Automated Malware Analysis Report For
Total Page:16
File Type:pdf, Size:1020Kb
ID: 314925 Sample Name: WebCompanion.exe Cookbook: default.jbs Time: 05:11:03 Date: 12/11/2020 Version: 31.0.0 Red Diamond Table of Contents Table of Contents 2 Analysis Report WebCompanion.exe 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Analysis Advice 4 Startup 4 Malware Configuration 4 Yara Overview 4 Sigma Overview 4 Signature Overview 5 Mitre Att&ck Matrix 5 Behavior Graph 5 Screenshots 6 Thumbnails 6 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 URLs 7 Domains and IPs 8 Contacted Domains 8 URLs from Memory and Binaries 8 Contacted IPs 10 Public 11 Private 11 General Information 11 Simulations 12 Behavior and APIs 12 Joe Sandbox View / Context 12 IPs 12 Domains 12 ASN 13 JA3 Fingerprints 13 Dropped Files 13 Created / dropped Files 13 Static File Info 14 General 14 File Icon 14 Static PE Info 14 General 14 Authenticode Signature 15 Entrypoint Preview 15 Data Directories 16 Sections 17 Resources 17 Imports 17 Network Behavior 17 UDP Packets 17 Code Manipulations 18 Statistics 19 Behavior 19 Copyright null 2020 Page 2 of 20 System Behavior 19 Analysis Process: WebCompanion.exe PID: 7132 Parent PID: 5936 19 General 19 File Activities 19 File Created 19 File Read 19 Analysis Process: dw20.exe PID: 4164 Parent PID: 7132 20 General 20 File Activities 20 Registry Activities 20 Disassembly 20 Code Analysis 20 Copyright null 2020 Page 3 of 20 Analysis Report WebCompanion.exe Overview General Information Detection Signatures Classification Sample WebCompanion.exe Name: CChheecckkss iiifff ttthhee ccuurrrrrreennttt pprrroocceessss iiiss bbeeiiinn… Analysis ID: 314925 CCrrhreeeaactttkeess iafa t phprreroo cceuesrsrsse iniinnt spsuruosscppeesnnsdd eiesdd b meioon… MD5: 3496336940e172… OCnrneeea otoerrr s m aoo prrreero ppcrrreoosccsee sisnss esesus s ccprrraeasnshdhed mo SHA1: ec254f19067046b… Ransomware POPEEn e fffii illoleer ccmoonontrttaeaii inpnsrso sscttterrraasnsngegese rcrreerassosohuurrrcceess Miner Spreading SHA256: f9e63f937f2636f1… QPEuue efrirliiee ssc oddniisstkak i ininnsffo osrrtmraaanttigiooenn r (e(oosfftoteeunnr c uuessseedd Quueerrriiieess ddiiisskk iiinnfffoorrrmaatttiiioonn (((oofffttteenn uusseedd… mmaallliiiccciiioouusss Most interesting Screenshot: malicious Evader Phishing sssuusssppiiiccciiioouusss SQSaaumerppielllees fffdiiillleies kiiiss i nddfiiioffffffreemrrreeanntittto tttnhh aa(onnf tooerrrniiigg uiiinnsaaelll d … suspicious cccllleeaann clean SSttatoomrrreepssl e llla afrrirlggeee i s bb idiinniafafrerryyr e ddnaattt tatah ttatoon tt thoherei g rrreienggaiiisls ttt… Exploiter Banker TSTrrtriioieersse stttoo l a llloorgaaedd bminiiissassriiyinn gdg a DDtaLL LLtoss the regist Tries to load missing DLLs Spyware Trojan / Bot Adware Score: 3 Range: 0 - 100 Whitelisted: false Confidence: 40% Analysis Advice Sample crashes during execution, try analyze it on another analysis machine Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--") Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior Startup System is w10x64 WebCompanion.exe (PID: 7132 cmdline: 'C:\Users\user\Desktop\WebCompanion.exe' MD5: 3496336940E172B597FA057C258834F1) dw20.exe (PID: 4164 cmdline: dw20.exe -x -s 1312 MD5: 8D10DA8A3E11747E51F23C882C22BBC3) cleanup Malware Configuration No configs have been found Yara Overview No yara matches Sigma Overview No Sigma rule has matched Copyright null 2020 Page 4 of 20 Signature Overview • Networking • System Summary • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection Click to jump to signature section There are no malicious signatures, click here to show all signatures . Mitre Att&ck Matrix Remote Initial Privilege Credential Lateral Command Network Service Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Effects Effects Valid Command DLL Side- Process Modify Registry 1 OS Security Software Remote Data from Exfiltration Data Eavesdrop on Remotely Accounts and Scripting Loading 1 Injection 1 1 Credential Discovery 2 1 Services Local Over Other Obfuscation Insecure Track Device Interpreter 2 Dumping System Network Network Without Medium Communication Authorization Default Scheduled Boot or DLL Side- Virtualization/Sandbox LSASS Virtualization/Sandbox Remote Data from Exfiltration Junk Data Exploit SS7 to Remotely Accounts Task/Job Logon Loading 1 Evasion 2 Memory Evasion 2 Desktop Removable Over Redirect Phone Wipe Data Initialization Protocol Media Bluetooth Calls/SMS Without Scripts