Automated Malware Analysis Report For
Total Page:16
File Type:pdf, Size:1020Kb
ID: 195574 Sample Name: FileOpenInstaller64.msi Cookbook: default.jbs Time: 23:32:33 Date: 11/12/2019 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report FileOpenInstaller64.msi 5 Overview 5 General Information 5 Detection 5 Confidence 6 Classification 6 Analysis Advice 6 Mitre Att&ck Matrix 7 Signature Overview 7 Spreading: 7 Networking: 7 System Summary: 7 Hooking and other Techniques for Hiding and Protection: 8 Malware Analysis System Evasion: 8 Language, Device and Operating System Detection: 8 Malware Configuration 8 Behavior Graph 8 Simulations 9 Behavior and APIs 9 Antivirus, Machine Learning and Genetic Malware Detection 9 Initial Sample 9 Dropped Files 9 Unpacked PE Files 9 Domains 9 URLs 9 Yara Overview 9 Initial Sample 9 PCAP (Network Traffic) 9 Dropped Files 9 Memory Dumps 9 Unpacked PEs 9 Sigma Overview 9 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 10 Screenshots 10 Thumbnails 10 Startup 11 Created / dropped Files 11 Domains and IPs 11 Contacted Domains 11 URLs from Memory and Binaries 11 Contacted IPs 12 Static File Info 12 General 12 File Icon 12 Static OLE Info 12 General 12 Authenticode Signature 13 OLE File "FileOpenInstaller64.msi" 13 Indicators 13 Summary 13 Streams 13 Stream Path: \x5DigitalSignature, File Type: data, Stream Size: 7246 13 General 13 Copyright Joe Security LLC 2019 Page 2 of 26 Stream Path: \x5MsiDigitalSignatureEx, File Type: data, Stream Size: 32 14 General 14 Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 560 14 General 14 Stream Path: \x16786\x17522\x17022\x18418\x17583\x17578\x17214\x17574, File Type: MS Windows icon resource - 19 icons, 256x256, 32 bits/pixel, 128x128, 32 bits/pixel, Stream Size: 544750 14 General 14 Stream Path: \x17163\x16689\x18229\x15358\x15128\x17848\x17591\x15024\x17894\x17580\x17841\x15693\x18453, File Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, Stream Size: 1735680 14 General 14 Stream Path: \x17163\x16689\x18229\x15358\x17388\x15912\x16947\x15793\x15516\x17886\x17388\x18486, File Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, Stream Size: 90112 14 General 14 Stream Path: \x17163\x16689\x18229\x16446\x18156\x15518\x15103\x17648\x15103\x17508\x16945\x18485, File Type: PC bitmap, Windows 3.x format, 500 x 63 x 24, Stream Size: 94556 15 General 15 Stream Path: \x17163\x16689\x18229\x16446\x18156\x15518\x15103\x17648\x15231\x16684\x17583\x18474, File Type: PC bitmap, Windows 3.x format, 503 x 314 x 24, Stream Size: 474824 15 General 15 Stream Path: \x17163\x16689\x18229\x16446\x18156\x15518\x15103\x17648\x15871\x18088, File Type: MS Windows icon resource - 1 icon, 16x16, 16 colors, Stream Size: 318 General 1515 Stream Path: \x17163\x16689\x18229\x16446\x18156\x15518\x15103\x17648\x16319\x18483, File Type: MS Windows icon resource - 1 icon, 16x16, 16 colors, Stream Size: 318 General 1615 Stream Path: \x17163\x16689\x18229\x16446\x18156\x15518\x15551\x17574\x15295\x16827\x16687\x18480, File Type: MS Windows icon resource - 1 icon, 32x32, 16 colors, Stream Size: 766 16 General 16 Stream Path: \x17163\x16689\x18229\x16446\x18156\x15518\x15551\x17574\x15551\x17009\x18482, File Type: MS Windows icon resource - 2 icons, 32x32, 16 colors, 16x16, 16 colors, Stream Size: 