File name:

payment_pdf.scr

Full analysis: https://app.any.run/tasks/217771ca-e710-4bde-bb61-f60f77f93a5e
Verdict: Malicious activity
Threats:

GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities.

Analysis date: April 29, 2025, 08:59:16
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
remcos
rat
remote
guloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

666A0C75ECC8BEF874684EF880B1C863

SHA1:

1F670C47FDE6079A7EB4F2615609F24620CE06EE

SHA256:

84EC208034EFD0DFFB844A7CA79DFDF07D1FA63C5122F9980192AA302C908C64

SSDEEP:

49152:VChySFMAaGyzdlRHd2enVr9McC4eYgQY7GkPmVgYa6bOHgKJmPG8GzEPewQmKYsJ:VCH6zFHoyVxMcfe37GkOSY5bOHgKRzES

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • payment_pdf.scr.exe (PID: 1812)
    • GULOADER has been detected (YARA)

      • msiexec.exe (PID: 4756)
    • GULOADER SHELLCODE has been detected (YARA)

      • msiexec.exe (PID: 4756)
    • REMCOS has been detected

      • msiexec.exe (PID: 4756)
    • REMCOS mutex has been found

      • msiexec.exe (PID: 4756)
    • REMCOS has been detected (SURICATA)

      • msiexec.exe (PID: 4756)
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • payment_pdf.scr.exe (PID: 1812)
    • Converts a specified value to a byte (POWERSHELL)

      • powershell.exe (PID: 4980)
    • Executable content was dropped or overwritten

      • payment_pdf.scr.exe (PID: 1812)
      • powershell.exe (PID: 4980)
    • Starts POWERSHELL.EXE for commands execution

      • payment_pdf.scr.exe (PID: 1812)
    • Connects to unusual port

      • msiexec.exe (PID: 4756)
    • Contacting a server suspected of hosting an CnC

      • msiexec.exe (PID: 4756)
  • INFO

    • The sample compiled with english language support

      • payment_pdf.scr.exe (PID: 1812)
      • powershell.exe (PID: 4980)
    • Reads the computer name

      • payment_pdf.scr.exe (PID: 1812)
    • Creates files or folders in the user directory

      • payment_pdf.scr.exe (PID: 1812)
    • Checks supported languages

      • payment_pdf.scr.exe (PID: 1812)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 4980)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 4980)
    • Create files in a temporary directory

      • payment_pdf.scr.exe (PID: 1812)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 4980)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 4980)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 4980)
    • Checks proxy server information

      • msiexec.exe (PID: 4756)
      • slui.exe (PID: 4464)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 4756)
    • Reads the software policy settings

      • msiexec.exe (PID: 4756)
      • slui.exe (PID: 4464)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:07:09 04:21:49+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 25600
InitializedDataSize: 186368
UninitializedDataSize: 2048
EntryPoint: 0x32a0
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.5.0.0
ProductVersionNumber: 3.5.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: ananaples folketingsbetjentens
FileDescription: slumgullion
LegalTrademarks: debatside tyverisikres chugging
OriginalFileName: bureaukratisk.exe
ProductName: rygelige turmalin fordrev
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start payment_pdf.scr.exe powershell.exe conhost.exe no specs #REMCOS msiexec.exe conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1812"C:\Users\admin\Desktop\payment_pdf.scr.exe" C:\Users\admin\Desktop\payment_pdf.scr.exe
explorer.exe
User:
admin
Company:
ananaples folketingsbetjentens
Integrity Level:
MEDIUM
Description:
slumgullion
Exit code:
4294967295
Modules
Images
c:\users\admin\desktop\payment_pdf.scr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2088\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2560\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4464C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4756"C:\WINDOWS\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\mshtml.dll
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4980"powershell.exe" -windowstyle minimized "$Gley=gc -Raw 'C:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Babelstaarnets192\Nonrivals.Not12';$Regnbuerne=$Gley.SubString(53282,3);.$Regnbuerne($Gley)"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
payment_pdf.scr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
14 634
Read events
14 630
Write events
4
Delete events
0

