Automated Malware Analysis Report for FIAS 2.11.Chm
Total Page:16
File Type:pdf, Size:1020Kb
ID: 195209 Sample Name: FIAS_2.11.chm Cookbook: default.jbs Time: 22:51:24 Date: 10/12/2019 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report FIAS_2.11.chm 4 Overview 4 General Information 4 Detection 4 Confidence 5 Classification 5 Mitre Att&ck Matrix 6 Signature Overview 6 Networking: 6 System Summary: 6 Hooking and other Techniques for Hiding and Protection: 6 Malware Analysis System Evasion: 6 Anti Debugging: 7 HIPS / PFW / Operating System Protection Evasion: 7 Language, Device and Operating System Detection: 7 Malware Configuration 7 Behavior Graph 7 Simulations 7 Behavior and APIs 7 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 8 Unpacked PE Files 8 Domains 8 URLs 8 Yara Overview 9 Initial Sample 9 PCAP (Network Traffic) 9 Dropped Files 9 Memory Dumps 9 Unpacked PEs 9 Sigma Overview 9 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 10 Screenshots 10 Thumbnails 10 Startup 11 Created / dropped Files 11 Domains and IPs 13 Contacted Domains 13 URLs from Memory and Binaries 13 Contacted IPs 17 Static File Info 17 General 17 File Icon 17 Network Behavior 17 Code Manipulations 17 Statistics 18 System Behavior 18 Analysis Process: hh.exe PID: 4496 Parent PID: 4256 18 General 18 File Activities 18 Copyright Joe Security LLC 2019 Page 2 of 18 Registry Activities 18 Disassembly 18 Code Analysis 18 Copyright Joe Security LLC 2019 Page 3 of 18 Analysis Report FIAS_2.11.chm Overview General Information Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 195209 Start date: 10.12.2019 Start time: 22:51:24 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 4m 49s Hypervisor based Inspection enabled: false Report type: light Sample file name: FIAS_2.11.chm Cookbook file name: default.jbs Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 Number of analysed new started processes analysed: 5 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled HDC enabled AMSI enabled Analysis stop reason: Timeout Detection: CLEAN Classification: clean1.winCHM@1/5@0/0 EGA Information: Failed HDC Information: Failed HCA Information: Successful, ratio: 100% Number of executed functions: 0 Number of non-executed functions: 0 Cookbook Comments: Adjust boot time Enable AMSI Found application associated with file extension: .chm Warnings: Show All Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe, CompatTelRunner.exe Execution Graph export aborted for target hh.exe, PID 4496 because it is empty Report size getting too big, too many NtAllocateVirtualMemory calls found. Report size getting too big, too many NtOpenKeyEx calls found. Report size getting too big, too many NtProtectVirtualMemory calls found. Report size getting too big, too many NtQueryValueKey calls found. Detection Strategy Score Range Reporting Whitelisted Detection Threshold 1 0 - 100 false Copyright Joe Security LLC 2019 Page 4 of 18 Confidence Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Copyright Joe Security LLC 2019 Page 5 of 18 Mitre Att&ck Matrix Initial Privilege Credential Lateral Command Network Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Impact Effects Valid Windows Winlogon Process Masquerading 1 Credential Process Application Data from Data Data Modify Eavesdrop on Accounts Remote Helper DLL Injection 1 Dumping Discovery 1 Deployment Local Compressed Obfuscation System Insecure Management Software System Partition Network Communication Replication Service Port Accessibility Disabling Security Network Security Remote Data from Exfiltration Fallback Device Exploit SS7 to Through Execution Monitors Features Tools 1 Sniffing Software Services Removable Over Other Channels Lockout Redirect Phone Removable Discovery 1 Media Network Calls/SMS Media Medium External Windows Accessibility Path Virtualization/Sandbox Input System Windows Data from Automated Custom Delete Exploit SS7 to Remote Management Features Interception Evasion 1 Capture Information Remote Network Exfiltration Cryptographic Device Track Device Services Instrumentation Discovery 1 2 Management Shared Protocol Data Location Drive Drive-by Scheduled System DLL Search Process Injection 1 Credentials System Logon Input Data Multiband Premium SIM Card Compromise Task Firmware Order in Files Network Scripts Capture Encrypted Communication SMS Swap Hijacking Configuration Toll Discovery