Download PDF Report

Download PDF Report

DYNAMIC ANALYSIS REPORT #1337459 Classifications: Exploit Downloader Spyware MALICIOUS Threat Names: Exploit.CVE-2018-0802.Gen Verdict Reason: - Sample Type Excel Document Sample Name homefarmanteroom9b56459b5645b0f5e2fbbb8ec8c45c1a4e82922f73a7b6c28dbc6c5f397ad9bda83f77.xls ID #471135 MD5 596b83a169467280b5e047f498eeaa33 SHA1 4d36aad5a72e14082ec57274921f503a9ae29aa1 SHA256 9b5645b0f5e2fbbb8ec8c45c1a4e82922f73a7b6c28dbc6c5f397ad9bda83f77 File Size 37.63 KB Report Created 2021-05-07 20:08 (UTC+2) Target Environment win7_64_sp1_en_mso2016 | ms_office X-Ray Vision for Malware - www.vmray.com 1 / 30 DYNAMIC ANALYSIS REPORT #1337459 OVERVIEW VMRay Threat Identifiers (24 rules, 73 matches) Score Category Operation Count Classification 5/5 Injection Writes into the memory of a process running from a created or modified executable 1 - • (Process #3) doqqx.exe modifies memory of (process #8) doqqx.exe. 5/5 Injection Modifies control flow of a process running from a created or modified executable 1 - • (Process #3) doqqx.exe alters context of (process #8) doqqx.exe. 5/5 Data Collection Tries to read cached credentials of various applications 1 Spyware • Tries to read sensitive data of: Opera, WinSCP, TightVNC, Cyberfox, Flock, Ipswitch WS_FTP, OpenVPN, TigerVNC, FTP Navigator, Microsoft Outlook, Pocomail, FileZilla, k- Meleon, SeaMonkey, BlackHawk, Opera Mail, Mozilla Thunderbird, IncrediMail, CoreFTP, Internet Download Manager, Postbox, The Bat!, Internet Explorer / Edge, Comodo IceDragon, Internet Explorer, Mozilla Firefox. 4/5 Execution Document tries to create process 3 - • Document creates (process #2) eqnedt32.exe. • Document creates (process #6) doqqx.exe. • Document creates (process #8) doqqx.exe. 4/5 Obfuscation Reads from memory of another process 2 - • (Process #3) doqqx.exe reads from (process #6) doqqx.exe. • (Process #3) doqqx.exe reads from (process #8) doqqx.exe. 4/5 Discovery Queries OS version via WMI 1 - • (Process #8) doqqx.exe queries OS version via WMI. 4/5 Discovery Executes WMI query 2 - • (Process #8) doqqx.exe executes WMI query: select * from Win32_OperatingSystem. • (Process #8) doqqx.exe executes WMI query: SELECT * FROM Win32_Processor. 4/5 Discovery Collects hardware properties 1 - • (Process #8) doqqx.exe queries hardware properties via WMI. 4/5 Exploit Possible exploitation attempt 1 Exploit • Office document may try to exploit a common vulnerability or exposure (CVE): CVE-2018-0798. 4/5 Network Connection Performs DNS request 1 - • (Process #8) doqqx.exe resolves host name "sixjan.club" to IP "162.213.251.182". 4/5 Network Connection Connects to remote host 1 - • (Process #8) doqqx.exe opens an outgoing TCP connection to host "162.213.251.182:587". 4/5 Network Connection Downloads executable 1 Downloader • (Process #2) eqnedt32.exe downloads executable via http from http://31.210.20.6/RT/Aeunsul.exe. 4/5 Network Connection Attempts to connect through HTTP 1 - • (Process #2) eqnedt32.exe connects to "http://31.210.20.6/RT/Aeunsul.exe". X-Ray Vision for Malware - www.vmray.com 2 / 30 DYNAMIC ANALYSIS REPORT #1337459 4/5 Network Connection Tries to connect using an uncommon port 1 - • (Process #8) doqqx.exe tries to connect to TCP port 587 at 162.213.251.182. 4/5 Antivirus Malicious content was detected by heuristic scan 2 - • Built-in AV detected the embedded file oleObject1.bin as "Exploit.CVE-2018-0802.Gen". • Built-in AV detected the sample itself as "Exploit.CVE-2018-0802.Gen". 3/5 Discovery Enumerates running processes 1 - • (Process #3) doqqx.exe enumerates running processes. 2/5 Data Collection Reads sensitive browser data 9 - • (Process #8) doqqx.exe tries to read sensitive data of web browser "Opera" by file. • (Process #8) doqqx.exe tries to read credentials of web browser "Internet Explorer" by reading from the system's credential vault. • (Process #8) doqqx.exe tries to read sensitive data of web browser "BlackHawk" by file. • (Process #8) doqqx.exe tries to read sensitive data of web browser "Cyberfox" by file. • (Process #8) doqqx.exe tries to read sensitive data of web browser "Comodo IceDragon" by file. • (Process #8) doqqx.exe tries to read sensitive data of web browser "k-Meleon" by file. • (Process #8) doqqx.exe tries to read sensitive data of web browser "Internet Explorer / Edge" by file. • (Process #8) doqqx.exe tries to read sensitive data of web browser "Mozilla Firefox" by file. • (Process #8) doqqx.exe tries to read sensitive data of web browser "Flock" by file. 2/5 Data Collection Reads sensitive ftp data 5 - • (Process #8) doqqx.exe tries to read sensitive data of ftp application "FTP Navigator" by file. • (Process #8) doqqx.exe tries to read sensitive data of ftp application "CoreFTP" by file. • (Process #8) doqqx.exe tries to read sensitive data of ftp application "CoreFTP" by registry. • (Process #8) doqqx.exe tries to read sensitive data of ftp application "FileZilla" by file. • (Process #8) doqqx.exe tries to read sensitive data of ftp application "Ipswitch WS_FTP" by file. 2/5 Discovery Possibly does reconnaissance 22 - • (Process #8) doqqx.exe tries to gather information about application "FTP Navigator" by file. • (Process #8) doqqx.exe tries to gather information about application "SeaMonkey" by file. • (Process #8) doqqx.exe tries to gather information about application "RealVNC" by registry. • (Process #8) doqqx.exe tries to gather information about application "TightVNC" by registry. • (Process #8) doqqx.exe tries to gather information about application "TigerVNC" by registry. • (Process #8) doqqx.exe tries to gather information about application "CoreFTP" by file. • (Process #8) doqqx.exe tries to gather information about application "Opera Mail" by file. • (Process #8) doqqx.exe tries to gather information about application "FileZilla" by file. • (Process #8) doqqx.exe tries to gather information about application "Pocomail" by file. • (Process #8) doqqx.exe tries to gather information about application "icecat" by file. • (Process #8) doqqx.exe tries to gather information about application "blackHawk" by file. • (Process #8) doqqx.exe tries to gather information about application "WS_FTP" by file. • (Process #8) doqqx.exe tries to gather information about application "Qualcomm Eudora" by registry. • (Process #8) doqqx.exe tries to gather information about application "Cyberfox" by file. • (Process #8) doqqx.exe tries to gather information about application "Comodo IceDragon" by file. • (Process #8) doqqx.exe tries to gather information about application "k-Meleon" by file. • (Process #8) doqqx.exe tries to gather information about application "The Bat!" by file. • (Process #8) doqqx.exe tries to gather information about application "WinSCP" by registry. • (Process #8) doqqx.exe tries to gather information about application "Postbox" by file. • (Process #8) doqqx.exe tries to gather information about application "Mozilla Firefox" by file. • (Process #8) doqqx.exe tries to gather information about application "Flock" by file. • (Process #8) doqqx.exe tries to gather information about application "Foxmail" by registry. X-Ray Vision for Malware - www.vmray.com 3 / 30 DYNAMIC ANALYSIS REPORT #1337459 2/5 Data Collection Reads sensitive mail data 7 - • (Process #8) doqqx.exe tries to read sensitive data of mail application "Mozilla Thunderbird" by file. • (Process #8) doqqx.exe tries to read sensitive data of mail application "Opera Mail" by file. • (Process #8) doqqx.exe tries to read sensitive data of mail application "Pocomail" by file. • (Process #8) doqqx.exe tries to read sensitive data of mail application "Microsoft Outlook" by registry. • (Process #8) doqqx.exe tries to read sensitive data of mail application "IncrediMail" by registry. • (Process #8) doqqx.exe tries to read sensitive data of mail application "The Bat!" by file. • (Process #8) doqqx.exe tries to read sensitive data of mail application "Postbox" by file. 2/5 Data Collection Reads sensitive application data 6 - • (Process #8) doqqx.exe tries to read sensitive data of application "SeaMonkey" by file. • (Process #8) doqqx.exe tries to read sensitive data of application "TightVNC" by registry. • (Process #8) doqqx.exe tries to read sensitive data of application "TigerVNC" by registry. • (Process #8) doqqx.exe tries to read sensitive data of application "OpenVPN" by registry. • (Process #8) doqqx.exe tries to read sensitive data of application "WinSCP" by registry. • (Process #8) doqqx.exe tries to read sensitive data of application "Internet Download Manager" by registry. 2/5 Discovery Reads network adapter information 1 - • (Process #8) doqqx.exe reads the network adapters' addresses by API. 2/5 Heuristics Contains known suspicious class identifier 1 - • Office document contains suspicious class identifier for ActiveX object "Equation2" (CLSID {0002CE02-0000-0000-C000-000000000046}). 2/5 Heuristics Signed executable failed signature validation 1 - • C:\Users\kEecfMwgj\doqqx.exe is signed, but signature validation failed. X-Ray Vision for Malware - www.vmray.com 4 / 30 DYNAMIC ANALYSIS REPORT #1337459 Mitre ATT&CK Matrix Command Initial Privilege Defense Credential Lateral Execution Persistence Discovery Collection and Exfiltration Impact Access Escalation Evasion Access Movement Control #T1057 - - - - - - Process - - - - - Discovery #T1119 - - - - - - - - Automated - - - Collection #T1081 - - - - - Credentials - - - - - - in Files #T1083 File and - - - - - - - - - - - Directory Discovery #T1005 Data - - - - - - - - from Local - - - System #T1012 - - - - - - Query - - - - - Registry #T1214 -

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    30 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us