Authorization Domain At (Linux) Logon Script Logon Script Disable or Modify Security System Information SMB/Windows Data from Automated Steganography Exploit SS7 to Obtain Accounts (Windows) (Windows) Tools 1 Account Discovery 1 2 Admin Shares Network Exfiltration Track Device Device Manager Shared Location Cloud Drive Backups Local At (Windows) Logon Script Logon Script Process NTDS Remote System Distributed Input Scheduled Protocol SIM Card Accounts (Mac) (Mac) Injection 1 1 Discovery 1 Component Capture Transfer Impersonation Swap Object Model Cloud Cron Network Network DLL Side-Loading 1 LSA Remote System SSH Keylogging Data Fallback Manipulate Accounts Logon Script Logon Script Secrets Discovery Transfer Channels Device Size Limits Communication Behavior Graph Copyright null 2020 Page 5 of 20 Hide Legend Legend: Process Behavior Graph Signature ID: 314925 Created File Sample: WebCompanion.exe DNS/IP Info Startdate: 12/11/2020 Is Dropped Architecture: WINDOWS Score: 3 Is Windows Process Number of created Registry Values started Number of created Files Visual Basic WebCompanion.exe Delphi Java .Net C# or VB.NET 2 C, C++ or other language Is malicious started Internet dw20.exe 22 6 192.168.2.1 unknown unknown Screenshots Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow. Copyright null 2020 Page 6 of 20 Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Source Detection Scanner Label Link WebCompanion.exe 3% Metadefender Browse WebCompanion.exe 4% ReversingLabs ByteCode- MSIL.PUA.WebCompanion Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches URLs Source Detection Scanner Label Link tempuri.org/TrackDataT 0% Avira URL Cloud safe tempuri.org/GetComponentsVersionInfoT 0% Avira URL Cloud safe Copyright null 2020 Page 7 of 20 Source Detection Scanner Label Link tempuri.org/IWCAssistantService/CreatUninstallInfoT 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/RunProcessT 0% Avira URL Cloud safe www.smartassembly.com/webservices/Reporting/UploadReport2 0% Avira URL Cloud safe tempuri.org/ 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/ProcessRemoteFeatureT 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/SilentUninstallT 0% Avira URL Cloud safe tempuri.org/SendWCFeedbackT 0% Avira URL Cloud safe tempuri.org/FirstRunT 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/RunasAdminResponse 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/SetHomePageIEResponse 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/GetCurrentHomePageIEResponse 0% Avira URL Cloud safe www.lavasoftsupport.com/index.php?/forum/191-web-companion/ 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/UpdateUninstallInfoResponse 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/GetCurrentSearchIEResponse 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/GetCurrentHomePageIET 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/SetHomePageIET 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/UpdateUninstallInfoT 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/SetNewTabIET 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/GetCurrentSearchIET 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/SetAutoRestoreSessionIET 0% Avira URL Cloud safe tempuri.org/WcSendAutoResponseEmailT 0% Avira URL Cloud safe www.smartassembly.com/webservices/UploadReportLogin/ 0% Avira URL Cloud safe tempuri.org/SignZipInstallerT 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/CopyFilesResponse 0% Avira URL Cloud safe tempuri.org/GetComponentsInfoT 0% Avira URL Cloud safe tempuri.org/A 0% Avira URL Cloud safe tempuri.org/; 0% Avira URL Cloud safe tempuri.org/AddT 0% Avira URL Cloud safe 10.45.0.17:8341/api/v1/activeFeatures/filter/partnerId/ 0% Avira URL Cloud safe www.smartassembly.com/webservices/Reporting/ 0% Avira URL Cloud safe www.smartassembly.com/webservices/UploadReportLogin/GetServerURL 0% Avira URL Cloud safe tempuri.org/SendEmailT 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/SetNewTabIEResponse 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/CopyFilesT 0% Avira URL Cloud safe tempuri.org/IWCAssistantService/SetSearchEngineIET 0% Avira URL Cloud safe Domains and IPs Contacted Domains No contacted domains info URLs from Memory and Binaries Name Source Malicious Antivirus Detection Reputation lavasoft.com/GetCountryISO2ByNameT WebCompanion.exe false high tempuri.org/TrackDataT WebCompanion.exe false Avira URL Cloud: safe unknown webcompanion.com/installed.php?extinstall=1 WebCompanion.exe