Analysis
-
max time kernel
141s -
max time network
101s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
09-07-2020 14:29
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_MD662H_PO-783837.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ_MD662H_PO-783837.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
RFQ_MD662H_PO-783837.exe
-
Size
589KB
-
MD5
f607f0ce8f8d6b58da6e8fe681bb8674
-
SHA1
fbe64f8fc5795dc7b0ea7551e0900f799ac16d27
-
SHA256
60ecae13c61f3b052a60c0937095f8b485ab10be58502c6bfbf4bec59f4e35ed
-
SHA512
6e96c369dccc9f8dd41948883aa8a98f7528bc112bb86eb2e60bd276d4b39980a999feaee63eb601352fcee67aae80f8cfccdb8747f0fb6a7bcec07340209a33
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2236 4004 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2236 WerFault.exe Token: SeBackupPrivilege 2236 WerFault.exe Token: SeDebugPrivilege 2236 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ_MD662H_PO-783837.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_MD662H_PO-783837.exe"1⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 11402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-