07de2347...632d | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Ransomware, Trojan

VMRay Threat Indicators (12 rules, 16 matches)

Severity Category Operation Count Classification
5/5
Local AV Malicious content was detected by heuristic scan 2 -
5/5
Reputation Known malicious file 1 Trojan
  • File "C:\Users\FD1HVy\Desktop\Rabbit4444.exe" is a known malicious file.
4/5
File System Renames user files 1 Ransomware
  • Renames multiple user files. This is an indicator for an encryption attempt.
4/5
OS Modifies Windows automatic backups 1 -
4/5
YARA YARA match 2 -
  • Rule "JS_High_Entropy" from ruleset "Generic" has matched on the modified file "C:\Windows10Upgrade\resources\ux\Microsoft.WinJS\js\base.js".
  • Rule "JS_High_Entropy" from ruleset "Generic" has matched on the modified file "C:\Windows10Upgrade\resources\ux\Microsoft.WinJS\js\ui.js".
3/5
File System Possibly drops ransom note files 1 Ransomware
  • Possibly drops ransom note files (creates 48 instances of the file "HOW TO BACK YOUR FILES.txt" in different locations).
2/5
Information Stealing Reads sensitive browser data 2 -
  • Trying to read sensitive data of web browser "Mozilla Firefox" by file.
  • Trying to read sensitive data of web browser "Internet Explorer / Edge" by file.
2/5
Anti Analysis Tries to detect virtual machine 1 -
  • Possibly trying to detect VM via rdtsc.
1/5
Persistence Installs system startup script or application 1 -
  • Adds "C:\Users\FD1HVy\Desktop\Rabbit4444.exe" to Windows startup via registry.
1/5
Process Creates process with hidden window 1 -
  • The process "C:\WINDOWS\system32\cmd.exe" starts with hidden window.
1/5
Information Stealing Possibly does reconnaissance 2 -
  • Possibly trying to gather information about application "Skype" by file.
  • Possibly trying to gather information about application "Mozilla Firefox" by file.
1/5
File System Creates an unusually large number of files 1 -

Screenshots

Monitored Processes

Sample Information

ID #118026
MD5 d6a83eed4b188f3d055fd516adab312c Copy to Clipboard
SHA1 6c71b3a40b350b6d735ebfd9f646443452023c8d Copy to Clipboard
SHA256 07de2347a59d9117b24305b533220231cf79b13263aa10591bec6f1bd30a632d Copy to Clipboard
SSDeep 3072:A0yYOYK165kQxq4X6S31giI/law+1Iqlh99nCRB1SGOq19Lwz974gBkk:A0EMmmvgiS4fpkBDnwt4kk Copy to Clipboard
ImpHash c5f9051b11db8e01e2a46f1912b62473 Copy to Clipboard
Filename Rabbit4444.exe
File Size 187.50 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-07-22 08:00 (UTC+2)
Analysis Duration 00:04:31
Number of Monitored Processes 2
Execution Successful True
Reputation Enabled True
WHOIS Enabled False
Local AV Enabled True
YARA Enabled True
Number of AV Matches 2
Number of YARA Matches 2
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image