Try VMRay Platform
Malicious
Classifications

Ransomware

Threat Names

CryptoLocker Mal/HTMLGen-A

Filters:
File Name Category Type Verdict Actions
C:\Users\OqXZRaykm\Desktop\PxoKRFYoxQB8PbHT.exe Sample File Binary
Malicious
»
MIME Type application/vnd.microsoft.portable-executable
File Size 69.68 KB
MD5 2f4dc148ea6fbec4f93557ab152f9c8f Copy to Clipboard
SHA1 6a2db6790b96d06d65c2cec2964f196f0a0905ce Copy to Clipboard
SHA256 368614574665904cb34365bc12233c841c6f62d1036a6e4f81117078dafc384f Copy to Clipboard
SSDeep 1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLEu:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7G Copy to Clipboard
ImpHash db206e36db5c9492ce02c61a679129e2 Copy to Clipboard
Static Analysis Parser Error malformed string file info
File Reputation Information
»
Verdict
Malicious
PE Information
»
Image Base 0x00400000
Entry Point 0x00401000
Size Of Code 0x00002400
Size Of Initialized Data 0x00004000
File Type IMAGE_FILE_EXECUTABLE_IMAGE
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 2013-10-02 08:13 (UTC)
Sections (4)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x00401000 0x000023F0 0x00002400 0x00000400 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 6.27
.rdata 0x00404000 0x00000DB0 0x00000E00 0x00002800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.72
.data 0x00405000 0x000005F0 0x00000200 0x00003600 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 5.9
.rsrc 0x00406000 0x00002B98 0x00002C00 0x00003800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.6
Imports (3)
»
user32.dll (20)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
BeginPaint - 0x0040402C 0x00004B6C 0x0000336C 0x0000000B
DispatchMessageA - 0x00404030 0x00004B70 0x00003370 0x00000093
DrawTextA - 0x00404034 0x00004B74 0x00003374 0x000000AA
EndPaint - 0x00404038 0x00004B78 0x00003378 0x000000B6
TranslateMessage - 0x0040403C 0x00004B7C 0x0000337C 0x0000025E
GetMessageA - 0x00404040 0x00004B80 0x00003380 0x00000122
PostQuitMessage - 0x00404044 0x00004B84 0x00003384 0x000001D5
ShowWindow - 0x00404048 0x00004B88 0x00003388 0x00000248
UpdateWindow - 0x0040404C 0x00004B8C 0x0000338C 0x0000026A
MoveWindow - 0x00404050 0x00004B90 0x00003390 0x000001BE
CreateWindowExA - 0x00404054 0x00004B94 0x00003394 0x00000056
RegisterClassExA - 0x00404058 0x00004B98 0x00003398 0x000001E1
DefWindowProcA - 0x0040405C 0x00004B9C 0x0000339C 0x00000083
MessageBoxA - 0x00404060 0x00004BA0 0x000033A0 0x000001B1
SendMessageA - 0x00404064 0x00004BA4 0x000033A4 0x000001FD
LoadIconA - 0x00404068 0x00004BA8 0x000033A8 0x00000198
DestroyWindow - 0x0040406C 0x00004BAC 0x000033AC 0x0000008D
LoadCursorA - 0x00404070 0x00004BB0 0x000033B0 0x00000194
GetClientRect - 0x00404074 0x00004BB4 0x000033B4 0x000000E9
GetWindowRect - 0x00404078 0x00004BB8 0x000033B8 0x00000157
kernel32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
GetLastError - 0x0040400C 0x00004B4C 0x0000334C 0x00000128
lstrcpyA - 0x00404010 0x00004B50 0x00003350 0x00000315
GetModuleHandleA - 0x00404014 0x00004B54 0x00003354 0x00000134
GetCommandLineA - 0x00404018 0x00004B58 0x00003358 0x000000E6
DeleteFileA - 0x0040401C 0x00004B5C 0x0000335C 0x00000069
CloseHandle - 0x00404020 0x00004B60 0x00003360 0x00000023
CreateFileA - 0x00404024 0x00004B64 0x00003364 0x0000003D
gdi32.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
