e5091d4a...60a6 | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Dropper, Trojan

Remarks (2/2)

(0x2000004): The operating system was rebooted during the analysis because the sample installed a startup script, task or application for persistence.

(0x200003a): A task was rescheduled ahead of time to reveal dormant functionality.

VMRay Threat Indicators (18 rules, 58 matches)

Severity Category Operation Count Classification
5/5
Local AV Malicious content was detected by heuristic scan 2 -
  • Local AV detected the dropped file "C:\Users\FD1HVy\AppData\Local\Temp\_MEI32442\runtime.cfg" as "Generic.Ransom.PyCrypter.690ADFD0".
4/5
OS Disables a crucial system tool 1 -
4/5
OS Modifies Windows automatic backups 1 -
3/5
Anti Analysis Delays execution 1 -
  • Schedules task for command "vssadmin", to be triggered by Time. Task has been rescheduled by the analyzer.
3/5
Persistence Schedules task for system startup 2 -
  • Schedules task " /st 00:00 /rl highest /ru SYSTEM /f" via the schtasks utility.
  • Schedules task "vssadmin Delete Shadows /All /Quiet" via the schtasks utility.
2/5
Anti Analysis Resolves APIs dynamically to possibly evade static detection 1 -
2/5
Information Stealing Reads sensitive browser data 3 -
  • Trying to read sensitive data of web browser "Google Chrome" by file.
  • Trying to read sensitive data of web browser "Internet Explorer / Edge" by file.
  • Trying to read sensitive data of web browser "Mozilla Firefox" by file.
2/5
Reputation Known suspicious file 2 Trojan
1/5
Process Creates system object 1 -
1/5
File System Modifies operating system directory 2 -
1/5
Persistence Installs system startup script or application 1 -
  • Adds "c:\users\fd1hvy\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini.crypted" to Windows startup folder.
1/5
Information Stealing Possibly does reconnaissance 1 -
  • Possibly trying to gather information about application "Mozilla Firefox" by file.
1/5
Device Monitors mouse movements and clicks 1 -
  • Frequently reads the state of a mouse button by API.
1/5
File System Creates an unusually large number of files 1 -
1/5
Process Overwrites code 1 -
1/5
PE Drops PE file 35 Dropper
1/5
Persistence Installs system service 1 -
  • Installs service "updater47" by using the sc.exe utility.
1/5
Static Unparsable sections in file 1 -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\FD1HVy\Desktop\Crypter.exe.

Screenshots

Monitored Processes

Sample Information

ID #81210
MD5 e35ddbfc848c5d2942f35ad5a4cd1687 Copy to Clipboard
SHA1 e643e94258adf86644d24a4942dfdd55c15e3717 Copy to Clipboard
SHA256 e5091d4a2b6fd5e5a7c4b86fe142555c4b2005eeedd909942d9e50c8d26960a6 Copy to Clipboard
SSDeep 196608:6IWfTu5sJn+WrXYTLL1mkJ2Z9Jq5dOYo+RWs7i7:XWfTuKJ+W0XBmKk9JMo9s7S Copy to Clipboard
ImpHash c8968748bf6183e3c66062912a824b6e Copy to Clipboard
Filename Crypter.exe
File Size 7.15 MB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-06-17 17:39 (UTC+2)
Analysis Duration 00:04:31
Number of Monitored Processes 11
Execution Successful True
Reputation Enabled True
WHOIS Enabled False
Local AV Enabled True
YARA Enabled True
Number of AV Matches 2
Number of YARA Matches 0
Termination Reason Timeout
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image