VTI Score 91 / 100 | |
VTI Database Version | 2.5 |
VTI Rule Match Count | 14 |
VTI Rule Type | Default (PE, ...) |
Anti Analysis | ||
Illegitimate API usage | ||
Internal API "CreateProcessInternalA" was used to start "C:\Windows\system32\netsh.exe advfirewall set allprofiles state on". | ||
Dynamic API usage | ||
Resolve above average number of APIs. | ||
File System | ||
Rename user files | ||
Rename multiple user files. This is an indicator for an encryption attempt. | ||
Injection | ||
Write into memory of a process running from a created or modified executable | ||
"c:\users\hjrd1koky ds8lujv\desktop\199a4a2585c9fc855c5a694df318d153cd74e47fe4b8c667f25a822bfbb22bc6.exe" modifies memory of "c:\users\hjrd1koky ds8lujv\desktop\199a4a2585c9fc855c5a694df318d153cd74e47fe4b8c667f25a822bfbb22bc6.exe" | ||
Modify control flow of a process running from a created or modified executable | ||
"c:\users\hjrd1koky ds8lujv\desktop\199a4a2585c9fc855c5a694df318d153cd74e47fe4b8c667f25a822bfbb22bc6.exe" alters context of "c:\users\hjrd1koky ds8lujv\desktop\199a4a2585c9fc855c5a694df318d153cd74e47fe4b8c667f25a822bfbb22bc6.exe" | ||
PE | ||
Drop PE file | ||
Drop file "c:\users\hjrd1k~1\appdata\local\temp\nsx1ae1.tmp\system.dll". | ||
Drop file "c:\users\hjrd1k~1\appdata\local\temp\underglaze.dll". | ||
Process | ||
Allocate a page with write and execute permissions | ||
Change the protection of a page from writable ("PAGE_READWRITE") to executable ("PAGE_EXECUTE_READWRITE"). | ||
Allocate a page in a foreign process with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code. | ||
Create process with hidden window | ||
The process ""C:\Users\hJrD1KOKY DS8lUjv\Desktop\199a4a2585c9fc855c5a694df318d153cd74e47fe4b8c667f25a822bfbb22bc6.exe" " starts with hidden window. | ||
The process "C:\Windows\system32\netsh.exe advfirewall set allprofiles state on" starts with hidden window. | ||
Read from memory of an other process | ||
"c:\users\hjrd1koky ds8lujv\desktop\199a4a2585c9fc855c5a694df318d153cd74e47fe4b8c667f25a822bfbb22bc6.exe" reads from ""C:\Users\hJrD1KOKY DS8lUjv\Desktop\199a4a2585c9fc855c5a694df318d153cd74e47fe4b8c667f25a822bfbb22bc6.exe" ". | ||
Create system object | ||
Create mutex with name "shell.{0835FA03-68AC-09B6-0CE4-703246A746AB}". | ||
Create mutex with name "Local\!PrivacIE!SharedMemory!Mutex". | ||
- | Browser | |
- | Device | |
- | Hide Tracks | |
- | Information Stealing | |
- | Kernel | |
- | Masquerade | |
- | Network | |
- | OS | |
- | Persistence | |
- | VBA Macro | |
- | YARA |