c65df5ec...b1f0 | VTI
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Trojan, Dropper, Ransomware

c65df5ec5152af018ff362039351255ba7b59ea844639619f73d96ea135ab1f0 (SHA256)

CUsersGrujaAppDataRoaming6Xx3WI1ICfwJbN6F1OD~1.EXE

Windows Exe (x86-32)

Created at 2019-01-18 08:45:00

Notifications (2/2)

The maximum number of reputation file hash requests (20 per analysis) was exceeded. As a result, the reputation status could not be queried for all file hashes. In order to get the reputation status for all file hashes, please increase the 'Max File Hash Requests' setting in the system configurations.

The operating system was rebooted during the analysis.

Severity Category Operation Classification
5/5
File System Encrypts content of user files Ransomware
  • Encrypts the content of multiple user files. This is an indicator for ransomware.
5/5
Device Writes to Master Boot Record (MBR) -
4/5
OS Modifies Windows automatic backups -
4/5
File System Known malicious file Trojan
3/5
Kernel Executes code with kernel privileges -
  • Executes code with kernel privileges to perform system level actions. This can sometimes be used to perform malicious actions and to avoid detection.
2/5
Hide Tracks Uses Alternate Data Stream (ADS) for interprocess communication -
2/5
Device Sends control codes to connected devices -
  • Controls device "C:\$Recycle.Bin\S-1-5-21-3388679973-3930757225-3770151564-1000" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0054-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-00B4-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\1033" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\Access.en-us" through API DeviceIOControl.
  • Controls device "C:\MSOCache\All Users\{91140000-0011-0000-1000-0000000FF1CE}-C" through API DeviceIOControl.
1/5
Process Creates system object -
  • Creates mutex with name "Global\{FD64C8AB-F74D-C8D4-F31D-96A1BB45705E}".
1/5
Process Creates process with hidden window -
  • The process "C:\Users\5P5NRG~1\AppData\Roaming\MOV7TW~1:bin" starts with hidden window.
  • The process "C:\Windows\system32\vssadmin.exe" starts with hidden window.
  • The process "C:\Windows\system32\diskshadow.exe" starts with hidden window.
  • The process "C:\Users\5P5NRG~1\AppData\Roaming\\8DAT2H~1:bin" starts with hidden window.
  • The process "C:\Windows\system32\arp.exe" starts with hidden window.
  • The process "C:\Windows\system32\nslookup.exe" starts with hidden window.
  • The process "C:\Windows\system32\net.exe" starts with hidden window.
1/5
File System Modifies application directory -
  • Modifies "c:\program files\common files\microsoft shared\source engine\ose.exe".
  • Modifies "c:\program files\common files\microsoft shared\source engine\ose.exe:0".
1/5
File System Creates an unusually large number of files -
1/5
PE Drops PE file Dropper
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image