c40ba66f...dbe2 | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 98/100
Dynamic Analysis Report
Classification: Backdoor, Ransomware, Exploit

VMRay Threat Indicators (18 rules, 41 matches)

Severity Category Operation Classification
4/5
File System Modifies content of user files Ransomware
  • Modifies the content of multiple user files. This is an indicator for an encryption attempt.
4/5
File System Renames user files Ransomware
  • Renames multiple user files. This is an indicator for an encryption attempt.
4/5
OS Modifies Windows automatic backups -
3/5
Anti Analysis Tries to detect application sandbox -
  • Possibly trying to detect "wine" by calling GetProcAddress() on "wine_get_version".
3/5
File System Possibly drops ransom note files Ransomware
  • Possibly drops ransom note files (creates 131 instances of the file "# instructions-HKJIL #.txt" in different locations).
2/5
Anti Analysis Resolves APIs dynamically to possibly evade static detection -
2/5
Network Sets up server that accepts incoming connections Backdoor
2/5
Information Stealing Reads sensitive browser data -
  • Trying to read sensitive data of web browser "Internet Explorer / Edge" by file.
2/5
File System Known suspicious file Exploit
  • File "C:\Users\FD1HVy\Desktop\Flash_Player.exe" is a known suspicious file.
1/5
Network Performs DNS request -
1/5
Information Stealing Reads system data -
  • Reads the cryptographic machine GUID from registry.
1/5
Process Creates process with hidden window -
  • The process "C:\WINDOWS\system32\cmd.exe" starts with hidden window.
1/5
Information Stealing Possibly does reconnaissance -
  • Possibly trying to gather information about application "Skype" by file.
1/5
File System Creates an unusually large number of files -
1/5
Network Connects to remote host -
  • Incoming TCP connection from host "88.99.66.31:443".
  • Incoming TCP connection from host "95.173.136.71:80".
  • Incoming TCP connection from host "216.58.206.14:80".
  • Incoming TCP connection from host "104.25.210.99:443".
  • Incoming TCP connection from host "216.58.206.4:80".
  • Outgoing TCP connection to host "88.99.66.31:443".
  • Outgoing TCP connection to host "95.173.136.71:80".
  • Outgoing TCP connection to host "216.58.206.14:80".
  • Outgoing TCP connection to host "104.25.210.99:443".
  • Outgoing TCP connection to host "216.58.206.4:80".
1/5
Network Connects to HTTP server -
1/5
PE The PE file was created with a packer -
  • File "C:\Users\FD1HVy\Desktop\Flash_Player.exe" is packed with "UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser".

Screenshots

Monitored Processes

Sample Information

ID #519923
MD5 3520dec68c0a8b28e7cf7b49e90a706e Copy to Clipboard
SHA1 9c2ad3d2983ce8a3cf49ab40cd539e94f9faf229 Copy to Clipboard
SHA256 c40ba66fd4c3061429b092d378da5f6a648edc38e8be83992fdb77fb6200dbe2 Copy to Clipboard
SSDeep 49152:33hTo6mOhe/doE5WXzx1KPL7QxTg0RvQxt+S/n:nhTo6/EazeTE5g0Roxt/f Copy to Clipboard
ImpHash 406f4cbdf82bde91761650ca44a3831a Copy to Clipboard
Filename Flash_Player.exe
File Size 1.61 MB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-03-17 21:36 (UTC+1)
Analysis Duration 00:04:36
Number of Monitored Processes 23
Execution Successful True
Reputation Enabled True
WHOIS Enabled True
YARA Enabled True
Number of YARA Matches 0
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image