Automated Malware Analysis Report for FAKE SSS ID-Pdf
Total Page:16
File Type:pdf, Size:1020Kb
ID: 214287 Sample Name: FAKE SSS ID- pdf.exe Cookbook: default.jbs Time: 14:43:07 Date: 10/03/2020 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report FAKE SSS ID-pdf.exe 4 Overview 4 General Information 4 Detection 4 Confidence 5 Classification Spiderchart 5 Analysis Advice 6 Mitre Att&ck Matrix 6 Signature Overview 7 AV Detection: 7 Spreading: 7 Networking: 7 Key, Mouse, Clipboard, Microphone and Screen Capturing: 8 System Summary: 8 Data Obfuscation: 8 Persistence and Installation Behavior: 8 Hooking and other Techniques for Hiding and Protection: 8 Malware Analysis System Evasion: 9 Anti Debugging: 9 HIPS / PFW / Operating System Protection Evasion: 9 Language, Device and Operating System Detection: 9 Stealing of Sensitive Information: 9 Remote Access Functionality: 9 Malware Configuration 9 Behavior Graph 10 Simulations 10 Behavior and APIs 10 Antivirus, Machine Learning and Genetic Malware Detection 10 Initial Sample 10 Dropped Files 10 Unpacked PE Files 10 Domains 11 URLs 11 Yara Overview 11 Initial Sample 11 PCAP (Network Traffic) 11 Dropped Files 11 Memory Dumps 11 Unpacked PEs 11 Sigma Overview 11 Joe Sandbox View / Context 11 IPs 11 Domains 11 ASN 12 JA3 Fingerprints 12 Dropped Files 12 Screenshots 12 Thumbnails 12 Startup 13 Created / dropped Files 13 Domains and IPs 18 Contacted Domains 18 URLs from Memory and Binaries 18 Contacted IPs 19 Static File Info 19 General 19 File Icon 19 Static PE Info 19 Copyright Joe Security LLC 2020 Page 2 of 36 General 19 Entrypoint Preview 20 Rich Headers 21 Data Directories 21 Sections 21 Resources 21 Imports 22 Possible Origin 22 Network Behavior 22 Code Manipulations 22 Statistics 23 Behavior 23 System Behavior 23 Analysis Process: FAKE SSS ID-pdf.exe PID: 3540 Parent PID: 3860 23 General 23 File Activities 23 File Created 23 File Deleted 25 File Written 25 File Read 35 Registry Activities 35 Analysis Process: wscript.exe PID: 3624 Parent PID: 3540 35 General 35 File Activities 35 Registry Activities 36 Analysis Process: oitpmotjn.exe PID: 1684 Parent PID: 3624 36 General 36 Disassembly 36 Code Analysis 36 Copyright Joe Security LLC 2020 Page 3 of 36 Analysis Report FAKE SSS ID-pdf.exe Overview General Information Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 214287 Start date: 10.03.2020 Start time: 14:43:07 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 8m 51s Hypervisor based Inspection enabled: false Report type: light Sample file name: FAKE SSS ID-pdf.exe Cookbook file name: default.jbs Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 Number of analysed new started processes analysed: 4 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled HDC enabled AMSI enabled Analysis stop reason: Timeout Detection: MAL Classification: mal64.evad.winEXE@5/20@0/0 EGA Information: Successful, ratio: 100% HDC Information: Successful, ratio: 99.8% (good quality ratio 95.6%) Quality average: 79.6% Quality standard deviation: 27.2% HCA Information: Successful, ratio: 53% Number of executed functions: 0 Number of non-executed functions: 0 Cookbook Comments: Adjust boot time Enable AMSI Found application associated with file extension: .exe Stop behavior analysis, all processes terminated Warnings: Show All Exclude process from analysis (whitelisted): dllhost.exe Report size exceeded maximum capacity and may have missing disassembly code. Report size getting too big, too many NtOpenKeyEx calls found. Report size getting too big, too many NtProtectVirtualMemory calls found. Report size getting too big, too many NtQueryValueKey calls found. Timeout during Intezer genetic analysis for /opt/package/joesandbox/database/analysis/21428 7/sample/FAKE SSS ID-pdf.exe Timeout during Intezer genetic analysis for unpackpe/0.2.FAKE SSS ID- pdf.exe.eb0000.1.unpack Detection Strategy Score Range Reporting Whitelisted Detection Copyright Joe Security LLC 2020 Page 4 of 36 Strategy Score Range Reporting Whitelisted Detection Threshold 64 0 - 100 false Confidence Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Spiderchart Copyright Joe Security LLC 2020 Page 5 of 36 Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior Sample has functionality to log and monitor keystrokes, analyze it