28be12bf...33e1 | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Ransomware, Trojan

VMRay Threat Indicators (12 rules, 14 matches)

Severity Category Operation Count Classification
5/5
Local AV Malicious content was detected by heuristic scan 1 -
5/5
Device Writes to Master Boot Record (MBR) 1 -
4/5
File System Modifies content of user files 1 Ransomware
  • Modifies the content of multiple user files. This is an indicator for an encryption attempt.
4/5
File System Renames user files 1 Ransomware
  • Renames multiple user files. This is an indicator for an encryption attempt.
4/5
OS Modifies Windows automatic backups 1 -
2/5
Information Stealing Reads sensitive browser data 3 -
  • Trying to read sensitive data of web browser "Google Chrome" by file.
  • Trying to read sensitive data of web browser "Internet Explorer / Edge" by file.
  • Trying to read sensitive data of web browser "Mozilla Firefox" by file.
2/5
Reputation Known suspicious file 1 Trojan
1/5
Information Stealing Possibly does reconnaissance 1 -
  • Possibly trying to gather information about application "Mozilla Firefox" by file.
1/5
Process Creates process with hidden window 1 -
  • The process "cmd.exe" starts with hidden window.
1/5
Device Monitors mouse movements and clicks 1 -
  • Frequently reads the state of a mouse button by API.
1/5
File System Creates an unusually large number of files 1 -
1/5
Static Unparsable sections in file 1 -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\SF.exe.

Screenshots

Monitored Processes

Sample Information

ID #632225
MD5 70745c6d104c8ae717c9c3c0f315304a Copy to Clipboard
SHA1 b28f3a757709106323ad5b0631fda38d3ee2bd69 Copy to Clipboard
SHA256 28be12bf46e2133a1e32c22aaaf35c1c47c4bde6aa2586ff79c4573e35b933e1 Copy to Clipboard
SSDeep 3072:t6tN/cBbmX43EW6OgGPEygKJwMErqQrZM+6sWZ43EQ:MtN/cBbmed1g7MsZ3q Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
Filename SF.exe
File Size 275.50 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-04-29 11:53 (UTC+2)
Analysis Duration 00:05:16
Number of Monitored Processes 5
Execution Successful True
Reputation Enabled True
WHOIS Enabled True
Local AV Enabled True
YARA Enabled True
Number of AV Matches 1
Number of YARA Matches 0
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image