Scripts - Reporte Sandboxing
Scripts - Reporte Sandboxing
Scripts - Reporte Sandboxing
Table of Contents 2
Windows Analysis Report Scripts.zip 3
Overview 3
General Information 3
Detection 3
Signatures 3
Classification 3
Process Tree 3
Malware Configuration 3
Yara Signatures 3
Sigma Signatures 3
Suricata Signatures 4
Joe Sandbox Signatures 4
Boot Survival 4
Mitre Att&ck Matrix 4
Behavior Graph 4
Screenshots 5
Thumbnails 5
Antivirus, Machine Learning and Genetic Malware Detection 6
Initial Sample 6
Dropped Files 6
Unpacked PE Files 6
Domains 6
URLs 6
Domains and IPs 7
Contacted Domains 7
World Map of Contacted IPs 7
General Information 7
Warnings 7
Simulations 7
Behavior and APIs 7
Joe Sandbox View / Context 8
IPs 8
Domains 8
ASNs 8
JA3 Fingerprints 8
Dropped Files 8
Created / dropped Files 8
Static File Info 8
General 8
File Icon 8
Network Behavior 8
Statistics 9
Behavior 9
System Behavior 9
Analysis Process: rundll32.exePID: 6972, Parent PID: 804 9
General 9
Analysis Process: OpenWith.exePID: 3588, Parent PID: 804 9
General 9
File Activities 10
Registry Activities 10
Analysis Process: notepad.exePID: 2212, Parent PID: 3588 10
General 10
File Activities 10
Registry Activities 10
Key Created 10
Key Value Created 10
Analysis Process: notepad.exePID: 1904, Parent PID: 4380 11
General 11
File Activities 11
Analysis Process: notepad.exePID: 5080, Parent PID: 4380 11
General 11
File Activities 11
Disassembly 12
Overview
SHA256: c7458230f00ee…
Ransomware
Miner Spreading
Infos: malicious
malicious
malicious
Evader Phishing
suspicious
suspicious
suspicious
clean
clean
clean
Exploiter Banker
Adware
Score: 21
Range: 0 - 100
Whitelisted: false
Confidence: 80%
Process Tree
System is w10x64_ra
rundll32.exe (PID: 6972 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding MD5: EF3179D498793BF4234F708D3BE28633)
OpenWith.exe (PID: 3588 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
notepad.exe (PID: 2212 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\Scripts\Scripts\Scripts_Envio_01\01_PFI_PIGNORA_TABLE.sql MD5:
27F71B12CB585541885A31BE22F61C83)
notepad.exe (PID: 1904 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\Scripts\Scripts\Scripts_Envio_02\06_Seguridad.sql MD5:
27F71B12CB585541885A31BE22F61C83)
notepad.exe (PID: 5080 cmdline: "C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\Desktop\Scripts\Scripts\Scripts_Envio_03\7_SP_GRABAR_SEG_ACCESOS_HIS.sql
MD5: 27F71B12CB585541885A31BE22F61C83)
cleanup
Malware Configuration
⊘ No configs have been found
Yara Signatures
⊘ No yara matches
Sigma Signatures
⊘ No Sigma rule has matched
Boot Survival
Gather Acquire Valid Windows 1 1 1 1 OS 1 Remote Data from Data Exfiltration Abuse
Victim Infrastructur Accounts Managemen DLL Side- Process Masqueradi Credential File and Services Local Obfuscation Over Other Accessibility
Identity e t Loading Injection ng Dumping Directory System Network Features
Information Instrumentat Discovery Medium
ion
Credentials Domains Default Scheduled Boot or 1 1 LSASS 1 1 Remote Data from Junk Data Exfiltration Network
Accounts Task/Job Logon DLL Side- Rundll32 Memory System Desktop Removable Over Denial of
Initialization Loading Information Protocol Media Bluetooth Service
Scripts Discovery
Email DNS Server Domain At Logon Script Logon Script 1 1 Security Query SMB/Windo Data from Steganogra Automated Data
Addresses Accounts (Windows) (Windows) Process Account Registry ws Admin Network phy Exfiltration Encrypted
