7f3f9eed...4841 | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Ransomware, Trojan

Remarks (2/2)

(0x2000004): The operating system was rebooted during the analysis because the sample installed a startup script, task or application for persistence.

(0x200003a): A task was rescheduled ahead of time to reveal dormant functionality.

VMRay Threat Indicators (14 rules, 16 matches)

Severity Category Operation Count Classification
5/5
Local AV Malicious content was detected by heuristic scan 2 -
5/5
Reputation Known malicious file 1 Trojan
4/5
File System Modifies content of user files 1 Ransomware
  • Modifies the content of multiple user files. This is an indicator for an encryption attempt.
4/5
File System Renames user files 1 Ransomware
  • Renames multiple user files. This is an indicator for an encryption attempt.
3/5
Anti Analysis Delays execution 1 -
  • Schedules task for command "C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\3f2aa1c4-e619-4d34-a21e-283f3d2a3401\370E.tmp.exe", to be triggered by Time. Task has been rescheduled by the analyzer.
2/5
Anti Analysis Resolves APIs dynamically to possibly evade static detection 1 -
1/5
Persistence Installs system startup script or application 1 -
  • Adds ""C:\Users\5p5NrGJn0jS HALPmcxz\AppData\Local\3f2aa1c4-e619-4d34-a21e-283f3d2a3401\370E.tmp.exe" --AutoStart" to Windows startup via registry.
1/5
Process Creates process with hidden window 1 -
  • The process "icacls" starts with hidden window.
1/5
Process Creates system object 1 -
  • Creates mutex with name "{1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}".
1/5
File System Creates an unusually large number of files 1 -
1/5
Process Overwrites code 1 -
1/5
Network Downloads file 1 -
  • Downloads file via http from "http://texet1.ug/ASUdy34576lUAd8756y90/Asd7356oisudfh345683g/get.php?pid=0C9F822062B97945A1C3E8A42C889890".
1/5
Network Connects to HTTP server 2 -
  • URL "http://texet1.ug/ASUdy34576lUAd8756y90/Asd7356oisudfh345683g/get.php?pid=0C9F822062B97945A1C3E8A42C889890".
0/5
Process Enumerates running processes 1 -

Screenshots

Monitored Processes

Sample Information

ID #88184
MD5 0ac0905c5f2e529a64543cd366c1ad08 Copy to Clipboard
SHA1 2beace9cc3f075676384b29daf10f517ae4e062e Copy to Clipboard
SHA256 7f3f9eedfbaa1807390b1659ebc5e9d8ff9a54d7c5ece5974e2fe382d5fe4841 Copy to Clipboard
SSDeep 12288:FCiK9sBBnKJRQEJezCNhAIx5APfZKLaZxwW:FCP9s7YOE4+hJEPyaZCW Copy to Clipboard
ImpHash 33afe1b48470d96fc3b09dc7a4acdac4 Copy to Clipboard
Filename 370E.tmp.exe
File Size 525.50 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-06-24 19:39 (UTC+2)
Analysis Duration 00:04:26
Number of Monitored Processes 7
Execution Successful True
Reputation Enabled True
WHOIS Enabled False
Local AV Enabled True
YARA Enabled True
Number of AV Matches 2
Number of YARA Matches 0
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image