Automated Malware Analysis Report for Oldnewexplorercfg.Exe
Total Page:16
File Type:pdf, Size:1020Kb
ID: 152305 Sample Name: OldNewExplorerCfg.exe Cookbook: default.jbs Time: 03:48:12 Date: 15/07/2019 Version: 26.0.0 Aquamarine Table of Contents Table of Contents 2 Analysis Report OldNewExplorerCfg.exe 5 Overview 5 General Information 5 Detection 5 Confidence 6 Classification 6 Analysis Advice 6 Mitre Att&ck Matrix 7 Signature Overview 7 AV Detection: 7 Spreading: 7 Networking: 7 Key, Mouse, Clipboard, Microphone and Screen Capturing: 7 DDoS: 8 System Summary: 8 Data Obfuscation: 8 Hooking and other Techniques for Hiding and Protection: 8 Malware Analysis System Evasion: 8 Anti Debugging: 8 HIPS / PFW / Operating System Protection Evasion: 8 Language, Device and Operating System Detection: 8 Behavior Graph 9 Simulations 9 Behavior and APIs 9 Antivirus and Machine Learning Detection 9 Initial Sample 9 Dropped Files 9 Unpacked PE Files 9 Domains 10 URLs 10 Yara Overview 10 Initial Sample 10 PCAP (Network Traffic) 10 Dropped Files 10 Memory Dumps 10 Unpacked PEs 10 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 10 Screenshots 10 Thumbnails 11 Startup 11 Created / dropped Files 12 Domains and IPs 12 Contacted Domains 12 URLs from Memory and Binaries 12 Contacted IPs 12 Static File Info 12 General 12 File Icon 13 Static PE Info 13 General 13 Entrypoint Preview 13 Data Directories 14 Sections 14 Copyright Joe Security LLC 2019 Page 2 of 27 Resources 14 Imports 15 Version Infos 16 Possible Origin 16 Network Behavior 17 Code Manipulations 17 Statistics 17 Behavior 17 System Behavior 17 Analysis Process: OldNewExplorerCfg.exe PID: 3760 Parent PID: 4364 18 General 18 File Activities 18 Analysis Process: regsvr32.exe PID: 2884 Parent PID: 3760 18 General 18 Analysis Process: regsvr32.exe PID: 4220 Parent PID: 3760 18 General 18 Analysis Process: regsvr32.exe PID: 1708 Parent PID: 3760 18 General 19 Analysis Process: regsvr32.exe PID: 4572 Parent PID: 3760 19 General 19 Analysis Process: regsvr32.exe PID: 4588 Parent PID: 3760 19 General 19 Analysis Process: regsvr32.exe PID: 1832 Parent PID: 3760 19 General 19 Analysis Process: regsvr32.exe PID: 5056 Parent PID: 3760 20 General 20 Analysis Process: regsvr32.exe PID: 4428 Parent PID: 3760 20 General 20 Analysis Process: regsvr32.exe PID: 2888 Parent PID: 3760 20 General 20 Analysis Process: regsvr32.exe PID: 4464 Parent PID: 3760 20 General 20 Analysis Process: regsvr32.exe PID: 1596 Parent PID: 3760 21 General 21 Analysis Process: regsvr32.exe PID: 2808 Parent PID: 3760 21 General 21 Analysis Process: regsvr32.exe PID: 3752 Parent PID: 3760 21 General 21 Analysis Process: regsvr32.exe PID: 3016 Parent PID: 3760 22 General 22 Analysis Process: regsvr32.exe PID: 4460 Parent PID: 3760 22 General 22 Analysis Process: regsvr32.exe PID: 2500 Parent PID: 3760 22 General 22 Analysis Process: regsvr32.exe PID: 228 Parent PID: 3760 22 General 22 Analysis Process: regsvr32.exe PID: 2440 Parent PID: 3760 23 General 23 Analysis Process: regsvr32.exe PID: 4288 Parent PID: 3760 23 General 23 Analysis Process: regsvr32.exe PID: 1876 Parent PID: 3760 23 General 23 Analysis Process: regsvr32.exe PID: 2128 Parent PID: 3760 23 General 24 Analysis Process: regsvr32.exe PID: 4716 Parent PID: 3760 24 General 24 Analysis Process: regsvr32.exe PID: 2212 Parent PID: 3760 24 General 24 Analysis Process: regsvr32.exe PID: 5060 Parent PID: 3760 24 General 24 Analysis Process: regsvr32.exe PID: 2720 Parent PID: 3760 25 General 25 Analysis Process: regsvr32.exe PID: 3536 Parent PID: 3760 25 General 25 Analysis Process: regsvr32.exe PID: 3828 Parent PID: 3760 25 General 25 Analysis Process: regsvr32.exe PID: 4648 Parent PID: 3760 25 Copyright Joe Security LLC 2019 Page 3 of 27 General 25 Analysis Process: regsvr32.exe PID: 4500 Parent PID: 3760 26 General 26 Analysis Process: regsvr32.exe PID: 3736 Parent PID: 3760 26 General 26 Analysis Process: regsvr32.exe PID: 2772 Parent PID: 3760 26 General 26 Analysis Process: regsvr32.exe PID: 3460 Parent PID: 3760 26 General 26 Analysis Process: regsvr32.exe PID: 2600 Parent PID: 3760 27 General 27 Disassembly 27 Code Analysis 27 Copyright Joe Security LLC 2019 Page 4 of 27 Analysis Report OldNewExplorerCfg.exe Overview General Information Joe Sandbox Version: 26.0.0 Aquamarine Analysis ID: 152305 Start date: 15.07.2019 Start time: 03:48:12 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 