1078 16 General 16 Stream Path: \x17163\x16689\x18229\x16446\x18156\x15518\x17184\x16827\x18468, File Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, Stream Size: 107008 General 1616 Stream Path: \x17167\x16943\x17624\x17512\x17490\x17910\x17380\x16943\x18357\x14923\x14537\x16830\x16740, File Type: Microsoft Cabinet archive data, 1397022 bytes, 20 files, Stream Size: 1397022 17 General 17 Stream Path: \x18496\x15167\x17394\x17464\x17841, File Type: data, Stream Size: 1576 17 General 17 Stream Path: \x18496\x15518\x16925\x17915, File Type: data, Stream Size: 204 17 General 17 Stream Path: \x18496\x16191\x17783\x17516\x15210\x17892\x18468, File Type: ISO-8859 text, with very long lines, Stream Size: 36704 17 General 17 Stream Path: \x18496\x16191\x17783\x17516\x15978\x17586\x18479, File Type: data, Stream Size: 3672 18 General 18 Stream Path: \x18496\x16255\x16740\x16943\x18486, File Type: data, Stream Size: 78 18 General 18 Stream Path: \x18496\x16383\x17380\x16876\x17892\x17580\x18481, File Type: data, Stream Size: 4776 18 General 18 Stream Path: \x18496\x16661\x17528\x17126\x17548\x16881\x17900\x17580\x18481, File Type: data, Stream Size: 12 18 General 18 Stream Path: \x18496\x16667\x17191\x15090\x17912\x17591\x18481, File Type: data, Stream Size: 36 18 General 18 Stream Path: \x18496\x16786\x17522, File Type: data, Stream Size: 4 19 General 19 Stream Path: \x18496\x16842\x17200\x15281\x16955\x17958\x16951\x16924\x17972\x17512\x16934, File Type: x86 executable not stripped, Stream Size: 48 19 General 19 Stream Path: \x18496\x16842\x17200\x16305\x16146\x17704\x16952\x16817\x18472, File Type: x86 executable not stripped, Stream Size: 42 19 General 19 Stream Path: \x18496\x16842\x17913\x18126\x16808\x17912\x16168\x17704\x16952\x16817\x18472, File Type: x86 executable not stripped, Stream Size: 42 19 General 19 Stream Path: \x18496\x16911\x17892\x17784\x15144\x17458\x17587\x16945\x17905\x18486, File Type: data, Stream Size: 80 19 General 19 Stream Path: \x18496\x16911\x17892\x17784\x18472, File Type: data, Stream Size: 80 19 General 20 Stream Path: \x18496\x16918\x17191\x18468, File Type: MIPSEB Ucode, Stream Size: 14 20 General 20 Stream Path: \x18496\x16923\x15722\x16818\x17892\x17778, File Type: data, Stream Size: 30 20 General 20 Stream Path: \x18496\x16923\x17194\x17910\x18229, File Type: data, Stream Size: 12 20 General 20 Stream Path: \x18496\x16924\x18037\x16812\x15144\x17522\x17783\x17394, File Type: data, Stream Size: 12 20 General 20 Stream Path: \x18496\x16924\x18037\x16812\x15528\x17841\x16695\x17391, File Type: data, Stream Size: 32 20 General 20 Stream Path: \x18496\x16925\x17915\x17884\x17404\x18472, File Type: data, Stream Size: 36 21 General 21 Stream Path: \x18496\x17100\x16808\x15086\x18162, File Type: data, Stream Size: 8 21 General 21 Stream Path: \x18496\x17163\x16689\x18229, File Type: MIPSEB-LE MIPS-II ECOFF executable not stripped - version 0.1, Stream Size: 36 21 General 21 Stream Path: \x18496\x17165\x16949\x17894\x17778\x18492, File Type: data, Stream Size: 90 21 General 21 Stream Path: \x18496\x17165\x17380\x17074, File Type: data, Stream Size: 396 21 General 21 Stream Path: \x18496\x17167\x16943, File Type: data, Stream Size: 400 21 General 22 Stream Path: \x18496\x17180\x17514\x17892\x17784\x18472, File Type: