MALICIOUS Threat Names:

MALICIOUS Threat Names:

DYNAMIC ANALYSIS REPORT #1191526 Classifications: Downloader Spyware MALICIOUS Threat Names: - Verdict Reason: - Sample Type Windows Exe (x86-32) Sample Name DFI_078_41_02_005.pdf.exe ID #392292 MD5 401b898010200d87fa8b93e0bf20f45d SHA1 dd1621dfaaffc7ecf9e4b52215eda9bd7cfe1a3b SHA256 2b5a82318d126c8d7f49bfcf1a093d349da46924c7bdae0ed0428ddd4549feb3 File Size 463.80 KB Report Created 2021-04-21 20:23 (UTC+2) Target Environment win10_64_th2_en_mso2016 | exe X-Ray Vision for Malware - www.vmray.com 1 / 31 DYNAMIC ANALYSIS REPORT #1191526 OVERVIEW VMRay Threat Identifiers (18 rules, 46 matches) Score Category Operation Count Classification 5/5 Data Collection Tries to read cached credentials of various applications 1 Spyware • Tries to read sensitive data of: Kometa, Comodo Dragon, Elements Browser, Cyberfox, Opera, Mozilla Thunderbird, Epic Privacy Browser, BlackHawk, Torch, Chromium, Internet Explorer, CocCoc, Orbitum, Amigo, Google Chrome, Mozilla Firefox, Vivaldi, Uran, CentBrowser. 4/5 Masquerade Uses a double file extension 2 - • File "c:\users\rdhj0cnfevzx\desktop\dfi_078_41_02_005.pdf.exe" has a double file extension. • File "c:\users\rdhj0cnfevzx\appdata\local\temp\dfi_078_41_02_005.pdf.exe" has a double file extension. 2/5 Data Collection Reads sensitive browser data 18 - • (Process #2) dfi_078_41_02_005.pdf.exe tries to read credentials of web browser "Internet Explorer" by reading from the system's credential vault. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Google Chrome" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Chromium" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Kometa" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Amigo" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Torch" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Orbitum" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Comodo Dragon" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Epic Privacy Browser" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Vivaldi" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "CocCoc" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Uran" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "CentBrowser" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Elements Browser" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Opera" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Mozilla Firefox" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "Cyberfox" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of web browser "BlackHawk" by file. 2/5 Data Collection Reads sensitive mail data 1 - • (Process #2) dfi_078_41_02_005.pdf.exe tries to read sensitive data of mail application "Mozilla Thunderbird" by file. 2/5 Anti Analysis Tries to detect virtual machine 1 - • Multiple processes are possibly trying to detect a VM via rdtsc. 2/5 Heuristics Signed executable failed signature validation 1 - • C:\Users\RDhJ0CNFevzX\Desktop\DFI_078_41_02_005.pdf.exe is signed, but signature validation failed. 2/5 Injection Writes into the memory of a process running from a created or modified executable 1 - • (Process #1) dfi_078_41_02_005.pdf.exe modifies memory of (process #2) dfi_078_41_02_005.pdf.exe. 2/5 Injection Modifies control flow of a process running from a created or modified executable 1 - • (Process #1) dfi_078_41_02_005.pdf.exe alters context of (process #2) dfi_078_41_02_005.pdf.exe. 1/5 Privilege Escalation Enables process privilege 1 - • (Process #1) dfi_078_41_02_005.pdf.exe enables process privilege "SeDebugPrivilege". X-Ray Vision for Malware - www.vmray.com 2 / 31 DYNAMIC ANALYSIS REPORT #1191526 1/5 Persistence Installs system startup script or application 1 - • (Process #1) dfi_078_41_02_005.pdf.exe adds ""C:\Users\RDhJ0CNFevzX\AppData\Local\notpad.exe"" to Windows startup via registry. 1/5 Hide Tracks Creates process with hidden window 2 - • (Process #1) dfi_078_41_02_005.pdf.exe starts (process #2) dfi_078_41_02_005.pdf.exe with a hidden window. • (Process #2) dfi_078_41_02_005.pdf.exe starts (process #2) dfi_078_41_02_005.pdf.exe with a hidden window. 1/5 Discovery Enumerates running processes 1 - • (Process #1) dfi_078_41_02_005.pdf.exe enumerates running processes. 