The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malware developments that demand immediate attention. We complement this effort with our internal tracking and monitor events the security community reports to stay up-to-date with the latest changes in the cyber threat landscape.
In November 2025, the VMRay Labs team has been focused on the following areas:
1) New VMRay Threat Identifiers addressing:
2) New or updated Configuration Extractors for:
3) Smart Link Detonation additions, including the support for:
4) +30 new YARA rules
Now, let’s delve into each topic for a more comprehensive understanding.
In a series of these blog posts, we introduced you to the concept of the VMRay Threat Identifiers (VTIs). In short, VTIs identify threatening or unusual behavior of the analyzed sample and rate the maliciousness on a scale of 1 to 5, with 5 being the most malicious. The VTI score, which greatly contributes to the ultimate Verdict of the sample, is presented to you in the VMRay Platform after a completed analysis. Here’s a recap of the new VTIs that we added, or improved in the past month.
Category: Anti Analysis
MITRE ATT&CK® Technique: T1497/002/
During recent analyses,
This behavior is a classic anti analysis technique: if the cursor remains idle for several seconds, the malware may assume it’s being executed in a sandbox and choose not to proceed.
The VMRay environment already simulates realistic mouse movement to bypass such checks. With this update, we are additionally introducing a new VTI that flags attempts to track mouse-movement behavior. Identifying user-activity checks is essential, as many malware families remain dormant until they confirm they’re running in an environment with a “real” user.
mshta.exe (short for Microsoft HTML Application Host) is a legitimate Windows host for HTML Applications (HTA) and scripts (VBScript/JScript). It lives in C:\Windows\System32\mshta.exe and is sometimes used legitimately by admins or Windows components to run small GUI scripts.
Attackers may abuse mshta.exe as a living-off-the-land binary – a trusted Windows tool used for malicious purposes to bypass defenses. In the observed scenario addressed by addition of this VTI, a sample attempted to establish an HTTP connection via mshta.exe to communicate with an external HTTP service.
mshta.exe connects to an HTTP service? Mshta.exe launched: That document or link causes mshta.exe to execute (often via a macro, shortcut, or malicious link).mshta.exe connects to an HTTP URL and downloads an HTA/JS/VBS payload (plain text over the network).This can lead to immediate compromise, as the fetched code runs in memory with the user’s privileges.
1) The payload is sent unencrypted and can be easily hosted or modified by the attacker.
2) There is no TLS certificate to verify, making domain reputation checks less effective.
While the VMRay Platform already includes a VTI that detects mshta.exe being abused to execute code, we are now equipped with a new VTI that triggers when mshta.exe is used specifically to establish an HTTP connection.
Category: Masquerade
MITRE ATT&CK® Technique: T1036/005/
A PE file (short for Portable Executable) is the standard format used in Windows for executable files like .exe and .dll. It contains all the instructions Windows needs to load and run a program.
In one recent sample, we observed multiple PE files being dropped during execution. The interesting part? The dropped files used names mimicking real Windows utilities, such as systemhelper.exe, msiexec.exe, or 7z.exe. Even more telling, these files were written to user directories or temporary paths, not to system folders like C:\Windows\System32\ or C:\Program Files\.
What’s the suspicious part?
While legitimate installers may temporarily unpack files during setup, executables left in writable user folders are a strong indicator of malicious intent. This behavior may suggests that:
To counter this technique, the new VTI triggers whenever a sample drops executable files that share names with known system utilities.
Category: Defense Evasion
When a program runs, it uses different parts of your computer’s memory for code, temporary data, and short-term storage. Recently we’ve seen more malware families allocate unusually large chunks of memory to unpack or hold their payloads entirely in RAM instead of writing anything to disk. That lets them run quietly, avoid file-based scanners, and frustrate analysts who rely on disk artifacts.
To help uncover this behavior, we added a low-scoring VTI that flags unusually large anonymous memory allocations. It’s intentionally a lightweight indicator, because large allocations can be legitimate (e.g.: in databases, scientific apps, etc). The goal is to add context to our existing detections so analysts see this behavior in the chain of events.
Category: Heuristics
We recently expanded our heuristic-based detection capabilities with a new VTI that flags samples exhibiting both a CAPTCHA and a branding image within their interface.
Previously, we introduced a VTI that triggers whenever a sample contains a CAPTCHA. This behavior alone is treated as low-severity because CAPTCHAs can appear in legitimate applications. During recent analysis, we encountered a sample that not only displayed a CAPTCHA but also presented a branding element mimicking Microsoft. This kind of impersonation is a classic social-engineering technique. A Microsoft (or any major vendor) logo is used by threat actors to create a false sense of legitimacy and lower user suspicion.
While the presence of a CAPTCHA or a branding image can be benign on its own, the combination of the two is unusual and raises red flags. Additionally, Microsoft sites do not generally employ CAPTCHAs.
To highlight this suspicious combination, our Platform products now include a new VTI that triggers when a page displays both a CAPTCHA and a branding image. By correlating these behaviors, the system can more accurately identify samples exhibiting advanced evasion and impersonation techniques helping analysts quickly prioritize and understand potentially malicious activity.
Category: Anti Analysis
MITRE ATT&CK® Technique: T1497
First, let’s start with explaining why analysis systems or sandboxes may rename malware samples. Malware analysis environments often modify a sample’s filename before execution. This behavior is usually benign and driven by operational or safety requirements:
1) Safety controls: Sandboxes may rename uploaded binaries to prevent accidental execution outside controlled directories or workflows.
2) Workflow consistency: At scale, systems must process thousands of samples reliably. Standardized naming, such as randomized values, UUIDs, or hash-based filenames like SHA256.exe, helps ensure consistency and simplifies automated handling.
3) Extraction of artifacts: When samples are embedded in archives (ZIP, RAR, etc.), the sandbox might extract them and assign clearer or more structured names as part of the unpacking process.
Some malware families validate their own filename or execution path to detect whether they are running in an analysis environment. The logic typically looks like this:
Our new VTI detects this technique by monitoring when malware invokes functions responsible for retrieving and validating its own execution name. When these checks occur, the VTI triggers, highlighting that the sample may be attempting to evade analysis through filename-based detection.
During recent analysis, we encountered a phishing sample that placed two CAPTCHA gates in front of the actual phishing page. While this behavior is unusual for legitimate websites, it starts to be seen among more sophisticated phishing operations.
Attackers rely on these fake CAPTCHA walls to evade automated detection. Most security crawlers, URL scanners, and sandbox environments cannot solve CAPTCHA challenges; let alone two in succession. By forcing automated systems to stop at the CAPTCHA stage, attackers significantly reduce the likelihood that the true phishing content will ever be retrieved, analyzed, or blocked.
In the sample we analyzed, the second CAPTCHA required clicking a “Verify Humanity” button. While earlier versions of the VMRay AutoUI engine did not automatically interact with this specific design pattern, we have since expanded our automated interaction rules. Over the last month, our AutoUI engine has been enhanced to recognize and click through both CAPTCHA layers, ensuring complete behavioral visibility – no matter how many fake CAPTCHAs stand in the way.
UmbralStealer is a stealer written in C# that can extract login credentials and cookies from various web browsers and video games. It also includes functionality to capture screenshots and webcam images. Its primary means of communication with attackers is via Discord.
SharkStealer is a Golang “malware-as-a-service” information stealer, which uses EtherHiding to store C2 information on a public blockchain.
DeerStealer is a Malware-as-a-Service (MaaS) infostealer which is sold on underground forums. DeerStealer mainly targets credentials and cryptocurrencies, but also offers remote access capabilities.
One of the key component of the VMRay Platform, Smart Link Detonation (SLD), is an automatic evaluation and detonation of hyperlinks embedded in emails and documents. We recently made two important improvements to our SLD feature to keep pace with evolving threats:
Typosquatting is a cybersecurity attack technique where an attacker registers a misspelled or visually similar version of a legitimate domain name, hoping that users will mistype the address or fail to notice subtle differences. For example, instead of going to the legitimate site vmray.com, a user might accidentally visit:
vmary.com (swapped letters)vnnray.com (extra character)v-mray.com (added hyphen)To strengthen our defenses against this tactic, we enhanced our Smart Link Detonation feature with typosquatting detection. SLD now evaluates URLs using patterns commonly seen in phishing campaigns, flagging cases where attackers disguise malicious domains to resemble trusted ones.
This capability is reinforced by a new VMRay Threat Identifier dedicated to spotting potential typosquatting. When a suspicious domain is detected, the VTI flags it, and SLD automatically detonates it in the VMRay Platform environment for deeper analysis.
Our hunt for new, undetected malware samples never stops. Over the past months, we added more than 220 fresh YARA rules to strengthen detection across a wide range of threats. This month, we’re continuing that momentum with 30+ new rules, focused on delivering a solid drop of high-quality detections. Here’s a quick preview of what we’re shipping this month.