7eef6ef8...5792 | VTI
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Riskware, Dropper, Downloader, Trojan, Backdoor, Spyware

7eef6ef8fed53b7c3bf61ba821f375a0a433ea4cb0185fd223780b729a9a5792 (SHA256)

output.113528456.txt.exe

Windows Exe (x86-32)

Created at 2018-08-10 04:08:00

Notifications (1/1)

The maximum number of reputation file hash requests (20 per analysis) was exceeded. As a result, the reputation status could not be queried for all file hashes. In order to get the reputation status for all file hashes, please increase the 'Max File Hash Requests' setting in the system configurations.

Severity Category Operation Classification
5/5
YARA YARA match Backdoor, Spyware
  • Rule "xrat_quasarrat" from ruleset "RATs" has matched for "analysis.pcap"
  • Rule "xrat_quasarrat" from ruleset "RATs" has matched for "C:\Users\EEBsYm5\AppData\Local\Temp\JrsI6VAkyYDZ.exe"
  • Rule "Vermin_Keylogger_Jan18_1" from ruleset "Malware" has matched for "C:\Users\EEBsYm5\AppData\Local\Temp\JrsI6VAkyYDZ.exe"
  • Rule "xrat_quasarrat" from ruleset "RATs" has matched for "\Users\EEBsYm5\AppData\Local\Temp\JrsI6VAkyYDZ.exe"
  • Rule "Vermin_Keylogger_Jan18_1" from ruleset "Malware" has matched for "\Users\EEBsYm5\AppData\Local\Temp\JrsI6VAkyYDZ.exe"
4/5
Masquerade Uses a double file extension Riskware
  • File "C:\Users\EEBsYm5\Desktop\output.113528456.txt.exe" has a double file extension.
3/5
Anti Analysis Tries to detect the presence of antivirus software -
  • Tries to detect antivirus software via WMI query: "select * from antivirusproduct".
2/5
Anti Analysis Resolves APIs dynamically to possibly evade static detection -
2/5
File System Known suspicious file Trojan
  • File "C:\Users\EEBsYm5\Desktop\output.113528456.txt.exe" is a known suspicious file.
2/5
Network Associated with known malicious/suspicious URLs -
  • URL "http://0x0x.co/ver.php" is known as malicious URL.
1/5
Process Creates process with hidden window -
  • The process ""C:\Users\EEBsYm5\AppData\Local\Temp\vKvMTNchwv3w.exe"" starts with hidden window.
  • The process ""C:\Users\EEBsYm5\AppData\Local\Temp\JrsI6VAkyYDZ.exe"" starts with hidden window.
  • The process ""schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\EEBsYm5\AppData\Local\Temp\JrsI6VAkyYDZ.exe" /rl HIGHEST /f" starts with hidden window.
  • The process ""C:\Users\EEBsYm5\AppData\Roaming\Realtek\RealtekAudio.exe"" starts with hidden window.
  • The process ""schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\EEBsYm5\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f" starts with hidden window.
1/5
Process Creates system object -
1/5
Network Performs DNS request -
1/5
Network Connects to remote host -
1/5
Network Downloads data Downloader
  • URL "http://api.ipstack.com/check?access_key=5fe547c4ec9ffabae465e7864d212dc4&output=xml".
1/5
Network Connects to HTTP server -
  • URL "api.ipstack.com/check?access_key=5fe547c4ec9ffabae465e7864d212dc4&output=xml".
1/5
PE Drops PE file Dropper
1/5
PE Executes dropped PE file -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image