Analysis
-
max time kernel
109s -
max time network
131s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 13:41
Static task
static1
Behavioral task
behavioral1
Sample
vbc.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
vbc.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
vbc.exe
-
Size
335KB
-
MD5
dcbed5a043d3eca73e3451f66718882f
-
SHA1
48d598c8d8cdef964d51c20fcf90421abb4da85a
-
SHA256
8114e5e30720952dbf0515a5f3801c7c0ef51844758e25b100b768a29c01155a
-
SHA512
cc82b9c701dacd25be9038be9c506b36a75d495cb96143e77d050562f21a4c83876826203bce0766ab34369569efafe9f7415cab8ae68582a3219f6e624e80c9
Score
7/10
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Program crash 1 IoCs
pid pid_target Process procid_target 2900 2416 WerFault.exe 67 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2900 WerFault.exe Token: SeBackupPrivilege 2900 WerFault.exe Token: SeDebugPrivilege 2900 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"1⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 9162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:2900
-