Analysis
-
max time kernel
115s -
max time network
115s -
platform
windows10_x64 -
resource
win10 -
submitted
12-07-2020 08:08
Static task
static1
Behavioral task
behavioral1
Sample
REV- PI 1696195.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
REV- PI 1696195.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
REV- PI 1696195.exe
-
Size
386KB
-
MD5
098b98588b0faa853692e46398be8f28
-
SHA1
24cc7fed9be45c81c3d01f49e5951ef04cbfe0f9
-
SHA256
476da428009c5570ace1ede955e7b11337e173eac8cb987c154e2be24468306f
-
SHA512
076fc393a4fe0bba02ed0357b5c0e9bcbc8d3e56a089ac9a34e3c7627b8c08577380a7e2acc9316dae20f98b00a2b838775556b1686be0111fae0458823718b9
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3800 3588 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe 3800 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 3800 WerFault.exe Token: SeBackupPrivilege 3800 WerFault.exe Token: SeDebugPrivilege 3800 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\REV- PI 1696195.exe"C:\Users\Admin\AppData\Local\Temp\REV- PI 1696195.exe"1⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 11362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3800
-