ConsoleApp1.exe
Created at 2019-06-03T14:18:00
Remarks (1/1)
(0x200000e): The overall sleep time of all monitored processes was truncated from "5 minutes" to "1 minute, 20 seconds" to reveal dormant functionality.
VMRay Threat Indicators (13 rules, 42 matches)
Severity | Category | Operation | Count | Classification | |
---|---|---|---|---|---|
5/5
|
File System | Encrypts content of user files | 1 | Ransomware | |
|
|||||
5/5
|
Local AV | Malicious content was detected by heuristic scan | 1 | - | |
|
|||||
3/5
|
Network | Reads network adapter information | 1 | - | |
|
|||||
3/5
|
File System | Possibly drops ransom note files | 1 | Ransomware | |
|
|||||
2/5
|
Information Stealing | Reads sensitive browser data | 1 | - | |
|
|||||
2/5
|
Anti Analysis | Delays execution | 1 | - | |
|
|||||
2/5
|
Reputation | Known suspicious file | 1 | Trojan | |
|
|||||
1/5
|
Network | Performs DNS request | 2 | - | |
|
|||||
|
|||||
1/5
|
Masquerade | Changes folder appearance | 28 | - | |
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
1/5
|
Network | Checks external IP address | 1 | - | |
|
|||||
1/5
|
Network | Connects to remote host | 2 | - | |
|
|||||
|
|||||
1/5
|
Network | Connects to HTTP server | 1 | - | |
|
|||||
1/5
|
Static | Unparsable sections in file | 1 | - | |
|
|||||
Screenshots
Monitored Processes
Sample Information
Analysis Information
Creation Time | 2019-06-03 16:18 (UTC+2) |
Analysis Duration | 00:04:35 |
Number of Monitored Processes | 1 |
Execution Successful |
![]() |
Reputation Enabled |
![]() |
WHOIS Enabled |
![]() |
Local AV Enabled |
![]() |
YARA Enabled |
![]() |
Number of AV Matches | 1 |
Number of YARA Matches | 0 |
Termination Reason | Timeout |
Tags |