098098de...d1a9 | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Ransomware, Wiper, Trojan

CSamples021916a11828339f07c41bdf234317c6418b7f.exe

Windows Exe (x86-32)

Created at 2019-04-27T18:12:00

VMRay Threat Indicators (14 rules, 16 matches)

Severity Category Operation Count Classification
5/5
File System Encrypts content of user files 1 Ransomware
  • Encrypts the content of multiple user files. This is an indicator for ransomware.
5/5
Local AV Malicious content was detected by heuristic scan 1 -
5/5
Reputation Known malicious file 1 Trojan
4/5
OS Modifies Windows automatic backups 1 -
3/5
OS Disables a Windows system tool 2 -
  • Disables startup repair by executing "C:\Windows\system32\cmd.exe /C title 1267515|bcdedit /set {default} recoveryenabled No".
  • Disables startup repair by executing "C:\Windows\system32\cmd.exe /C title 2041765|bcdedit /set {default} bootstatuspolicy ignoreallfailures".
3/5
Persistence Schedules task for system startup 2 -
  • Schedules task for command "C:\PROGRA~2\COMMON~1\CSAMPL~1.EXE", to be triggered by Logon.
  • Schedules task for command "C:\PROGRA~2\COMMON~1\CSamples021916a11828339f07c41bdf234317c6418b7f.exe", to be triggered by Logon.
2/5
Anti Analysis Tries to detect debugger 1 -
2/5
Anti Analysis Resolves APIs dynamically to possibly evade static detection 1 -
1/5
Process Creates system object 1 -
  • Creates mutex with name "BellevueCollegeEncryptor".
1/5
Anti Analysis Tries to detect analyzer sandbox 1 -
  • Possibly trying to detect analyzer sandbox by checking for patched sleep.
1/5
Process Creates process with hidden window 1 -
  • The process "C:\Windows\system32\cmd.exe" starts with hidden window.
1/5
File System Creates an unusually large number of files 1 -
1/5
Persistence Installs system service 1 -
  • Installs service "2620738370" by using the sc.exe utility.
1/5
Static Unparsable sections in file 1 -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\CSamples021916a11828339f07c41bdf234317c6418b7f.exe.

Screenshots

Monitored Processes

Sample Information

ID #631083
MD5 a11828339f07c41bdf234317c6418b7f Copy to Clipboard
SHA1 a4a0309b205f2c859a4e1ee57849dcf5836afbca Copy to Clipboard
SHA256 098098dea6b3f1cb7aa8598b530b6242e13477cf404b1691725ca5b8b327d1a9 Copy to Clipboard
SSDeep 24576:9AHnh+eWsN3skA4RV1Hom2KXMmHaN7Wo5:ch+ZkldoPK8YaN7v Copy to Clipboard
ImpHash afcdf79be1557326c854b6e20cb900a7 Copy to Clipboard
Filename CSamples021916a11828339f07c41bdf234317c6418b7f.exe
File Size 885.00 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-04-27 20:12 (UTC+2)
Analysis Duration 00:04:33
Number of Monitored Processes 21
Execution Successful True
Reputation Enabled True
WHOIS Enabled True
Local AV Enabled True
YARA Enabled True
Number of AV Matches 1
Number of YARA Matches 0
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image