Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.MulDrop16.9965.2278.18780

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.MulDrop16.9965.2278.18780 (renamed file extension from 18780 to exe)
Analysis ID:345042
MD5:e750511892ab532fb2147f4537dabcfd
SHA1:d78aa528d38fa57bd3a5bf591cbd4437ebcdf377
SHA256:4328e4ac330339d884b95d99128404d4f8b5d6b695a9f583ff4c3f3a61ac4ff8

Detection

AgentTesla
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM_3
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains capabilities to detect virtual machines
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.225631461.0000000002DD1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.225667409.0000000002E28000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.226077491.0000000012DE1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Process Memory Space: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe PID: 5660JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe PID: 5660JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Scheduled temp file as task from temp locationShow sources
            Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XdwuEt' /XML 'C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XdwuEt' /XML 'C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe' , ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, ParentProcessId: 5660, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XdwuEt' /XML 'C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp', ProcessId: 4864

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\XdwuEt.exeVirustotal: Detection: 35%Perma Link
            Source: C:\Users\user\AppData\Roaming\XdwuEt.exeReversingLabs: Detection: 13%
            Multi AV Scanner detection for submitted fileShow sources
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeVirustotal: Detection: 35%Perma Link
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeReversingLabs: Detection: 13%
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\XdwuEt.exeJoe Sandbox ML: detected
            Machine Learning detection for sampleShow sources
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeJoe Sandbox ML: detected

            Compliance:

            barindex
            Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225631461.0000000002DD1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.226077491.0000000012DE1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip

            System Summary:

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeCode function: 3_2_00909369
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeCode function: 4_2_00179369
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeCode function: 5_2_00E99369
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeCode function: 6_2_006E9369
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeCode function: 7_2_00F39369
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000000.213372307.0000000000982000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLocalActivator.exe vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225583426.0000000002C00000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.229284290.000000001B760000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225597685.0000000002C60000.00000002.00000001.sdmpBinary or memory string: originalfilename vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225597685.0000000002C60000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225528629.0000000002B30000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.226077491.0000000012DE1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.226077491.0000000012DE1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameblDfexytmIsjktOhVhedavVGNLfjoGevXVht.exe4 vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225398705.0000000000F4B000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000003.00000000.221181067.0000000000902000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLocalActivator.exe vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000004.00000002.222227234.0000000000172000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLocalActivator.exe vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000005.00000000.223073350.0000000000E92000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLocalActivator.exe vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000006.00000000.223922655.00000000006E2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLocalActivator.exe vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000007.00000002.224874903.0000000000F32000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLocalActivator.exe vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeBinary or memory string: OriginalFilenameLocalActivator.exe vs SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: XdwuEt.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal96.troj.evad.winEXE@14/4@0/0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeFile created: C:\Users\user\AppData\Roaming\XdwuEt.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeMutant created: \Sessions\1\BaseNamedObjects\bekswvIDa
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4700:120:WilError_01
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeFile created: C:\Users\user\AppData\Local\Temp\tmpCBF8.tmpJump to behavior
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeVirustotal: Detection: 35%
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeReversingLabs: Detection: 13%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe'
            Source: unknownProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XdwuEt' /XML 'C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XdwuEt' /XML 'C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp'
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: initial sampleStatic PE information: section name: .text entropy: 7.80365257713
            Source: initial sampleStatic PE information: section name: .text entropy: 7.80365257713
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeFile created: C:\Users\user\AppData\Roaming\XdwuEt.exeJump to dropped file

