Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10_x64 -
resource
win10 -
submitted
09/07/2020, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
6fEDPaC5pBfRZVL.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6fEDPaC5pBfRZVL.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
6fEDPaC5pBfRZVL.exe
-
Size
1.1MB
-
MD5
9eecfb090fcf1859e91a84aed74320b3
-
SHA1
bdcb9a733ce4bc426895c3e9e78aedd9aa31f83b
-
SHA256
365759dd03965a10bfb50c17454055b0272a0cf33b78aa78441ab6cc996e1090
-
SHA512
f1e042d6cd350c8f4df7992e631ad0de86a86c36c58da0c5bac545272adc556b2f5c969bc2f31dae5119fcf52f6111348b9cc34bcc989621aaad827a3fa845bd
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3800 3524 WerFault.exe 66 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3800 WerFault.exe Token: SeBackupPrivilege 3800 WerFault.exe Token: SeDebugPrivilege 3800 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fEDPaC5pBfRZVL.exe"C:\Users\Admin\AppData\Local\Temp\6fEDPaC5pBfRZVL.exe"1⤵PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 11562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3800
-