VTI Score 100 / 100 | |
VTI Database Version | 2.5 |
VTI Rule Match Count | 17 |
VTI Rule Type | Default (PE, ...) |
![]() | Device | Write master boot record (MBR) | |
Write 512 bytes to master boot record (MBR). | |||
![]() | File System | Handle with malicious files | |
File "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp" is a known malicious file. | |||
![]() | Network | Connect to SMB share | |
Connect to a network share at \\192.168.0.1\admin$. | |||
![]() | Process | Escalate Privileges | |
Enable critical process privilege "SeTcbPrivilege". | |||
Enable process privilege "SeShutdownPrivilege". | |||
Enable process privilege "SeDebugPrivilege". | |||
![]() | Device | Access physical drive | |
Access physical drive "\device\harddisk0\dr0". | |||
![]() | Process | Allocate a page with write and execute permissions | |
Change the protection of a page from writable ("PAGE_READWRITE") to executable ("PAGE_EXECUTE_READ"). | |||
![]() | Anti Analysis | Dynamic API usage | |
Resolve above average number of APIs. | |||
![]() | Process | Create process with hidden window | |
The process "C:\Windows\system32\cmd.exe" starts with hidden window. | |||
The process "C:\Users\HJRD1K~1\AppData\Local\Temp\6B4.tmp" starts with hidden window. | |||
![]() | Process | Read from memory of an other process | |
"c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp" reads from "c:\windows\system32\lsass.exe". | |||
![]() | File System | Modify operating system directory | |
Modify "c:\windows\dllhost.dat". | |||
![]() | OS | Use encryption API | |
Use above average number of encryption APIs. | |||
![]() | PE | Drop PE file | |
Drop file "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp". | |||
Drop file "c:\windows\dllhost.dat". | |||
![]() | PE | Execute dropped PE file | |
Execute dropped file "c:\users\hjrd1k~1\appdata\local\temp\6b4.tmp". |