Analysis
-
max time kernel
137s -
max time network
101s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 11:20
Static task
static1
Behavioral task
behavioral1
Sample
Document din 40-312296854.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Document din 40-312296854.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Document din 40-312296854.exe
-
Size
437KB
-
MD5
961b7aea9625d6a84e06f18afd8f4027
-
SHA1
59585bd71bcf196b794b6503fddc43405f9dedcf
-
SHA256
84f7bbb691b431355264cf4e815bf32281c00efe34805b47b7e8aef84fbe610e
-
SHA512
907dd33d077919f84fbf0721770bd708b10b9503bd0ff1ae684ba9c46d3eac7aa9f4c59d4bdb71df97068dd8de1c73a0a37858825447af905b8dceb596a607d9
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3968 992 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe 3968 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3968 WerFault.exe Token: SeBackupPrivilege 3968 WerFault.exe Token: SeDebugPrivilege 3968 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Document din 40-312296854.exe"C:\Users\Admin\AppData\Local\Temp\Document din 40-312296854.exe"1⤵PID:992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 9162⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-