c283c47e...528b | VTI
Try VMRay Analyzer
VTI SCORE: 95/100
Dynamic Analysis Report
Classification: Trojan, Dropper, Spyware

c283c47ed7ecb84bdedf5a856374b4a60d48e0d42c0c57d4ff61a16d71f3528b (SHA256)

Mining.exe

Windows Exe (x86-32)

Created at 2019-01-26 02:20:00

Notifications (1/1)

Due to a WHOIS service error, no query could be made to get WHOIS data of any contacted domain.

Severity Category Operation Classification
4/5
Information Stealing Reads application data Spyware
3/5
Anti Analysis Tries to detect application sandbox -
  • Possibly trying to detect "Comodo Sandbox" by checking for existence of module "cmdvrt32.dll".
  • Possibly trying to detect "Sandboxie" by checking for existence of module "SbieDll.dll".
  • Possibly trying to detect "wine" by calling GetProcAddress() on "wine_get_version".
3/5
Information Stealing Reads cryptocurrency wallet locations Spyware
2/5
Anti Analysis Tries to detect debugger -
2/5
Anti Analysis Tries to detect virtual machine -
  • Possibly trying to detect VirtualBox via registry "HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__".
  • Reads out system information, commonly used to detect VMs via registry. (Value "SystemBiosVersion" in key "HKEY_LOCAL_MACHINE\Hardware\description\System").
  • Reads out system information, commonly used to detect VMs via registry. (Value "VideoBiosVersion" in key "HKEY_LOCAL_MACHINE\Hardware\description\System").
  • Possibly trying to detect VM via rdtsc.
2/5
Anti Analysis Tries to detect a forensic tool -
  • Searches for the window class "FilemonClass" that is related to a forensic tool.
  • Searches for the window "File Monitor - Sysinternals: www.sysinternals.com" that is related to a forensic tool.
  • Searches for the window class "PROCMON_WINDOW_CLASS" that is related to a forensic tool.
  • Searches for the window class "RegmonClass" that is related to a forensic tool.
  • Searches for the window "Registry Monitor - Sysinternals: www.sysinternals.com" that is related to a forensic tool.
  • Searches for the window class "18467-41" that is related to a forensic tool.
2/5
File System Known suspicious file Trojan
1/5
Process Creates process with hidden window -
  • The process "C:\Windows\system32\cmd.exe /c Zero_Two.tmp" starts with hidden window.
  • The process "C:\Windows\system32\cmd.exe /c C:\Users\CIiHmnxMn6Ps\AppData\Roaming\517847183.tmp" starts with hidden window.
1/5
Anti Analysis Resolves APIs dynamically -
1/5
Network Performs DNS request -
1/5
Process Creates system object -
1/5
Static Unparsable sections in file -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\CIiHmnxMn6Ps\Desktop\Mining.exe.
1/5
Network Connects to remote host -
1/5
PE Drops PE file Dropper
1/5
PE Executes dropped PE file -
1/5
Persistence Installs system service -
  • Installs service "WinRun" by using the sc.exe utility.
  • Installs service "SystemUpdate" by using the sc.exe utility.
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image