DeleteObject - 0x00404000 0x00004B40 0x00003340 0x0000004B
CreateFontIndirectA - 0x00404004 0x00004B44 0x00003344 0x0000002F
Memory Dumps (8)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point YARA Actions
pxokrfyoxqb8pbht.exe 1 0x00400000 0x00408FFF Relevant Image False 32-bit 0x00402B80 False
buffer 1 0x01EF0000 0x01EF5FFF First Execution False 32-bit 0x01EF0009 False
buffer 1 0x00400000 0x00405FFF Marked Executable False 32-bit - False
buffer 1 0x00400000 0x00405FFF Marked Executable False 32-bit - False
buffer 1 0x00400000 0x00405FFF Marked Executable False 32-bit - False
buffer 1 0x00400000 0x00405FFF Marked Executable False 32-bit - False
buffer 1 0x00400000 0x00405FFF First Execution False 32-bit 0x00401020 False
buffer 1 0x02150048 0x02161767 Image In Buffer False 32-bit - False
YARA Matches (2)
»
Rule Name Rule Description Classification Score Actions
CryptoLocker_set1 CryptoLocker ransomware Ransomware
5/5
CryptoLocker_rule2 CryptoLocker ransomware Ransomware
5/5
C:\Users\OQXZRA~1\AppData\Local\Temp\hurok.exe Dropped File Binary
Malicious
»
MIME Type application/vnd.microsoft.portable-executable
File Size 69.78 KB
MD5 44d7a8ac512e257e45eadc485d8f7152 Copy to Clipboard
SHA1 fb665764475e46622c9c2ccde808e1b6f7c4b9ed Copy to Clipboard
SHA256 af3991510c27f4588000b640e0dfdf682046c304927770f698416e3ca6fbf537 Copy to Clipboard
SSDeep 1536:o1KhxqwtdgI2MyzNORQtOflIwoHNV2XBFV72BOlA7ZszudnYTjipvF293vaRLE6:aq7tdgI2MyzNORQtOflIwoHNV2XBFV7C Copy to Clipboard
ImpHash db206e36db5c9492ce02c61a679129e2 Copy to Clipboard
Static Analysis Parser Error malformed string file info
PE Information
»
Image Base 0x00400000
Entry Point 0x00401000
Size Of Code 0x00002400
Size Of Initialized Data 0x00004000
File Type IMAGE_FILE_EXECUTABLE_IMAGE
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Machine Type IMAGE_FILE_MACHINE_I386
Compile Timestamp 2013-10-02 08:13 (UTC)
Sections (4)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x00401000 0x000023F0 0x00002400 0x00000400 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 6.27
.rdata 0x00404000 0x00000DB0 0x00000E00 0x00002800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.72
.data 0x00405000 0x000005F0 0x00000200 0x00003600 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE 5.9
.rsrc 0x00406000 0x00002B98 0x00002C00 0x00003800 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 5.6
Imports (3)
»
user32.dll (20)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
BeginPaint - 0x0040402C 0x00004B6C 0x0000336C 0x0000000B
DispatchMessageA - 0x00404030 0x00004B70 0x00003370 0x00000093
DrawTextA - 0x00404034 0x00004B74 0x00003374 0x000000AA
EndPaint - 0x00404038 0x00004B78 0x00003378 0x000000B6
TranslateMessage - 0x0040403C 0x00004B7C 0x0000337C 0x0000025E
GetMessageA - 0x00404040 0x00004B80 0x00003380 0x00000122
PostQuitMessage - 0x00404044 0x00004B84 0x00003384 0x000001D5
ShowWindow - 0x00404048 0x00004B88 0x00003388 0x00000248
UpdateWindow - 0x0040404C 0x00004B8C 0x0000338C 0x0000026A
MoveWindow - 0x00404050 0x00004B90 0x00003390 0x000001BE
CreateWindowExA - 0x00404054 0x00004B94 0x00003394 0x00000056
RegisterClassExA - 0x00404058 0x00004B98 0x00003398 0x000001E1
DefWindowProcA - 0x0040405C 0x00004B9C 0x0000339C 0x00000083
MessageBoxA - 0x00404060 0x00004BA0 0x000033A0 0x000001B1
