Analysis
-
max time kernel
76s -
max time network
116s -
platform
windows10_x64 -
resource
win10 -
submitted
08-07-2020 06:39
Static task
static1
Behavioral task
behavioral1
Sample
RFP_NDT_ServicesandEquipments_Proposal_Project_dwg.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFP_NDT_ServicesandEquipments_Proposal_Project_dwg.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
RFP_NDT_ServicesandEquipments_Proposal_Project_dwg.exe
-
Size
797KB
-
MD5
d9a372fd1f0401897210599c330124b6
-
SHA1
570eff9c5b310ef0a577804be2ab2dcf470a139f
-
SHA256
ff4bcfd3663088b0e8fed48b19bf950f8a6680fea9d3b0a478ac1fbfbcefeeef
-
SHA512
6df19c26284e5aa2951692ecdeb59ce7cb4861b181c468857be58c51344a2807450337ca1c8e3539422d44cb8939f169b7bf1b957aff0e7e7bf7995876a4a928
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1940 2920 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1940 WerFault.exe Token: SeBackupPrivilege 1940 WerFault.exe Token: SeDebugPrivilege 1940 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFP_NDT_ServicesandEquipments_Proposal_Project_dwg.exe"C:\Users\Admin\AppData\Local\Temp\RFP_NDT_ServicesandEquipments_Proposal_Project_dwg.exe"1⤵PID:2920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 11482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1940
-