Analysis
-
max time kernel
84s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-05-2021 15:32
Static task
static1
Behavioral task
behavioral1
Sample
PDFViewer.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PDFViewer.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
PDFViewer.exe
-
Size
564KB
-
MD5
0b9f0463a2d36d53505c4911b74c8f08
-
SHA1
d5c929cbd199dadaa879fb9368103b11fb68e7fd
-
SHA256
f1e52af7310c199ec5d44f16b37b6e4a7eebb3a55de5db292111440fa7d0da47
-
SHA512
796e923ae65df8e652387628dccff85d2bfb793c99386aec34c2c6db3482d0bf97fd5586a72b4732b4bef2fe6aabd8e912b5b390068dd590d5d1a57d93f6d924
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1512-119-0x0000000000400000-0x00000000004F6000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1440 set thread context of 1512 1440 PDFViewer.exe 77 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1440 PDFViewer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1512 PDFViewer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1512 PDFViewer.exe Token: SeCreatePagefilePrivilege 1512 PDFViewer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1440 PDFViewer.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1512 1440 PDFViewer.exe 77 PID 1440 wrote to memory of 1512 1440 PDFViewer.exe 77 PID 1440 wrote to memory of 1512 1440 PDFViewer.exe 77 PID 1440 wrote to memory of 1512 1440 PDFViewer.exe 77 PID 1512 wrote to memory of 844 1512 PDFViewer.exe 79 PID 1512 wrote to memory of 844 1512 PDFViewer.exe 79 PID 1512 wrote to memory of 844 1512 PDFViewer.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\PDFViewer.exe"C:\Users\Admin\AppData\Local\Temp\PDFViewer.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\PDFViewer.exe"C:\Users\Admin\AppData\Local\Temp\PDFViewer.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CRBhLBbxpcaKFFVj.bat" "3⤵PID:844
-
-