Analysis
-
max time kernel
66s -
max time network
90s -
platform
windows10_x64 -
resource
win10 -
submitted
10-07-2020 13:31
Static task
static1
Behavioral task
behavioral1
Sample
inquiry.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
inquiry.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
inquiry.exe
-
Size
449KB
-
MD5
f68a1350469f33284215b4bdeece9684
-
SHA1
a18e517eb1409c06d73cae87d3253ea83ad8c97f
-
SHA256
ca8f27e8398ec81d1bbaa5714ef8bb4c557edeb706690bc031a3089c990bbef1
-
SHA512
8d47ca1fe59f89112b09cde3648e8b2bc4d29cc9b5abcb3019b4d35fdf49d8e9671ca61674154a9ee02630b137af456b08e691996d04cfb1a3b72445d261867e
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3792 3536 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe 3792 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3792 WerFault.exe Token: SeBackupPrivilege 3792 WerFault.exe Token: SeDebugPrivilege 3792 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\inquiry.exe"C:\Users\Admin\AppData\Local\Temp\inquiry.exe"1⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 9122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792
-