bxavdk.exe
Created at 2019-07-30T00:49:00
Remarks (2/3)
(0x200000e): The overall sleep time of all monitored processes was truncated from "40 seconds" to "10 seconds" to reveal dormant functionality.
(0x200003a): 2 tasks were rescheduled ahead of time to reveal dormant functionality.
VMRay Threat Indicators (29 rules, 127 matches)
Severity | Category | Operation | Count | Classification | |
---|---|---|---|---|---|
5/5
|
Local AV | Malicious content was detected by heuristic scan | 6 | - | |
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
5/5
|
Reputation | Known malicious file | 6 | Trojan | |
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
4/5
|
Network | Modifies network configuration | 1 | - | |
|
|||||
4/5
|
File System | Modifies content of user files | 1 | Ransomware | |
|
|||||
4/5
|
File System | Renames user files | 1 | Ransomware | |
|
|||||
4/5
|
Information Stealing | Exhibits Spyware behavior | 1 | Spyware | |
|
|||||
4/5
|
Reputation | Known malicious URL | 6 | - | |
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
3/5
|
Information Stealing | Reads cryptocurrency wallet locations | 2 | - | |
|
|||||
|
|||||
3/5
|
File System | Possibly drops ransom note files | 1 | Ransomware | |
|
|||||
3/5
|
Anti Analysis | Delays execution | 1 | - | |
|
|||||
2/5
|
Anti Analysis | Resolves APIs dynamically to possibly evade static detection | 1 | - | |
|
|||||
2/5
|
Information Stealing | Reads sensitive browser data | 6 | - | |
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
2/5
|
Information Stealing | Reads sensitive mail data | 1 | - | |
|
|||||
2/5
|
Information Stealing | Reads sensitive ftp data | 1 | - | |
|
|||||
2/5
|
Information Stealing | Reads sensitive application data | 2 | - | |
|
|||||
|
|||||
2/5
|
Reputation | Known suspicious URL | 11 | - | |
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
1/5
|
Persistence | Installs system startup script or application | 1 | - | |
|
|||||
1/5
|
Process | Creates process with hidden window | 2 | - | |
|
|||||
|
|||||
1/5
|
Process | Creates system object | 2 | - | |
|
|||||
|
|||||
1/5
|
File System | Modifies operating system directory | 1 | - | |
|
|||||
1/5
|
Information Stealing | Reads system data | 1 | - | |
|
|||||
1/5
|
Information Stealing | Possibly does reconnaissance | 8 | - | |
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
1/5
|
File System | Creates an unusually large number of files | 1 | - | |
|
|||||
1/5
|
Process | Overwrites code | 1 | - | |
|
|||||
1/5
|
Network | Downloads file | 1 | - | |
|
|||||
1/5
|
Network | Downloads executable | 4 | Downloader | |
|
|||||
|
|||||
|
|||||
|
|||||
1/5
|
Network | Connects to HTTP server | 9 | - | |
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
1/5
|
PE | Drops PE file | 47 | Dropper | |
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
|
|||||
0/5
|
Process | Enumerates running processes | 1 | - | |
|
|||||
Screenshots
Monitored Processes
Sample Information
Analysis Information
Creation Time | 2019-07-30 02:49 (UTC+2) |
Analysis Duration | 00:04:27 |
Number of Monitored Processes | 13 |
Execution Successful |
![]() |
Reputation Enabled |
![]() |
WHOIS Enabled |
![]() |
Local AV Enabled |
![]() |
YARA Enabled |
![]() |
Number of AV Matches | 6 |
Number of YARA Matches | 0 |
Termination Reason | Timeout |
Tags |