CSamples021916a11828339f07c41bdf234317c6418b7f.exe
Created at 2019-04-27T18:12:00
VMRay Threat Indicators (14 rules, 16 matches)
Severity | Category | Operation | Count | Classification | |
---|---|---|---|---|---|
5/5
|
File System | Encrypts content of user files | 1 | Ransomware | |
|
|||||
5/5
|
Local AV | Malicious content was detected by heuristic scan | 1 | - | |
|
|||||
5/5
|
Reputation | Known malicious file | 1 | Trojan | |
|
|||||
4/5
|
OS | Modifies Windows automatic backups | 1 | - | |
|
|||||
3/5
|
OS | Disables a Windows system tool | 2 | - | |
|
|||||
|
|||||
3/5
|
Persistence | Schedules task for system startup | 2 | - | |
|
|||||
|
|||||
2/5
|
Anti Analysis | Tries to detect debugger | 1 | - | |
|
|||||
2/5
|
Anti Analysis | Resolves APIs dynamically to possibly evade static detection | 1 | - | |
|
|||||
1/5
|
Process | Creates system object | 1 | - | |
|
|||||
1/5
|
Anti Analysis | Tries to detect analyzer sandbox | 1 | - | |
|
|||||
1/5
|
Process | Creates process with hidden window | 1 | - | |
|
|||||
1/5
|
File System | Creates an unusually large number of files | 1 | - | |
|
|||||
1/5
|
Persistence | Installs system service | 1 | - | |
|
|||||
1/5
|
Static | Unparsable sections in file | 1 | - | |
|
|||||
Screenshots
Monitored Processes
Sample Information
Analysis Information
Creation Time | 2019-04-27 20:12 (UTC+2) |
Analysis Duration | 00:04:33 |
Number of Monitored Processes | 21 |
Execution Successful |
![]() |
Reputation Enabled |
![]() |
WHOIS Enabled |
![]() |
Local AV Enabled |
![]() |
YARA Enabled |
![]() |
Number of AV Matches | 1 |
Number of YARA Matches | 0 |
Termination Reason | Timeout |
Tags |