7fbbd075d1c2afb0bda717fde96ae452b104b628348a4454e14f2e3a07828f67 (SHA-256)

Malicious with 81% Confidence 

SecondWrite’s DeepView Sandbox analyzed this file last week and declared it to be malicious using our proprietary techniques. At the time of detection, this malware did not appear on many of the leading malware blacklists. A link to the full report is below and some key highlights follow: 

Type of Malware:  Trojan

– One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.

– This executable has a PDB path

– Installs a hook procedure to monitor for mouse events

– Executed a process and injected code into it, probably while unpacking

– Drops a binary and executes it

Evasiveness Indicators:

– Checks whether any human activity is being performed by constantly checking whether the foreground window changed

– Checks for the presence of known devices from debuggers and forensic tools

– Checks the version of Bios, possibly for anti-virtualization

– Detects VMWare through the in instruction feature

– A process attempted to delay the analysis task

Other Compelling Indicators:

– Reads data out of its own binary image

– Allocates read-write-execute memory (usually to unpack itself

– Creates an Alternate Data Stream (ADS)

– More than %50 of the external calls do not go through the import address table

– Attempts to repeatedly call a single API many times in order to delay analysis time

MITRE ATT&CK Indicators:

MITRE TacticMITRE Technique
Software PackingDefense Evasion
Virtualization / Sandbox EvasionDiscovery
Remote File CopyCommand and Control
Process InjectionDefense Evasion Privilege Escalation
NTFS File AttributesDefense Evasion
Credential DumpingCredential Access

Selection From The Report:

See Full Detailed Report:

Malware Of The Week is sourced by DeepView Sandbox using SecondWrite’s patented techniques of Forced Code Execution,Program Level Indicators, and Automatic Sequence Detection