singleupdate.exe
Created at 2019-04-12T09:14:00
VMRay Threat Indicators (16 rules, 19 matches)
Severity | Category | Operation | Classification | |
---|---|---|---|---|
5/5
|
Local AV | Malicious content was detected by heuristic scan | - | |
|
||||
|
||||
4/5
|
File System | Renames user files | Ransomware | |
|
||||
4/5
|
OS | Modifies Windows automatic backups | - | |
|
||||
3/5
|
File System | Possibly drops ransom note files | Ransomware | |
|
||||
2/5
|
Anti Analysis | Resolves APIs dynamically to possibly evade static detection | - | |
|
||||
2/5
|
Device | Sends control codes to connected devices | - | |
|
||||
2/5
|
Anti Analysis | Tries to detect debugger | - | |
|
||||
2/5
|
Anti Analysis | Tries to detect virtual machine | - | |
|
||||
2/5
|
File System | Known suspicious file | Trojan | |
|
||||
1/5
|
Process | Creates process with hidden window | - | |
|
||||
|
||||
|
||||
1/5
|
Device | Monitors keyboard input | Keylogger | |
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
1/5
|
Persistence | Installs system startup script or application | - | |
|
||||
1/5
|
File System | Creates an unusually large number of files | - | |
|
||||
0/5
|
Process | Enumerates running processes | - | |
|
||||
Screenshots
Monitored Processes
Sample Information
Analysis Information
Creation Time | 2019-04-12 11:14 (UTC+2) |
Analysis Duration | 00:05:48 |
Number of Monitored Processes | 15 |
Execution Successful |
![]() |
Reputation Enabled |
![]() |
WHOIS Enabled |
![]() |
Local AV Enabled |
![]() |
YARA Enabled |
![]() |
Number of AV Matches | 6 |
Number of YARA Matches | 0 |
Termination Reason | Timeout |
Tags |