Automated Malware Analysis Report for It
Total Page:16
File Type:pdf, Size:1020Kb
ID: 196310 Sample Name: it.gruppopellegrini.tiristoriamo_1575400267.apk Cookbook: defaultandroidfilecookbook.jbs Time: 09:36:14 Date: 16/12/2019 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report it.gruppopellegrini.tiristoriamo_1575400267.apk 4 Overview 4 General Information 4 Detection 4 Confidence 5 Classification 5 Analysis Advice 6 Mitre Att&ck Matrix 6 Signature Overview 7 Privilege Escalation: 7 Networking: 7 Key, Mouse, Clipboard, Microphone and Screen Capturing: 7 E-Banking Fraud: 7 Operating System Destruction: 7 Change of System Appearance: 7 System Summary: 7 Data Obfuscation: 8 Persistence and Installation Behavior: 8 Boot Survival: 8 Hooking and other Techniques for Hiding and Protection: 8 Malware Analysis System Evasion: 8 Anti Debugging: 8 Language, Device and Operating System Detection: 8 Stealing of Sensitive Information: 8 Malware Configuration 8 Antivirus, Machine Learning and Genetic Malware Detection 9 Initial Sample 9 Dropped Files 9 Domains 9 URLs 9 Yara Overview 9 Initial Sample 9 PCAP (Network Traffic) 9 Dropped Files 9 Sigma Overview 9 Joe Sandbox View / Context 9 IPs 9 Domains 11 ASN 11 JA3 Fingerprints 12 Dropped Files 13 Screenshots 13 Thumbnails 13 Created / dropped Files 14 Domains and IPs 15 Contacted Domains 15 URLs from Memory and Binaries 15 Contacted IPs 15 Public 16 Static File Info 16 General 16 File Icon 16 Static APK Info 17 General 17 Activities 17 Receivers 17 Services 17 Permission Requested 17 Copyright Joe Security LLC 2019 Page 2 of 36 Certificate 17 Resources 17 Network Behavior 29 Network Port Distribution 29 TCP Packets 29 UDP Packets 30 DNS Queries 31 DNS Answers 32 HTTPS Packets 32 APK Behavior 34 Installation 34 Miscellaneous 36 System Calls 36 By Permission (executed) 36 By Permission (non-executed) 36 Disassembly 36 0 Executed Methods 36 0 Non-Executed Methods 36 Copyright Joe Security LLC 2019 Page 3 of 36 Analysis Report it.gruppopellegrini.tiristoriamo_1575400267.apk Overview General Information Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 196310 Start date: 16.12.2019 Start time: 09:36:14 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 11m 49s Hypervisor based Inspection enabled: false Report type: light Sample file name: it.gruppopellegrini.tiristoriamo_1575400267.apk Cookbook file name: defaultandroidfilecookbook.jbs Analysis system description: Android 6.0 APK Instrumentation enabled: true Detection: MAL Classification: mal48.evad.andAPK@0/253@4/0 Warnings: Show All An application runtime error occurred TCP Packets have been reduced to 100 Excluded IPs from analysis (whitelisted): 172.217.21.227, 74.125.206.188, 172.217.22.78, 172.217.16.138, 173.194.187.8, 216.58.205.234, 172.217.21.195, 172.217.16.168, 172.217.16.131, 74.125.173.39, 172.217.23.170, 216.58.207.46, 216.58.207.78, 172.217.23.110, 172.217.16.174, 216.58.208.46, 172.217.16.142, 172.217.22.110, 216.58.210.14, 172.217.16.206, 172.217.21.238, 216.58.205.238, 172.217.22.14, 172.217.18.14, 172.217.18.110, 216.58.207.67, 172.217.18.106, 216.58.208.42, 172.217.18.170, 216.58.207.42, 74.125.173.41, 74.125.110.105 Excluded domains from analysis (whitelisted): gstaticadssl.l.google.com, www.googleadservices.com, android.googleapis.com, r3---sn- 4g5e6ns6.gvt1.com, r3.sn-4g5e6nlk.gvt1.com, r4--- sn-4g5ednsr.gvt1.com, mobile-gtalk.l.google.com, r1---sn-4g5e6nlk.gvt1.com, phonedeviceverification-pa.googleapis.com, dl.google.com, cloudconfig.googleapis.com, play.googleapis.com, ssl-google- analytics.l.google.com, www.gstatic.com, digitalassetlinks.googleapis.com, mtalk.google.com, fonts.gstatic.com, r4.sn- 4g5ednsr.gvt1.com, pagead2.googlesyndication.com, www.googleapis.com, r3---sn-4g5e6nlk.gvt1.com, r1.sn-4g5e6nlk.gvt1.com, connectivitycheck.gstatic.com, ssl.google- analytics.com, youtubei.googleapis.com, crashlytics.l.google.com, youtube-ui.l.google.com, instantmessaging-pa.googleapis.com, r3.sn- 4g5e6ns6.gvt1.com No interacted views No simulation commands forwarded to apk Not all executed log events are in report (maximum 10 identical API calls) Not all non-executed APIs are in report Not all resource files were parsed Report size exceeded maximum capacity and may have missing disassembly code. Report size exceeded maximum capacity and may have missing dynamic data code. Errors: Execution failed: Runtime error External Dependency Missing Detection Copyright Joe Security LLC 2019 Page 4 of 36 Strategy Score Range Reporting Whitelisted Detection Threshold 48 0 - 100 false Confidence Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Classification