Automated Malware Analysis Report for Hitmanpro Universal Crack (64
Total Page:16
File Type:pdf, Size:1020Kb
ID: 40923 Sample Name: HitmanPro Universal Crack (64 bit).exe Cookbook: default.jbs Time: 05:18:12 Date: 25/12/2017 Version: 20.0.0 Table of Contents Table of Contents 2 Analysis Report 4 Overview 4 General Information 4 Detection 4 Confidence 4 Classification 5 Analysis Advice 5 Signature Overview 6 AV Detection: 6 Key, Mouse, Clipboard, Microphone and Screen Capturing: 6 Persistence and Installation Behavior: 6 Data Obfuscation: 6 Spreading: 6 System Summary: 6 HIPS / PFW / Operating System Protection Evasion: 7 Anti Debugging: 7 Malware Analysis System Evasion: 7 Language, Device and Operating System Detection: 7 Behavior Graph 7 Simulations 8 Behavior and APIs 8 Antivirus Detection 8 Initial Sample 8 Dropped Files 8 Domains 8 Yara Overview 8 Initial Sample 8 PCAP (Network Traffic) 8 Dropped Files 8 Memory Dumps 8 Unpacked PEs 8 Joe Sandbox View / Context 8 IPs 9 Domains 9 ASN 9 Dropped Files 9 Screenshot 9 Startup 10 Created / dropped Files 10 Contacted Domains/Contacted IPs 10 Contacted Domains 10 Contacted IPs 10 Static File Info 10 General 10 File Icon 11 Static PE Info 11 General 11 Entrypoint Preview 11 Data Directories 12 Sections 12 Resources 13 Imports 13 Network Behavior 13 Copyright Joe Security LLC 2017 Page 2 of 14 Code Manipulations 13 Statistics 13 System Behavior 13 Analysis Process: HitmanPro Universal Crack (64 bit).exe PID: 3256 Parent PID: 2948 13 General 13 File Activities 13 File Created 14 File Written 14 Disassembly 14 Code Analysis 14 Copyright Joe Security LLC 2017 Page 3 of 14 Analysis Report Overview General Information Joe Sandbox Version: 20.0.0 Analysis ID: 40923 Start time: 05:18:12 Joe Sandbox Product: CloudBasic Start date: 25.12.2017 Overall analysis duration: 0h 4m 50s Hypervisor based Inspection enabled: false Report type: light Sample file name: HitmanPro Universal Crack (64 bit).exe Cookbook file name: default.jbs Analysis system description: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Flash 26, Java 8.0.1440.1) Number of analysed new started processes analysed: 4 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies HCA enabled EGA enabled HDC enabled Detection: MAL Classification: mal60.winEXE@1/2@0/0 HCA Information: Successful, ratio: 100% Number of executed functions: 0 Number of non-executed functions: 0 EGA Information: Successful, ratio: 100% HDC Information: Successful, ratio: 39.8% (good quality ratio 39.1%) Quality average: 81.2% Quality standard deviation: 24.5% Cookbook Comments: Found application associated with file extension: .exe Warnings: Show All Exclude process from analysis (whitelisted): WmiApSrv.exe, dllhost.exe Detection Strategy Score Range Reporting Detection Threshold 60 0 - 100 Report FP / FN Confidence Strategy Score Range Further Analysis Required? Confidence Copyright Joe Security LLC 2017 Page 4 of 14 Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior Sample monitors Window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook Copyright Joe Security LLC 2017 Page 5 of 14 Signature Overview • AV Detection • Key, Mouse, Clipboard, Microphone and Screen Capturing • Persistence and Installation Behavior • Data Obfuscation • Spreading • System Summary • HIPS / PFW / Operating System Protection Evasion • Anti Debugging • Malware Analysis System Evasion • Language, Device and Operating System Detection Click to jump to signature section AV Detection: Antivirus detection for dropped file Antivirus detection for submitted file Key, Mouse, Clipboard, Microphone and Screen Capturing: Contains functionality for read data from the clipboard Persistence and Installation Behavior: Drops PE files Data Obfuscation: Binary may include packed or encrypted code Contains functionality to dynamically determine API calls PE file contains an invalid checksum Spreading: Contains functionality to enumerate / list files inside a directory System Summary: Contains modern PE file flags such as dynamic base (ASLR) or NX Classification label Contains functionality to load and extract PE file embedded resources Creates temporary files PE file has an executable .text section and no other executable section Reads software policies Sample is known by Antivirus (Virustotal or Metascan) Uses an in-process (OLE) Automation server PE file has an executable .text section which is very likely to contain packed code (zlib compression ratio < 0.3) Found potential string decryption / allocating functions PE file contains executable