7m 11s Hypervisor based Inspection enabled: false Report type: light Sample file name: OldNewExplorerCfg.exe Cookbook file name: default.jbs Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 Number of analysed new started processes analysed: 41 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled HDC enabled AMSI enabled Analysis stop reason: Timeout Detection: MAL Classification: mal48.winEXE@96/0@0/0 EGA Information: Successful, ratio: 100% HDC Information: Successful, ratio: 99.7% (good quality ratio 87%) Quality average: 75.2% Quality standard deviation: 34.2% HCA Information: Failed Cookbook Comments: Adjust boot time Enable AMSI Found application associated with file extension: .exe Warnings: Show All Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, conhost.exe, CompatTelRunner.exe, WmiPrvSE.exe Report size exceeded maximum capacity and may have missing behavior information. Report size getting too big, too many NtOpenKeyEx calls found. Report size getting too big, too many NtQueryValueKey calls found. Detection Strategy Score Range Reporting Whitelisted Detection Threshold 48 0 - 100 false Copyright Joe Security LLC 2019 Page 5 of 27 Confidence Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Copyright Joe Security LLC 2019 Page 6 of 27 Sample has functionality to log and monitor keystrokes, analyze it with the 'Simulates keyboard and window changes' cookbook Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior Mitre Att&ck Matrix Privilege Credential Lateral Command Initial Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Valid Accounts Windows New Exploitation for Software Packing 1 Input System Time Application Screen Data Standard Remote Service 1 Privilege Capture 1 1 Discovery 1 Deployment Capture 1 Encrypted 1 Cryptographic Management Escalation 1 Software Protocol 1 Replication Service Port Monitors Process Process Injection 1 Network Process Remote Input Exfiltration Fallback Through Execution Injection 1 Sniffing Discovery 1 Services Capture 1 1 Over Other Channels Removable Network Media Medium Drive-by Windows Accessibility New Service 1 Deobfuscate/Decode Input Capture Application Windows Data from Automated Custom Compromise Management Features Files or Window Remote Network Exfiltration Cryptographic Instrumentation Information 1 Discovery 1 Management Shared Drive Protocol Exploit Public- Scheduled Task System DLL Search Obfuscated Files or Credentials in Security Logon Scripts Input Capture Data Encrypted Multiband Facing Firmware Order Hijacking Information 2 Files Software Communication Application Discovery 1 1 Spearphishing Command-Line Shortcut File System DLL Side- Account File and Shared Data Staged Scheduled Standard Link Interface Modification Permissions Loading 1 Manipulation Directory Webroot Transfer Cryptographic Weakness Discovery 2 Protocol Spearphishing Graphical User Modify New Service DLL Search Order Brute Force System Third-party Screen Data Transfer Commonly Attachment Interface Existing Hijacking Information Software Capture Size Limits Used Port Service Discovery 2 4 Signature Overview • AV Detection • Spreading • Networking • Key, Mouse, Clipboard, Microphone and Screen Capturing • DDoS • System Summary • Data Obfuscation • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection Click to jump to signature section AV Detection: Antivirus or Machine Learning detection for unpacked file Spreading: Contains functionality to enumerate / list files inside a directory Networking: Urls found in memory or binary data Key, Mouse, Clipboard, Microphone and Screen Capturing: Copyright Joe Security LLC 2019 Page 7 of 27 Contains functionality to record screenshots Contains functionality to retrieve information about pressed keystrokes DDoS: Too many similar processes found System Summary: Detected potential crypto function Found potential string decryption / allocating functions PE file contains strange resources Sample file is different than original file name gathered from version info Tries to load missing DLLs Classification label Contains functionality for error logging Contains functionality to check free disk space Contains functionality to load and extract PE file embedded resources Parts of this applications are using Borland Delphi (Probably coded in Delphi) Reads ini files Reads software policies Spawns processes Uses an in-process (OLE) Automation server Executable