File name:

ab.jpeg.exe

Full analysis: https://app.any.run/tasks/7d340b33-6b8f-4ae3-a043-b2bf8d8df1d9
Verdict: Malicious activity
Threats:

GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities.

Analysis date: May 17, 2025, 08:15:31
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
guloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

FD70EFF166BEABA884D221A8FFB68A7A

SHA1:

13742B6B153696AFFA22F802A6EE3791681D3452

SHA256:

4B200DD8310E34C8B7C5656DEA5A61985606F2DF2C27B1FD6CDA76C43A55621D

SSDEEP:

768:rZfxxeQwen+cHraM5htUlAKVnoET+LvL0sqC7o5wN9255R+GYXOSY/:7xP2MSHVb+Lz0sqC7o509257+GYXOSs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GULOADER SHELLCODE has been detected (YARA)

      • ab.jpeg.exe (PID: 4944)
    • GULOADER has been detected (YARA)

      • ab.jpeg.exe (PID: 4944)
  • SUSPICIOUS

    • Application launched itself

      • ab.jpeg.exe (PID: 6816)
    • Reads security settings of Internet Explorer

      • ab.jpeg.exe (PID: 4944)
  • INFO

    • The sample compiled with english language support

      • ab.jpeg.exe (PID: 6816)
    • Checks supported languages

      • ab.jpeg.exe (PID: 6816)
      • ab.jpeg.exe (PID: 4944)
    • Checks proxy server information

      • ab.jpeg.exe (PID: 4944)
    • Reads the machine GUID from the registry

      • ab.jpeg.exe (PID: 4944)
    • Reads the software policy settings

      • ab.jpeg.exe (PID: 4944)
    • Reads the computer name

      • ab.jpeg.exe (PID: 4944)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

guloader

(PID) Process(4944) ab.jpeg.exe
C2 (1)https://clearrange53.com/css/c/ab_hSVfCCrE233.bin
Keys
Xor (1)c2hlbGwzMgDrOPt5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH7ecYx2dDrKPt5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH46Cby//+awett6pb1WkE0qhB8bhXjsS5sH4HidgSgAC7DErpqalR64Yakz4vzR2xnScmH7xS2RiawWxsPvXr8+Hso02DGbde6Pr1nRCtcyX0lzz/kTAAjP+hQs9nVcxXxrOULeX9jD7BXd9xaXBZhcl7E...
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (69.4)
.exe | Win64 Executable (generic) (23.3)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:01:28 16:21:43+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 86016
InitializedDataSize: 8192
UninitializedDataSize: -
EntryPoint: 0x150c
OSVersion: 4
ImageVersion: 2.8
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.8.0.0
ProductVersionNumber: 2.8.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Hurtinx
FileDescription: Hurtinx
ProductName: tastvarle
FileVersion: 2.08
ProductVersion: 2.08
InternalName: Keyb
OriginalFileName: Keyb.exe
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ab.jpeg.exe no specs #GULOADER ab.jpeg.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4944"C:\Users\admin\AppData\Local\Temp\ab.jpeg.exe" C:\Users\admin\AppData\Local\Temp\ab.jpeg.exe
ab.jpeg.exe
User:
admin
Company:
Hurtinx
Integrity Level:
MEDIUM
Description:
Hurtinx
Version:
2.08
Modules
Images
c:\windows\syswow64\msvbvm60.dll
c:\users\admin\appdata\local\temp\ab.jpeg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
guloader
(PID) Process(4944) ab.jpeg.exe
C2 (1)https://clearrange53.com/css/c/ab_hSVfCCrE233.bin
Keys
Xor (1)c2hlbGwzMgDrOPt5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH7ecYx2dDrKPt5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH7ecYx+3nGMft5xjH46Cby//+awett6pb1WkE0qhB8bhXjsS5sH4HidgSgAC7DErpqalR64Yakz4vzR2xnScmH7xS2RiawWxsPvXr8+Hso02DGbde6Pr1nRCtcyX0lzz/kTAAjP+hQs9nVcxXxrOULeX9jD7BXd9xaXBZhcl7E...
5212C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6816"C:\Users\admin\AppData\Local\Temp\ab.jpeg.exe" C:\Users\admin\AppData\Local\Temp\ab.jpeg.exeexplorer.exe
User:
admin
Company:
Hurtinx
Integrity Level:
MEDIUM
Description:
Hurtinx
Exit code:
0
Version:
2.08
Modules
Images
c:\users\admin\appdata\local\temp\ab.jpeg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6944"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 524
Read events
3 521
Write events
3
Delete events
0

Modification events

(PID) Process:(4944) ab.jpeg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4944) ab.jpeg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4944) ab.jpeg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
39
DNS requests
13
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4944
ab.jpeg.exe
49.13.77.253:443
clearrange53.com
Hetzner Online GmbH
DE
malicious
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4688
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4688
SIHClient.exe
13.85.23.206:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.23
  • 20.190.159.73
  • 20.190.159.130
  • 40.126.31.69
  • 20.190.159.4
  • 40.126.31.71
  • 20.190.159.2
  • 40.126.31.67
whitelisted
clearrange53.com
  • 49.13.77.253
malicious
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
  • 2603:1030:800:5::bfee:a08d
whitelisted
206.23.85.13.in-addr.arpa
unknown
d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown

Threats

No threats detected
No debug info