e10030b1...f7a2 | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Ransomware, Wiper

VMRay Threat Indicators (9 rules, 10 matches)

Severity Category Operation Count Classification
5/5
File System Encrypts content of user files 1 Ransomware
  • Encrypts the content of multiple user files. This is an indicator for ransomware.
5/5
Local AV Malicious content was detected by heuristic scan 1 -
5/5
Device Writes to Master Boot Record (MBR) 1 -
4/5
OS Modifies Windows automatic backups 1 -
3/5
File System Possibly drops ransom note files 1 Ransomware
  • Possibly drops ransom note files (creates 58 instances of the file "DECRYPT_FILES.txt" in different locations).
3/5
Kernel Executes code with kernel privileges 1 -
  • Executes code with kernel privileges to perform system level actions. This can sometimes be used to perform malicious actions and to avoid detection.
1/5
Process Creates process with hidden window 2 -
  • The process "cmd.exe" starts with hidden window.
  • The process "C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\ecorp.bat" starts with hidden window.
1/5
File System Creates an unusually large number of files 1 -
1/5
Static Unparsable sections in file 1 -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\DropShit.exe.

Screenshots

Monitored Processes

Sample Information

ID #109885
MD5 5916dc99801c7d7a26bd6c39e8174610 Copy to Clipboard
SHA1 65f98b37b36f395d14edaee8924f9ade837c9068 Copy to Clipboard
SHA256 e10030b1df3b85c273425aa39d866a39a10b21a825d83a0b901c8a71ea86f7a2 Copy to Clipboard
SSDeep 768:bCePd1SPGZvreXKWD6rbGgnTwAAri+kdxj+:P1vZvrDrbG6gSvS Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
Filename DropShit.exe
File Size 37.50 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-07-16 10:39 (UTC+2)
Analysis Duration 00:04:29
Number of Monitored Processes 18
Execution Successful True
Reputation Enabled True
WHOIS Enabled False
Local AV Enabled True
YARA Enabled True
Number of AV Matches 1
Number of YARA Matches 0
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image