Flash_Player.exe
Created at 2019-03-17T20:36:00
VMRay Threat Indicators (18 rules, 41 matches)
Severity | Category | Operation | Classification | |
---|---|---|---|---|
4/5
|
File System | Modifies content of user files | Ransomware | |
|
||||
4/5
|
File System | Renames user files | Ransomware | |
|
||||
4/5
|
OS | Modifies Windows automatic backups | - | |
|
||||
3/5
|
Anti Analysis | Tries to detect application sandbox | - | |
|
||||
3/5
|
Browser | Reads data related to browser cookies | - | |
|
||||
|
||||
3/5
|
File System | Possibly drops ransom note files | Ransomware | |
|
||||
2/5
|
Anti Analysis | Resolves APIs dynamically to possibly evade static detection | - | |
|
||||
2/5
|
Network | Sets up server that accepts incoming connections | Backdoor | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
2/5
|
Information Stealing | Reads sensitive browser data | - | |
|
||||
2/5
|
File System | Known suspicious file | Exploit | |
|
||||
1/5
|
Network | Performs DNS request | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
Information Stealing | Reads system data | - | |
|
||||
1/5
|
Process | Creates process with hidden window | - | |
|
||||
1/5
|
Information Stealing | Possibly does reconnaissance | - | |
|
||||
1/5
|
File System | Creates an unusually large number of files | - | |
|
||||
1/5
|
Network | Connects to remote host | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
1/5
|
PE | The PE file was created with a packer | - | |
|
||||
Screenshots
Monitored Processes
Sample Information
Analysis Information
Creation Time | 2019-03-17 21:36 (UTC+1) |
Analysis Duration | 00:04:36 |
Number of Monitored Processes | 23 |
Execution Successful |
![]() |
Reputation Enabled |
![]() |
WHOIS Enabled |
![]() |
YARA Enabled |
![]() |
Number of YARA Matches | 0 |
Termination Reason | Timeout |
Tags |