SendMessageA - 0x00404064 0x00004BA4 0x000033A4 0x000001FD
LoadIconA - 0x00404068 0x00004BA8 0x000033A8 0x00000198
DestroyWindow - 0x0040406C 0x00004BAC 0x000033AC 0x0000008D
LoadCursorA - 0x00404070 0x00004BB0 0x000033B0 0x00000194
GetClientRect - 0x00404074 0x00004BB4 0x000033B4 0x000000E9
GetWindowRect - 0x00404078 0x00004BB8 0x000033B8 0x00000157
kernel32.dll (7)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
GetLastError - 0x0040400C 0x00004B4C 0x0000334C 0x00000128
lstrcpyA - 0x00404010 0x00004B50 0x00003350 0x00000315
GetModuleHandleA - 0x00404014 0x00004B54 0x00003354 0x00000134
GetCommandLineA - 0x00404018 0x00004B58 0x00003358 0x000000E6
DeleteFileA - 0x0040401C 0x00004B5C 0x0000335C 0x00000069
CloseHandle - 0x00404020 0x00004B60 0x00003360 0x00000023
CreateFileA - 0x00404024 0x00004B64 0x00003364 0x0000003D
gdi32.dll (2)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
DeleteObject - 0x00404000 0x00004B40 0x00003340 0x0000004B
CreateFontIndirectA - 0x00404004 0x00004B44 0x00003344 0x0000002F
Memory Dumps (12)
»
Name Process ID Start VA End VA Dump Reason PE Rebuild Bitness Entry Point YARA Actions
hurok.exe 4 0x00400000 0x00408FFF Relevant Image False 32-bit 0x00402B80 False
buffer 4 0x01EF0000 0x01EF5FFF First Execution False 32-bit 0x01EF0009 False
buffer 4 0x00400000 0x00405FFF Marked Executable False 32-bit - False
buffer 4 0x00400000 0x00405FFF Marked Executable False 32-bit - False
buffer 4 0x00400000 0x00405FFF Marked Executable False 32-bit - False
buffer 4 0x00400000 0x00405FFF Marked Executable False 32-bit - False
buffer 4 0x00400000 0x00405FFF First Execution False 32-bit 0x00401020 False
buffer 4 0x0019C000 0x0019FFFF First Network Behavior False 32-bit - False
buffer 4 0x00400000 0x00405FFF First Network Behavior False 32-bit - False
buffer 4 0x01EF0000 0x01EF5FFF First Network Behavior False 32-bit - False
buffer 4 0x01F40000 0x01F9FFFF First Network Behavior False 32-bit - False
buffer 4 0x02100048 0x021117C7 First Network Behavior False 32-bit - False
YARA Matches (2)
»
Rule Name Rule Description Classification Score Actions
CryptoLocker_rule2 CryptoLocker ransomware Ransomware
5/5
CryptoLocker_set1 CryptoLocker ransomware Ransomware
5/5
c:\users\oqxzraykm\appdata\local\temp\hurrok.exe Dropped File Empty
Clean
»
Also Known As hurrok.exe (Accessed File, Dropped File)
MIME Type application/x-empty
File Size 0 Bytes (not extracted)
MD5 d41d8cd98f00b204e9800998ecf8427e Copy to Clipboard
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Copy to Clipboard
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 Copy to Clipboard
SSDeep 3:: Copy to Clipboard
ImpHash -
0be74dcbb2460f6aab602ca1c3b509d46648ed8b7026d22ce43ca9bd30ac3828 Downloaded File HTML
Clean
»
MIME Type text/html
File Size 100.05 KB
MD5 f0b442713aafddfc56ea8671526248f7 Copy to Clipboard
SHA1 d89b81272a920608f1649dc5744546ad0815bcec Copy to Clipboard
SHA256 0be74dcbb2460f6aab602ca1c3b509d46648ed8b7026d22ce43ca9bd30ac3828 Copy to Clipboard
SSDeep 768:W0IOGkklgWgucWCsZdap7GI1hels3o37R7JRT03N3LrSW2+z266:TOapiWYlIc7RlRTgdL2W2+z266 Copy to Clipboard
ImpHash -
Extracted URLs (43)
»
URL WHOIS Data Reputation Status Recursively Submitted Actions
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Show WHOIS
Not Available
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image