f9dfdce8...2a74 | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Ransomware, Trojan

Remarks (1/1)

(0x2000002): The maximum VM disk space was reached. The analysis was terminated prematurely.

VMRay Threat Indicators (12 rules, 17 matches)

Severity Category Operation Count Classification
5/5
Local AV Malicious content was detected by heuristic scan 2 -
4/5
OS Modifies Windows automatic backups 1 -
3/5
Hide Tracks Hides data in extended file attributes 1 -
  • Sets extended file attributes for "c:\programdata\foo.db" to possibly hide the file.
3/5
File System Possibly drops ransom note files 1 Ransomware
  • Possibly drops ransom note files (creates 42 instances of the file "DECRYPT-FILES.html" in different locations).
2/5
Anti Analysis Tries to detect debugger 1 -
2/5
Reputation Known suspicious file 1 Trojan
  • File "C:\Users\5p5NrGJn0jS HALPmcxz\Desktop\test.exe" is a known suspicious file.
1/5
Process Creates system object 1 -
1/5
Process Creates process with hidden window 1 -
  • The process "C:\m\..\Windows\ovxhp\sff\qyv\..\..\..\system32\w\sfc\roma\..\..\..\wbem\ux\dgfg\..\..\wmic.exe" starts with hidden window.
1/5
Process Overwrites code 1 -
1/5
Network Connects to remote host 3 -
  • Outgoing TCP connection to host "92.63.8.47:80".
  • Outgoing TCP connection to host "92.63.37.100:80".
  • Outgoing TCP connection to host "92.63.32.2:80".
1/5
Network Connects to HTTP server 3 -
  • URL "92.63.8.47/archive/fxc.action?sdp=q&g=6oix0&qbaa=6b&k=u7a7u".
  • URL "92.63.32.2/tbrelgdfl.cgi?ah=wjfq2ey&j=23t84u4&ytxn=8kk6be554".
  • URL "92.63.37.100/post/checkout/mkgqp.cgi?iii=8128v5".
0/5
Process Enumerates running processes 1 -

Screenshots

Monitored Processes

Sample Information

ID #670337
MD5 345d140139d2d11713b06f1cd9a5669e Copy to Clipboard
SHA1 ca3c843964caa54471c136e8fc36bcb3534c1432 Copy to Clipboard
SHA256 f9dfdce85f83d7a416ecc162a9f68643357b1fd10ea29e6b2cd934b967192a74 Copy to Clipboard
SSDeep 6144:kNlHAp8tUArLrLrLfMemq5MmsCdKSXZ/cJlCJ6AWJE9V50DErTNg/ydlb4fQ6wFL:14DmGw6yDKNg6dNoQl+v Copy to Clipboard
ImpHash a18f19bfde6ec917a1a314ee3f6727cd Copy to Clipboard
Filename test.exe
File Size 351.50 KB
Sample Type Windows Exe (x86-32)

Analysis Information

Creation Time 2019-06-01 20:40 (UTC+2)
Analysis Duration 00:01:18
Number of Monitored Processes 5
Execution Successful True
Reputation Enabled True
WHOIS Enabled True
Local AV Enabled True
YARA Enabled True
Number of AV Matches 2
Number of YARA Matches 0
Termination Reason VM disk exhausted
Tags
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image