ID: 319513 Sample Name: AutoRun.inf Cookbook: default.jbs Time: 11:49:41 Date: 18/11/2020 Version: 31.0.0 Red Diamond Table of Contents
Table of Contents 2 Analysis Report AutoRun.inf 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Startup 3 Malware Configuration 3 Yara Overview 3 Sigma Overview 3 Signature Overview 3 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 5 Thumbnails 5 Antivirus, Machine Learning and Genetic Malware Detection 6 Initial Sample 6 Dropped Files 6 Unpacked PE Files 6 Domains 6 URLs 6 Domains and IPs 6 Contacted Domains 7 Contacted IPs 7 General Information 7 Simulations 7 Behavior and APIs 7 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Created / dropped Files 8 Static File Info 8 General 8 File Icon 8 Network Behavior 8 Code Manipulations 9 Statistics 9 System Behavior 9 Analysis Process: notepad.exe PID: 4548 Parent PID: 5620 9 General 9 File Activities 9 Disassembly 9 Code Analysis 9
Copyright null 2020 Page 2 of 9 Analysis Report AutoRun.inf
Overview
General Information Detection Signatures Classification
Sample AutoRun.inf Name: Maayy iiinnfffeeccttt UUSSBB ddrrriiivveess
Analysis ID: 319513 QMuaueyerr riiienesfse ttcthhte eU vvSooBllluu dmreiev eiiinnsfffoorrrmaatttiiioonn (((nnaam… MD5: e61fb75da834380… Queries the volume information (nam
SHA1: d684c54f38f9e98… Ransomware
Miner Spreading SHA256: 31b4e54b2babffb…
mmaallliiiccciiioouusss Most interesting Screenshot: malicious Evader Phishing
sssuusssppiiiccciiioouusss
suspicious
cccllleeaann
clean
Exploiter Banker
Spyware Trojan / Bot
Adware
Score: 1 Range: 0 - 100 Whitelisted: false Confidence: 80%
Startup
System is w10x64 notepad.exe (PID: 4548 cmdline: 'C:\Windows\system32\NOTEPAD.EXE' C:\Users\user\Desktop\AutoRun.inf MD5: BB9A06B8F2DD9D24C77F389D7B2B58D2) cleanup
Malware Configuration
No configs have been found
Yara Overview
No yara matches
Sigma Overview
No Sigma rule has matched
Signature Overview
• Spreading Copyright null 2020 Page 3 of 9 • System Summary • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures .
Mitre Att&ck Matrix
Remote Initial Privilege Defense Credential Lateral Command Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration and Control Effects Effects Impact Replication Windows Path Process Process OS Process Replication Data from Exfiltration Data Eavesdrop on Remotely Modify Through Management Interception Injection 1 Injection 1 Credential Discovery 1 Through Local Over Other Obfuscation Insecure Track Device System Removable Instrumentation Dumping Removable System Network Network Without Partition Media 1 Media 1 Medium Communication Authorization Default Scheduled Boot or Boot or Rootkit LSASS Peripheral Remote Data from Exfiltration Junk Data Exploit SS7 to Remotely Device Accounts Task/Job Logon Logon Memory Device Desktop Removable Over Redirect Phone Wipe Data Lockout Initialization Initialization Discovery 1 Protocol Media Bluetooth Calls/SMS Without Scripts Scripts Authorization Domain At (Linux) Logon Script Logon Obfuscated Security System SMB/Windows Data from Automated Steganography Exploit SS7 to Obtain Delete Accounts (Windows) Script Files or Account Information Admin Shares Network Exfiltration Track Device Device Device (Windows) Information Manager Discovery 1 1 Shared Location Cloud Data Drive Backups
Behavior Graph
Copyright null 2020 Page 4 of 9 Hide Legend Legend: Process Signature Created File DNS/IP Info Is Dropped
Is Windows Process