data, Stream Size: 52 22 General 22 Stream Path: \x18496\x17490\x17910\x17380\x15279\x16955\x17958\x16951\x16924\x17972\x17512\x16934, File Type: data, Stream Size: 198 22 General 22 Stream Path: \x18496\x17490\x17910\x17380\x16303\x16146\x17704\x16952\x16817\x18472, File Type: data, Stream Size: 102 22 General 22 Stream Path: \x18496\x17548\x16881\x17900\x17580\x18481, File Type: data, Stream Size: 6 22 General 22 Stream Path: \x18496\x17548\x17648\x17522\x17512\x18487, File Type: data, Stream Size: 240 23 Copyright Joe Security LLC 2019 Page 3 of 26 General 23 Stream Path: \x18496\x17548\x17905\x17589\x15151\x17522\x17191\x17207\x17522, File Type: iAPX 286 executable large model (COFF) not stripped, Stream Size: 536 23 General 23 Stream Path: \x18496\x17548\x17905\x17589\x15279\x16953\x17905, File Type: data, Stream Size: 1404 23 General 23 Stream Path: \x18496\x17548\x17905\x17589\x18479, File Type: data, Stream Size: 4628 23 General 23 Stream Path: \x18496\x17610\x16179\x16680\x16821\x18475, File Type: data, Stream Size: 28 23 General 24 Stream Path: \x18496\x17630\x17770\x16868\x18472, File Type: data, Stream Size: 16 24 General 24 Stream Path: \x18496\x17740\x16680\x16951\x17551\x16879\x17768, File Type: data, Stream Size: 4 24 General 24 Stream Path: \x18496\x17741\x17557\x16678\x17591\x18485, File Type: data, Stream Size: 32 24 General 24 Stream Path: \x18496\x17753\x17650\x17768\x18231, File Type: data, Stream Size: 76 24 General 24 Stream Path: \x18496\x17814\x15340\x17388\x15464\x17828\x18475, File Type: CLIPPER COFF executable (VAX #) not stripped - version 425, Stream Size: 280 24 General 24 Stream Path: \x18496\x17932\x17910\x17458\x16778\x17207\x17522, File Type: data, Stream Size: 96 25 General 25 Stream Path: \x18496\x17933\x17395\x16812\x17892\x15336\x17388\x18472, File Type: data, Stream Size: 80 25 General 25 Stream Path: \x18496\x17998\x17512\x15799\x17636\x17203\x17073, File Type: data, Stream Size: 32 25 General 25 Network Behavior 25 Code Manipulations 25 Statistics 25 System Behavior 26 Analysis Process: msiexec.exe PID: 4400 Parent PID: 4220 26 General 26 File Activities 26 Disassembly 26 Code Analysis 26 Copyright Joe Security LLC 2019 Page 4 of 26 Analysis Report FileOpenInstaller64.msi Overview General Information Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 195574 Start date: 11.12.2019 Start time: 23:32:33 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 2m 10s Hypervisor based Inspection enabled: false Report type: light Sample file name: FileOpenInstaller64.msi Cookbook file name: default.jbs Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 Number of analysed new started processes analysed: 2 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled HDC enabled AMSI enabled Analysis stop reason: Timeout Detection: CLEAN Classification: clean1.winMSI@1/0@0/0 EGA Information: Failed HDC Information: Failed HCA Information: Successful, ratio: 100% Number of executed functions: 0 Number of non-executed functions: 0 Cookbook Comments: Adjust boot time Enable AMSI Found application associated with file extension: .msi Stop behavior analysis, all processes terminated Warnings: Show All Exclude process from analysis (whitelisted): dllhost.exe Report size getting too big, too many NtOpenKeyEx calls found.