Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows10_x64 -
resource
win10 -
submitted
09-07-2020 12:17
Static task
static1
Behavioral task
behavioral1
Sample
ANNEX SALES CONTRACT DOC SIGNED.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ANNEX SALES CONTRACT DOC SIGNED.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
ANNEX SALES CONTRACT DOC SIGNED.exe
-
Size
581KB
-
MD5
5292c2a557d193f22ba04f9f7a81e521
-
SHA1
94425b344d5a6dde203d38948659659229df6119
-
SHA256
a8c715b2f18e39ff613f8fdd17388a7b1e51044a4a147b52cb40072fdfc9b49a
-
SHA512
732ad21febdd1844a37bd48935c25a3defb25fe7ab05f1519ca59dfdcf7f9e18a5d8671dc683131773b40e5056fbbc3c7cff7af45030146d76d71346d3614398
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3832 3104 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3832 WerFault.exe Token: SeBackupPrivilege 3832 WerFault.exe Token: SeDebugPrivilege 3832 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ANNEX SALES CONTRACT DOC SIGNED.exe"C:\Users\Admin\AppData\Local\Temp\ANNEX SALES CONTRACT DOC SIGNED.exe"1⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 11362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-