1.exe
Created at 2019-07-03T15:12:00
Remarks (2/2)
(0x200000e): The overall sleep time of all monitored processes was truncated from "5 minutes, 30 seconds" to "1 minute, 10 seconds" to reveal dormant functionality.
VMRay Threat Indicators (15 rules, 25 matches)
Severity | Category | Operation | Count | Classification | |
---|---|---|---|---|---|
5/5
|
OS | Obscures a file's origin | 2 | - | |
|
|||||
|
|||||
4/5
|
File System | Renames user files | 1 | Ransomware | |
|
|||||
4/5
|
Injection | Writes into the memory of another running process | 2 | - | |
|
|||||
|
|||||
4/5
|
Injection | Modifies control flow of another process | 2 | - | |
|
|||||
|
|||||
3/5
|
Anti Analysis | Tries to detect application sandbox | 1 | - | |
|
|||||
3/5
|
File System | Possibly drops ransom note files | 1 | Ransomware | |
|
|||||
3/5
|
YARA | YARA match | 1 | - | |
|
|||||
2/5
|
Anti Analysis | Tries to detect virtual machine | 2 | - | |
|
|||||
|
|||||
2/5
|
Anti Analysis | Resolves APIs dynamically to possibly evade static detection | 1 | - | |
|
|||||
1/5
|
Process | Creates system object | 2 | - | |
|
|||||
|
|||||
1/5
|
Process | Creates process with hidden window | 4 | - | |
|
|||||
|
|||||
|
|||||
|
|||||
1/5
|
Process | Reads from memory of another process | 2 | - | |
|
|||||
|
|||||
1/5
|
Persistence | Installs system startup script or application | 2 | - | |
|
|||||
|
|||||
1/5
|
File System | Creates an unusually large number of files | 1 | - | |
|
|||||
1/5
|
PE | Drops PE file | 1 | Dropper | |
|
|||||
Screenshots
Monitored Processes
Sample Information
Analysis Information
Creation Time | 2019-07-03 17:12 (UTC+2) |
Analysis Duration | 00:04:26 |
Number of Monitored Processes | 12 |
Execution Successful |
![]() |
Reputation Enabled |
![]() |
WHOIS Enabled |
![]() |
Local AV Enabled |
![]() |
YARA Enabled |
![]() |
Number of AV Matches | 0 |
Number of YARA Matches | 1 |
Termination Reason | Timeout |
Tags |