Edit tour
Windows
Analysis Report
rArz0wnYVU.exe
Overview
General Information
Sample name: | rArz0wnYVU.exerenamed because original name is a hash value |
Original sample name: | 0a2bf76a4014ebafcf6a15f5a3e7f8ea1e2e058b4c7efbfab930454fe9cf150d.exe |
Analysis ID: | 1586025 |
MD5: | 2c5d3252b0c8ce91c28211e0ed75a1f5 |
SHA1: | 9ca8101bc26b8ea199c71fed4e3aa9279535ed58 |
SHA256: | 0a2bf76a4014ebafcf6a15f5a3e7f8ea1e2e058b4c7efbfab930454fe9cf150d |
Tags: | exeuser-adrian__luca |
Infos: | |
Detection
GuLoader
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Early bird code injection technique detected
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64
- rArz0wnYVU.exe (PID: 2940 cmdline:
"C:\Users\ user\Deskt op\rArz0wn YVU.exe" MD5: 2C5D3252B0C8CE91C28211E0ED75A1F5) - powershell.exe (PID: 4284 cmdline:
powershell .exe -wind owstyle hi dden "$Sal sas=gc -ra w 'C:\User s\user\App Data\Local \Temp\alky lsulfater\ Deprivable \Profascis ts46.Skr'; $Huddler=$ Salsas.Sub String(958 9,3);.$Hud dler($Sals as) MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 2684 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msiexec.exe (PID: 904 cmdline:
"C:\Window s\SysWOW64 \msiexec.e xe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-08T16:29:45.073616+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:29:55.205794+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:30:05.335139+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:30:15.471803+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:30:25.617263+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:30:35.763757+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:30:45.893758+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:30:56.036797+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:31:06.175243+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:31:16.315793+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:31:26.456822+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:31:36.597147+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:31:46.738458+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:31:56.990808+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:32:07.127948+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
2025-01-08T16:32:17.268549+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.5 | 49792 | 212.162.149.94 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0040596F | |
Source: | Code function: | 0_2_004064C1 | |
Source: | Code function: | 0_2_004027FB |
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |