Edit tour
Windows
Analysis Report
SetupWIService.exe
Overview
General Information
Detection
GuLoader
Score: | 57 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Compliance
Score: | 35 |
Range: | 0 - 100 |
Signatures
Yara detected GuLoader
Uses netsh to modify the Windows network and firewall settings
Tries to delay execution (extensive OutputDebugStringW loop)
Modifies the hosts file
DLL side loading technique detected
Sets file extension default program settings to executables
Modifies the windows firewall
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Creates files inside the system directory
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
EXE planting / hijacking vulnerabilities found
PE file does not import any functions
Drops PE files
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Binary contains a suspicious time stamp
Uses taskkill to terminate processes
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Classification
- System is w10x64
- SetupWIService.exe (PID: 5396 cmdline:
C:\Users\u ser\Deskto p\SetupWIS ervice.exe MD5: 6685BBB6EEA96A5BEE42CA0379671647) - cmd.exe (PID: 2852 cmdline:
cmd /C tas kkill /F / IM WIServi ce.exe MD5: F3BDBE3BB6F734E357235F4D5898582D) - conhost.exe (PID: 4132 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - taskkill.exe (PID: 4436 cmdline:
taskkill / F /IM WISe rvice.exe MD5: 15E2E0ACD891510C6268CB8899F2A1A1) - cmd.exe (PID: 4760 cmdline:
cmd /C tas kkill /F / IM WIui.ex e MD5: F3BDBE3BB6F734E357235F4D5898582D) - conhost.exe (PID: 4356 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - taskkill.exe (PID: 2856 cmdline:
taskkill / F /IM WIui .exe MD5: 15E2E0ACD891510C6268CB8899F2A1A1) - cmd.exe (PID: 3480 cmdline:
cmd /C tas kkill /F / IM wirtppr oxy.exe MD5: F3BDBE3BB6F734E357235F4D5898582D) - conhost.exe (PID: 2472 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - taskkill.exe (PID: 6140 cmdline:
taskkill / F /IM wirt pproxy.exe MD5: 15E2E0ACD891510C6268CB8899F2A1A1) - cmd.exe (PID: 2068 cmdline:
cmd /C tas kkill /F / IM wiservi ce-ui.exe MD5: F3BDBE3BB6F734E357235F4D5898582D) - conhost.exe (PID: 5016 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - taskkill.exe (PID: 6096 cmdline:
taskkill / F /IM wise rvice-ui.e xe MD5: 15E2E0ACD891510C6268CB8899F2A1A1) - cmd.exe (PID: 2992 cmdline:
cmd /C tas kkill /F / IM vncsrv. exe MD5: F3BDBE3BB6F734E357235F4D5898582D) - conhost.exe (PID: 5236 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - taskkill.exe (PID: 6136 cmdline:
taskkill / F /IM vncs rv.exe MD5: 15E2E0ACD891510C6268CB8899F2A1A1) - cmd.exe (PID: 2860 cmdline:
cmd /C tas kkill /F / IM WildixO utlookInte gration.ex e MD5: F3BDBE3BB6F734E357235F4D5898582D) - conhost.exe (PID: 4760 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - taskkill.exe (PID: 3084 cmdline:
taskkill / F /IM Wild ixOutlookI ntegration .exe MD5: 15E2E0ACD891510C6268CB8899F2A1A1) - wiservice.exe (PID: 3712 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\wiser vice.exe" --removesv c MD5: BC9438A9AF6E7EEA099BC91557F1FC26) - wiservice.exe (PID: 4496 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\wiser vice.exe" --install_ faxprinter MD5: BC9438A9AF6E7EEA099BC91557F1FC26) - RegAsm.exe (PID: 1428 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\R egAsm" "C: \Program F iles\Wildi x\WIServic e\Microsof t.Office.I nterop.Out look.dll" /silent /c odebase MD5: 2B5D765B33C67EBA41E9F47954227BC3) - conhost.exe (PID: 4504 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - Conhost.exe (PID: 5404 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - RegAsm.exe (PID: 5360 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\R egAsm" "C: \Program F iles\Wildi x\WIServic e\Microsof t.Office.U c.dll" /si lent /code base MD5: 2B5D765B33C67EBA41E9F47954227BC3) - conhost.exe (PID: 5356 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - RegAsm.exe (PID: 5088 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\R egAsm" "C: \Program F iles\Wildi x\WIServic e\Office.d ll" /silen t /codebas e MD5: 2B5D765B33C67EBA41E9F47954227BC3) - conhost.exe (PID: 4640 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - RegAsm.exe (PID: 5708 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\R egAsm" "C: \Program F iles\Wildi x\WIServic e\Newtonso ft.Json.dl l" /silent /codebase MD5: 2B5D765B33C67EBA41E9F47954227BC3) - conhost.exe (PID: 5712 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - MpCmdRun.exe (PID: 5880 cmdline:
"C:\Progra m Files\Wi ndows Defe nder\mpcmd run.exe" - wdenable MD5: A267555174BFA53844371226F482B86B) - conhost.exe (PID: 524 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - RegAsm.exe (PID: 5272 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\R egAsm" "C: \Program F iles\Wildi x\WIServic e\Serilog. dll" /sile nt /codeba se MD5: 2B5D765B33C67EBA41E9F47954227BC3) - conhost.exe (PID: 5264 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - RegAsm.exe (PID: 5332 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\R egAsm" "C: \Program F iles\Wildi x\WIServic e\Serilog. Sinks.Cons ole.dll" / silent /co debase MD5: 2B5D765B33C67EBA41E9F47954227BC3) - conhost.exe (PID: 3636 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - RegAsm.exe (PID: 4516 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\R egAsm" "C: \Program F iles\Wildi x\WIServic e\Serilog. Sinks.File .dll" /sil ent /codeb ase MD5: 2B5D765B33C67EBA41E9F47954227BC3) - conhost.exe (PID: 3804 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - RegAsm.exe (PID: 2472 cmdline:
