46c8e192...aa93 | VTI
Try VMRay Analyzer
VTI SCORE: 97/100
Dynamic Analysis Report
Classification: Dropper, Riskware, Downloader, Trojan, Ransomware

46c8e192bb6e37452c1b8029987a7c05f64b7766ff692731b050c402d91baa93 (SHA256)

update.exe

Windows Exe (x86-32)

Created at 2018-11-19 13:55:00

Notifications (2/5)

Some extracted files may be missing in the report since the maximum number of extracted files was reached during the analysis. You can increase the limit in the configuration settings.

The maximum number of reputation file hash requests (20 per analysis) was exceeded. As a result, the reputation status could not be queried for all file hashes. In order to get the reputation status for all file hashes, please increase the 'Max File Hash Requests' setting in the system configurations.

The overall sleep time of all monitored processes was truncated from "3 minutes" to "10 seconds" to reveal dormant functionality.

The operating system was rebooted during the analysis.

Severity Category Operation Classification
4/5
Network Modifies network configuration -
4/5
File System Modifies content of user files Ransomware
  • Modifies the content of multiple user files. This is an indicator for an encryption attempt.
4/5
File System Renames user files Ransomware
  • Renames multiple user files. This is an indicator for an encryption attempt.
4/5
File System Known malicious file Trojan
  • File "C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\update.exe" is a known malicious file.
2/5
Network Associated with known malicious/suspicious URLs -
  • URL "http://paulmcnagets.ru/003/get.php?pid=33E9AA5ADDB65D39A5923495F06BCF33" is known as malicious URL.
  • URL "http://jordan9908.ru/updatewin.exe" is known as malicious URL.
1/5
Anti Analysis Resolves APIs dynamically -
1/5
Persistence Installs system startup script or application -
  • Adds ""C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\544c4f6e-08e8-406f-ae98-d88505d8a2e3\update.exe" --AutoStart" to Windows startup via registry.
  • Adds "c:\users\all users\microsoft\windows\start menu\programs\startup\desktop.ini" to Windows startup folder.
  • Adds "c:\users\all users\microsoft\windows\start menu\programs\startup\desktop.ini.infowait" to Windows startup folder.
  • Adds "c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini" to Windows startup folder.
  • Adds "c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini.infowait" to Windows startup folder.
1/5
Process Creates process with hidden window -
  • The process "icacls "C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\544c4f6e-08e8-406f-ae98-d88505d8a2e3" /deny *S-1-1-0:(OI)(CI)(DE,DC)" starts with hidden window.
  • The process ""C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\update.exe" --ForNetRes 5sQa7p3KFH0h1EIQpNMDhhbQdqopHt59HIaPvsLC LsCOYLRYMkqjvfiCCakqofPJhgWeL5nBT09BhA40 IsNotAutoStart IsNotTask" starts with hidden window.
  • The process ""C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\update.exe" --Service 2308 5sQa7p3KFH0h1EIQpNMDhhbQdqopHt59HIaPvsLC LsCOYLRYMkqjvfiCCakqofPJhgWeL5nBT09BhA40" starts with hidden window.
  • The process "powershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned" starts with hidden window.
  • The process ""C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\544c4f6e-08e8-406f-ae98-d88505d8a2e3\update.exe" --ForNetRes 5sQa7p3KFH0h1EIQpNMDhhbQdqopHt59HIaPvsLC LsCOYLRYMkqjvfiCCakqofPJhgWeL5nBT09BhA40 IsAutoStart IsNotTask" starts with hidden window.
  • The process ""C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\544c4f6e-08e8-406f-ae98-d88505d8a2e3\update.exe" --Service 1676 5sQa7p3KFH0h1EIQpNMDhhbQdqopHt59HIaPvsLC LsCOYLRYMkqjvfiCCakqofPJhgWeL5nBT09BhA40" starts with hidden window.
  • The process ""C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\544c4f6e-08e8-406f-ae98-d88505d8a2e3\update.exe" --Service 2040 5sQa7p3KFH0h1EIQpNMDhhbQdqopHt59HIaPvsLC LsCOYLRYMkqjvfiCCakqofPJhgWeL5nBT09BhA40" starts with hidden window.
1/5
Process Creates system object -
1/5
File System Modifies operating system directory -
  • Modifies file "C:\Windows\System32\drivers\etc\hosts" in the OS directory.
1/5
Masquerade Changes folder appearance Riskware
  • Folder "c:\users\5p5nrgjn0js halpmcxz\contacts" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\documents" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\documents\my shapes" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\downloads" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\favorites" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\favorites\links" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\links" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\music" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\pictures" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\saved games" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\searches" has a changed appearance.
  • Folder "c:\users\5p5nrgjn0js halpmcxz\videos" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\ringtones" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs\accessories\accessibility" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs\accessories" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs\accessories\system tools" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs\accessories\tablet pc" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs\accessories\windows powershell" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs\administrative tools" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs\games" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs\maintenance" has a changed appearance.
  • Folder "c:\users\all users\microsoft\windows\start menu\programs\startup" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\feeds cache\1nbur4hr" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\feeds cache\6asvn7j7" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\feeds cache\d68g7bij" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\feeds cache" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\feeds cache\kqmhsvkd" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows\burn\burn" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows\history" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows\history\history.ie5" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows\temporary internet files\content.ie5" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows\temporary internet files\content.ie5\mm5o9xqs" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows\temporary internet files\content.ie5\pmmr5k9k" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows\temporary internet files\content.ie5\rijuql1c" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows\temporary internet files\content.ie5\x9ohk109" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows\temporary internet files" has a changed appearance.
  • Folder "c:\users\default\appdata\local\microsoft\windows mail\stationery" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\internet explorer\quick launch" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\internet explorer\quick launch\user pinned\taskbar" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\libraries" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\recent" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\sendto" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\start menu" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\accessories\accessibility" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\accessories" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\accessories\system tools" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\administrative tools" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\start menu\programs" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\maintenance" has a changed appearance.
  • Folder "c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\startup" has a changed appearance.
  • Folder "c:\users\default\favorites\links" has a changed appearance.
1/5
File System Creates an unusually large number of files -
1/5
Process Overwrites code -
1/5
Network Downloads data Downloader
  • URL "http://paulmcnagets.ru/003/get.php?pid=33E9AA5ADDB65D39A5923495F06BCF33".
1/5
Network Connects to HTTP server -
  • URL "http://paulmcnagets.ru/003/get.php?pid=33E9AA5ADDB65D39A5923495F06BCF33".
1/5
PE Drops PE file Dropper
1/5
PE Executes dropped PE file -
1/5
Process Process crashed -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image