0fa20794...b54d | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 96/100
Dynamic Analysis Report
Classification: Ransomware, Trojan

VMRay Threat Indicators (15 rules, 15 matches)

Severity Category Operation Count Classification
4/5
File System Modifies content of user files 1 Ransomware
  • Modifies the content of multiple user files. This is an indicator for an encryption attempt.
4/5
File System Renames user files 1 Ransomware
  • Renames multiple user files. This is an indicator for an encryption attempt.
4/5
OS Modifies Windows automatic backups 1 -
3/5
OS Disables a Windows system tool 1 -
  • Disables startup repair by executing ""C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures".
2/5
Anti Analysis Resolves APIs dynamically to possibly evade static detection 1 -
2/5
OS Changes the desktop wallpaper. 1 -
  • Sets the desktop wallpaper to the file "c:\users\fd1hvy\appdata\local\temp\nx3s.bmp".
2/5
Anti Analysis Tries to detect virtual machine 1 -
  • Possibly trying to detect VM via rdtsc.
2/5
Anti Analysis Makes direct system call to possibly evade hooking based sandboxes 1 -
  • Makes a direct system call to "NtUserCallOneParam".
2/5
Reputation Known suspicious file 1 Trojan
  • File "C:\Users\FD1HVy\Desktop\sodinokibi.exe" is a known suspicious file.
1/5
Process Creates system object 1 -
  • Creates mutex with name "Global\DAE678E1-967E-6A19-D564-F7FCA6E7AEBC".
1/5
Process Creates process with hidden window 1 -
  • The process "cmd.exe" starts with hidden window.
1/5
File System Creates an unusually large number of files 1 -
1/5
Process Overwrites code 1 -
1/5
Static Unparsable sections in file 1 -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\FD1HVy\Desktop\sodinokibi.exe.
0/5
Process Enumerates running processes 1 -

Screenshots

Monitored Processes

Sample Information

ID #630766
MD5 fb68a02333431394a9a0cdbff3717b24 Copy to Clipboard
SHA1 1399bf98a509adb07663476dee7f9fee571e09f3 Copy to Clipboard
SHA256 0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d Copy to Clipboard
SSDeep 6144:cGZamLIoveyefyOrA80qE1lHJv3loPHVb6:cEsomyef5k8k3Sb Copy to Clipboard
ImpHash 672b84df309666b9d7d2bc8cc058e4c2 Copy to Clipboard
Filename sodinokibi.exe
File Size 290.00 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-04-27 10:16 (UTC+2)
Analysis Duration 00:04:26
Number of Monitored Processes 3
Execution Successful True
Reputation Enabled True
WHOIS Enabled True
Local AV Enabled True
YARA Enabled True
Number of AV Matches 0
Number of YARA Matches 0
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image