Analysis
-
max time kernel
131s -
max time network
98s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
08/07/2020, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
Akbank Hesap Özetiniz.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Akbank Hesap Özetiniz.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Akbank Hesap Özetiniz.exe
-
Size
850KB
-
MD5
960b0304ac2537192e73521cc798876f
-
SHA1
b9f8ffe26efd5c7b3cbc55027dc099f3573690b2
-
SHA256
7c19cbbbb385a448d0033fe89cf139fff95ea9760ac2f0e9fa9acac60d180b81
-
SHA512
fea2058080344068600acc5e0af3ee206f4bbc6b1d2a63e0714df522a62fbc62ab69dcc381ecde7b14d9cca531a05953d8e20b132a3a0031923a6cb563844b5d
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3608 1588 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe 3608 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3608 WerFault.exe Token: SeBackupPrivilege 3608 WerFault.exe Token: SeDebugPrivilege 3608 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Akbank Hesap Özetiniz.exe"C:\Users\Admin\AppData\Local\Temp\Akbank Hesap Özetiniz.exe"1⤵PID:1588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 11482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608
-