            Boot Survival:

            barindex
            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
            Source: unknownProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XdwuEt' /XML 'C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp'
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM_3Show sources
            Source: Yara matchFile source: 00000000.00000002.225631461.0000000002DD1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.225667409.0000000002E28000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe PID: 5660, type: MEMORY
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225667409.0000000002E28000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225667409.0000000002E28000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeCode function: 3_2_0090471C sldt word ptr [edx]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe TID: 5936Thread sleep time: -53886s >= -30000s
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe TID: 6136Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225667409.0000000002E28000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225667409.0000000002E28000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225667409.0000000002E28000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225667409.0000000002E28000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XdwuEt' /XML 'C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp'
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe VolumeInformation
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000000.00000002.226077491.0000000012DE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe PID: 5660, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000000.00000002.226077491.0000000012DE1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe PID: 5660, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection11Masquerading1OS Credential DumpingSecurity Software Discovery211Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion4LSASS MemoryVirtualization/Sandbox Evasion4Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe35%VirustotalBrowse
            SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe13%ReversingLabsByteCode-MSIL.Trojan.Pwsx
            SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\XdwuEt.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\XdwuEt.exe35%VirustotalBrowse
            C:\Users\user\AppData\Roaming\XdwuEt.exe13%ReversingLabsByteCode-MSIL.Trojan.Pwsx

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.225631461.0000000002DD1000.00000004.00000001.sdmpfalse
              high
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipSecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe, 00000000.00000002.226077491.0000000012DE1000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:31.0.0 Emerald
              Analysis ID:345042
              Start date:27.01.2021
              Start time:16:14:38
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 0s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:SecuriteInfo.com.Trojan.MulDrop16.9965.2278.18780 (renamed file extension from 18780 to exe)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:8
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal96.troj.evad.winEXE@14/4@0/0
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 4.5% (good quality ratio 2.5%)
              • Quality average: 31%
              • Quality standard deviation: 32.2%
              HCA Information:Failed
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Stop behavior analysis, all processes terminated
              Warnings:
              Show All
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              16:15:31API Interceptor2x Sleep call for process: SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe modified

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe.log
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):1742
              Entropy (8bit):5.381353871108486
              Encrypted:false
              SSDEEP:48:MxHKEYHKGD8Ao6+vxpNl1qHGiD0HKeGitHTG1hAHKKPJAmHKoA9:iqEYqGgAo9ZPlwmI0qertzG1eqKPJ/qT
              MD5:978918F6120A43D1FA5899938A5A542F
              SHA1:6567A2E687B40BFD3A46246F51F4C89D93D89455
              SHA-256:F814F290A540B3FD755D05F3434317D7B26F2C33D2087F9E63233CD88AB510FC
              SHA-512:1DF2AF5A3F8212BF591AAA366FE96F167F3E6D43746E07B7CD44F1B2F06C63B1D290412891AD0B4D0A82D1DFD6EB2EB7D70981C35941F370DC97729E9205DD53
              Malicious:true
              Reputation:moderate, very likely benign file
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\f2e0589ed6d670f264a5f65dd0ad000f\Microsoft.VisualBasic.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_6
              C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1639
              Entropy (8bit):5.184744549823039
              Encrypted:false
              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBLQrtn:cbh47TlNQ//rydbz9I3YODOLNdq3NQp
              MD5:90BBB757FD516A98CE985F615199C9C5
              SHA1:D17490C1D27995F6B68F137D14E6732A3E156C2C
              SHA-256:C90368DA6B08D81AF46467FCD1F37550E9A11393DFDFBE0FBE372C61416D1708
              SHA-512:EF79D2570DF43FF1BB12E049D49286BB3011BE58203E48FEDF283AB31DC0E5F358B86806D1E2B8A73436A313C26720C5EBEE4AA0E552C81E357D6D657287450B
              Malicious:true
              Reputation:low
              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
              C:\Users\user\AppData\Roaming\XdwuEt.exe
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):541184
              Entropy (8bit):7.789762421792232
              Encrypted:false
              SSDEEP:12288:jgDW4PmoO4lv8zw7n9AXJBkwVHI3eC9Z9rzWmvRM:L4uoO4VnsJRHc/zJ
              MD5:E750511892AB532FB2147F4537DABCFD
              SHA1:D78AA528D38FA57BD3A5BF591CBD4437EBCDF377
              SHA-256:4328E4AC330339D884B95D99128404D4F8B5D6B695A9F583FF4C3F3A61AC4FF8
              SHA-512:F0C1AF9E1B8175EA91337702FFA8140DD0C901C8AC570A1DEF1299F2493EFC6FD66F36E19C8AE6B1B5C2B0F174A44A8754761A30EB2E652F3FC2E8D90A939BD5
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Virustotal, Detection: 35%, Browse
              • Antivirus: ReversingLabs, Detection: 13%
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.........."...P..6...........U... ...`....@.. ....................................@.................................tU..O....`..`............................................................................ ............... ..H............text....5... ...6.................. ..`.rsrc...`....`.......8..............@..@.reloc...............@..............@..B.................U......H.......|...............,...H............................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*&..(1....*...0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....
              C:\Users\user\AppData\Roaming\XdwuEt.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview: [ZoneTransfer]....ZoneId=0

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.789762421792232
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              • Win32 Executable (generic) a (10002005/4) 49.75%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Windows Screen Saver (13104/52) 0.07%
              • Generic Win/DOS Executable (2004/3) 0.01%
              File name:SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              File size:541184
              MD5:e750511892ab532fb2147f4537dabcfd
              SHA1:d78aa528d38fa57bd3a5bf591cbd4437ebcdf377
              SHA256:4328e4ac330339d884b95d99128404d4f8b5d6b695a9f583ff4c3f3a61ac4ff8
              SHA512:f0c1af9e1b8175ea91337702ffa8140dd0c901c8ac570a1def1299f2493efc6fd66f36e19c8ae6b1b5c2b0f174a44a8754761a30eb2e652f3fc2e8d90a939bd5
              SSDEEP:12288:jgDW4PmoO4lv8zw7n9AXJBkwVHI3eC9Z9rzWmvRM:L4uoO4VnsJRHc/zJ
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.........."...P..6...........U... ...`....@.. ....................................@................................

              File Icon

              Icon Hash:00828e8e8686b000

              Static PE Info

              General

              Entrypoint:0x4855c6
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x601113D8 [Wed Jan 27 07:18:48 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v4.0.30319
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Entrypoint Preview

              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x855740x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x660.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x835cc0x83600False0.878449096099data7.80365257713IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rsrc0x860000x6600x800False0.3466796875data3.54395993413IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x880000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_VERSION0x860900x3d0data
              RT_MANIFEST0x864700x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Version Infos

              DescriptionData
              Translation0x0000 0x04b0
              LegalCopyrightSteffen Henjes
              Assembly Version0.2.0.0
              InternalNameLocalActivator.exe
              FileVersion0.2.0.0
              CompanyNamewww.steffen-blogging.de
              LegalTrademarks
              Comments
              ProductNameDummy File Creator - powered by steffen-blogging.de
              ProductVersion0.2.0.0
              FileDescriptionDFC - Dummy File Creator
              OriginalFilenameLocalActivator.exe

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:16:15:30
              Start date:27/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Wow64 process (32bit):false
              Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe'
              Imagebase:0x980000
              File size:541184 bytes
              MD5 hash:E750511892AB532FB2147F4537DABCFD
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.225631461.0000000002DD1000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.225667409.0000000002E28000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.226077491.0000000012DE1000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              General

              Start time:16:15:32
              Start date:27/01/2021
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XdwuEt' /XML 'C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp'
              Imagebase:0x7ff634190000
              File size:226816 bytes
              MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              General

              Start time:16:15:33
              Start date:27/01/2021
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6b2800000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:16:15:33
              Start date:27/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Imagebase:0x900000
              File size:541184 bytes
              MD5 hash:E750511892AB532FB2147F4537DABCFD
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              General

              Start time:16:15:34
              Start date:27/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Imagebase:0x170000
              File size:541184 bytes
              MD5 hash:E750511892AB532FB2147F4537DABCFD
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              General

              Start time:16:15:34
              Start date:27/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Imagebase:0xe90000
              File size:541184 bytes
              MD5 hash:E750511892AB532FB2147F4537DABCFD
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              General

              Start time:16:15:35
              Start date:27/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Imagebase:0x6e0000
              File size:541184 bytes
              MD5 hash:E750511892AB532FB2147F4537DABCFD
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              General

              Start time:16:15:35
              Start date:27/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
              Imagebase:0xf30000
              File size:541184 bytes
              MD5 hash:E750511892AB532FB2147F4537DABCFD
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >