ID: Sample Name: 11youtube3.com Cookbook: default.jbs Time: 08:17:42 Date: 12/04/2018 Version:

Similar documents
ID: Sample Name: meterpreter64bit.exe Cookbook: default.jbs Time: 16:01:45 Date: 24/11/2017 Version:

ID: Sample Name: process.0xfffffa8004b x dmp Cookbook: default.jbs Time: 22:45:59 Date: 02/12/2017 Version: 20.0.

ID: Sample Name: French.exe Cookbook: default.jbs Time: 15:57:57 Date: 24/03/2018 Version:

ID: Sample Name: MSVCR100.dll Cookbook: default.jbs Time: 16:59:36 Date: 30/04/2018 Version:

ID: Sample Name: TBSERV.exe Cookbook: default.jbs Time: 01:52:14 Date: 23/11/2017 Version:

ID: Sample Name: 29UPDYATHD.exe Cookbook: default.jbs Time: 19:03:31 Date: 06/04/2018 Version:

ID: Sample Name: Renci.SshNet.dll Cookbook: default.jbs Time: 12:55:23 Date: 08/06/2018 Version:

ID: Sample Name: CRP_Force_Tool.exe Cookbook: default.jbs Time: 20:11:41 Date: 20/07/2018 Version:

ID: Sample Name: 5GeZNwROcB.bin Cookbook: default.jbs Time: 15:22:54 Date: 30/11/2017 Version:

ID: Sample Name: MacKeeper.dmg Cookbook: default.jbs Time: 11:09:32 Date: 02/06/2018 Version:

ID: Sample Name: ikeyhelper.exe Cookbook: default.jbs Time: 16:40:36 Date: 28/12/2017 Version:

ID: Sample Name:.scr Cookbook: default.jbs Time: 09:33:32 Date: 24/12/2017 Version:

ID: Sample Name: test Cookbook: default.jbs Time: 09:46:13 Date: 21/05/2018 Version:

ID: Sample Name: faktury_pdf.rar Cookbook: default.jbs Time: 12:24:33 Date: 15/12/2017 Version:

ID: Sample Name: text_0.txt Cookbook: default.jbs Time: 16:20:15 Date: 12/01/2018 Version:

ID: Sample Name: vlaue.exe Cookbook: default.jbs Time: 18:54:49 Date: 26/01/2018 Version:

ID: Sample Name: dronefly.apk Cookbook: default.jbs Time: 10:24:54 Date: 07/06/2018 Version:

ID: Sample Name: Updater.exe Cookbook: default.jbs Time: 21:09:59 Date: 18/05/2018 Version:

ID: Sample Name: testfiletestfile.txt Cookbook: default.jbs Time: 15:24:30 Date: 06/07/2018 Version:

ID: Sample Name:.exe Cookbook: default.jbs Time: 17:05:50 Date: 25/12/2017 Version:

ID: Sample Name: gpg4win exe.sig Cookbook: default.jbs Time: 21:44:31 Date: 02/02/2018 Version:

ID: Sample Name:._k.php Cookbook: default.jbs Time: 05:41:18 Date: 25/04/2018 Version:

ID: Sample Name: Serial.txt Cookbook: default.jbs Time: 02:59:20 Date: 07/05/2018 Version:

ID: Sample Name: test.txt Cookbook: default.jbs Time: 13:18:36 Date: 31/03/2018 Version:

ID: Sample Name: dialog.nvp Cookbook: default.jbs Time: 00:09:12 Date: 10/05/2018 Version:

ID: Sample Name: image002 Cookbook: default.jbs Time: 18:19:28 Date: 18/05/2018 Version:

ID: Sample Name: maintools.js Cookbook: default.jbs Time: 15:43:35 Date: 17/02/2018 Version:

ID: Sample Name: 47ntn.scr Cookbook: default.jbs Time: 04:50:45 Date: 31/12/2017 Version:

ID: Sample Name: E DA5e8a0c01b.txt Cookbook: default.jbs Time: 15:35:01 Date: 18/04/2018 Version:

ID: Cookbook: urldownload.jbs Time: 19:53:36 Date: 07/03/2018 Version:

ID: Sample Name: 1hUHXByC3VK Cookbook: default.jbs Time: 05:04:58 Date: 24/12/2017 Version:

ID: Sample Name: binarydata Cookbook: default.jbs Time: 22:09:57 Date: 22/11/2017 Version:

ID: Sample Name: quzpecasrh Cookbook: default.jbs Time: 16:55:54 Date: 07/10/2017 Version:

ID: Sample Name: lt.pak Cookbook: default.jbs Time: 12:40:34 Date: 26/07/2018 Version:

ID: Sample Name: Unconfirmed crdownload Cookbook: default.jbs Time: 22:58:07 Date: 08/11/2017 Version:

ID: Sample Name: pccfvhbyjn.sample Cookbook: default.jbs Time: 13:15:27 Date: 18/01/2018 Version:

ID: Sample Name: SKYDIGITAL- NEW PO.exe Cookbook: default.jbs Time: 15:55:01 Date: 15/01/2018 Version:

ID: Sample Name: 43letter.scr Cookbook: default.jbs Time: 11:20:31 Date: 22/12/2017 Version:

ID: Sample Name: MobaXterm_installer.dat Cookbook: default.jbs Time: 18:29:43 Date: 25/05/2018 Version:

ID: Sample Name: 7LAjPx5USL6 Cookbook: default.jbs Time: 12:02:59 Date: 08/10/2017 Version:

ID: Sample Name: calc1 Cookbook: default.jbs Time: 14:46:00 Date: 13/07/2018 Version:

ID: Cookbook: urldownload.jbs Time: 16:10:39 Date: 07/12/2017 Version:

ID: Sample Name: vscdme.exe Cookbook: default.jbs Time: 22:43:24 Date: 22/11/2017 Version:

ID: Sample Name: NEW ORDER LIST.jar Cookbook: default.jbs Time: 10:19:47 Date: 19/02/2018 Version:

ID: Cookbook: urldownload.jbs Time: 22:46:20 Date: 19/02/2018 Version:

ID: Cookbook: urldownload.jbs Time: 16:41:45 Date: 23/06/2018 Version:

ID: Sample Name: 15text.html.exe Cookbook: default.jbs Time: 10:33:14 Date: 11/12/2017 Version:

ID: Sample Name: 23transcript.scr Cookbook: default.jbs Time: 07:48:13 Date: 30/12/2017 Version:

ID: Sample Name: 2017_w2.exe Cookbook: default.jbs Time: 17:03:04 Date: 09/02/2018 Version:

ID: Sample Name: 13_outputD50AA6F.exe Cookbook: default.jbs Time: 21:05:14 Date: 21/04/2018 Version:

ID: Sample Name: filedata Cookbook: default.jbs Time: 03:13:04 Date: 23/01/2018 Version:

ID: Sample Name: QhSXTPahQj Cookbook: default.jbs Time: 07:55:34 Date: 20/06/2018 Version:

ID: Sample Name: tesseract-ocrsetup exe. Cookbook: default.jbs Time: 16:44:15 Date: 12/02/2018 Version:

ID: Sample Name: 11#Ucb#Uae#Uc4#Ube#Ue5#Ubb#UaafNOnOJTVYQ.exe Cookbook: default.jbs Time: 09:47:21 Date: 02/02/2018 Version: 20.0.

ID: Sample Name: js.jar Cookbook: defaultwindowsfilecookbook.jbs Time: 10:01:15 Date: 26/09/2018 Version:

ID: Cookbook: urldownload.jbs Time: 02:55:04 Date: 01/02/2018 Version:

ID: Sample Name: ff2c8cadaa0fd8da6138cce6fce37e001f53a5d9ceccd67945b15ae273f4d751.evaljs.js Cookbook: default.jbs Time: 16:44:00 Date:

ID: Sample Name: adobe.snr.patchpainter.exe. Cookbook: default.jbs Time: 07:05:16 Date: 03/03/2018 Version:

ID: Sample Name: Payment_Remittance#.xps Cookbook: defaultwindowsofficecookbook.jbs Time: 01:35:46 Date: 20/09/2018 Version: 23.0.

ID: Sample Name: FsQHOWXph8.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 20:31:13 Date: 16/03/2018 Version:

ID: Sample Name: 21PO jpg...js Cookbook: default.jbs Time: 14:32:06 Date: 21/11/2017 Version:

ID: Sample Name: Coss, Daniel.vcf Cookbook: default.jbs Time: 15:16:47 Date: 21/06/2018 Version:

ID: Sample Name: 19document.scr Cookbook: default.jbs Time: 13:48:21 Date: 23/11/2017 Version:

ID: Cookbook: urldownload.jbs Time: 20:09:25 Date: 13/06/2018 Version:

ID: Sample Name: fly.jse Cookbook: default.jbs Time: 18:17:26 Date: 11/11/2017 Version:

ID: Cookbook: browseurl.jbs Time: 13:10:41 Date: 01/04/2018 Version:

ID: Cookbook: urldownload.jbs Time: 08:25:02 Date: 29/10/2018 Version: Fire Opal

ID: Cookbook: browseurl.jbs Time: 17:39:02 Date: 22/03/2018 Version:

ID: Cookbook: browseurl.jbs Time: 15:46:38 Date: 29/03/2018 Version:

ID: Sample Name: adobe.snr.patch.v2.0-painter.exe Cookbook: default.jbs Time: 18:11:59 Date: 06/07/2018 Version:

ID: Sample Name: test.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 18:57:54 Date: 12/04/2018 Version:

ID: Sample Name: Luxus.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 10:22:08 Date: 09/01/2018 Version:

ID: Sample Name: SSI Set Details.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 01:14:07 Date: 13/04/2018 Version: 22.0.

ID: Cookbook: browseurl.jbs Time: 12:58:02 Date: 02/04/2018 Version:

ID: Cookbook: urldownload.jbs Time: 20:47:24 Date: 09/12/2017 Version:

ID: Cookbook: urldownload.jbs Time: 20:31:22 Date: 09/08/2018 Version:

ID: Sample Name: oq5wdjgk2r.exe Cookbook: default.jbs Time: 20:25:47 Date: 22/11/2017 Version:

ID: Cookbook: urldownload.jbs Time: 19:58:34 Date: 02/05/2018 Version:

ID: Cookbook: urldownload.jbs Time: 23:23:00 Date: 11/01/2018 Version:

ID: Sample Name: modulecheck.js Cookbook: default.jbs Time: 17:46:31 Date: 01/02/2018 Version:

ID: Sample Name: FD-1 Phase Out Notice.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 14:36:29 Date: 04/05/2018 Version: 22.0.

ID: Cookbook: browseurl.jbs Time: 11:59:06 Date: 14/05/2018 Version:

ID: Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:55:50 Date:

ID: Cookbook: browseurl.jbs Time: 13:46:19 Date: 09/05/2018 Version:

ID: Cookbook: browseurl.jbs Time: 16:58:45 Date: 04/06/2018 Version:

ID: Sample Name: consulta.cpf- CNPJ.exe Cookbook: default.jbs Time: 21:07:22 Date: 14/10/2017 Version:

ID: Cookbook: urldownload.jbs Time: 18:48:38 Date: 19/06/2018 Version:

ID: Cookbook: urldownload.jbs Time: 22:26:00 Date: 30/12/2017 Version:

ID: Cookbook: browseurl.jbs Time: 10:12:02 Date: 15/01/2018 Version:

ID: Sample Name: fonttable.xml Cookbook: defaultandroidfilecookbook.jbs Time: 05:14:58 Date: 27/04/2018 Version:

ID: Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:52:31 Date:

ID: Sample Name: TO_HM_CROWN PR#U0130NCE MOHAMMED B#U0130N SALMAN - Dear Prime Minister.doc Cookbook: defaultwindowsofficecookbook.

ID: Cookbook: browseurl.jbs Time: 15:48:15 Date: 29/03/2018 Version:

ID: Sample Name: Snow Patrol - Chasing Cars.mp3 Cookbook: defaultandroidfilecookbook.jbs Time: 12:40:19 Date: 09/01/2018 Version: 20.0.

ID: Sample Name: Dxd1yOZMU1.bin Cookbook: defaultwindowsofficecookbook.jbs Time: 09:43:59 Date: 21/10/2017 Version:

ID: Sample Name: Liste_az.docx Cookbook: defaultwindowsofficecookbook.jbs Time: 00:17:54 Date: 30/12/2017 Version:

ID: Sample Name: PO xls Cookbook: defaultwindowsofficecookbook.jbs Time: 03:13:36 Date: 08/01/2018 Version:

ID: Sample Name: MSM- 24_Supply_List RU_518.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 17:15:48 Date: 19/06/2018 Version: 22.0.

ID: Cookbook: browseurl.jbs Time: 16:56:06 Date: 13/02/2018 Version:

ID: Sample Name: numbering.xml Cookbook: defaultandroidfilecookbook.jbs Time: 05:15:39 Date: 27/04/2018 Version:

Transcription:

ID: 54295 Sample Name: 11youtube3.com Cookbook: default.jbs Time: 08:1:42 Date: 12/04/2018 Version: 22.0.0

Table of Contents Table of Contents Analysis Report Overview General Information Detection Confidence Classification Signature Overview Data Obfuscation: System Summary: Anti Debugging: Malware Analysis System Evasion: Behavior Graph Simulations Behavior and APIs Antivirus Detection Initial Sample Unpacked PE Files Domains Yara Overview Initial Sample PCAP (Network Traffic) Memory Dumps Unpacked PEs Joe Sandbox View / Context IPs Domains ASN Created / dropped Files Contacted Domains/Contacted IPs Contacted Domains Contacted IPs Static File Info General Static PE Info General Entrypoint Preview Data Directories Sections Resources Imports Possible Origin Network Behavior Code Manipulations Statistics System Behavior Disassembly 2 3 3 3 3 3 4 4 5 5 5 5 5 8 8 8 8 8 10 10 10 10 10 11 11 11 11 11 Copyright Joe Security LLC 2018 Page 2 of 11

Analysis Report Overview General Information Joe Sandbox Version: 22.0.0 Analysis ID: 54295 Start time: 08:1:42 Joe Sandbox Product: CloudBasic Start date: 12.04.2018 Overall analysis duration: Hypervisor based Inspection enabled: Report type: Sample file name: Cookbook file name: 0h 3m 2s false light 11youtube3.com default.jbs Analysis system description: Windows SP1 (with Office 2010 SP2, IE 11, FF 54, Chrome 0, Acrobat Reader DC 1, Flash 2, Java 8.0.1440.1) Number of analysed new started processes analysed: 0 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 0 Technologies Detection: Classification: Errors: MAL EGA enabled HDC enabled mal48.wincom@0/0@0/0 Unable to connect to analysis machine: w, W_2, timeout exceeded, no analysis of the sample was performed Nothing to analyse, Joe Sandbox has not found any analysis process or sample Detection Strategy Score Range Reporting Detection Threshold 48 0-100 Report FP / FN Confidence Strategy Score Range Further Analysis Required? Confidence Threshold 5 0-5 false Copyright Joe Security LLC 2018 Page 3 of 11

Classification Ransomware Miner Spreading malicious malicious malicious Evader Phishing suspicious suspicious suspicious clean clean clean Exploiter Banker Spyware Trojan / Bot Adware Signature Overview Obfuscation Data Summary System Debugging Anti Malware Analysis System Evasion Copyright Joe Security LLC 2018 Page 4 of 11

Click to jump to signature section Data Obfuscation: Sample is packed with UPX System Summary: Submitted file has a suspicious file extension PE file contains strange resources PE file has section (not.text) which is very likely to contain packed code (zlib compression ratio < 0.011) Classification label Anti Debugging: Program does not show much activity (idle) Malware Analysis System Evasion: Program does not show much activity (idle) Behavior Graph Copyright Joe Security LLC 2018 Page 5 of 11

Hide Legend Legend: Process Signature Created File DNS/IP Info Is Dropped Is Windows Process Behavior Graph Number of created Registry Values Number of created Files ID: 54295 Sample: 11youtube3.com Startdate: 12/04/2018 Architecture: WINDOWS Score: 48 Visual Basic Delphi Java.Net C# or VB.NET C, C++ or other language Is malicious Submitted file has a suspicious file extension Simulations Behavior and APIs No simulations Antivirus Detection Initial Sample No Antivirus matches No Antivirus matches Unpacked PE Files No Antivirus matches Domains No Antivirus matches Copyright Joe Security LLC 2018 Page of 11

Yara Overview Initial Sample No yara matches PCAP (Network Traffic) No yara matches No yara matches Memory Dumps No yara matches Unpacked PEs No yara matches Joe Sandbox View / Context IPs No context Domains No context ASN No context No context Created / dropped Files No created / dropped files found Contacted Domains/Contacted IPs Contacted Domains No contacted domains info Contacted IPs No contacted IP infos Copyright Joe Security LLC 2018 Page of 11

Static File Info General File type: Entropy (8bit):.812491931042 PE32 executable (GUI) Intel 8038, for MS Windows, UPX compressed TrID: Win32 Executable (generic) a (10002005/4) 99.3% UPX compressed Win32 Executable (3051/9) 0.30% Win32 EXE Yoda's Crypter (251/9) 0.2% Clipper DOS Executable (2020/12) 0.02% Generic Win/DOS Executable (2004/3) 0.02% File name: File size: 45982 MD5: SHA1: SHA25: SHA512: File Content Preview: 11youtube3.com b092bd2842bad4c13ab3b9b01 c8fd51855c45be4fdfdade88cfb3a313309c9b 2f4cc3032491b85d8ef34a1403cc258cab083951a 83c3f240a945d19f 54098513ff12edb553f8ed232d8f0e41f2a8cc98d04 ee13e1bed4a12522a411fc8baa4ad43d9b4de 459413ca35915e181a18e8ec5db134 MZ...@...!..L.!Th is program cannot be run in DOS mode...$........pe..l... Static PE Info General Entrypoint: Entrypoint Section: Digitally signed: Imagebase: Subsystem: Image File Characteristics: DLL Characteristics: 0x80b4a0 UPX1 false 0x800000 windows gui LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED Time Stamp: 0x0 [Thu Jan 1 00:00:00 190 UTC] TLS Callbacks: CLR (.Net) Version: OS Version Major: 4 OS Version Minor: 0 File Version Major: 4 File Version Minor: 0 Subsystem Version Major: 4 Subsystem Version Minor: 0 Import Hash: 5d02fde12eb0fb22fe8e05e50da0 Entrypoint Preview Instruction pushad mov esi, 0080000h lea edi, dword ptr [esi-0000000h] push edi or ebp, FFFFFFFFh jmp 0000F224DCBAE92h mov al, byte ptr [esi] inc esi mov byte ptr [edi], al inc edi Copyright Joe Security LLC 2018 Page 8 of 11

