Analysis

  • max time kernel
    65s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    08-07-2020 06:47

General

  • Target

    7599525244gZ.exe

  • Size

    883KB

  • MD5

    89f79b70ca375bcf96333974bac723f0

  • SHA1

    ce93da121de90a87a93b09a98f2d3564afe75079

  • SHA256

    81967adfc60e1b5895f81d7bc1d1fdcb000f451a1524d56f831f43232b6841ff

  • SHA512

    e709a0b0ea790dc0b8bbed49d037cf18ce62f068b4fca480f5d8eccf9bd8a1aa9d84847a55a10695a7436dca4e6f253682695660c2ac4eab9b1cd4a7c5ecc982

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7599525244gZ.exe
    "C:\Users\Admin\AppData\Local\Temp\7599525244gZ.exe"
    1⤵
      PID:3588
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 1148
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:3828

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3828-0-0x0000000004380000-0x0000000004381000-memory.dmp

      Filesize

      4KB

    • memory/3828-1-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

      Filesize

      4KB