Copyright Joe Security LLC 2019 Page 5 of 36 Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Unable to instrument or execute APK, runtime error occurred Mitre Att&ck Matrix Remote Initial Privilege Defense Credential Lateral Command Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration and Control Effects Effects Impact Valid Windows Winlogon Port Obfuscated Access System Application Access Data Standard Eavesdrop on Remotely Delete Accounts Remote Helper DLL Monitors Files or Stored Network Deployment Stored Compressed Cryptographic Insecure Track Device Device Management Information 1 Application Connections Software Application Protocol 1 Network Without Data Data 1 Discovery 1 Data 1 Communication Authorization Replication Service Port Accessibility Binary Network System Remote Network Exfiltration Standard Exploit SS7 to Remotely Device Through Execution Monitors Features Padding Sniffing Information Services Information Over Other Non- Redirect Phone Wipe Data Lockout Removable Discovery 1 Discovery 1 Network Application Calls/SMS Without Media Medium Layer Authorization Protocol 1 Copyright Joe Security LLC 2019 Page 6 of 36 Remote Initial Privilege Defense Credential Lateral Command Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration and Control Effects Effects Impact External Windows Accessibility Path Rootkit Input Process Windows Data from Automated Standard Exploit SS7 to Obtain Delete Remote Management Features Interception Capture Discovery 1 Remote Network Exfiltration Application Track Device Device Device Services Instrumentation Management Shared Layer Location Cloud Data Drive Protocol 2 Backups Signature Overview • Privilege Escalation • Networking • Key, Mouse, Clipboard, Microphone and Screen Capturing • E-Banking Fraud • Operating System Destruction • Change of System Appearance • System Summary • Data Obfuscation • Persistence and Installation Behavior • Boot Survival • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • Language, Device and Operating System Detection • Stealing of Sensitive Information Click to jump to signature section Privilege Escalation: Requests root access Networking: Checks an internet connection is available Opens an internet connection Connects to IPs without corresponding DNS lookups Performs DNS lookups Urls found in memory or binary data Uses HTTP for connecting to the internet Uses HTTPS Key, Mouse, Clipboard, Microphone and Screen Capturing: Has permission to take photos E-Banking Fraud: Has functionalty to add an overlay to other apps Operating System Destruction: Lists and deletes files in the same context Change of System Appearance: Acquires a wake lock System Summary: Copyright Joe Security LLC 2019 Page 7 of 36 Requests potentially dangerous permissions Classification label Loads native libraries Reads shares settings Data Obfuscation: Obfuscates method names Uses reflection Persistence and Installation Behavior: Creates files Boot Survival: Installs a new wake lock (to get activate on phone screen on) Hooking and other Techniques for Hiding and Protection: Queries list of running processes/tasks Queries package code path (often used for patching other applications) Uses Crypto APIs Malware Analysis System Evasion: Tries to detect Android x86 Tries to detect the analysis device (e.g. the Android emulator) Accesses /proc Accesses android OS build fields Queries several sensitive phone informations Queries the unique operating system id (ANDROID_ID) Tries to detect Virtualbox Anti Debugging: Checks if debugger is running Language, Device and Operating System Detection: Checks if phone is rooted (checks for Superuser.apk) Checks if phone is rooted (checks for test-keys build tags) Stealing of Sensitive Information: Queries camera information Queries stored mail and application accounts (e.g. Gmail or Whatsup) Reads boot loader settings of the device Malware Configuration No configs have been found Copyright Joe Security LLC 2019 Page 8 of 36 Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Source Detection Scanner Label Link it.gruppopellegrini.tiristoriamo_1575400267.apk 0% Virustotal Browse Dropped Files No Antivirus matches Domains No Antivirus matches URLs Source Detection Scanner Label Link http://fontforge.sf.net) 0% Avira URL Cloud safe https://app-measurement.com/a 0% Virustotal Browse https://app-measurement.com/a 0% URL Reputation safe https://api.flutter.dev/flutter/material/Scaffold/of.html8 0% Avira URL Cloud safe http://fontforge.sf.net)CupertinoIconsCupertinoIconsMediumMediumFontForge 0% Avira URL Cloud safe http://fontforge.sf.net)Created 0% Avira URL Cloud safe