Automated Malware Analysis Report For
Total Page:16
File Type:pdf, Size:1020Kb
ID: 195729 Sample Name: hellofax_document_169111792.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 15:35:30 Date: 12/12/2019 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report hellofax_document_169111792.doc 4 Overview 4 General Information 4 Detection 4 Confidence 5 Classification 5 Mitre Att&ck Matrix 6 Signature Overview 7 AV Detection: 7 Software Vulnerabilities: 7 Networking: 7 System Summary: 7 Hooking and other Techniques for Hiding and Protection: 7 Malware Analysis System Evasion: 8 Language, Device and Operating System Detection: 8 Malware Configuration 8 Behavior Graph 8 Simulations 8 Behavior and APIs 8 Antivirus, Machine Learning and Genetic Malware Detection 9 Initial Sample 9 Dropped Files 9 Unpacked PE Files 9 Domains 9 URLs 9 Yara Overview 9 Initial Sample 9 PCAP (Network Traffic) 9 Dropped Files 9 Memory Dumps 9 Unpacked PEs 9 Sigma Overview 9 System Summary: 9 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 10 Screenshots 10 Thumbnails 10 Startup 11 Created / dropped Files 11 Domains and IPs 15 Contacted Domains 15 Contacted IPs 15 Static File Info 15 General 15 File Icon 16 Static OLE Info 16 General 16 OLE File "hellofax_document_169111792.doc" 16 Indicators 16 Summary 16 Document Summary 16 Streams with VBA 16 VBA File Name: ThisDocument.cls, Stream Size: 8684 16 General 17 Copyright Joe Security LLC 2019 Page 2 of 45 VBA Code Keywords 17 VBA Code 19 Streams 19 Stream Path: \x1CompObj, File Type: data, Stream Size: 114 19 General 19 Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 280 19 General 19 Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 448 19 General 19 Stream Path: 1Table, File Type: data, Stream Size: 7318 19 General 19 Stream Path: Data, File Type: data, Stream Size: 105481 20 General 20 Stream Path: Macros/PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 445 20 General 20 Stream Path: Macros/PROJECTwm, File Type: data, Stream Size: 41 20 General 20 Stream Path: Macros/VBA/_VBA_PROJECT, File Type: data, Stream Size: 4396 20 General 20 Stream Path: Macros/VBA/dir, File Type: VAX-order 68k Blit mpx/mux executable, Stream Size: 778 21 General 21 Stream Path: ObjectPool/_1637576468/\x1CompObj, File Type: data, Stream Size: 112 21 General 21 Stream Path: ObjectPool/_1637576468/\x3OCXNAME, File Type: data, Stream Size: 16 21 General 21 Stream Path: ObjectPool/_1637576468/\x3ObjInfo, File Type: data, Stream Size: 6 21 General 21 Stream Path: ObjectPool/_1637576468/f, File Type: data, Stream Size: 92 21 General 21 Stream Path: ObjectPool/_1637576468/o, File Type: empty, Stream Size: 0 21 General 22 Stream Path: WordDocument, File Type: data, Stream Size: 311173 22 General 22 Network Behavior 22 Code Manipulations 22 Statistics 22 Behavior 22 System Behavior 22 Analysis Process: WINWORD.EXE PID: 3668 Parent PID: 548 23 General 23 File Activities 23 File Created 23 File Deleted 23 File Written 24 File Read 34 Registry Activities 34 Key Created 34 Key Value Created 35 Key Value Modified 42 Analysis Process: wscript.exe PID: 3784 Parent PID: 3668 44 General 44 File Activities 45 File Read 45 Disassembly 45 Code Analysis 45 Copyright Joe Security LLC 2019 Page 3 of 45 Analysis Report hellofax_document_169111792.doc Overview General Information Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 195729 Start date: 12.12.2019 Start time: 15:35:30 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 4m 19s Hypervisor based Inspection enabled: false Report type: light Sample file name: hellofax_document_169111792.doc Cookbook file name: defaultwindowsofficecookbook.jbs Analysis system description: Windows 7 SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 60, Acrobat Reader DC 17, Java 8.0.1440.1, Flash 30.0.0.113) Run name: Without Instrumentation Number of analysed new started processes analysed: 5 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled HDC enabled AMSI enabled Analysis stop reason: Timeout Detection: MAL Classification: mal72.expl.evad.winDOC@3/14@0/0 EGA Information: Failed HDC Information: Failed HCA Information: Successful, ratio: 100% Number of executed functions: 0 Number of non-executed functions: 0 Cookbook Comments: Adjust boot time Enable AMSI Found application associated with file extension: .doc Found Word or Excel or PowerPoint or XPS Viewer Found warning dialog Click Ok Attach to Office via COM Scroll down Close Viewer Warnings: Show All Exclude process from analysis (whitelisted): dllhost.exe, WmiPrvSE.exe Report