9b86a50b...0ad2 | VTI
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Trojan, Ransomware

9b86a50b36aea5cc4cb60573a3660cf799a9ec1f69a3d4572d3dc277361a0ad2 (SHA256)

xhcdxx.exe

Windows Exe (x86-64)

Created at 2018-11-27 19:38:00

Notifications (2/3)

Some extracted files may be missing in the report since the maximum number of extracted files was reached during the analysis. You can increase the limit in the configuration settings.

The maximum number of reputation file hash requests (20 per analysis) was exceeded. As a result, the reputation status could not be queried for all file hashes. In order to get the reputation status for all file hashes, please increase the 'Max File Hash Requests' setting in the system configurations.

The operating system was rebooted during the analysis.

Severity Category Operation Classification
5/5
File System Encrypts content of user files Ransomware
  • Encrypts the content of multiple user files. This is an indicator for ransomware.
4/5
File System Known malicious file Trojan
  • File "C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\xhcdxx.exe" is a known malicious file.
4/5
Injection Writes into the memory of another running process -
  • "c:\users\5p5nrgjn0js halpmcxz\desktop\xhcdxx.exe" modifies memory of "c:\windows\system32\dwm.exe"
  • "c:\users\5p5nrgjn0js halpmcxz\desktop\xhcdxx.exe" modifies memory of "c:\windows\system32\taskhost.exe"
  • "c:\users\5p5nrgjn0js halpmcxz\desktop\xhcdxx.exe" modifies memory of "c:\windows\system32\taskeng.exe"
4/5
Injection Modifies control flow of another process -
  • "c:\users\5p5nrgjn0js halpmcxz\desktop\xhcdxx.exe" creates thread in "c:\windows\system32\dwm.exe"
  • "c:\users\5p5nrgjn0js halpmcxz\desktop\xhcdxx.exe" creates thread in "c:\windows\system32\taskhost.exe"
  • "c:\users\5p5nrgjn0js halpmcxz\desktop\xhcdxx.exe" creates thread in "c:\windows\system32\taskeng.exe"
3/5
Process Creates an unusally large number of processes -
3/5
Persistence Adds file to open the next time Excel is launched -
  • Adds "c:\program files\microsoft office\office14\startup\ryukreadme.txt" to a default Excel XLStart folder
  • Adds "c:\program files\microsoft office\office14\xlstart\ryukreadme.txt" to a default Excel XLStart folder
  • Adds "c:\users\5p5nrgjn0js halpmcxz\appdata\roaming\microsoft\excel\xlstart\ryukreadme.txt" to a default Excel XLStart folder
3/5
OS Modifies certificate store -
  • Adds a certificate to the local "my" certificate trust list by file.
3/5
Persistence Adds file to open the next time Word is launched -
  • Adds "c:\users\5p5nrgjn0js halpmcxz\appdata\roaming\microsoft\word\startup\ryukreadme.txt" to a default Word Startup folder
1/5
Process Creates process with hidden window -
  • The process "C:\Windows\System32\cmd.exe" starts with hidden window.
1/5
Process Creates a page with write and execute permissions -
  • Allocates a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code.
1/5
Anti Analysis Resolves APIs dynamically -
1/5
Persistence Installs system startup script or application -
  • Adds "C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\xhcdxx.exe" to Windows startup via registry.
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image