Injection Manager Shares Shared for Impact
Drive
Employee Virtual Local Cron Login Hook Login Hook 1 NTDS System Distributed Input Protocol Traffic Data
Names Private Accounts DLL Side- Network Component Capture Impersonati Duplication Destruction
Server Loading Configuratio Object on
n Discovery Model
Behavior Graph
Delphi
OpenWith.exe notepad.exe notepad.exe Java rundll32.exe
.Net C# or VB.NET
Is malicious
Internet
notepad.exe
Screenshots
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
⊘ No Antivirus matches
Dropped Files
⊘ No Antivirus matches
Unpacked PE Files
⊘ No Antivirus matches
Domains
⊘ No Antivirus matches
URLs
⊘ No Antivirus matches
⊘ No contacted IP infos
General Information
Joe Sandbox version: 41.0.0 Charoite
Analysis system description: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip
23.01
Detection: SUS
Classification: sus21.winZIP@6/0@0/0
Warnings
Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, Microsoft.Photos.exe, SgrmBroker.exe, conhost.exe,
svchost.exe
Excluded domains from analysis (whitelisted): fs.microsoft.c om, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
Not all processes where analyz ed, report is missing behavior information
Report size getting too big, t oo many NtOpenKeyEx calls found.
Report size getting too big, t oo many NtProtectVirtualMemory calls found.
Report size getting too big, t oo many NtQueryValueKey calls found.
VT rate limit hit for: Scripts.zip
Simulations
Behavior and APIs
Time Type Description
⊘ No context
Domains
⊘ No context
ASNs
⊘ No context
JA3 Fingerprints
⊘ No context
Dropped Files
⊘ No context
MD5: 1bd6e701796c839198341741d98cbffe
SHA1: e54da49bb1d7de8be6a5834050240eeceeaa32f6
SHA256: c7458230f00eeb1091c835454895befd9104cecbcd42debd3bb007569ee1263a
SHA512: 8fbd143042a6f2035f1088ebfa016d63c0e0c31b664413f1957abfcd37955c43e169b0b9746578f1d3aa8f132729881ae5c2d24b772ee975c7cc060f7ae0084e
SSDEEP: 1536:+AlWpaDE1EZd0Nxy4D9zwppiy8AvMHWyp9xLDhcSPMSsy6iWrsnidO:gd1qdigpifAk2AbHyTivnH
TLSH: 2183F2039F48CA34DC0FD275A61409C282398D519059F283F7BFCACA9E4F79A1F5A54E
File Icon
Network Behavior
⊘ No network behavior found
Behavior
• rundll32.exe
• OpenWith.exe
• notepad.exe
• notepad.exe
• notepad.exe
System Behavior
General
Target ID: 0
Path: C:\Windows\System32\rundll32.exe
Imagebase: 0x7ff7eb370000
Reputation: high
General
Target ID: 10
Path: C:\Windows\System32\OpenWith.exe
Imagebase: 0x7ff6aecc0000
Reputation: high
File Activities
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
File Path Access Attributes Options Completion Count Source Address Symbol
Registry Activities
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
Key Path Name Type Data Completion Count Source Address Symbol
Source
Key Path Name Type Old Data New Data Completion Count Symbol
Address
General
Target ID: 12
Path: C:\Windows\System32\notepad.exe
Imagebase: 0x7ff7cda80000
Reputation: moderate
File Activities
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
Registry Activities
Key Created
Key Path Completion Count Source Address Symbol
General
Target ID: 17
Path: C:\Windows\System32\notepad.exe
Imagebase: 0x7ff7cda80000
Reputation: moderate
File Activities
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
General
Target ID: 23
Path: C:\Windows\System32\notepad.exe
Imagebase: 0x7ff7cda80000
Reputation: moderate
File Activities
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.