Behavior Graph Number of created Registry Values Number of created Files ID: 319513 Visual Basic Sample: AutoRun.inf Startdate: 18/11/2020 Delphi Architecture: WINDOWS Java Score: 1 .Net C# or VB.NET
C, C++ or other language
started Is malicious
Internet notepad.exe
Screenshots
Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Copyright null 2020 Page 5 of 9 Antivirus, Machine Learning and Genetic Malware Detection
Initial Sample
No Antivirus matches
Dropped Files
No Antivirus matches
Unpacked PE Files
No Antivirus matches
Domains
No Antivirus matches
URLs
No Antivirus matches
Domains and IPs
Copyright null 2020 Page 6 of 9 Contacted Domains
No contacted domains info
Contacted IPs
No contacted IP infos
General Information
Joe Sandbox Version: 31.0.0 Red Diamond Analysis ID: 319513 Start date: 18.11.2020 Start time: 11:49:41 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 4m 17s Hypervisor based Inspection enabled: false Report type: light Sample file name: AutoRun.inf Cookbook file name: default.jbs Analysis system description: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 Number of analysed new started processes analysed: 20 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies: HCA enabled EGA enabled HDC enabled AMSI enabled Analysis Mode: default Analysis stop reason: Timeout Detection: CLEAN Classification: clean1.winINF@1/0@0/0 EGA Information: Failed HDC Information: Failed HCA Information: Successful, ratio: 100% Number of executed functions: 0 Number of non-executed functions: 0 Cookbook Comments: Adjust boot time Enable AMSI Found application associated with file extension: .inf Warnings: Show All Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe Report size getting too big, too many NtProtectVirtualMemory calls found.
Simulations
Behavior and APIs
No simulations
Copyright null 2020 Page 7 of 9 Joe Sandbox View / Context
IPs
No context
Domains
No context
ASN
No context
JA3 Fingerprints
No context
Dropped Files
No context
Created / dropped Files
No created / dropped files found
Static File Info
General File type: Microsoft Windows Autorun file, ASCII text, with CRLF line terminators Entropy (8bit): 4.502841453316659 TrID: Generic INI configuration (1001/1) 100.00% File name: AutoRun.inf File size: 150 MD5: e61fb75da834380f98c744974510e12b SHA1: d684c54f38f9e9829008e304371a0d9c45b7ffc1 SHA256: 31b4e54b2babffb46e81c1c8aa50ef4a9b5cf997052f1e72 048dc6243433d2d9 SHA512: 0957265277406008c7f6e76942d36ade4d5a45a412ca52 a4a54d302c461effdfdbc16b309402ecf2b179075949023 6a372f258de80fed3c469edb2c3c5305b38 SSDEEP: 3:00u0DqsP58ONDq0TrYMuFDqzmzAJwdVJMKJBL9+ dVJMXTrYMuN:CqqsP5jDq0TMMEq6swZv/oZewMa File Content Preview: [AutoRun]..open=ie.exe..shell\open=Open(&O)..shell\op en\Command=ie.exe..shell\open\Default=1..shell\explor e=Explorer(&X)..shell\explore\Command=ie.exe
File Icon
Icon Hash: 74f0e4e0e2e5e2ec
Network Behavior
No network behavior found
Copyright null 2020 Page 8 of 9 Code Manipulations
Statistics
System Behavior
Analysis Process: notepad.exe PID: 4548 Parent PID: 5620
General
Start time: 11:50:37 Start date: 18/11/2020 Path: C:\Windows\System32\notepad.exe Wow64 process (32bit): false Commandline: 'C:\Windows\system32\NOTEPAD.EXE' C:\Users\user\Desktop\AutoRun.inf Imagebase: 0x7ff60acb0000 File size: 245760 bytes MD5 hash: BB9A06B8F2DD9D24C77F389D7B2B58D2 Has elevated privileges: true Has administrator privileges: true Programmed in: C, C++ or other language Reputation: moderate
File Activities
Source File Path Offset Length Completion Count Address Symbol
Disassembly
Code Analysis
Copyright null 2020 Page 9 of 9