d590e543b70f2a94028931c414108c2282af7de162659d3978460b0adf3765a7 (SHA-256)

Malicious with 98% Confidence 

SecondWrite’s DeepView Sandbox analyzed this file this week and declared it to be malicious.  At the time of its discovery, all major malware detection vendors had not identified this file of malicious.  DeepView unique and patented methods – specifically in this case, force code execution (FCE) and program level indication (PLI)  – identified 4 indicators.  A link to the full report with descriptions and details is below.  

Some key highlights and indicators follow.  Those discovered by DeepView proprietary method are flagged with [FCE] for forced code execution and [PLI] for program level indication.

Type of Malware:  Trojan

  • [PLI] More than %50 of the external calls do not go through the import address table
  • Creates a suspicious Powershell process
  • Creates executable files on the filesystem 
  • One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
  • Attempts to execute a powershell command with suspicious parameter/s 

Evasiveness Indicators:

  • [FCE] Installs an hook procedure to monitor for mouse events
  • [FCE] A process attempted to delay the analysis task.
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Checks adapter addresses which can be used to detect virtual network interfaces
  • Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available
  • A process created a hidden window

Other Compelling Indicators:

  • [FCE] Sniffs keystrokes
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Creates a hidden or system file
  • Queries for the computername
  • Reads data out of its own binary image

MITRE ATT&CK Indicators:

MITRE TacticMITRE Technique
ExecutionScripting
PersistenceHidden Files and Directories
Defense EvasionSoftware PackingVirtualization / Sandbox EvasionHidden WindowScriptingHidden Files and Directories
Credential AccessCredential Dumping
DiscoveryVirtualization / Sandbox Evasion
Command and ControlUncommonly Used PortCommonly Used PortCustom Command and Control Protocol

Selection from The Report:

See Full Detailed Report:

Malware Of The Week is sourced by DeepView Sandbox using SecondWrite’s patented techniques of Forced Code Execution, Program Level Indicators, and Automatic Sequence Detection.