VTI Score 94 / 100 | |
VTI Database Version | 2.3 |
VTI Rule Match Count | 32 |
VTI Rule Type | Default (PE, ...) |
![]() | Anti Analysis | |
![]() | Dynamic API usage | |
Resolve more than 50 APIs. | ||
![]() | Delay execution | |
One thread sleeps more than 5 minutes. | ||
![]() | Browser | |
![]() | Change security related browser settings | |
Disable signature check for executables downloaded by Microsoft Internet Explorer. | ||
![]() | Injection | |
![]() | Write into memory of an other process | |
"c:\windows\system32\regsvr32.exe" modifies memory of "c:\windows\explorer.exe" | ||
![]() | Modify control flow of an other process | |
"c:\windows\system32\regsvr32.exe" creates thread in "c:\windows\explorer.exe" | ||
![]() | Network | |
![]() | Perform DNS request | |
Resolve "N3EErvtwsM". | ||
Resolve "adom2.com.br". | ||
Resolve "carvas32ltda.com". | ||
Resolve "carva32ssa.com". | ||
Resolve "bandeivacomercial.com". | ||
Resolve "bandeivacomercio.com". | ||
![]() | Connect to remote host | |
Outgoing TCP connection to host "None:80". | ||
Outgoing TCP connection to host "187.191.100.112:80". | ||
![]() | Download data | |
Url "http://None/nosoanfhtympkl50tre/ljk32g1.txt". | ||
Url "http://None/nosoanfhtympkl50tre/ljk32g2.txt". | ||
Url "http://None/nosoanfhtympkl50tre/ljk32g4.txt". | ||
Url "http://127.0.0.1/nosoanfhtympkl50tre/infx/s1/conta.php?chave=s3n4&url=N3EERVTWSM%20*%20%2032%20bits%20*%202626.5%20kb%20*%20%20*%20English%20(United%20States)". | ||
![]() | Connect to HTTP server | |
Remote address "None". | ||
Remote address "127.0.0.1". | ||
![]() | OS | |
![]() | Modfiy system security configuration | |
Disable UAC notification. | ||
Disable Windows Security Center antivirus notification. | ||
Disable Windows Security Center warning about disabled system updates. | ||
![]() | Disable crucial system service | |
Disable "Windows Defender Service" by ChangeServiceConfigW. | ||
![]() | PE | |
![]() | Drop PE file | |
Drop file "c:\users\public\n3eg\ljkg4". | ||
Drop file "c:\users\public\n3eg\ljkg2". | ||
![]() | Persistence | |
![]() | Install system startup script or application | |
Add "regsvr32.exe /s "C:\Users\Public\N3Eg\N3Eg2.51N3E" #96" to windows startup via registry. | ||
![]() | Process | |
![]() | Create process with hidden window | |
The process "regsvr32.exe \s \"C:\Users\Public\N3Eg\N3Eg2.51N3E\" #96" starts with hidden window. | ||
The process "cmd /k "C:\Users\Public\N3Eg\N3E.vbs"" starts with hidden window. | ||
The process "sc" starts with hidden window. | ||
The process "net" starts with hidden window. | ||
The process "cmd" starts with hidden window. | ||
![]() | Allocate a page with write and execute permissions | |
Allocate a page with "PAGE_EXECUTE_READWRITE" permissions, often used to dynamically unpack code. | ||
- | Device | |
- | File System | |
- | Hide Tracks | |
- | Information Stealing | |
- | Kernel | |
- | Masquerade | |
- | VBA Macro | |
- | YARA |