Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-05-2021 15:34
Static task
static1
Behavioral task
behavioral1
Sample
ExcelViewerss.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ExcelViewerss.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
ExcelViewerss.exe
-
Size
571KB
-
MD5
40d56ef0857cd5fe0ba21d20c73686e2
-
SHA1
90a8bdadbdebfcaf3a1e146472d56db7d531f921
-
SHA256
d1623332c586135747a2575bec4ee783f299c5fca0f527f0328ea47691e9506d
-
SHA512
74953fa8056f17e96831cf932a482907af00ef22008a4c829da339d3c55fb9696ba812c605155486971cdc4427cb85bf4d63f0e29ffdb46c602be083bdcdc038
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/932-119-0x0000000000400000-0x00000000004F6000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3016 set thread context of 932 3016 ExcelViewerss.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3016 ExcelViewerss.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 932 ExcelViewerss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 932 ExcelViewerss.exe Token: SeCreatePagefilePrivilege 932 ExcelViewerss.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3016 ExcelViewerss.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3016 wrote to memory of 932 3016 ExcelViewerss.exe 79 PID 3016 wrote to memory of 932 3016 ExcelViewerss.exe 79 PID 3016 wrote to memory of 932 3016 ExcelViewerss.exe 79 PID 3016 wrote to memory of 932 3016 ExcelViewerss.exe 79 PID 932 wrote to memory of 1164 932 ExcelViewerss.exe 80 PID 932 wrote to memory of 1164 932 ExcelViewerss.exe 80 PID 932 wrote to memory of 1164 932 ExcelViewerss.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExcelViewerss.exe"C:\Users\Admin\AppData\Local\Temp\ExcelViewerss.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\ExcelViewerss.exe"C:\Users\Admin\AppData\Local\Temp\ExcelViewerss.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nJ3x4QfDj5RhAt3p.bat" "3⤵PID:1164
-
-