Windows Analysis Report
SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe

Overview

General Information

Sample name: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe
Analysis ID: 1543086
MD5: 8bc8dfa75b6b62a90785f46221075ed3
SHA1: f55a2670f6b5945aab4033a66bc035ce0cf10e8d
SHA256: 9db830145716b1d60d3472934f02b289838d8bbef2fd9f50def9f6af6886529c
Tags: exe
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

AI detected suspicious sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Contains functionality for read data from the clipboard
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: Submited Sample Integrated Neural Analysis Model: Matched 89.9% probability
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_00410B5F CryptAcquireContextA,CryptGenRandom,CryptReleaseContext, 12_2_00410B5F
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe File created: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\readme.txt.txt Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00405D07 FindFirstFileA,FindClose, 0_2_00405D07
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA, 0_2_00405331
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_0040263E FindFirstFileA, 0_2_0040263E
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_0040501B SetLastError,malloc,GetFileAttributesW,wcscat,FindFirstFileW,free, 12_2_0040501B
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\Local\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\Local\Temp\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\ Jump to behavior

Networking

barindex
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_004114C1 recv,WSAGetLastError, 12_2_004114C1
Source: mongoose-2.11.exe0.0.dr, mongoose.conf.0.dr, mongoose.conf0.0.dr String found in binary or memory: http://code.google.com/p/mongoose/wiki/MongooseManual
Source: readme.txt.txt.0.dr String found in binary or memory: http://localhost/clientaccesspolicy.xml
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe String found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00404EE8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard, 0_2_00404EE8
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_004019DB __p___argv,OpenSCManagerA,GetModuleFileNameA,strncat,strncat,strncat,CreateServiceA,ChangeServiceConfig2A,OpenServiceA,DeleteService,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle, 12_2_004019DB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_004030FA EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,CoUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess, 0_2_004030FA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00406128 0_2_00406128
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_004046F9 0_2_004046F9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_004068FF 0_2_004068FF
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_0040D44D 12_2_0040D44D
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_00412456 12_2_00412456
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_0040E87B 12_2_0040E87B
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_00411829 12_2_00411829
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_004164F6 12_2_004164F6
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_00413084 12_2_00413084
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_0040D943 12_2_0040D943
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_0040E903 12_2_0040E903
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_0040EDEE 12_2_0040EDEE
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_0040E666 12_2_0040E666
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_00402609 12_2_00402609
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_004116D7 12_2_004116D7
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_0040DE89 12_2_0040DE89
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_00412349 12_2_00412349
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_004133C5 12_2_004133C5
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engine Classification label: mal52.troj.evad.winEXE@24/12@0/1
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_00401B0A GetLastError,FormatMessageA,MessageBoxA, 12_2_00401B0A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_004041FC GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA, 0_2_004041FC
Source: C:\Mongoose\mongoose-2.11.exe Code function: __p___argv,OpenSCManagerA,GetModuleFileNameA,strncat,strncat,strncat,CreateServiceA,ChangeServiceConfig2A,OpenServiceA,DeleteService,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle, 12_2_004019DB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar, 0_2_00402020
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_004011DD __p___argv,__p___argv,CreatePopupMenu,AppendMenuA,AppendMenuA,AppendMenuA,_snprintf,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,GetCursorPos,SetForegroundWindow,TrackPopupMenu,PostMessageA,DestroyMenu,Shell_NotifyIconA,PostQuitMessage,__p___argv,__p___argv,strcmp,StartServiceCtrlDispatcherA,exit,__p___argv,__p___argc,DefWindowProcA, 12_2_004011DD
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_004011DD __p___argv,__p___argv,CreatePopupMenu,AppendMenuA,AppendMenuA,AppendMenuA,_snprintf,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,GetCursorPos,SetForegroundWindow,TrackPopupMenu,PostMessageA,DestroyMenu,Shell_NotifyIconA,PostQuitMessage,__p___argv,__p___argv,strcmp,StartServiceCtrlDispatcherA,exit,__p___argv,__p___argc,DefWindowProcA, 12_2_004011DD
Source: C:\Mongoose\mongoose-2.11.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7084:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe File created: C:\Users\user\AppData\Local\Temp\nss8F7C.tmp Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" "
