Setup.exe
Created 5 years ago
VMRay Threat Identifiers (11 rules, 14 matches)
Severity | Category | Operation | Count | Classification | |
---|---|---|---|---|---|
5/5 | Antivirus | Malicious content was detected by heuristic scan | 2 | - | |
4/5 | User Data Modification | Modifies Windows automatic backups | 1 | - | |
3/5 | Network Connection | Connects to TOR hidden service | 1 | - | |
2/5 | Anti Analysis | Tries to detect debugger | 3 | - | |
2/5 | Obfuscation | Resolves APIs dynamically to possibly evade static detection | 1 | - | |
2/5 | Network Connection | Attempts to connect to unavailable TCP servers | 1 | - | |
2/5 | Reputation | File has embedded suspicious URL | 1 | - | |
1/5 | Mutex | Creates mutex | 1 | - | |
1/5 | Network Connection | Performs DNS request | 1 | - | |
1/5 | Network Connection | Connects to HTTP server | 1 | - | |
Screenshots
MITRE ATT&CK™ Matrix - Windows
Sample Information
ID | #1363858 |
MD5 | |
SHA1 | |
SHA256 | |
SSDeep | |
ImpHash | |
Filename | Setup.exe |
File Size | 68.00 KB |
Sample Type | Windows Exe (x86-32) |
Analysis Information
Creation Time | 2020-09-24 13:09 (UTC+) |
Analysis Duration | 00:04:00 |
Number of Monitored Processes | 10 |
Execution Successful | ![]() |
Reputation Enabled | ![]() |
WHOIS Enabled | ![]() |
Local AV Enabled | ![]() |
Local AV Applied On | Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps |
YARA Enabled | ![]() |
YARA Applied On | Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps |
Number of AV Matches | 3 |
Number of YARA Matches | 0 |
Termination Reason | Timeout |