Analysis
-
max time kernel
73s -
max time network
147s -
platform
windows10_x64 -
resource
win10 -
submitted
08/07/2020, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
Urgent orders _PDF____________________________________________.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Urgent orders _PDF____________________________________________.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
Urgent orders _PDF____________________________________________.exe
-
Size
634KB
-
MD5
0a9a4fb69a373964f94e17b42cade496
-
SHA1
d82372b122c84c41b28ed8988d2a2d7cc7e9b0e2
-
SHA256
2044b097243f5bbb3ef44651d4845d064b3d89e491a1d68d78aa99fea74ae50f
-
SHA512
cc6cb4e12f9769098b3ce52e0726fca1faa5eecaffed62e84ae8e24d4b9bd15d0cf4a9a3f87bdf33d7322e60e09eb12d3c0e62e582c4f0b05643b256fa975833
Score
3/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe 3940 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3940 792 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3940 WerFault.exe Token: SeBackupPrivilege 3940 WerFault.exe Token: SeDebugPrivilege 3940 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Urgent orders _PDF____________________________________________.exe"C:\Users\Admin\AppData\Local\Temp\Urgent orders _PDF____________________________________________.exe"1⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 792 -s 11562⤵
- Suspicious behavior: EnumeratesProcesses
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3940
-