097460509366C59C5C7CB
                                        Instruction
                                        sub esp, 000002D4h
                                        push ebx
                                        push esi
                                        push edi
                                        push 00000020h
                                        pop edi
                                        xor ebx, ebx
                                        push 00008001h
                                        mov dword ptr [esp+14h], ebx
                                        mov dword ptr [esp+10h], 0040A2E0h
                                        mov dword ptr [esp+1Ch], ebx
                                        call dword ptr [004080A8h]
                                        call dword ptr [004080A4h]
                                        and eax, BFFFFFFFh
                                        cmp ax, 00000006h
                                        mov dword ptr [007A8A2Ch], eax
                                        je 00007F6A9509FD13h
                                        push ebx
                                        call 00007F6A950A2FA9h
                                        cmp eax, ebx
                                        je 00007F6A9509FD09h
                                        push 00000C00h
                                        call eax
                                        mov esi, 004082B0h
                                        push esi
                                        call 00007F6A950A2F23h
                                        push esi
                                        call dword ptr [00408150h]
                                        lea esi, dword ptr [esi+eax+01h]
                                        cmp byte ptr [esi], 00000000h
                                        jne 00007F6A9509FCECh
                                        push 0000000Ah
                                        call 00007F6A950A2F7Ch
                                        push 00000008h
                                        call 00007F6A950A2F75h
                                        push 00000006h
                                        mov dword ptr [007A8A24h], eax
                                        call 00007F6A950A2F69h
                                        cmp eax, ebx
                                        je 00007F6A9509FD11h
                                        push 0000001Eh
                                        call eax
                                        test eax, eax
                                        je 00007F6A9509FD09h
                                        or byte ptr [007A8A2Fh], 00000040h
                                        push ebp
                                        call dword ptr [00408044h]
                                        push ebx
                                        call dword ptr [004082A0h]
                                        mov dword ptr [007A8AF8h], eax
                                        push ebx
                                        lea eax, dword ptr [esp+34h]
                                        push 000002B4h
                                        push eax
                                        push ebx
                                        push 0079FEE0h
                                        call dword ptr [00408188h]
                                        push 0040A2C8h
                                        Programming Language:
                                        • [EXP] VC++ 6.0 SP5 build 8804
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d00000x28268.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x67a880x2240.data
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x63c80x6400False0.6766015625data6.504099201068482IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x80000x138e0x1400False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0xa0000x39eb380x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .ndata0x3a90000x270000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x3d00000x282680x28400False0.3355129076086957data4.767250735975199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0x3d03100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
                                        RT_ICON0x3e0b380x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
                                        RT_ICON0x3e9fe00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
                                        RT_ICON0x3ef4680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
                                        RT_ICON0x3f36900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
                                        RT_ICON0x3f5c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                                        RT_ICON0x3f6ce00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
                                        RT_ICON0x3f76680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
                                        RT_DIALOG0x3f7ad00x100dataEnglishUnited States
                                        RT_DIALOG0x3f7bd00xf8dataEnglishUnited States
                                        RT_DIALOG0x3f7cc80xa0dataEnglishUnited States
                                        RT_DIALOG0x3f7d680x60dataEnglishUnited States
                                        RT_GROUP_ICON0x3f7dc80x76dataEnglishUnited States
                                        RT_MANIFEST0x3f7e400x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States
                                        DLLImport
                                        KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                        USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                        SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                        ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.
                                        No statistics
                                        Target ID:0
                                        Start time:10:48:06
                                        Start date:20/03/2023
                                        Path:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                                        Imagebase:0x400000
                                        File size:433352 bytes
                                        MD5 hash:E542CF9CE8A67A5B681CC9B0004E0B10
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.772608706.0000000004E36000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low

                                        No disassembly