Automated Malware Analysis Report for Spoolsv.Exe
Total Page:16
File Type:pdf, Size:1020Kb
ID: 160124 Sample Name: spoolsv.exe Cookbook: default.jbs Time: 10:37:44 Date: 05/08/2019 Version: 26.0.0 Aquamarine Table of Contents Table of Contents 2 Analysis Report spoolsv.exe 4 Overview 4 General Information 4 Detection 4 Confidence 4 Classification 5 Analysis Advice 5 Mitre Att&ck Matrix 6 Signature Overview 6 Spreading: 6 System Summary: 6 Data Obfuscation: 7 Boot Survival: 7 Hooking and other Techniques for Hiding and Protection: 7 Malware Analysis System Evasion: 7 Anti Debugging: 7 HIPS / PFW / Operating System Protection Evasion: 7 Language, Device and Operating System Detection: 7 Remote Access Functionality: 7 Behavior Graph 7 Simulations 8 Behavior and APIs 8 Antivirus and Machine Learning Detection 8 Initial Sample 8 Dropped Files 8 Unpacked PE Files 8 Domains 8 URLs 9 Yara Overview 9 Initial Sample 9 PCAP (Network Traffic) 9 Dropped Files 9 Memory Dumps 9 Unpacked PEs 9 Joe Sandbox View / Context 9 IPs 9 Domains 9 ASN 9 JA3 Fingerprints 9 Dropped Files 9 Screenshots 9 Thumbnails 9 Startup 10 Created / dropped Files 10 Domains and IPs 11 Contacted Domains 11 Contacted IPs 11 Static File Info 11 General 11 File Icon 11 Static PE Info 12 General 12 Entrypoint Preview 12 Rich Headers 13 Data Directories 13 Sections 13 Resources 14 Imports 14 Copyright Joe Security LLC 2019 Page 2 of 22 Exports 15 Version Infos 18 Possible Origin 18 Network Behavior 19 Code Manipulations 19 Statistics 19 Behavior 19 System Behavior 19 Analysis Process: cmd.exe PID: 2748 Parent PID: 480 19 General 19 File Activities 20 File Created 20 Analysis Process: conhost.exe PID: 936 Parent PID: 2748 20 General 20 Analysis Process: sc.exe PID: 2400 Parent PID: 2748 20 General 20 File Activities 20 File Written 20 Analysis Process: cmd.exe PID: 4616 Parent PID: 480 20 General 20 File Activities 21 File Created 21 Analysis Process: conhost.exe PID: 1680 Parent PID: 4616 21 General 21 Analysis Process: sc.exe PID: 648 Parent PID: 4616 21 General 21 File Activities 21 File Written 21 Analysis Process: spoolsv.exe PID: 4304 Parent PID: 576 22 General 22 Disassembly 22 Code Analysis 22 Copyright Joe Security LLC 2019 Page 3 of 22 Analysis Report spoolsv.exe Overview General Information Joe Sandbox Version: 26.0.0 Aquamarine Analysis ID: 160124 Start date: 05.08.2019 Start time: 10:37:44 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 2m 52s Hypervisor based Inspection enabled: false Report type: light Sample file name: spoolsv.exe Cookbook file name: default.jbs Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113 Run name: Run as Windows Service Number of analysed new started processes analysed: 12 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled HDC enabled AMSI enabled Analysis stop reason: Timeout Detection: SUS Classification: sus27.evad.winEXE@9/2@0/0 EGA Information: Successful, ratio: 100% HDC Information: Successful, ratio: 100% (good quality ratio 69.9%) Quality average: 47.7% Quality standard deviation: 38.1% HCA Information: Failed Cookbook Comments: Adjust boot time Enable AMSI Found application associated with file extension: .exe Stop behavior analysis, all processes terminated Warnings: Show All Exclude process from analysis (whitelisted): MpCmdRun.exe, sc.exe, dllhost.exe, conhost.exe Detection Strategy Score Range Reporting Whitelisted Detection Threshold 27 0 - 100 false Confidence Copyright Joe Security LLC 2019 Page 4 of 22 Strategy Score Range Further Analysis Required? Confidence Threshold 2 0 - 5 true Classification Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Initial sample is a service handler and should be started as service Sample is a service DLL but no service has been registered Copyright Joe Security LLC 2019 Page 5 of 22 Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior Mitre Att&ck Matrix Privilege Defense Credential Lateral Command and Initial Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration Control Valid Accounts Service Modify Existing Process Process Credential System Time Application Data from Local Data Standard Execution 2 Service 2 Injection 1 1 Injection 1 1 Dumping Discovery 1 Deployment System Encrypted 1 Cryptographic Software Protocol 1 Replication Execution New Service 3 New Service 3 DLL Side- Network Peripheral Remote Data from Exfiltration Over Commonly Used Through through API 1 Loading 1 Sniffing Device Services Removable Other Network Port 