Instruction jne 0000F224DCBAE89h jc 0000F224DCBAEFh mov eax, 00000001h jne 0000F224DCBAE89h adc eax, eax jnc 0000F224DCBAE1h jne 0000F224DCBAE8Bh jnc 0000F224DCBAEh xor ecx, ecx sub eax, 03h jc 0000F224DCBAE8Fh shl eax, 08h mov al, byte ptr [esi] inc esi xor eax, FFFFFFFFh je 0000F224DCBAEFh mov ebp, eax jne 0000F224DCBAE89h adc ecx, ecx jne 0000F224DCBAE89h adc ecx, ecx jne 0000F224DCBAEA2h inc ecx jne 0000F224DCBAE89h adc ecx, ecx jnc 0000F224DCBAE1h jne 0000F224DCBAE8Bh jnc 0000F224DCBAEh add ecx, 02h cmp ebp, FFFFF300h adc ecx, 01h lea edx, dword ptr [edi+ebp] cmp ebp, FFFFFFFCh jbe 0000F224DCBAE91h mov al, byte ptr [edx] inc edx Copyright Joe Security LLC 2018 Page 9 of 11

Instruction mov byte ptr [edi], al inc edi dec ecx jne 0000F224DCBAE9h jmp 0000F224DCBADE8h mov eax, dword ptr [edx] Data Directories Name Virtual Address Virtual Size Is in Section IMAGE_DIRECTORY_ENTRY_EXPORT 0x0 0x0 IMAGE_DIRECTORY_ENTRY_IMPORT 0xc514 0x130.rsrc IMAGE_DIRECTORY_ENTRY_RESOURCE 0xc000 0x514.rsrc IMAGE_DIRECTORY_ENTRY_EXCEPTION 0x0 0x0 IMAGE_DIRECTORY_ENTRY_SECURITY 0x0 0x0 IMAGE_DIRECTORY_ENTRY_BASERELOC 0x0 0x0 IMAGE_DIRECTORY_ENTRY_DEBUG 0x0 0x0 IMAGE_DIRECTORY_ENTRY_COPYRIGHT 0x0 0x0 IMAGE_DIRECTORY_ENTRY_GLOBALPTR 0x0 0x0 IMAGE_DIRECTORY_ENTRY_TLS 0x0 0x0 IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG 0x0 0x0 IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT 0x0 0x0 IMAGE_DIRECTORY_ENTRY_IAT 0x0 0x0 IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT 0x0 0x0 IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR 0x0 0x0 IMAGE_DIRECTORY_ENTRY_RESERVED 0x0 0x0 Sections Name Virtual Address Virtual Size Raw Size Xored PE ZLIB Complexity File Type Entropy Characteristics UPX0 0x1000 0x000 0x0 False 0 empty 0.0 IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_ DATA, IMAGE_SCN_MEM_READ UPX1 0x000 0x5000 0x400 False 0.9924101428 data.8990234125 IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DA TA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ.rsrc 0xc000 0x1000 0x800 False 0.283203125 data 2.495945519 IMAGE_SCN_CNT_INITIALIZED_DA TA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ Resources Name RVA Size Type Language Country RT_ICON 0xc0d8 0x2e8 data English United States RT_ICON 0xc3c4 0x128 GLS_BINARY_LSB_FIRST English United States RT_GROUP_ICON 0xc4f0 0x22 MS Windows icon resource - 2 icons, 32x32, 1-colors English United States Imports DLL KERNEL32.DLL ADVAPI32.dll MSVCRT.dll USER32.dll WS2_32.dll Import LoadLibraryA, GetProcAddress, ExitProcess RegCloseKey time wsprintfa gethostname Possible Origin Language of compilation system Country where language is spoken Map English United States Copyright Joe Security LLC 2018 Page 10 of 11

Network Behavior No network behavior found Code Manipulations Statistics System Behavior Disassembly Copyright Joe Security LLC 2018 Page 11 of 11