Analysis
-
max time kernel
68s -
max time network
119s -
platform
windows10_x64 -
resource
win10 -
submitted
10-07-2020 13:36
Static task
static1
Behavioral task
behavioral1
Sample
shipping invoic.pdf.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
shipping invoic.pdf.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
shipping invoic.pdf.exe
-
Size
433KB
-
MD5
2cf842fe3ba47b8dba8804bfb0bf6a2d
-
SHA1
dc8fde935e8f186d398fe39743e4a78cc163ae04
-
SHA256
a0fa5e8d28d67d9c239fddc6b9c859eb0ca04275b9ed043adcd9cafbebcb5600
-
SHA512
622a3d68b9aeeefd4ddfae48cfdcdf18a9134dc13917e3d271b166e41f399346f089dbc63b9ba46547a3f3c797ba68eb2af26e4a84bc19954d9f91e506d33d33
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3812 3984 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3812 WerFault.exe Token: SeBackupPrivilege 3812 WerFault.exe Token: SeDebugPrivilege 3812 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\shipping invoic.pdf.exe"C:\Users\Admin\AppData\Local\Temp\shipping invoic.pdf.exe"1⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 9122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-