Fraud Signature Overview • Networking • System Summary • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection Click to jump to signature section Networking: Found strings which match to known social media urls Urls found in memory or binary data System Summary: Classification label Creates files inside the user directory Creates temporary files Reads software policies Uses an in-process (OLE) Automation server Executable creates window controls seldom found in malware Checks if Microsoft Office is installed Hooking and other Techniques for Hiding and Protection: Disables application error messsages (SetErrorMode) Malware Analysis System Evasion: Allocates memory with a write watch (potentially for evading sandboxes) Copyright Joe Security LLC 2019 Page 6 of 18 May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) Anti Debugging: Creates guard pages, often used to prevent reverse engineering and debugging HIPS / PFW / Operating System Protection Evasion: May try to detect the Windows Explorer process (often used for injection) Language, Device and Operating System Detection: Queries the volume information (name, serial number etc) of a device Malware Configuration No configs have been found Behavior Graph Hide Legend Legend: Process Signature Created File DNS/IP Info Is Dropped Is Windows Process Behavior Graph Number of created Registry Values Number of created Files ID: 195209 Visual Basic Sample: FIAS_2.11.chm Startdate: 10/12/2019 Delphi Architecture: WINDOWS Java Score: 1 .Net C# or VB.NET C, C++ or other language started Is malicious Internet hh.exe 26 Simulations Behavior and APIs Copyright Joe Security LLC 2019 Page 7 of 18 No simulations Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Source Detection Scanner Label Link FIAS_2.11.chm 0% Virustotal Browse Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches URLs Source Detection Scanner Label Link www.mercadolivre.com.br/ 0% Virustotal Browse www.mercadolivre.com.br/ 0% Avira URL Cloud safe www.merlin.com.pl/favicon.ico 0% Virustotal Browse www.merlin.com.pl/favicon.ico 0% URL Reputation safe www.dailymail.co.uk/ 0% Virustotal Browse www.dailymail.co.uk/ 0% URL Reputation safe image.excite.co.jp/jp/favicon/lep.ico 0% Virustotal Browse image.excite.co.jp/jp/favicon/lep.ico 0% URL Reputation safe %s.com 0% Virustotal Browse %s.com 0% URL Reputation safe www.zhongyicts.com.cn 0% Virustotal Browse www.zhongyicts.com.cn 0% URL Reputation safe busca.igbusca.com.br//app/static/images/favicon.ico 0% Virustotal Browse busca.igbusca.com.br//app/static/images/favicon.ico 0% URL Reputation safe www.etmall.com.tw/favicon.ico 0% Virustotal Browse www.etmall.com.tw/favicon.ico 0% URL Reputation safe it.search.dada.net/favicon.ico 0% Virustotal Browse it.search.dada.net/favicon.ico 0% URL Reputation safe search.hanafos.com/favicon.ico 0% Virustotal Browse search.hanafos.com/favicon.ico 0% URL Reputation safe cgi.search.biglobe.ne.jp/favicon.ico 0% Virustotal Browse cgi.search.biglobe.ne.jp/favicon.ico 0% Avira URL Cloud safe www.abril.com.br/favicon.ico 0% Virustotal Browse www.abril.com.br/favicon.ico 0% Avira URL Cloud safe search.msn.co.jp/results.aspx?q= 0% Virustotal Browse search.msn.co.jp/results.aspx?q= 0% URL Reputation safe buscar.ozu.es/ 0% Virustotal Browse buscar.ozu.es/ 0% Avira URL Cloud safe busca.igbusca.com.br/ 0% Virustotal Browse busca.igbusca.com.br/ 0% URL Reputation safe www.carterandcone.coml 0% URL Reputation safe search.auction.co.kr/ 0% Virustotal Browse search.auction.co.kr/ 0% URL Reputation safe busca.buscape.com.br/favicon.ico 0% Virustotal Browse busca.buscape.com.br/favicon.ico 0% Avira URL Cloud safe www.pchome.com.tw/favicon.ico 0% Virustotal Browse www.pchome.com.tw/favicon.ico 0% Avira URL Cloud safe browse.guardian.co.uk/favicon.ico 0% Virustotal Browse browse.guardian.co.uk/favicon.ico 0% URL Reputation safe Copyright Joe Security LLC 2019 Page 8 of 18 Source Detection Scanner Label Link google.pchome.com.tw/ 0% Virustotal Browse google.pchome.com.tw/ 0% Avira URL Cloud safe www.ozu.es/favicon.ico 0% Virustotal Browse www.ozu.es/favicon.ico 0% Avira URL Cloud safe search.yahoo.co.jp/favicon.ico 0% Virustotal Browse search.yahoo.co.jp/favicon.ico 0% URL Reputation safe www.gmarket.co.kr/ 0% Virustotal Browse www.gmarket.co.kr/ 0% URL Reputation safe www.founder.com.cn/cn/bThe 0% Virustotal Browse www.founder.com.cn/cn/bThe