Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
follinaV1.2.py

Overview

General Information

Sample Name:follinaV1.2.py
Analysis ID:646040
MD5:c1317d365d0084c4016a280a52608923
SHA1:ea358003fd5b1beba3b2e58991117127afb1eefd
SHA256:076b22f6815cf168a813fa64e7f0b7e45d5312de16f8c9e65593160cc2c9cb1e
Infos:

Detection

Follina CVE-2022-30190
Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device

Classification

  • System is w10x64
  • OpenWith.exe (PID: 6096 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: D179D03728E95E040A889F760C1FC402)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
follinaV1.2.pyJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    Exploits

    barindex
    Source: Yara matchFile source: follinaV1.2.py, type: SAMPLE
    Source: OpenWith.exe, 00000000.00000003.241144359.0000017025086000.00000004.00000020.00020000.00000000.sdmp, OpenWith.exe, 00000000.00000003.241165426.0000017025096000.00000004.00000020.00020000.00000000.sdmp, OpenWith.exe, 00000000.00000003.241125214.000001702508A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.wi7
    Source: follinaV1.2.pyString found in binary or memory: https://stackoverflow.com/questions/1855095/how-to-create-a-zip-archive-of-a-directory
    Source: C:\Windows\System32\OpenWith.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\OpenWith.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
    Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_01
    Source: C:\Windows\System32\OpenWith.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: classification engineClassification label: mal48.expl.winPY@1/0@0/0
    Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformationJump to behavior
    Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformationJump to behavior
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
    File and Directory Discovery
    Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory11
    System Information Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://en.wi70%Avira URL Cloudsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    https://stackoverflow.com/questions/1855095/how-to-create-a-zip-archive-of-a-directoryfollinaV1.2.pyfalse
      high
      http://en.wi7OpenWith.exe, 00000000.00000003.241144359.0000017025086000.00000004.00000020.00020000.00000000.sdmp, OpenWith.exe, 00000000.00000003.241165426.0000017025096000.00000004.00000020.00020000.00000000.sdmp, OpenWith.exe, 00000000.00000003.241125214.000001702508A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox Version:35.0.0 Citrine
      Analysis ID:646040
      Start date and time: 15/06/202211:25:392022-06-15 11:25:39 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 4m 26s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:follinaV1.2.py
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:25
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal48.expl.winPY@1/0@0/0
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      11:26:43API Interceptor1x Sleep call for process: OpenWith.exe modified
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:Python script, ASCII text executable, with very long lines
      Entropy (8bit):4.957918486987788
      TrID:
        File name:follinaV1.2.py
        File size:7988
        MD5:c1317d365d0084c4016a280a52608923
        SHA1:ea358003fd5b1beba3b2e58991117127afb1eefd
        SHA256:076b22f6815cf168a813fa64e7f0b7e45d5312de16f8c9e65593160cc2c9cb1e
        SHA512:c789bbfc16addf6c31d4a2f5af0b05a63d49ebdff56adece906ccb8adeed579b7eec921d731b6aa4d783dd191492db8c3d2aa9380990e8eb2a7f644e492a1719
        SSDEEP:192:F79ZrAosQOP6h+hhUMLQJjb5zy4iCyv4gGPCUHydw4:F7TrAWJJjlzyuyggGPCUHydv
        TLSH:57F1D62145AA90A7CFC3828497EFEDB48337390737033890B76CB7946F05A75D5E4A89
        File Content Preview:import argparse.import os.import zipfile.import http.server.import socketserver.import base64.from time import sleep, perf_counter.import threading as th.from urllib.parse import urlparse..# Helper function to zip whole dir.# https://stackoverflow.com/que
        Icon Hash:74f0e4e4e4e4e0e4
        No network behavior found

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:11:26:43
        Start date:15/06/2022
        Path:C:\Windows\System32\OpenWith.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\OpenWith.exe -Embedding
        Imagebase:0x7ff704eb0000
        File size:111120 bytes
        MD5 hash:D179D03728E95E040A889F760C1FC402
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        No disassembly