1176637004956c3cde0de41c5dde29ad7be714d07d6426174d89b56b85669f9b (SHA-256)

Malicious with 100% Confidence 

SecondWrite’s DeepView Sandbox analyzed this file – a Windows PE32 Executable – this week and declared it to be malicious.  At the time of its discovery, all major malware detection vendors had not identified this file as malicious.  DeepView unique and patented methods identified 4 indicators – specifically in this case, force code execution (FCE), program level indication (PLI), and automated sequence detection (ASD). 

A link to the full report with descriptions and details is below.  Some key highlights and indicators follow. 

Type of Malware:  Ransomware

  • Sample writes a large amount of files (Over 100)
  • Installs itself for autorun at Windows startup
  • Attempts to disable UAC
  • Expresses interest in specific running processes
  • Attempts to modify Explorer settings to prevent file extensions from being displayed

Evasiveness Indicators:

  • [FCE] Attempts to repeatedly call a single API many times in order to delay analysis time
  • [PLI] Contains obfuscated control-flow to defeat static analysis
  • [PLI] A process attempted to delay the analysis task
  • Uses anti-binary translation code by allocating huge blocks
  • Disables Windows Security features

Other Compelling Indicators:

  • [ASD] Automatic Sequence Detection maliciousness score: 56%
  • Expresses interest in specific running processes
  • Attempts to modify Explorer settings to prevent hidden files from being displayed
  • Allocates read-write-execute memory (usually to unpack itself)
  • Creates a service

MITRE ATT&CK Indicators:

MITRE TacticMITRE Technique
Command and ControlCommonly Used Port Custom Command and Control Protocol Remote File Copy Uncommonly Used Port
Defense EvasionBypass User Account Control Disabling Security Tools File Deletion Hidden Files and Directories Hidden Window Software Packing
DiscoveryProcess Discovery Virtualization / Sandbox Evasion
PersistenceHidden Files and Directories Registry Run Keys / Startup Folder

Selection from The Report:

Yara Pattern Match and Mitre Att&ck Sections

See Full Detailed Report:

Malware Of The Week is sourced by DeepView Sandbox using SecondWrite’s patented techniques of Forced Code Execution, Program Level Indicators, and Automatic Sequence Detection.