Analysis
-
max time kernel
136s -
max time network
93s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 12:22
Static task
static1
Behavioral task
behavioral1
Sample
T. HALK BANKASI A.S.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
T. HALK BANKASI A.S.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
T. HALK BANKASI A.S.exe
-
Size
489KB
-
MD5
be55dd6e2a8fb0d8e12fa824aa57d8c2
-
SHA1
cbab35a49fa6c4597ccbcf8ff19b3a880457ff8d
-
SHA256
d25f524faf11aee50288503f06409544fe07433df48455e89b2376de13255ff5
-
SHA512
75f8f91a5abe004aff29a15d21616580c61aac677a04cfee9893a9475242f33d25212bc432c53d5f4b4c38a85366fbe3493b897cee0824b4867111cf9f0d7930
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2436 3944 WerFault.exe 65 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3944 T. HALK BANKASI A.S.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe 2436 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3944 T. HALK BANKASI A.S.exe Token: SeRestorePrivilege 2436 WerFault.exe Token: SeBackupPrivilege 2436 WerFault.exe Token: SeDebugPrivilege 2436 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\T. HALK BANKASI A.S.exe"C:\Users\Admin\AppData\Local\Temp\T. HALK BANKASI A.S.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 12762⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-