2b277c411944cb25bf454ad5dc38d32e8eed45eac058304982c15646720990cf (SHA256)
beckky.exe
Created at 2018-10-24 12:43:00
Notifications (2/3)
The operating system was rebooted during the analysis.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
4/5
|
File System | Known malicious file | Trojan | |
|
||||
4/5
|
Injection | Writes into the memory of another running process | - | |
|
||||
|
||||
4/5
|
Injection | Modifies control flow of another process | - | |
|
||||
|
||||
|
||||
3/5
|
Browser | Changes security-related browser settings | - | |
|
||||
3/5
|
Device | Monitors keyboard input | Keylogger | |
|
||||
1/5
|
Anti Analysis | Resolves APIs dynamically | - | |
|
||||
1/5
|
Information Stealing | Reads system data | Spyware | |
|
||||
|
||||
1/5
|
Persistence | Installs system startup script or application | - | |
|
||||
1/5
|
Process | Creates process with hidden window | - | |
|
||||
|
||||
1/5
|
Process | Creates a page with write and execute permissions | - | |
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
Process | Reads from memory of another process | - | |
|
||||
1/5
|
Process | Overwrites code | - | |
|
||||
1/5
|
Process | Process crashed | - | |
|