Number Of samples
1
Threat Analysis report
https://www.hybrid-analysis.com/sample/89f35f20af62201010e3218a22c50ed6994c79fb6f9f2210fd55203e6e6b01a1?environmentId=120
Disclaimer

This test shows how an antivirus behaves with certain threats, in a specific environment and under certain conditions.
We encourage you to compare these results with others and take informed decisions on what security products to use.
Before buying an antivirus you should consider factors such as price, ease of use, compatibility and support. Installing a free trial version allows an antivirus to be tested in everyday use before purchase.

askalan

Level 14
MWT-Tester
Verified
Joined
Jul 27, 2017
Messages
667
Operating System
Linux
#2
Product: Windows SmartScreen (activated by Hard_Configurator with recommended SRP and restrictions)

Disclaimer: Experimental setup for testing the effectiveness of Windows SmartScreen and script restrictions against 0-day malware samples. This test is suitable for users with more knowledge about Windows built-in security features.

Code:
1. Containment: VirtualBox 5.1.38
2. Windows: 10 LTSB
3. VPN: CyberGhost
4. Office: LibreOffice (standard settings)

Samples that have harmed the system/changed system configuration: 0/1

The presented system configuration has successfully blocked all malware. No files were encrypted.
Before the second opinion scan the samples were deleted.

The video is still being processed. It will take about 5 minutes to 30 minutes. Please be patient.



Thanks for the samples!
@Andy Ful

Hard_Configurator
 
Last edited:

omidomi

Level 64
MWT-Tester
Verified
Joined
Apr 5, 2014
Messages
5,375
Operating System
Windows 8.1
Antivirus
Kaspersky
#3
Containment :Virtual Box 5.2.22
Guest/OS : Windows 7 Ultimate 86X
Product: WebRoot IS (9.0.24.37) - Default Setting
Static(On-demand scan):1/1
Dynamic(On execution) : *0/1
Total :1/1
SUD : No
VPN: Security Kiss Tunnel 0.3.2
File encrypted: No
Second Opinion Scanners: *Infected(NPE)
System Final Status:*Infected,Live malware in Memory!
lets run sample,run in memory.
PE & Autorun reported infected:

Zemana(full,custom) & HMP reported safe:

NPE reported infected:

thanks for the sample
 

harlan4096

Moderator
MalwareTips Team
MWT-Tester
Verified
Joined
Apr 28, 2015
Messages
4,203
Operating System
Windows 10
Antivirus
Kaspersky
#4
Containment: VMWare WorkStation Pro 15.0.2-10952284 (running over Windows 10 Pro x64 Build 1809-17763)
Guest/OS: Windows 10 Pro x64 Build 1809-17763
Product: KSCloud Free 2019 19.0.0.1088 / VPN: Kaspersky Secure Connection
Tweaked Settings

Static/Contextual Scan: 1 / 1 - SUD: N/A
1 by UDS (Urgent Detection System)
Files Encrypted: No - System Final Status: Clean

BB Dynamic Bonus Test/On Execution Scan (File AV + KSN disabled): 1 / 1
1 by Dangerous Application Behaviour (PDM:Trojan)
Files Encrypted: No - Second Opinion Scanners: All Clean - System Final Status: Clean

Location: Almería (Spain) CET
Samples Pack Posted: 11/01/2019 06:42am
Static Test Started: 11/01/2019 03:08pm
Dynamic Test Started: 11/01/2019 03:23pm

U.png

ST.png

* (Hit) svchost.jpg.exe: detected/deleted upon execution by Dangerous/Suspicious Application Behaviour (PDM:Trojan). KL Advanced Disinfection was started.

1.png

_____________________________________________________________________

After testing samples dynamically I ran AutoRuns and Comodo AutoRuns:

AR.png

Warning: All original samples from the extracted folder were deleted manually before run Second Opinion Scanners, except those who are still active running on system and/or are referred in a registry key in Windows AutoRuns sections.

ZAM (Full System Scan + C:\ProgramData + C:\...\<user account>\),
WiseVector
(C:\ProgramData + C:\...\<user account>\),
HMP (Default Scan: Recommended) -> All Clean, System Clean:

SOS.png

Thanks to @Der.Reisende !
__________

MWHub Monthly Statistics & Reports
 

Der.Reisende

Level 37
Content Creator
MWT-Tester
Verified
Joined
Dec 27, 2014
Messages
2,664
Operating System
Windows 10
Antivirus
Tencent
#5
Containment: Shadow Defender v1.4.0.680
Guest/OS: Win10 Home v1809 (Build 17763.253)
Product: Tencent PC Manager v12.3.26597.901 (Tencent Cloud Protection engine + Bitdefender Local Antivirus Engine)
Static (On-demand scan): 1/1
Dynamic (On execution): 1/1
Total: 1/1
SUD: N/A
VPN: Windscribe v1.83 b18
System Status:
Files encrypted: no
update.png
static.png
Tencent PC Manager Global:
Realtime protection mode: Expert mode (Prompt upon detecting suspect actions)
File system protection level: High (monitor all file operations)
Action on threat detection: Choose action manually
Download Protection: Security prompt on dangerous files only
svchost.jpg.exe triggers cmd.exe. Both processes get intercepted by TCPM BB, source malware and dropped notepad.vbs get autoquarantined (many BB alerts in total). No further malicious traces, no AutoRuns, no encrypted files. HIT.
run.png run1_1.png run1_2.png
PE.png TCP_PE.png autorun.png files.png 2o.png NPE_detail.png
Norton Power Eraser (NPE) entries: Baidu registry entries belong to TPCM installation. The registry hijack for "openas\command" appears once an inital installation of TCPM has been in-app upgraded. It's safe.
 

Solarquest

Moderator
MalwareTips Team
MWT-Tester
Verified
Joined
Jul 22, 2014
Messages
2,067
#6
Containment: VirtualBox-6.0.0.127566
Host Windows 10 pro 64 bit v1809
Guest/OS: Windows 10, Home v1809 + Java
VPN: Windscribe 1.83
Product: Emsisoft 12 AM 2018.12.1.9144, default settings + Emsisoft Browser security
Static (On-demand scan): 1/1
BONUS Dynamic (On execution): 1/1
Total: 1 /1
SUD: all samples missed on static
2nd opinion detection of new files or in memory: Zemana: 0 HMP:0 autoruns:0 PE: 0 NPE:0
File encrypted:
Final status: System (not) infected

Additional notes:Thank you @Der.Reisende for the samples!
(I decided to keep the missed/not deleted samples in the malware folder to see if 2nd opinion scanners detect them.)

[ SUD+ update updated signatures.PNG /SPOILER]


[ static.jpg /SPOILER]


[
svchost- conhost x2, cmd, wscript-> UAC for WMI, conhost-> EMis BB alerts.
svchost.PNG svchost wmi.PNG svchost2.PNG


/SPOILER]


[
files in MW folder:0

2nd opinion scanners:
PE.PNG Autoruns compare.PNG NPE.PNG HMP.PNG

Zemana appdata.PNG zemana.PNG
/SPOILER]