Source: SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: mongoose-2.11.exe String found in binary or memory: --help
Source: mongoose-2.11.exe String found in binary or memory: --help
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe File read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" "
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc stop mongoose
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc stop mongoose
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc delete mongoose echo 3:27:02.65
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc start mongoose
Source: unknown Process created: C:\Mongoose\mongoose-2.11.exe c:\Mongoose\mongoose-2.11.exe --
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" " Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc stop mongoose Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc stop mongoose Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc delete mongoose echo 3:27:02.65 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc start mongoose Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: acgenral.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: msacm32.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: riched20.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: usp10.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: msls31.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: acgenral.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: msacm32.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Windows\SysWOW64\sc.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\sc.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\SysWOW64\sc.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\SysWOW64\sc.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\SysWOW64\sc.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress, 0_2_00405D2E
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_00416A00 push eax; ret 12_2_00416A2E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe File created: C:\Mongoose\mongoose-2.11.exe Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe File created: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose-2.11.exe Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe File created: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\readme.txt.txt Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_004011DD __p___argv,__p___argv,CreatePopupMenu,AppendMenuA,AppendMenuA,AppendMenuA,_snprintf,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,AppendMenuA,GetCursorPos,SetForegroundWindow,TrackPopupMenu,PostMessageA,DestroyMenu,Shell_NotifyIconA,PostQuitMessage,__p___argv,__p___argv,strcmp,StartServiceCtrlDispatcherA,exit,__p___argv,__p___argc,DefWindowProcA, 12_2_004011DD
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc stop mongoose
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe Window / User API: threadDelayed 9680 Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe Decision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
Source: C:\Mongoose\mongoose-2.11.exe API coverage: 8.4 %
Source: C:\Mongoose\mongoose-2.11.exe TID: 6128 Thread sleep count: 256 > 30 Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe TID: 6128 Thread sleep time: -256000s >= -30000s Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe TID: 6128 Thread sleep count: 9680 > 30 Jump to behavior
Source: C:\Mongoose\mongoose-2.11.exe TID: 6128 Thread sleep time: -9680000s >= -30000s Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXE Last function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXE Last function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXE Last function: Thread delayed
Source: C:\Mongoose\mongoose-2.11.exe Last function: Thread delayed
Source: C:\Mongoose\mongoose-2.11.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\PING.EXE Last function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00405D07 FindFirstFileA,FindClose, 0_2_00405D07
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA, 0_2_00405331
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_0040263E FindFirstFileA, 0_2_0040263E
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_0040501B SetLastError,malloc,GetFileAttributesW,wcscat,FindFirstFileW,free, 12_2_0040501B
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\Local\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\Local\Temp\ Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe File opened: C:\Users\user\AppData\Local\Temp\Stand Alone CNP\ Jump to behavior
Source: mongoose-2.11.exe, 0000000C.00000002.4519330539.000000000074A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress, 0_2_00405D2E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\Stand Alone CNP\Mongoose\mongoose.bat" " Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc stop mongoose Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc stop mongoose Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc delete mongoose echo 3:27:02.65 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc create Mongoose binPath= "c:\Mongoose\mongoose-2.11.exe --" start= auto Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\sc.exe sc start mongoose Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1 Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop7.25259.29933.1105.exe Code function: 0_2_00405A2E GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA, 0_2_00405A2E
Source: C:\Mongoose\mongoose-2.11.exe Code function: 12_2_004034CD socket,bind,listen,calloc,closesocket,GetLastError,strerror,closesocket,GetLastError,strerror, 12_2_004034CD
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs