Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows10_x64 -
resource
win10 -
submitted
10-07-2020 10:21
Static task
static1
Behavioral task
behavioral1
Sample
HALKBANK.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
HALKBANK.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
HALKBANK.exe
-
Size
2.8MB
-
MD5
fe768517f29326fe6c77a2ec75ebb115
-
SHA1
5f6996bc64096c6603ff732cf80b7a0336e75d45
-
SHA256
283e544c4bb4dcba6f6b982e53d33bb1b2bf342314f92b144bc98f4ebafbce05
-
SHA512
99a58f69eb138c29e2360a057536ae242b69d7c5cd1b71d06f5b9dcf3d74ecea887a6af0716f43f373c2bea3d2ab879d51526bfcc2ff74967e6c88a945ea1d14
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3568 2460 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2460 HALKBANK.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2460 HALKBANK.exe Token: SeRestorePrivilege 3568 WerFault.exe Token: SeBackupPrivilege 3568 WerFault.exe Token: SeDebugPrivilege 3568 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 12722⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-