killeryuga.exe
Created at 2019-03-24T16:35:00
Remarks (2/3)
(0x200000e): The overall sleep time of all monitored processes was truncated from "1 minute, 40 seconds" to "10 seconds" to reveal dormant functionality.
VMRay Threat Indicators (30 rules, 116 matches)
Severity | Category | Operation | Classification | |
---|---|---|---|---|
5/5
|
File System | Known malicious file | Trojan | |
|
||||
|
||||
|
||||
|
||||
5/5
|
YARA | YARA match | Backdoor | |
|
||||
4/5
|
Network | Modifies network configuration | - | |
|
||||
4/5
|
Information Stealing | Exhibits Spyware behavior | Spyware | |
|
||||
4/5
|
Network | Associated with known malicious/suspicious URLs | - | |
|
||||
|
||||
|
||||
|
||||
3/5
|
Browser | Reads data related to browser cookies | - | |
|
||||
|
||||
|
||||
3/5
|
Information Stealing | Reads cryptocurrency wallet locations | - | |
|
||||
|
||||
3/5
|
File System | Possibly drops ransom note files | Ransomware | |
|
||||
3/5
|
Anti Analysis | Delays execution | - | |
|
||||
2/5
|
Anti Analysis | Resolves APIs dynamically to possibly evade static detection | - | |
|
||||
2/5
|
Information Stealing | Reads sensitive browser data | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
2/5
|
Information Stealing | Reads sensitive mail data | - | |
|
||||
2/5
|
Information Stealing | Reads sensitive ftp data | - | |
|
||||
2/5
|
Information Stealing | Reads sensitive application data | - | |
|
||||
|
||||
2/5
|
Static | Contains known malicious embedded URLs | - | |
|
||||
1/5
|
Persistence | Installs system startup script or application | - | |
|
||||
1/5
|
Process | Creates process with hidden window | - | |
|
||||
|
||||
|
||||
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
|
||||
|
||||
1/5
|
File System | Modifies operating system directory | - | |
|
||||
1/5
|
Information Stealing | Reads system data | - | |
|
||||
1/5
|
Information Stealing | Possibly does reconnaissance | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
File System | Creates an unusually large number of files | - | |
|
||||
1/5
|
Process | Overwrites code | - | |
|
||||
1/5
|
Network | Downloads file | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
PE | The PE file was created with a packer | - | |
|
||||
1/5
|
PE | Drops PE file | Dropper | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
Process | Process crashed | - | |
|
||||
1/5
|
Static | Contains known suspicious embedded URLs | - | |
|
||||
0/5
|
Process | Enumerates running processes | - | |
|
||||
Screenshots
Monitored Processes
Sample Information
Analysis Information
Creation Time | 2019-03-24 17:35 (UTC+1) |
Analysis Duration | 00:04:34 |
Number of Monitored Processes | 17 |
Execution Successful |
![]() |
Reputation Enabled |
![]() |
WHOIS Enabled |
![]() |
YARA Enabled |
![]() |
Number of YARA Matches | 11 |
Termination Reason | Timeout |
Tags |