3e4f8a15...7f8a | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Keylogger, Ransomware, Trojan

VMRay Threat Indicators (16 rules, 19 matches)

Severity Category Operation Classification
5/5
Local AV Malicious content was detected by heuristic scan -
4/5
File System Renames user files Ransomware
  • Renames multiple user files. This is an indicator for an encryption attempt.
4/5
OS Modifies Windows automatic backups -
3/5
File System Possibly drops ransom note files Ransomware
  • Possibly drops ransom note files (creates 30 instances of the file "HOW TO RECOVER ENCRYPTED FILES.TXT" in different locations).
2/5
Anti Analysis Resolves APIs dynamically to possibly evade static detection -
2/5
Device Sends control codes to connected devices -
  • Controls device "System Paging File" through API DeviceIOControl.
2/5
Anti Analysis Tries to detect debugger -
2/5
Anti Analysis Tries to detect virtual machine -
  • Possibly trying to detect VM via rdtsc.
2/5
File System Known suspicious file Trojan
1/5
Process Creates process with hidden window -
  • The process "C:\WINDOWS\system32\cmd.exe" starts with hidden window.
  • The process "mshta.exe" starts with hidden window.
  • The process "cmd.exe" starts with hidden window.
1/5
Device Monitors keyboard input Keylogger
  • Frequently reads the state of a keyboard key by API.
1/5
Process Creates system object -
1/5
Persistence Installs system startup script or application -
  • Adds "C:\Users\FD1HVy\AppData\Roaming\osk.exe" to Windows startup via registry.
1/5
Hide Tracks Writes an unusually large amount of data to the registry -
  • Hides 1100 byte in "HKEY_CURRENT_USER\Software\shwlwook\temp".
1/5
File System Creates an unusually large number of files -
0/5
Process Enumerates running processes -

Screenshots

Monitored Processes

Sample Information

ID #592967
MD5 545c7d2d0c5b7686dd4a2012399148a9 Copy to Clipboard
SHA1 a481c02f8cb988279431aae959b2cbc2638443cb Copy to Clipboard
SHA256 3e4f8a1598f9dd834766d5184c3347947a201ff9a559fa275f048b14267d7f8a Copy to Clipboard
SSDeep 12288:S9CZOU8dEgeDiSrnR32F8RB1laLv6GcxJ5Wj/o9ZPlThRqdbMSz+NHH+gD1axZF8:jZOU8dEgeDDrnR3losxyU9ZNThSwNHHr Copy to Clipboard
ImpHash 7b0897ba013cd1473311ad371e7e3ad9 Copy to Clipboard
Filename singleupdate.exe
File Size 746.00 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-04-12 11:14 (UTC+2)
Analysis Duration 00:05:48
Number of Monitored Processes 15
Execution Successful True
Reputation Enabled True
WHOIS Enabled True
Local AV Enabled True
YARA Enabled True
Number of AV Matches 6
Number of YARA Matches 0
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image