33352a38...3d0e | VMRay Analyzer Report
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification:
Ransomware
Threat Names:
DeepScan:Generic.Ransom.Cuba.4D0E95B0
DeepScan:Generic.Ransom.Cuba.23871C35

VMRay Threat Identifiers (9 rules, 5491 matches)

SeverityCategoryOperationCountClassification
5/5
AntivirusMalicious content was detected by heuristic scan2-
4/5
User Data ModificationModifies content of user files1Ransomware
4/5
User Data ModificationRenames user files1Ransomware
2/5
Data CollectionReads sensitive mail data1-
2/5
Data CollectionReads sensitive browser data1-
1/5
System ModificationModifies application directory5482-
1/5
DiscoveryPossibly does reconnaissance1-
1/5
System ModificationCreates an unusually large number of files1-
0/5
DiscoveryEnumerates running processes1-

Screenshots

Monitored Processes

Process GraphProcess Graph Legend

MITRE ATT&CK™ Matrix - Windows

ActiveAll
Version: 2019-04-25 20:53:07.719000
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Credentials in Files
Discovery
File and Directory Discovery
Process Discovery
Lateral Movement
Collection
Automated Collection
Data from Local System
Command and Control
Exfiltration
Impact
Data Encrypted for Impact

Sample Information

ID#1573664
MD5
d8fd19fef4605b4217cb2546c470a918
SHA1
79786955d426945054e6d02050b8f9ada01e39ef
SHA256
33352a38454cfc247bc7465bf177f5f97d7fd0bd220103d4422c8ec45b4d3d0e
SSDeep
3072:WRDVJnsys6q6q7U9jVse9yuqO3acuKk+huzeVgjedzFgX4t3YbSdV:4DVJsysPbIvse9vqM7uZEuzeuX4kSdV
ImpHash
3dfd6c1844e4962d112479d58d5da410
FilenameqEjdLfskd47NI5BG.exe
File Size160.50 KB
Sample TypeWindows Exe (x86-32)

Analysis Information

Creation Time2020-11-13 14:11 (UTC+)
Analysis Duration00:01:59
Number of Monitored Processes1
Execution SuccessfulTrue
Reputation EnabledTrue
WHOIS EnabledFalse
Local AV EnabledTrue
Local AV Applied OnSample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps
YARA EnabledTrue
YARA Applied OnSample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps
Number of AV Matches2
Number of YARA Matches0
Termination ReasonMaximum binlog size reached
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image