1 Removable Discovery 1 Media Medium Media Drive-by Windows Accessibility Path Rootkit Input Security Windows Data from Automated Custom Compromise Management Features Interception Capture Software Remote Network Shared Exfiltration Cryptographic Instrumentation Discovery 2 1 Management Drive Protocol Exploit Public- Scheduled Task System DLL Search Obfuscated Credentials System Logon Scripts Input Capture Data Encrypted Multiband Facing Firmware Order Hijacking Files or in Files Information Communication Application Information Discovery 2 Signature Overview • Spreading • System Summary • Data Obfuscation • Boot Survival • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection • Remote Access Functionality Click to jump to signature section Spreading: Contains functionality to get notified if a device is plugged in / out System Summary: Contains functionality to call native functions Creates mutexes Detected potential crypto function Sample file is different than original file name gathered from version info Tries to load missing DLLs Classification label Contains functionality to modify services (start/stop/modify) Contains functionality to register a service control handler (likely the sample is a service DLL) PE file has an executable .text section and no other executable section Reads software policies Spawns processes Uses an in-process (OLE) Automation server PE file exports many functions Copyright Joe Security LLC 2019 Page 6 of 22 PE file has a high image base, often used for DLLs Contains modern PE file flags such as dynamic base (ASLR) or NX PE file contains a debug data directory Binary contains paths to debug symbols Data Obfuscation: Contains functionality to dynamically determine API calls Boot Survival: Contains functionality to start windows services Uses sc.exe to modify the status of services Hooking and other Techniques for Hiding and Protection: Extensive use of GetProcAddress (often used to hide API calls) Disables application error messsages (SetErrorMode) Malware Analysis System Evasion: Found evasive API chain checking for process token information Found large amount of non-executed APIs Sample execution stops while process was sleeping (likely an evasion) May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) Anti Debugging: Contains functionality to check if a debugger is running (IsDebuggerPresent) Contains functionality to dynamically determine API calls Contains functionality which may be used to detect a debugger (GetProcessHeap) Contains functionality to register its own exception handler HIPS / PFW / Operating System Protection Evasion: Contains functionality to prevent local Windows debugging Creates a process in suspended mode (likely to inject code) Contains functionality to create a new security descriptor Language, Device and Operating System Detection: Contains functionality to query local / system time Contains functionality to query windows version Remote Access Functionality: Contains functionality to open a port and listen for incoming connection (possibly a backdoor) Behavior Graph Copyright Joe Security LLC 2019 Page 7 of 22 Hide Legend Legend: Process Signature Created File Behavior Graph ID: 160124 DNS/IP Info Sample: spoolsv.exe Is Dropped Startdate: 05/08/2019 Is Windows Process Architecture: WINDOWS Number of created Registry Values Score: 27 Number of created Files started started started Visual Basic Delphi spoolsv.exe cmd.exe cmd.exe Java .Net C# or VB.NET 2 2 C, C++ or other language Is malicious Internet Contains functionality to prevent local Windows started started started started debugging conhost.exe sc.exe conhost.exe sc.exe 1 1 Simulations Behavior and APIs Time Type Description 10:38:55 API Interceptor 1x Sleep call for process: cmd.exe modified Antivirus and Machine Learning Detection Initial Sample Source Detection Scanner Label Link spoolsv.exe 0% virustotal Browse spoolsv.exe 0% metadefender Browse Dropped Files No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches Copyright Joe Security LLC 2019 Page 8 of 22 URLs No Antivirus matches Yara Overview Initial Sample No yara matches PCAP (Network Traffic) No yara matches Dropped Files No yara matches Memory Dumps No yara matches Unpacked PEs No yara matches Joe Sandbox View / Context IPs No context Domains No context ASN No context JA3 Fingerprints No context Dropped Files No context Screenshots Thumbnails This section contains all screenshots as thumbnails, including those not