VTI Score 100 / 100 | |
VTI Database Version | 2.5 |
VTI Rule Match Count | 17 |
VTI Rule Type | Default (PE, ...) |
Anti Analysis | ||
Dynamic API usage | ||
Resolve above average number of APIs. | ||
Device | ||
Write master boot record (MBR) | ||
Write 512 bytes to master boot record (MBR). | ||
Access physical drive | ||
Access physical drive "\device\harddisk0\dr0". | ||
File System | ||
Handle with malicious files | ||
File "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp" is a known malicious file. | ||
Modify operating system directory | ||
Modify "c:\windows\dllhost.dat". | ||
Network | ||
Connect to SMB share | ||
Connect to a network share at \\192.168.0.1\admin$. | ||
OS | ||
Use encryption API | ||
Use above average number of encryption APIs. | ||
PE | ||
Drop PE file | ||
Drop file "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp". | ||
Drop file "c:\windows\dllhost.dat". | ||
Execute dropped PE file | ||
Execute dropped file "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp". | ||
Process | ||
Escalate Privileges | ||
Enable critical process privilege "SeTcbPrivilege". | ||
Enable process privilege "SeShutdownPrivilege". | ||
Enable process privilege "SeDebugPrivilege". | ||
Allocate a page with write and execute permissions | ||
Change the protection of a page from writable ("PAGE_READWRITE") to executable ("PAGE_EXECUTE_READ"). | ||
Create process with hidden window | ||
The process "C:\Windows\system32\cmd.exe" starts with hidden window. | ||
The process "C:\Users\HJRD1K~1\AppData\Local\Temp\6B4.tmp" starts with hidden window. | ||
Read from memory of an other process | ||
"c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp" reads from "c:\windows\system32\lsass.exe". | ||
- | Browser | |
- | Hide Tracks | |
- | Information Stealing | |
- | Injection | |
- | Kernel | |
- | Masquerade | |
- | Persistence | |
- | VBA Macro | |
- | YARA |