Modification events

(PID) Process:(4756) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-VIZ8IU
Operation:writeName:exepath
Value:
94886E31C59E101477985AD71045C127C0967C8425B12300EEF11B59BF4A754F7899DE63B8FC87F0CBA2AB6ECD851D999223750CE49EB623D3695C3AB6A9FF15
(PID) Process:(4756) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-VIZ8IU
Operation:writeName:licence
Value:
E73D82D1D2C493D03A1949B0B6E0ABB9
(PID) Process:(4756) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-VIZ8IU
Operation:writeName:time
Value:
(PID) Process:(4756) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Rmc-VIZ8IU
Operation:writeName:UID
Value:
Executable files
3
Suspicious files
11
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Tredjeverdenslandet.Pedbinary
MD5:33709827C4D88C4927BF889F4FCB7E77
SHA256:B0F03F01A1EA75A3550C1F071248CB653F85057706944CB8769282491BF60A36
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Babelstaarnets192\Mejeriejeren.jpgbinary
MD5:E4B703186655532B1F4EF3931C219AD1
SHA256:0C48DF7E82E94B3788DD9BF0EDA9043FA39B0118C478450867AC4B8309B6BB97
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Prototypisk\ordinariate.txttext
MD5:BB02832932EB12D7822277CE8FD805A1
SHA256:641E7E2A4D1B69923252B658585718572B68E751A82ED0C0F82BE9888A6B05CA
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Bortsalg\weanlings.initext
MD5:E2601B6F2D8182914802F455132D0113
SHA256:7E2C5555AFC2B3E31326BA71B3654EE50F0FCCBDFACF23B5798993024B88C91A
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Prototypisk\scovel.jpgbinary
MD5:E835EEFF3055F10B52685664AB329B93
SHA256:6B963C92223CDE77CA5E9ED0A079FAAE84284CF0A49B5FFDAA2D004FB90E1D8D
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Prototypisk\pharmakos.jpgbinary
MD5:8CFFC98FA07A2A66539B89635691B440
SHA256:114FD542A7B8E67E9639A6810834FBD09B6AFEE1B4F1BD2EAF92A4C76EBA458D
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Babelstaarnets192\Skorstenspiben.txttext
MD5:A2EEC6406179A0468360EBF60CC57F20
SHA256:C9A80635CFF5CC2F6D45AC5FFDC2BF79C78740CDB4142B8CABF0A20F12D92FB1
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Babelstaarnets192\holostomatous.txttext
MD5:907C974E71C8D4E6F46D45F3EB3BBCBE
SHA256:7688AE2A5A2524F686E450ACC84DE0FACB65068EABB606AA0DFAC662C054BE64
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Babelstaarnets192\forsook.txttext
MD5:14CC961192865985A79B3F06BD35EC1F
SHA256:38A7635D744F9C786380235E4856A7E9CAA871D6FE8ACF0C2524338A12C436EB
1812payment_pdf.scr.exeC:\Users\admin\AppData\Roaming\gadekrydsenes\spatiums\Prototypisk\rskenerne.jpgbinary
MD5:E72E8A52F30A4772D0DC71EDBC5CE422
SHA256:654D8849015367BB433BC61C9C124E9B1B613A6042BBF4E777AC2947FD52D025
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
113
DNS requests
10
Threats
183

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
303
216.58.206.46:443
https://drive.google.com/uc?export=download&id=12kSXdEOw4tQaaZKW4GOHaf0IxfvdmCnZ
unknown
2104
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
142.250.185.193:443
https://drive.usercontent.google.com/download?id=12kSXdEOw4tQaaZKW4GOHaf0IxfvdmCnZ&export=download
unknown
binary
487 Kb
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
23.216.77.18:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.21
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
drive.google.com
  • 142.250.185.206
whitelisted
drive.usercontent.google.com
  • 142.250.185.193
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
4756
msiexec.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 30
4756
msiexec.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4756
msiexec.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
4756
msiexec.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4756
msiexec.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
4756
msiexec.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
4756
msiexec.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4756
msiexec.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
4756
msiexec.exe
Malware Command and Control Activity Detected
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
4756
msiexec.exe
A Network Trojan was detected
REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash
No debug info