Analysis
-
max time kernel
130s -
max time network
130s -
platform
windows10_x64 -
resource
win10 -
submitted
09-07-2020 08:25
Static task
static1
Behavioral task
behavioral1
Sample
NEWPURCHASEORDER-709.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
NEWPURCHASEORDER-709.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
NEWPURCHASEORDER-709.exe
-
Size
385KB
-
MD5
d82697b49947ccfa6a4efb06b3979cbb
-
SHA1
bcb6ee3200e31ebd5de9fd0b67aad7f6fa18a312
-
SHA256
a46f78f7e28f2091db3e5c505f6c2811397464d6220c52a747cbde491584ca2b
-
SHA512
7bac26ed1578fba7476e4b0e41baf8a62c7c2860c7046392120b784d24c9de674ebb2066006f964808f21c5fcae50627c23b237b588a2401fe8764e7634da3b6
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1852 3404 WerFault.exe NEWPURCHASEORDER-709.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
WerFault.exepid process 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe 1852 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1852 WerFault.exe Token: SeBackupPrivilege 1852 WerFault.exe Token: SeDebugPrivilege 1852 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEWPURCHASEORDER-709.exe"C:\Users\Admin\AppData\Local\Temp\NEWPURCHASEORDER-709.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 8762⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken