Automated Malware Analysis Report for Commerce
Total Page:16
File Type:pdf, Size:1020Kb
ID: 288231 Sample Name: commerce - 09.21.2020.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 19:48:34 Date: 21/09/2020 Version: 30.0.0 Red Diamond Table of Contents Table of Contents 2 Analysis Report commerce -09.21.2020.doc 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 4 Malware Configuration 4 Yara Overview 4 Sigma Overview 4 System Summary: 4 Signature Overview 4 AV Detection: 5 Software Vulnerabilities: 5 System Summary: 5 Hooking and other Techniques for Hiding and Protection: 5 Mitre Att&ck Matrix 5 Behavior Graph 6 Screenshots 6 Thumbnails 6 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 URLs 7 Domains and IPs 9 Contacted Domains 9 Contacted URLs 9 URLs from Memory and Binaries 9 Contacted IPs 13 Public 13 General Information 13 Simulations 14 Behavior and APIs 14 Joe Sandbox View / Context 15 IPs 15 Domains 15 ASN 15 JA3 Fingerprints 15 Dropped Files 15 Created / dropped Files 15 Static File Info 22 General 22 File Icon 22 Static OLE Info 22 General 22 OLE File "/opt/package/joesandbox/database/analysis/288231/sample/commerce -09.21.2020.doc" 22 Indicators 22 Summary 22 Document Summary 23 Streams with VBA 23 VBA File Name: ThisDocument.cls, Stream Size: 1127 23 General 23 VBA Code Keywords 23 VBA Code 23 VBA File Name: ad2db.bas, Stream Size: 10325 23 Copyright null 2020 Page 2 of 49 General 23 VBA Code Keywords 24 VBA Code 29 VBA File Name: dd953.bas, Stream Size: 6897 29 General 29 VBA Code Keywords 29 VBA Code 32 VBA File Name: f99c5.cls, Stream Size: 11477 32 General 32 VBA Code Keywords 33 VBA Code 39 Streams 39 Stream Path: PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 461 39 General 39 Stream Path: PROJECTwm, File Type: data, Stream Size: 95 39 General 39 Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 3458 39 General 40 Stream Path: VBA/__SRP_0, File Type: data, Stream Size: 1918 40 General 40 Stream Path: VBA/__SRP_1, File Type: data, Stream Size: 198 40 General 40 Stream Path: VBA/__SRP_2, File Type: data, Stream Size: 348 40 General 40 Stream Path: VBA/__SRP_3, File Type: data, Stream Size: 106 40 General 40 Stream Path: VBA/dir, File Type: data, Stream Size: 741 41 General 41 Network Behavior 41 Network Port Distribution 41 TCP Packets 41 UDP Packets 41 DNS Queries 42 DNS Answers 43 HTTP Request Dependency Graph 43 HTTP Packets 43 Code Manipulations 43 Statistics 43 Behavior 43 System Behavior 44 Analysis Process: WINWORD.EXE PID: 7144 Parent PID: 804 44 General 44 File Activities 44 File Created 44 File Deleted 44 File Written 44 File Read 45 Registry Activities 45 Key Created 45 Key Value Created 46 Key Value Modified 47 Analysis Process: regsvr32.exe PID: 1612 Parent PID: 7144 49 General 49 File Activities 49 File Read 49 Disassembly 49 Code Analysis 49 Copyright null 2020 Page 3 of 49 Analysis Report commerce -09.21.2020.doc Overview General Information Detection Signatures Classification Sample commerce - Name: 09.21.2020.doc Muullltttiii AAVV SSccaannnneerrr ddeettteecctttiiioonn fffoorrr ssuubbm… Analysis ID: 288231 OMffuffffiilictcie eA ddVoo cScuucmaneennettt rttt rrrdiiieesst e tttocot iccooonnn fvvoiiinrn csceue b vvmiii… MD5: cb29335b00b0a2… COCrrfrefeiacaetttee dss o aacnnuddm ooeppneet nntrssi e aas ffftaaokk eceo ddnoovccinuucmee evnnittt… SHA1: 6aeb42b7e0d7ab… DCDoroeccauutmesee nanttnt cdcoo onnptttaaeiiinnss aa nnfa eekme bbdeeoddcdudemedde VnVBtB… SHA256: 2d2f0a3e263c64c… DDooccuumeennttt ccoonntttaaiiinnss aann eembbeeddddeedd VVBB… Tags: doc IcedID macros shath Ransomware ak TA551 DDooccuumeennttt ccoonntttaaiiinnss aann eembbeeddddeedd VVBB… Miner Spreading Most interesting Screenshot: mmaallliiiccciiioouusss DDooccuumeennttt ccoonntttaaiiinnss aann eembbeeddddeedd VVBB… malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious DDooccuumeennttt ecexoxpnplltloaoiiittnt dsde eatttenec cetttemeddb ((e(ppdrrrodocecedes sVss…B cccllleeaann clean MDoaaccuhhmiiinnee n LLte eeaaxrrrpnnliioinnigtg d ddeeettteteeccctttetiiioodnn ( pfffoorrorr csseaasmspp… Exploiter Banker SMSiiigagmchaain ddeee Lttteeccatttreenddin::: gM diiiccerrrotoesscootfiffottt nO ffffoffiiicrc ees a PPmrrr…p Score: 88 Spyware Trojan / Bot DSDoiogccmuuma edenentt e cccootnentdtaa:i inMnssi c aarnon s eeomftb bOeefddfiddceed dP VVrBB Range: 0 - 100 DDooccuumeennttt ccoonntttaaiiinnss aann eembbeeddddeedd VVBB… Adware Whitelisted: false DDooccuumeennttt ccoonntttaaiiinnss eaemn bebemeddbddeeedddd VeVdBB AVA B … Confidence: 100% DDooccuumeennttt ccoonntttaaiiinnss nenomo ObeLLdEEd sesttdtrrre eVaaBmA … DDooccuumeennttt hchaoasns t aaninn usu nnkkonn oOowwLnEn aasptprppelllaiiiccmaatt tiii… PDPoottcteeunnmtttiiiaeallnl ddt oohccauusm aeennn uttt neekxxnppollloowiiitttn dd aeepttteepcclittcteeaddt…i Startup PPoottteenntttiiiaalll ddooccuumeennttt eexxpplllooiiittt ddeettteeccttteedd… PPoottteenntttiiiaalll ddooccuumeennttt eexxpplllooiiittt ddeettteeccttteedd System is w10x64 PPoottteenntttiiiaalll ddooccuumeennttt eexxpplllooiiittt ddeettteeccttteedd… WINWORD.EXE (PID: 7144 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\WINTPTWrroriiieteOessnR tttoDoia l.lloE odaaXoddEc mu' /miAiisseussnitiinontg mge DxaDptLLiloLoLnsist -dEemtebceteddding MD5: 0B9AB9B9C4DE429473D6450D4297A123) regsvr32.exe (PID: 1612 cmdline: regsvr32 c:\programdata\b467e.pdf MD5: 426E7499F6A7346F0410DEAD0805586B) UTUrssieess atao k klnonoaowdw nmn wiwsesebibn bgbr rrDoowLwLsseserrr uusseerrr aaggee… cleanup UUsseess aa kknnoowwnn wweebb bbrroowwsseerr uusseerr aaggee… Uses a known web browser user age Malware Configuration No configs have been found Yara Overview No yara matches Sigma Overview System Summary: Sigma detected: Microsoft Office Product Spawning Windows Shell Signature Overview Copyright null 2020 Page 4 of 49 • AV Detection • Software Vulnerabilities • Networking • System Summary • Hooking and other Techniques for Hiding and Protection Click to jump to signature section AV Detection: Multi AV Scanner detection for submitted file Machine Learning detection for sample Software Vulnerabilities: Document exploit detected (process start blacklist hit) System Summary: Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) Document contains an embedded VBA macro which may execute processes Document contains an embedded VBA macro with suspicious strings Document contains an embedded VBA with functions possibly related to ADO stream file operations Document contains an embedded VBA with functions possibly related to HTTP operations Hooking and other Techniques for Hiding and Protection: Creates and opens a fake document (probably a fake document to hide exploiting) Mitre Att&ck Matrix Remote Initial Privilege Defense Credential Lateral Command and Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Effects Effects Valid Scripting 4 2 DLL Side- Process Masquerading 1 OS File and Remote Data from Exfiltration Non-Application Eavesdrop on Remotely Accounts Loading 1 Injection 1 Credential Directory Services Local Over Other Layer Protocol 2 Insecure Track Device Dumping Discovery 1 System Network Network Without Medium Communication Authorization Default Exploitation for Boot or DLL Side- Disable or Modify LSASS System Remote Data from Exfiltration Application Layer Exploit SS7 to Remotely Accounts Client Logon Loading 1 Tools 1 Memory Information Desktop Removable Over Protocol 1 1 2 Redirect Phone Wipe Data Execution 2 3 Initialization Discovery 2 Protocol Media Bluetooth Calls/SMS Without Scripts Authorization Domain At (Linux) Logon Script Logon Process Security Query SMB/Windows Data from Automated Ingress Tool Exploit SS7 to Obtain Accounts (Windows) Script Injection 1 Account Registry Admin Shares Network Exfiltration Transfer 1 Track Device Device (Windows) Manager Shared Location Cloud Drive Backups Local At (Windows) Logon Script Logon Scripting 4 2 NTDS System Distributed Input Scheduled Protocol SIM Card Accounts (Mac) Script Network Component Capture Transfer Impersonation Swap (Mac) Configuration Object Model Discovery Copyright null 2020 Page 5 of 49 Remote Initial Privilege Defense Credential Lateral Command and Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Effects Effects Cloud Cron Network Network DLL Side- LSA Remote SSH Keylogging Data Fallback Manipulate Accounts Logon Script Logon Loading 1 Secrets System Transfer Channels Device Script Discovery Size Limits Communication Behavior Graph Hide Legend Behavior Graph Legend: ID: 288231 Process Sample: commerce -09.21.2020.doc Startdate: 21/09/2020 Signature Architecture: WINDOWS Created File Score: 88 DNS/IP Info Is Dropped Office document tries Is Windows Process to convince victim to Multi AV Scanner detection Machine Learning detection disable security protection 5 other signatures started for submitted file for sample Number of created Registry Values (e.g. to enable ActiveX or Macros) Number of created Files Visual Basic Delphi WINWORD.EXE Java .Net C# or VB.NET 60 69 C, C++ or other language Is malicious dsb5vd.com Internet 185.159.129.44, 49722, 80 ITOS-ASRU Russian Federation started Creates and opens a Document exploit detected fake document (probably (process start blacklist a fake document to hide hit) exploiting) regsvr32.exe Screenshots Thumbnails This section contains all screenshots as thumbnails,