Analysis

  • max time kernel
    139s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    30-06-2020 13:20

General

  • Target

    Purchase Order.exe

  • Size

    635KB

  • MD5

    a16e39975fd3c0f0c707f661102813e1

  • SHA1

    e729381aa629fdfb01cec05f2f747dfe99a5594d

  • SHA256

    aec14877d4e03e342e0f010e0d6c25aea5492f94ddbd7d48ab41607f609bb87b

  • SHA512

    b3ae3e974193dd8ca2e599d077a3f8e01831b06131069d07ffe3245ad09d13bbf11ee2cf65679bc74ebd08a24a60bd9e31d9ed4b733340a9fc921a582060e4da

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3724
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 924
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/588-0-0x0000000004590000-0x0000000004591000-memory.dmp
    Filesize

    4KB

  • memory/588-1-0x0000000004590000-0x0000000004591000-memory.dmp
    Filesize

    4KB

  • memory/588-3-0x0000000004D40000-0x0000000004D41000-memory.dmp
    Filesize

    4KB