67beeb7a...2f08 | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Ransomware, Trojan

Remarks (2/2)

(0x200000e): The overall sleep time of all monitored processes was truncated from "1 minute, 10 seconds" to "10 seconds" to reveal dormant functionality.

(0x2000004): The operating system was rebooted during the analysis because the sample installed a startup script, task or application for persistence.

VMRay Threat Indicators (16 rules, 49 matches)

Severity Category Operation Count Classification
5/5
Local AV Malicious content was detected by heuristic scan 2 -
5/5
Reputation Known malicious file 1 Trojan
4/5
File System Renames user files 1 Ransomware
  • Renames multiple user files. This is an indicator for an encryption attempt.
4/5
File System Modifies content of user files 1 Ransomware
  • Modifies the content of multiple user files. This is an indicator for an encryption attempt.
4/5
YARA YARA match 6 -
  • Rule "JS_High_Entropy" from ruleset "Generic" has matched on the modified file "C:\Windows10Upgrade\resources\ux\Microsoft.WinJS\js\base.js".
  • Rule "JS_High_Entropy" from ruleset "Generic" has matched on the modified file "C:\Windows10Upgrade\resources\ux\Microsoft.WinJS\js\ui.js".
  • Rule "JS_Unicode_escaped_bytes" from ruleset "Generic" has matched on the modified file "C:\Windows10Upgrade\resources\ux\Microsoft.WinJS\js\base.js".
  • Rule "JS_charCodeAt" from ruleset "Generic" has matched on the modified file "C:\Windows10Upgrade\resources\ux\Microsoft.WinJS\js\base.js".
  • Rule "JS_charCodeAt" from ruleset "Generic" has matched on the modified file "C:\Windows10Upgrade\resources\ux\Microsoft.WinJS\js\ui.js".
2/5
Information Stealing Reads sensitive browser data 1 -
  • Trying to read sensitive data of web browser "Mozilla Firefox" by file.
2/5
Injection Writes into the memory of a process running from a created or modified executable 1 -
  • "c:\users\fd1hvy\desktop\rdfg546fgh.exe" modifies memory of "c:\users\fd1hvy\desktop\rdfg546fgh.exe".
2/5
Injection Modifies control flow of a process running from a created or modified executable 1 -
  • "c:\users\fd1hvy\desktop\rdfg546fgh.exe" alters context of "c:\users\fd1hvy\desktop\rdfg546fgh.exe".
1/5
Process Creates process with hidden window 2 -
  • The process "cmd.exe" starts with hidden window.
  • The process "C:\Users\FD1HVy\Desktop\rdfg546fgh.exe" starts with hidden window.
1/5
Process Reads from memory of another process 1 -
  • "c:\users\fd1hvy\desktop\rdfg546fgh.exe" reads from "C:\Users\FD1HVy\Desktop\rdfg546fgh.exe".
1/5
Process Creates a page with write and execute permissions 1 -
  • Allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code.
1/5
Persistence Installs system startup script or application 1 -
  • Adds "C:\Users\FD1HVy\AppData\Local\rdfg546fgh.exe" to Windows startup via registry.
1/5
Masquerade Changes folder appearance 26 -
  • Folder "c:\users\public" has a changed appearance.
  • Folder "c:\users\public\videos" has a changed appearance.
  • Folder "c:\users\public\pictures" has a changed appearance.
  • Folder "c:\users\public\music" has a changed appearance.
  • Folder "c:\users\public\libraries" has a changed appearance.
  • Folder "c:\users\public\downloads" has a changed appearance.
  • Folder "c:\users\public\documents" has a changed appearance.
  • Folder "c:\users\public\desktop" has a changed appearance.
  • Folder "c:\users\public\accountpictures" has a changed appearance.
  • Folder "c:\users\fd1hvy\videos" has a changed appearance.
  • Folder "c:\users\fd1hvy\searches" has a changed appearance.
  • Folder "c:\users\fd1hvy\saved games" has a changed appearance.
  • Folder "c:\users\fd1hvy\pictures" has a changed appearance.
  • Folder "c:\users\fd1hvy\pictures\saved pictures" has a changed appearance.
  • Folder "c:\users\fd1hvy\pictures\camera roll" has a changed appearance.
  • Folder "c:\users\fd1hvy\onedrive" has a changed appearance.
  • Folder "c:\users\fd1hvy\music" has a changed appearance.
  • Folder "c:\users\fd1hvy\links" has a changed appearance.
  • Folder "c:\users\fd1hvy\favorites" has a changed appearance.
  • Folder "c:\users\fd1hvy\favorites\links" has a changed appearance.
  • Folder "c:\users\fd1hvy\downloads" has a changed appearance.
  • Folder "c:\users\fd1hvy\documents" has a changed appearance.
  • Folder "c:\users\fd1hvy\documents\my shapes" has a changed appearance.
  • Folder "c:\users\fd1hvy\desktop" has a changed appearance.
  • Folder "c:\users\fd1hvy\contacts" has a changed appearance.
1/5
Information Stealing Possibly does reconnaissance 2 -
  • Possibly trying to gather information about application "Skype" by file.
  • Possibly trying to gather information about application "Mozilla Firefox" by file.
1/5
File System Creates an unusually large number of files 1 -
1/5
Static Unparsable sections in file 1 -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\FD1HVy\Desktop\rdfg546fgh.exe.

Screenshots

Monitored Processes

Sample Information

ID #74358
MD5 bd4ea1c3cb843597d5b3a560f95840bb Copy to Clipboard
SHA1 f81c504435d27e6a502acee3d1834121517ea194 Copy to Clipboard
SHA256 67beeb7a196a91ffdb77af4e53143e75a157ea6cf3432a2e14e1c55d11ef2f08 Copy to Clipboard
SSDeep 3072:1VAz+HYRuV4ek4gX/am6/iQ0ET1fY/Tnib6qICONXvm0JZxkW5QGmwFp+1mSZoNJ:7c+HY0n/p0VTJq+9wm0sfi4J Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
Filename rdfg546fgh.exe
File Size 416.93 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-06-10 14:14 (UTC+2)
Analysis Duration 00:04:31
Number of Monitored Processes 4
Execution Successful True
Reputation Enabled True
WHOIS Enabled False
Local AV Enabled True
YARA Enabled True
Number of AV Matches 2
Number of YARA Matches 6
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image