size getting too big, too many NtCreateFile calls found. Report size getting too big, too many NtOpenKeyEx calls found. Report size getting too big, too many NtQueryAttributesFile calls found. Report size getting too big, too many NtSetInformationFile calls found. Detection Strategy Score Range Reporting Whitelisted Detection Copyright Joe Security LLC 2019 Page 4 of 45 Strategy Score Range Reporting Whitelisted Detection Threshold 72 0 - 100 false Confidence Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Copyright Joe Security LLC 2019 Page 5 of 45 Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Mitre Att&ck Matrix Initial Privilege Credential Lateral Command Network Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Effects Valid Windows Winlogon Process Masquerading 1 Credential Virtualization/Sandbox Remote File Data from Data Remote File Eavesdrop on Accounts Management Helper DLL Injection 1 Dumping Evasion 1 Copy 1 Local Compressed Copy 1 Insecure Instrumentation 1 System Network Communication Replication Scripting 2 3 Port Accessibility Virtualization/Sandbox Network Peripheral Device Remote Data from Exfiltration Fallback Exploit SS7 to Through Monitors Features Evasion 1 Sniffing Discovery 1 Services Removable Over Other Channels Redirect Phone Removable Media Network Calls/SMS Media Medium External Exploitation for Accessibility Path Process Injection 1 Input Security Software Windows Data from Automated Custom Exploit SS7 to Remote Client Features Interception Capture Discovery 1 Remote Network Exfiltration Cryptographic Track Device Services Execution 2 Management Shared Protocol Location Drive Drive-by Graphical User System DLL Search Scripting 2 3 Credentials File and Directory Logon Input Data Multiband SIM Card Compromise Interface 2 Firmware Order in Files Discovery 1 Scripts Capture Encrypted Communication Swap Hijacking Exploit Command-Line Shortcut File System Obfuscated Files or Account System Information Shared Data Scheduled Standard Manipulate Public- Interface Modification Permissions Information 1 Manipulation Discovery 4 Webroot Staged Transfer Cryptographic Device Facing Weakness Protocol Communication Application Copyright Joe Security LLC 2019 Page 6 of 45 Signature Overview • AV Detection • Software Vulnerabilities • Networking • System Summary • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Language, Device and Operating System Detection Click to jump to signature section AV Detection: Machine Learning detection for sample Software Vulnerabilities: Document exploit detected (creates forbidden files) Document exploit detected (process start blacklist hit) Networking: Downloads files System Summary: Document contains an embedded VBA macro which may check the active printer (possible anti-VM) Document contains an embedded VBA macro with suspicious strings Microsoft Office drops suspicious files Document contains an embedded VBA macro which executes code when the document is opened / closed Document contains embedded VBA macros Classification label Creates files inside the user directory Creates temporary files Document contains an OLE Word Document stream indicating a Microsoft Word file Document contains summary information with irregular field values Queries process information (via WMI, Win32_Process) Reads ini files Reads software policies Spawns processes Uses an in-process (OLE) Automation server Found GUI installer (many successful clicks) Found graphical window changes (likely an installer) Checks if Microsoft Office is installed Document has a 'comments' value indicative of goodware Uses new MSVCR Dlls Hooking and other Techniques for Hiding and Protection: Copyright Joe Security LLC 2019 Page 7 of 45 Document contains an embedded VBA macro which may check the active printer (possible anti-VM) Disables application error messsages (SetErrorMode) Document contains OLE streams with high entropy indicating encrypted embedded content Malware Analysis System Evasion: Found WSH timer for Javascript or VBS script (likely evasive script) May sleep (evasive loops) to hinder dynamic analysis Language, Device and Operating System Detection: Queries the cryptographic machine GUID Malware Configuration No configs have been found Behavior Graph Hide Legend Legend: Process Behavior Graph Signature ID: 195729 Created File Sample: hellofax_document_169111792.doc Startdate: 12/12/2019 DNS/IP Info Architecture: WINDOWS Is Dropped Score: 72 Is Windows Process Number of created Registry Values Document contains an Document contains an Sigma detected: Microsoft