resources (Code or Archives) PE file contains strange resources Sample file is different than original file name gathered from version info PE file has a writeable .text section Copyright Joe Security LLC 2017 Page 6 of 14 HIPS / PFW / Operating System Protection Evasion: May try to detect the Windows Explorer process (often used for injection) Anti Debugging: Contains functionality for execution timing, often used to detect debuggers Contains functionality to dynamically determine API calls Contains functionality to read the PEB Malware Analysis System Evasion: Contains functionality to enumerate / list files inside a directory Contains functionality to query system information Program exit points Contains functionality for execution timing, often used to detect debuggers Found a high number of Window / User specific system calls (may be a loop to detect user behavior) May sleep (evasive loops) to hinder dynamic analysis Language, Device and Operating System Detection: Contains functionality to query windows version Behavior Graph Hide Legend Legend: Process Signature Created File Behavior Graph DNS/IP Info Is Dropped ID: 40923 Is Windows Process Number of created Registry Values Sample: HitmanPro Universal... Number of created Files Startdate: 25/12/2017 Visual Basic Architecture: WINDOWS Delphi Score: 60 Java .Net C# or VB.NET started C, C++ or other language Is malicious HitmanPro Universal... 2 dropped dropped dup2patcher.dll, PE32 bassmod.dll, PE32 Copyright Joe Security LLC 2017 Page 7 of 14 Simulations Behavior and APIs No simulations Antivirus Detection Initial Sample Source Detection Cloud Link HitmanPro Universal Crack (64 bit).exe 63% virustotal Browse HitmanPro Universal Crack (64 bit).exe 45% metadefender Browse Dropped Files Source Detection Cloud Link C:\Users\HERBBL~1\AppData\Local\Temp\bassmod.dll 3% virustotal Browse C:\Users\HERBBL~1\AppData\Local\Temp\bassmod.dll 0% metadefender Browse C:\Users\HERBBL~1\AppData\Local\Temp\dup2patcher.dll 25% virustotal Browse Domains No Antivirus matches Yara Overview Initial Sample No yara matches PCAP (Network Traffic) No yara matches Dropped Files No yara matches Memory Dumps No yara matches Unpacked PEs No yara matches Joe Sandbox View / Context Copyright Joe Security LLC 2017 Page 8 of 14 IPs No context Domains No context ASN No context Dropped Files Associated Sample Match Name / URL SHA 256 Detection Link Context C:\Users\HERBBL~1\AppData\Local\Temp\bassm poweriso.6.x.patch.exe 05418c503589319a46d7ba2cb95 malicious Browse od.dll ac0905dd3223752ef31c5257339f 4ef037850 agiledotnet-patch.exe 92225e5a84e8021a97a3e9b5b86 malicious Browse 6e000075ab2653e12f4cb5e1352 59de556cc3 Service Provider Lic 69909d397b447c084230aba457e malicious Browse ense.exe 10599425a6389bf52f3baf2530a6 56cfa47ad GlassWire #U7eInjector e448b5d6e0db6a837a9be4d0605 malicious Browse #U7eUniversal Cra 298a720ac525a783302a21cfb09f ck.exe 08d77e54f Screenshot Copyright Joe Security LLC 2017 Page 9 of 14 Startup System is w7 HitmanPro Universal Crack (64 bit).exe (PID: 3256 cmdline: 'C:\Users\user\Desktop\HitmanPro Universal Crack (64 bit).exe' MD5: C4433CA2721EADC9F423418B12702CF3) cleanup Created / dropped Files C:\Users\HERBBL~1\AppData\Local\Temp\bassmod.dll File Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows MD5: 780D14604D49E3C634200C523DEF8351 SHA1: E208EF6F421D2260070A9222F1F918F1DE0A8EEB SHA-256: 844EB66A10B848D3A71A8C63C35F0A01550A46D2FF8503E2CA8947978B03B4D2 SHA-512: A49C030F11DA8F0CDC4205C86BEC00653EC2F8899983CAD9D7195FD23255439291AAEC5A7E128E1A103EFD93B8566E86F 15AF89EBA4EFEBF9DEBCE14A7A5564B Malicious: false Antivirus: Antivirus: virustotal, Detection: 3%, Browse Antivirus: metadefender, Detection: 0%, Browse Reputation: low C:\Users\HERBBL~1\AppData\Local\Temp\dup2patcher.dll File Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows MD5: 4749BFF0E381AFCC30F3B4E2561DAF3A SHA1: C09E868DFA1C2364F3896F73F78A59722EF5F88B SHA-256: 0B613DF892AA456419CBEAD866F6E5D8FEFAC21F4BDDB3EB4EFAC7FB9DA2C3B6 SHA-512: C00BFA854B28D72050DFEB86B8D80C2CFAC55B211A5268AA4DD3DCE74E48FB369029BAC63F7F4BC5CE818DCFDD44D3 E3E16847275F9B586CDF4EA30170E7D5C9 Malicious: true Antivirus: Antivirus: virustotal, Detection: 25%, Browse Reputation: low Contacted Domains/Contacted IPs Contacted Domains No contacted domains info Contacted IPs No contacted IP infos Static File Info General File type: PE32 executable (GUI) Intel 80386, for MS Windows TrID: Win32 Executable (generic) a (10002005/4) 99.96% Generic Win/DOS Executable (2004/3) 0.02% DOS Executable Generic (2002/1)