1/5 Obfuscation Reads from memory of another process 1 - • (Process #1) dfi_078_41_02_005.pdf.exe reads from (process #2) dfi_078_41_02_005.pdf.exe. 1/5 Obfuscation Creates a page with write and execute permissions 1 - • (Process #1) dfi_078_41_02_005.pdf.exe allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code. 1/5 Discovery Possibly does reconnaissance 4 - • (Process #2) dfi_078_41_02_005.pdf.exe tries to gather information about application "Mozilla Firefox" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to gather information about application "Cyberfox" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to gather information about application "blackHawk" by file. • (Process #2) dfi_078_41_02_005.pdf.exe tries to gather information about application "icecat" by file. 1/5 Obfuscation Resolves API functions dynamically 1 - • (Process #2) dfi_078_41_02_005.pdf.exe resolves 74 API functions by name. 1/5 Execution Executes itself 1 - • (Process #1) dfi_078_41_02_005.pdf.exe executes a copy of the sample at c:\users\rdhj0cnfevzx\desktop\dfi_078_41_02_005.pdf.exe. 1/5 Network Connection Downloads executable 7 Downloader • (Process #2) dfi_078_41_02_005.pdf.exe downloads executable via http from duiy.xyz/6.jpg. • (Process #2) dfi_078_41_02_005.pdf.exe downloads executable via http from duiy.xyz/1.jpg. • (Process #2) dfi_078_41_02_005.pdf.exe downloads executable via http from duiy.xyz/2.jpg. • (Process #2) dfi_078_41_02_005.pdf.exe downloads executable via http from duiy.xyz/3.jpg. • (Process #2) dfi_078_41_02_005.pdf.exe downloads executable via http from duiy.xyz/4.jpg. • (Process #2) dfi_078_41_02_005.pdf.exe downloads executable via http from duiy.xyz/5.jpg. • (Process #2) dfi_078_41_02_005.pdf.exe downloads executable via http from duiy.xyz/7.jpg. - Trusted Known clean file 7 - • File "C:\\ProgramData\\softokn3.dll" is a known clean file. • File "C:\\ProgramData\\sqlite3.dll" is a known clean file. • File "C:\\ProgramData\\freebl3.dll" is a known clean file. • File "C:\\ProgramData\\mozglue.dll" is a known clean file. • File "C:\\ProgramData\\msvcp140.dll" is a known clean file. • File "C:\\ProgramData\\nss3.dll" is a known clean file. • File "C:\\ProgramData\\vcruntime140.dll" is a known clean file. Remarks Auto Reboot Triggered (0x02000004): The operating system was rebooted during the analysis because the sample installed a startup script, task or application for persistence. X-Ray Vision for Malware - www.vmray.com 3 / 31 DYNAMIC ANALYSIS REPORT #1191526 Mitre ATT&CK Matrix Command Initial Privilege Defense Credential Lateral Execution Persistence Discovery Collection and Exfiltration Impact Access Escalation Evasion Access Movement Control #T1036 - - - - Masqueradin - - - - - - - g #T1060 Registry Run - - Keys / - - - - - - - - - Startup Folder #T1112 - - - - Modify - - - - - - - Registry #T1143 - - - - Hidden - - - - - - - Window #T1057 - - - - - - Process - - - - - Discovery #T1045 - - - - Software - - - - - - - Packing #T1119 - - - - - - - - Automated - - - Collection #T1003 - - - - - Credential - - - - - - Dumping #T1005 Data - - - - - - - - from Local - - - System #T1081 - - - - - Credentials - - - - - - in Files #T1083 File and - - - - - - - - - - - Directory Discovery #T1497 #T1497 Virtualization Virtualization - - - - - - - - - - /Sandbox /Sandbox Evasion Evasion #T1124 - - - - - - System Time - - - - - Discovery #T1071 Standard - - - - - - - - - Application - - Layer Protocol #T1105 #T1105 - - - - - - - Remote File - Remote File - - Copy Copy X-Ray Vision for Malware - www.vmray.com 4 / 31 DYNAMIC ANALYSIS REPORT #1191526 Sample Information ID 1191526 MD5 401b898010200d87fa8b93e0bf20f45d SHA1 dd1621dfaaffc7ecf9e4b52215eda9bd7cfe1a3b SHA256 2b5a82318d126c8d7f49bfcf1a093d349da46924c7bdae0ed0428ddd4549feb3 SSDeep 6144:Zz3df/UYtfUeAIQHuA36cdrNSvsdssKDJXJ6a/2aKE4VCQMCS:f/JeeAItC66Jtg1Iajg/ ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Filename DFI_078_41_02_005.pdf.exe File Size 463.80 KB Sample Type Windows Exe (x86-32) Has Macros Analysis Information Creation Time 2021-04-21 20:23 (UTC+2) Analysis Duration 00:04:00 Termination Reason Timeout Number of Monitored Processes 4 Execution Successfull False Reputation Analysis Enabled WHOIS Enabled Built-in AV Enabled Built-in AV Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files Number of AV Matches 0 YARA Enabled YARA Applied On Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps, Embedded Files Number of YARA Matches 0 X-Ray Vision for Malware - www.vmray.com 5 / 31

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    31 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us