"C:\Window s\Microsof t.NET\Fram ework64\v4 .0.30319\R egAsm" "C: \Program F iles\Wildi x\WIServic e\WildixOu tlookInteg ration.exe " /silent MD5: 2B5D765B33C67EBA41E9F47954227BC3) - conhost.exe (PID: 5816 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - cmd.exe (PID: 4332 cmdline:
cmd /C sch tasks /cre ate /TN "W ildix\WISe rvice upda te checker " /xml "C: \Program F iles\Wildi x\WIServic e\WisUpdat eCheckerTa skX64.xml" /F MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - conhost.exe (PID: 2856 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - schtasks.exe (PID: 5944 cmdline:
schtasks / create /TN "Wildix\W IService u pdate chec ker" /xml "C:\Progra m Files\Wi ldix\WISer vice\WisUp dateChecke rTaskX64.x ml" /F MD5: 838D346D1D28F00783B7A6C6BD03A0DA) - cmd.exe (PID: 5880 cmdline:
cmd /C net sh advfire wall firew all delete rule name =all progr am="C:\Pro gram Files \Wildix\WI Service\wi service.ex e" MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - conhost.exe (PID: 5664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - netsh.exe (PID: 5732 cmdline:
netsh advf irewall fi rewall del ete rule n ame=all pr ogram="C:\ Program Fi les\Wildix \WIService \wiservice .exe" MD5: 98CC37BBF363A38834253E22C80A8F32) - cmd.exe (PID: 1252 cmdline:
cmd /C net sh advfire wall firew all add ru le name="W ildix Inte gration Se rvice" dir =in action =allow pro gram="C:\P rogram Fil es\Wildix\ WIService\ wiservice. exe" MD5: 4E2ACF4F8A396486AB4268C94A6A245F) - conhost.exe (PID: 2848 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) - netsh.exe (PID: 204 cmdline:
netsh advf irewall fi rewall add rule name ="Wildix I ntegration Service" dir=in act ion=allow program="C :\Program Files\Wild ix\WIServi ce\wiservi ce.exe" MD5: 98CC37BBF363A38834253E22C80A8F32) - wiservice.exe (PID: 4940 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\wiser vice.exe" --proxyex MD5: BC9438A9AF6E7EEA099BC91557F1FC26) - wiservice.exe (PID: 5344 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\wiser vice.exe" --installs vc MD5: BC9438A9AF6E7EEA099BC91557F1FC26) - explorer.exe (PID: 6032 cmdline:
C:\Windows \explorer. exe" "C:\P rogram Fil es\Wildix\ WIService\ proxyex.ln k MD5: AD5296B280E8F522A8A897C96BAB0E1D)
- svchost.exe (PID: 3084 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- spoolsv.exe (PID: 1876 cmdline:
C:\Windows \System32\ spoolsv.ex e MD5: C05A19A38D7D203B738771FD1854656F)
- spoolsv.exe (PID: 4140 cmdline:
C:\Windows \System32\ spoolsv.ex e MD5: C05A19A38D7D203B738771FD1854656F)
- svchost.exe (PID: 4368 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- svchost.exe (PID: 4896 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
- wiservice.exe (PID: 5316 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\wiser vice.exe" --update MD5: BC9438A9AF6E7EEA099BC91557F1FC26)
- wiservice.exe (PID: 5892 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\WISer vice.exe" MD5: BC9438A9AF6E7EEA099BC91557F1FC26)
- wiservice.exe (PID: 3428 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\wiser vice.exe" --hostsvc MD5: BC9438A9AF6E7EEA099BC91557F1FC26) - wiservice.exe (PID: 5088 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\wiser vice.exe" --watchdog MD5: BC9438A9AF6E7EEA099BC91557F1FC26) - wiservice.exe (PID: 3872 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\wiser vice.exe" --dispatch er MD5: BC9438A9AF6E7EEA099BC91557F1FC26)
- explorer.exe (PID: 3800 cmdline:
C:\Windows \explorer. exe /facto ry,{75dff2 b7-6936-4c 06-a8bb-67 6a7b00b24b } -Embeddi ng MD5: AD5296B280E8F522A8A897C96BAB0E1D) - wiservice.exe (PID: 4112 cmdline:
"C:\Progra m Files\Wi ldix\WISer vice\wiser vice.exe" --proxyex MD5: BC9438A9AF6E7EEA099BC91557F1FC26)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GuLoader_3 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_GuLoader_3 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_GuLoader_3 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_GuLoader_3 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_GuLoader_3 | Yara detected GuLoader | Joe Security | ||
Click to see the 2 entries |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | Binary or memory string: |
Source: | EXE: | Jump to behavior |
Compliance |
---|
Source: | Static PE information: |
Source: | EXE: | Jump to behavior |
Source: | Registry value created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: | Jump to behavior | ||
Source: | Directory created: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00402765 | |
Source: | Code function: | 0_2_00406313 | |
Source: | Code function: | 0_2_004057D8 | |
Source: | Code function: | 24_2_00007FFA126F3F10 |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | String found in binary or memory: |