with the 'Simulates keyboard and window changes' cookbook Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--") Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior Mitre Att&ck Matrix Privilege Credential Lateral Command Network Initial Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Effects Valid Scripting 1 1 Valid Exploitation for Software Packing 1 Input System Time Remote File Input Data Commonly Eavesdrop on Accounts 2 Accounts 2 Privilege Capture 2 1 Discovery 2 Copy 1 Capture 2 1 Encrypted 1 Used Port 1 Insecure Escalation 1 Network Communication Copyright Joe Security LLC 2020 Page 6 of 36 Privilege Credential Lateral Command Network Initial Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Effects Replication Execution Port Valid Accounts 2 Disabling Security Network Account Remote Clipboard Exfiltration Remote File Exploit SS7 to Through through API 2 Monitors Tools 1 Sniffing Discovery 1 Services Data 2 Over Other Copy 1 Redirect Phone Removable Network Calls/SMS Media Medium External Graphical User Accessibility Access Token Deobfuscate/Decode Input Capture Security Software Windows Data from Automated Standard Exploit SS7 to Remote Interface 2 Features Manipulation 2 1 Files or Discovery 1 2 1 Remote Network Exfiltration Cryptographic Track Device Services Information 1 Management Shared Drive Protocol 1 Location Drive-by Command- System Process Scripting 1 1 Credentials in File and Directory Logon Input Capture Data Multiband SIM Card Compromise Line Firmware Injection 1 2 Files Discovery 3 Scripts Encrypted Communication Swap Interface 2 Exploit Public- Command- Shortcut File System Obfuscated Files or Account System Shared Data Staged Scheduled Standard Manipulate Facing Line Interface Modification Permissions Information 2 Manipulation Information Webroot Transfer Cryptographic Device Application Weakness Discovery 2 6 Protocol Communication Spearphishing Graphical User Modify New Service Masquerading 1 1 Brute Force Query Registry 1 Third-party Screen Data Commonly Jamming or Link Interface Existing Software Capture Transfer Used Port Denial of Service Size Limits Service Spearphishing Scripting Path Scheduled Task Valid Accounts 2 Two-Factor Process Pass the Email Exfiltration Uncommonly Rogue Wi-Fi Attachment Interception Authentication Discovery 2 Hash Collection Over Used Port Access Points Interception Command and Control Channel Spearphishing Third-party Logon Process Injection Access Token Bash History Application Remote Clipboard Exfiltration Standard Downgrade to via Service Software Scripts Manipulation 2 1 Window Desktop Data Over Application Insecure Discovery 1 Protocol Alternative Layer Protocol Protocols Protocol Supply Chain Rundll32 DLL Search Service Registry Process Input Prompt System Windows Automated Exfiltration Multilayer Rogue Cellular Compromise Order Permissions Injection 1 2 Owner/User Admin Collection Over Encryption Base Station Hijacking Weakness Discovery 1 Shares Physical Medium Trusted PowerShell Change Exploitation for DLL Side- Keychain Process Discovery Taint Shared Audio Commonly Connection Relationship Default File Privilege Loading 1 Content Capture Used Port Proxy Association Escalation Signature Overview • AV Detection • Spreading • Networking • Key, Mouse, Clipboard, Microphone and Screen Capturing • System Summary • Data Obfuscation • Persistence and Installation Behavior • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection • Stealing of Sensitive Information • Remote Access Functionality Click to jump to signature section AV Detection: Multi AV Scanner detection for dropped file Multi AV Scanner detection for submitted file Spreading: Contains functionality to enumerate / list files inside a directory Enumerates the file system Networking: Copyright Joe Security LLC 2020 Page 7 of 36 Contains functionality to download additional files from the internet Urls found in memory or binary data Key, Mouse, Clipboard, Microphone and Screen Capturing: Contains functionality for read data from the clipboard Contains functionality to read the clipboard data Contains functionality to retrieve information about pressed keystrokes Potential key logger detected (key state polling based) System Summary: Contains functionality to communicate with device drivers